Practical Hardware Pentesting Second Edition is an example-driven guide that will help you plan attacks hack your embedded devices and secure the hardware infrastructure. Throughout the book you ll explore the functional and security aspects of a device and learn how a system senses and communicate
Java Generics and Collections, 2nd Edition (Second Early Release)
β Scribed by Maurice Naftalin and Philip Wadler
- Publisher
- O'Reilly Media, Inc.
- Year
- 2023
- Tongue
- English
- Leaves
- 300
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Java Generics and Collections has been the go-to guide to generics for more than a decade. This second edition covers Java 21, providing a clear guide to generics from their most common uses to the strangest corner cases, giving you everything you need to know to use and write generic APIs effectively. It covers the collections library thoroughly, so you'll always know how and when to use each collection for any given task. And it explains stream processing, so you'll know which model to use and how they interoperate to get the best out of the platform library.
β¦ Table of Contents
- Subtyping and Wildcards
Subtyping and the Substitution Principle
Wildcards with extends
Wildcards with super
The Get and Put Principle
Arrays
Wildcards Versus Type Parameters
Wildcard Capture
Restrictions on Wildcards - Comparison and Bounds
Comparable
Maximum of a Collection
A Fruity Example
Comparator
Enumerated Types
Multiple Bounds
Bridges
Covariant Overriding - Declarations
Constructors
Static Members
Nested Classes
How Erasure Works - The Main Interfaces of the Java Collections Framework
Collection
Set
List
Queue
Map
Using the Different Collection Types
Sequenced Collections
SequencedCollection
SequencedSet and NavigableSet
Deque
SequencedMap and NavigableMap - Preliminaries
Iterable and Iterators
Implementations
Views
Performance
Memory
Instruction Count and the O-notation
Immutability and Unmodifiability
Contracts
Content-based Organization
Lambdas and Streams
Collections and Thread Safety
Synchronization and the Legacy Collections
Java 2: Synchronized Collections and Fail-Fast Iterators
Java 5: Concurrent Collections - The Collection Interface
Using the Methods of Collection
Implementing Collection
Collection Constructors - The SequencedCollection Interface
- Sets
Set Implementations
HashSet
CopyOnWriteArraySet
EnumSet
UnmodifiableSet
SequencedSet
LinkedHashSet
NavigableSet
TreeSet
ConcurrentSkipListSet
Comparing Set Implementations - Queues
Using the Methods of Queue
Queue Implementations
PriorityQueue
ConcurrentLinkedQueue
BlockingQueue
Using the Methods of BlockingQueue
BlockingQueue Implementations
LinkedBlockingQueue
ArrayBlockingQueue
PriorityBlockingQueue
DelayQueue
SynchronousQueue
TransferQueue
Deques
Deque Implementations
ArrayDeque
LinkedList
BlockingDeque
Implementing BlockingDeque
Comparing Queue Implementations - Lists
Using the Methods of List
List Implementations
ArrayList
LinkedList
CopyOnWriteArrayList
Comparing List Implementations - Maps
Map.Entry
Using the Methods of Map
Map Implementations
HashMap
WeakHashMap
IdentityHashMap
EnumMap
UnmodifiableMap
SequencedMap
LinkedHashMap
NavigableMap
TreeMap
ConcurrentMap
ConcurrentHashMap
ConcurrentNavigableMap
ConcurrentSkipListMap
Comparing Map Implementations - The Collections Class
Generic Algorithms
Changing the Order of List Elements
Changing the Contents of a List
Finding Extreme Values in a Collection
Finding Specific Values in a List
Collection Factories
Wrappers
Synchronized Collections
Unmodifiable Collections
Checked Collections
Other Methods
π SIMILAR VOLUMES
Learn how to use R to turn data into insight, knowledge, and understanding. Ideal for current and aspiring data scientists, this book introduces you to doing data science with R and RStudio, as well as the tidyverseβa collection of R packages designed to work together to make data science fast, flue
Generative modeling is one of the hottest topics in AI. It's now possible to teach a machine to excel at human endeavors such as painting, writing, and composing music. With this practical book, machine learning engineers and data scientists will discover how to re-create some of the most impressive
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate good development practices based on classic software design patterns and new patterns unique to embedded program
With the fast, competitive evolution of new cloud services, particularly those related to security, cloud deployment is now definitively as secure as on-premises servers, and probably even more secure. This practical book surveys current security challenges and shows security professionals, IT archi
The goal of this book is to teach you what AWK is and how to use it effectively. AWK was created in 1977 as a simple programming language for writing short programs that manipulate text and numbers with equal ease. It was meant as a scripting language to complement and work well with Unix tools, fol