List of Tables

Table 2.1 Task management—from simple to advanced.
Table 2.2 OS primitives for scheduling.
Table 3.1 Overview of concepts related to CPU-choice.
Table 4.1 Important CANOpen message types.
Table 6.1 Robocopy parameters.
Table 6.2 Selected git commands.
Table 7.1 The most important reserved IP address ranges.
Table 7.2 Sample NAT table.
Table 7.3 The main HTTP commands, and what they do.
Table 7.4 REST rules.
Table 7.5 How IPv4 and IPv6 notation differs.
Table 7.6 Functional differences between IPv4 and IPv6.
Table 7.7 Examples on addresses in the two systems.
Table 7.8 The three types of -casts.
Table 7.9 TCP versus UDP.
Table 7.10 Parameters on application layer protocols.
Table 7.11 Names and terms used with Ethernet cables.
Table 7.12 EIA-568A wiring scheme.
Table 8.1 Network analyzer pro icons.
Table 8.2 Network commands (Linux specific name in parentheses).
Table 9.1 A selection of wireless networks.
Table 9.2 Parameters on application layer protocols.
Table 9.3 Wireshark terms for Wi-Fi nodes.
Table 9.4 Wi-Fi data rate calculation.
Table 9.5 Bluetooth Classic versus BLE.
Table 9.6 Bluetooth Smart connectivity.
Table 10.1 Security terms.
Table 10.2 Secure hashes described in NIST FIPS-180-4.
Table 10.3 Crypto++ – an overview.
Table 10.4 Trusted platform module (TPM) v2.0.
Table 11.1 Sample filter parameters.
Table 11.2 Examples of 16-bit signed integers.
Table 12.1 Statistical symbols.
Table 12.2 Control chart definitions.
Table 12.3 WECO alarm rules from NIST.
Table 12.4 Control chart constants for X-Bar, R- and s-charts.
Table 12.5 Ten days of testing—five samples each day.
Table 12.6 X-Bar and R control lines.
Table 12.7 X-Bar and s control lines.
Table 12.8 Subgroup data with means and ranges.
Table 12.9 Cpk and related values.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset