Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 72
- Operating systems (Computers) 64
- Engineering & Applied Sciences 44
- Computer Science 40
- UNIX (Computer file) 19
- Computer networks 18
- Open source software 18
- Programming 16
- Computer security 12
- Embedded computer systems 12
- Security measures 12
- Development 10
- Computer programs 9
- Computer programming 8
- GNU Emacs 8
- Certification 7
- Computer software 7
- Data processing 7
- UNIX Shells 7
- Application software 6
- Electronic data processing personnel 6
- Examinations 6
- GIMP (Computer file) 6
- Linux (Sistema operativo de ordenadores) 6
- Robots 6
- Software engineering 6
- C (Computer program language) 5
- C++ (Computer program language) 5
- Computer graphics 5
- Computers 5
-
221Publicado 2014Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- About the Authors -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I: Essential Knowledge -- Chapter 1: Getting Started -- Installing Hudson -- Trying Hudson with the Easy Installation Method -- Installing Hudson as a Windows Service -- Installing Hudson to Start When a User Logs in to Mac OS X -- Installing Hudson Within Tomcat -- Installing Hudson on GNU/Linux -- Basic Hudson Configuration -- Your First Job: Back Everything Up -- Summary -- Chapter 2: Hudson Precondition Primer -- Hudson in the Software Development Lifecycle -- Developer -- Tester -- Manager -- Architect -- Release Engineer -- Example: Orchestration of Roles Around Hudson -- Software Development as Marionette Theatre Production -- Development Platforms -- Software Configuration Management -- Builders -- Integrated Development Environments -- Eclipse -- Oracle JDeveloper -- IntelliJ IDEA -- NetBeans -- Testing Tools -- Soft Correctness Testing Tools -- Summary -- Chapter 3: Basic Concepts -- Intermediate Hudson Configuration -- Adding Source Code Management (SCM) to Your Jobs -- Your Second Job: A Simple Java Program -- Your Third Job: A Simple Servlet -- Using the Plugin Center -- Your Fourth Job: Advanced Backup Options -- Hudson Authentication Security -- Adding Quality Assurance Systems -- Build Notifiers -- Configuring E-mail Server -- Configuring the Job to Send Build Status Message -- Summary -- Part II: Applying Hudson -- Chapter 4: Hudson as a Continuous Integration Server -- What Is Continuous Integration? …”
Libro electrónico -
222Publicado 2023Tabla de Contenidos: “…-- Generating a native SDK for on-device development -- Understanding the types of cross-development SDKs -- Using the Standard SDK -- Using the Extensible SDK -- Building an image using devtool -- Running an image on QEMU -- Creating a recipe from an external Git repository -- Building a recipe using devtool -- Deploying to the target using devtool -- Extending the SDK -- Summary -- Chapter 10: Debugging with the Yocto Project -- Differentiating metadata and application debugging -- Tracking image, package, and SDK contents -- Debugging packaging -- Inspecting packages -- Logging information during task execution -- Debugging metadata variables -- Utilizing a development shell -- Using the GNU Debugger for debugging -- Summary -- Chapter 11: Exploring External Layers -- Powering flexibility with layers -- Detailing a layer's source code -- Adding meta layers -- The Yocto Project layer ecosystem -- Summary -- Chapter 12: Creating Custom Layers -- Making a new layer -- Adding metadata to the layer -- Creating an image -- Adding a package recipe -- Adding support to a new machine definition -- Using a custom distribution -- MACHINE_FEATURES versus DISTRO_FEATURES -- Understanding the scope of a variable -- Summary -- Chapter 13: Customizing Existing Recipes -- Understanding common use cases -- Extending a task -- Adding extra options to recipes based on Autotools -- Applying a patch -- Adding extra files to the existing packages -- Understanding file searching paths -- Changing recipe feature configuration -- Configuration fragments for Kconfig-based projects…”
Libro electrónico -
223Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Linux Basics -- Chapter 1: Getting to Know Linux -- The structure of a Linux system -- The Linux kernel and Linux-based operating systems -- Kernel versus user space -- The Linux kernel and the GNU project -- Open source software licenses -- Permissive and copyleft licenses -- Patent grant, tivoization, and SaaS concerns -- Linux distributions -- Package managers and package repositories -- Differences between distributions -- Linux usage in the modern world -- Summary -- Chapter 2: The Shell and Its Commands -- What is a shell? …”
Libro electrónico -
224Publicado 2024Tabla de Contenidos: “…Cover -- Title Name -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Part 1: Begin with NGINX -- Chapter 1: Downloading and Installing NGINX -- Installing NGINX via package managers -- NGINX-provided packages -- Compiling NGINX from source -- Installing GNU Compiler Collection -- The PCRE library -- The zlib library -- OpenSSL -- Downloading and compiling the NGINX source code -- Websites and resources -- Version branches -- Features -- Downloading and extracting -- Exploring the options for configuring the compilation -- The easy way -- Path options -- Build configuration issues -- Compiling and installing -- Controlling the NGINX service -- Daemons and services -- Users and groups -- NGINX command-line switches -- Starting and stopping the daemon -- Testing the configuration -- Other switches -- Adding NGINX as a system service -- systemd unit file -- Handling system errors -- A quick overview of the possibilities offered by NGINX Plus -- Summary -- Chapter 2: Basic NGINX Configuration -- Delving into the configuration file syntax -- Configuration directives -- Organization and inclusions -- Directive blocks -- Advanced language rules -- Looking at the base module directives -- What are base modules? …”
Libro electrónico -
225Publicado 2017Tabla de Contenidos: “…SECURING COMMUNICATIONS -- The Favored Operating System: Linux -- Step 1: Let Us Get Secure: Encrypting Files and Using Secure Shell -- Gnu Privacy Guard -- Encrypting and Decrypting Using GNU Privacy Guard -- Secure Shell Access to Servers -- Moving Files Securely -- Exercise for the Reader -- 4. …”
Libro electrónico -
226
-
227por Loshin, PeterTabla de Contenidos: “…3.3.9 KeePassX3.3.10 Metadata Anonymization Toolkit; 3.3.11 Claws Mail; 3.3.12 GNU Privacy Guard; 4 Tor Relays, Bridges, and Obfsproxy; 4.1 When Basic Tor Is Not Enough; 4.1.1 How China Blocked Tor; 4.1.2 Is Tor Down, or Do You Need a Bridge; 4.2 Bridge Relays; 4.2.1 Getting a Bridge Relay Using BridgeDB; 4.2.2 Getting Bridge Relays by E-mail; 4.2.3 Other Ways to Get Bridge Relays; 4.3 Setting Up to Use a Bridge Relay; 4.4 Pluggable Transports and Obfsproxy; 4.4.1 Pluggable Transport Proxies; 4.4.2 Flash Proxy; 4.4.3 Using Pluggable Transports; 5 Sharing Tor Resources…”
Publicado 2013
Libro electrónico -
228por Peikari, CyrusTabla de Contenidos: “…Debugging with ptrace; 3.4.3. The GNU BFD Library; 3.4.4. Disassembling with libopcodes; 3.5. …”
Publicado 2004
Libro electrónico -
229por Yaghmour, KarimTabla de Contenidos: “…Development Tools; 4.2. GNU Cross-Platform Development Toolchain; 4.2.1.2. …”
Publicado 2003
Libro electrónico -
230por Kirch, OlafTabla de Contenidos: “…Handling Name Server Lookups More About Network Address Translation Important Network Features Inetd Super Server Tcpd Access Control Facility Services and Protocols Files Remote Procedure Call Configuring Remote Login and Execution Network Information System Getting Acquainted with NIS NIS Versus NIS+ Client Side of NIS Running an NIS Server NIS Server Security Setting Up an NIS Client with GNU libc Choosing the Right Maps Using the passwd and group Maps Using NIS with Shadow Support Network File System Preparing NFS Mounting an NFS Volume NFS Daemons Exports File Kernel-Based NFSv2 Server Support Kernel-Based NFSv3 Server Support…”
Publicado 2000
Libro electrónico -
231Publicado 2006Tabla de Contenidos: “…Objective 6: Use Red Hat Package Manager (RPM); 4.6.2. Running rpm; 5. GNU and Unix Commands (Topic 1.103); 5.1.1.2. Entering commands at the command prompt…”
Libro electrónico -
232Publicado 2017Tabla de Contenidos: “…How It Works -- Running the Script -- The Results -- Hacking the Script -- Chapter 4: Tweaking Unix -- #27 Displaying a File with Line Numbers -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #28 Wrapping Only Long Lines -- The Code -- How It Works -- Running the Script -- The Results -- #29 Displaying a File with Additional Information -- The Code -- How It Works -- Running the Script -- The Results -- #30 Emulating GNU-Style Flags with quota -- The Code -- How It Works -- Running the Script -- The Results -- #31 Making sftp Look More Like ftp -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #32 Fixing grep -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #33 Working with Compressed Files -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #34 Ensuring Maximally Compressed Files -- The Code -- How It Works -- Running the Script -- The Results -- Chapter 5: System Administration: Managing Users -- #35 Analyzing Disk Usage -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #36 Reporting Disk Hogs -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #37 Improving the Readability of df Output -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #38 Figuring Out Available Disk Space -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #39 Implementing a Secure locate -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #40 Adding Users to the System -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #41 Suspending a User Account -- The Code -- How It Works…”
Libro electrónico -
233Publicado 2001Tabla de Contenidos: “…On Publishing Cryptographic Algorithms -- Two More Open-Source Fallacies -- The Microsoft Fallacy -- The Java Fallacy -- An Example: GNU Mailman Security -- More Evidence: Trojan Horses -- To Open Source or Not to Open Source -- Another Security Lesson from Buffer Overflows -- Beating the Drum -- Conclusion -- 5 Guiding Principles for Software Security -- Principle 1: Secure the Weakest Link -- Principle 2: Practice Defense in Depth -- Principle 3: Fail Securely -- Principle 4: Follow the Principle of Least Privilege -- Principle 5: Compartmentalize -- Principle 6: Keep It Simple -- Principle 7: Promote Privacy -- Principle 8: Remember That Hiding Secrets Is Hard -- Principle 9: Be Reluctant to Trust -- Principle 10: Use Your Community Resources -- Conclusion -- 6 Auditing Software -- Architectural Security Analysis -- Attack Trees -- Reporting Analysis Findings -- Implementation Security Analysis -- Auditing Source Code -- Source-level Security Auditing Tools -- Using RATS in an Analysis -- The Effectiveness of Security Scanning of Software -- Conclusion -- 7 Buffer Overflows -- What Is a Buffer Overflow? …”
Libro electrónico -
234Ubuntu 22.04 Schnelleinstieg Der einfache Einstieg in die Linux-Welt. Inkl. Ubuntu 22.04 LTS auf DVDpor Gödl, RobertTabla de Contenidos: “…6.2.5 FreeCAD - Alternative zu AutoCAD -- 6.2.6 GIMP - Alternative zu Photoshop -- 6.2.7 GNU Paint - Alternative zu Microsoft Paint -- 6.2.8 Darktable - Alternative zu Adobe Lightroom -- 6.2.9 Evolution - Verbindung zu Microsoft Exchange (Office 365) -- 6.2.10 Digikam - Alternative zu ACDSee Photo Studio und ähnlichen Fotosammlungen -- 6.2.11 Kdenlive - Alternative zu Adobe Premiere -- 6.3 Weitere Software -- Kapitel 7: Sicherheit unter Ubuntu -- 7.1 Ist Ubuntu sicherer als Windows? …”
Publicado 2022
Libro electrónico -
235Publicado 2021Tabla de Contenidos: “…Parallel Pipelines -- Overview -- Serial Processing -- Looping Over Numbers -- Looping Over Lines -- Looping Over Files -- Parallel Processing -- Introducing GNU Parallel -- Specifying Input -- Controlling the Number of Concurrent Jobs -- Logging and Output -- Creating Parallel Tools -- Distributed Processing -- Get List of Running AWS EC2 Instances -- Running Commands on Remote Machines -- Distributing Local Data Among Remote Machines -- Processing Files on Remote Machines -- Summary…”
Libro electrónico -
236Publicado 2023Tabla de Contenidos: “…_OS -- 5.4.2 VirtualBox - Windows unter Linux installieren -- Kapitel 6: Anwendungen -- 6.1 Alternativen zu Windows-Anwendungen -- 6.1.1 Master PDF Editor - Alternative zu Adobe Acrobat Pro -- 6.1.2 Scribus - freie Alternative zu Adobe Acrobat Pro, Affinity Publisher und VivaDesigner -- 6.1.3 Onlyoffice - Alternative zu Microsoft Office -- 6.1.4 BricsCAD - Alternative zu AutoCAD -- 6.1.5 FreeCAD - freie Alternative zu AutoCAD -- 6.1.6 GIMP - Alternative zu Photoshop -- 6.1.7 GNU Paint - Alternative zu Microsoft Paint -- 6.1.8 Darktable - Alternative zu Adobe Lightroom -- 6.1.9 Evolution - Verbindung zu Microsoft Exchange (Microsoft 365) -- 6.1.10 digiKam - Alternative zu ACDSee Photo Studio und ähnlichen Fotosammlungen -- 6.1.11 Kdenlive - Alternative zu Adobe Premiere -- 6.2 Weitere Software -- Kapitel 7: Sicherheit unter Pop!…”
Libro electrónico -
237Publicado 2021Tabla de Contenidos: “…. -- 1.3.5 FUNCIONES DE LOS SISTEMAS OPERATIVOS -- 1.3.6 DISTINTOS SISTEMAS OPERATIVOS -- 1.3.6.1 LA FAMILIA MICROSOFT WINDOWS -- 1.3.6.2 LA FAMILIA GNU/LINUX -- 1.3.6.3 DISTRIBUCIONES LINUX -- 1.4 SUITES OFIMÁTICAS -- 1.4.1 LA SUITE MICROSOFT OFFICE -- 1.4.1.1 WORD -- 1.4.1.2 EXCEL -- 1.4.1.3 POWERPOINT -- 1.4.2 LA SUITE OPENOFFICE -- 1.4.2.1 WRITER -- 1.4.2.2 CALC -- 1.4.2.3 IMPRESS -- 1.4.2.4 MATH -- 1.5 LENGUAJES DE PROGRAMACIÓN -- 1.5.1 CLASIFICACIÓN DE LOS LENGUAJES DE PROGRAMACIÓN -- 1.5.1.1 LENGUAJES DE BAJO NIVEL -- 1.5.1.2 LENGUAJES DE MEDIO NIVEL -- 1.5.1.3 LENGUAJES DE ALTO NIVEL -- 1.5.1.4 LENGUAJES COMPILADOS -- 1.5.1.5 LENGUAJES INTERPRETADOS -- 1.5.2 EJEMPLOS DE LENGUAJES DE PROGRAMACIÓN -- 1.6 COMO USAR EL CD DE PUPPYLINUX 2.7183 NOP -- 1.6.1 PUPPYLINUX -- 1.6.2 CÓMO TRABAJAR CON EL CD DE PUPPYLINUX -- 1.6.3 APLICACIONES DISPONIBLES EN EL LIVECD -- 1.7 BIBLIOGRAFÍA -- UNIDAD 2: INTRODUCCIÓN A LA PROGRAMACIÓN - PARTE I -- 2.1 EL LENGUAJE DE PROGRAMACIÓN GNUOCTAVE -- 2.2 INTRODUCCIÓN AL USO DE GNUOCTAVE -- 2.2.1 ENTORNO INTERACTIVO DE TRABAJO -- 2.2.2 CONSTANTES Y VARIABLES -- 2.2.3 OPERACIONES ARITMÉTICAS…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
238Publicado 2018Tabla de Contenidos: “…. -- There's more... -- Using GnuPG to encrypt secrets -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Comparing package versions -- How to do it... -- How it works... -- Chapter 5: Users and Virtual Resources -- Introduction -- Using virtual resources -- How to do it... -- How it works... -- There's more... -- Managing users with virtual resources -- How to do it... -- How it works... -- There's more... -- See also -- Managing users' SSH access -- How to do it... -- How it works... -- There's more... -- Managing users' customization files -- How to do it... -- How it works... -- There's more... -- See also -- Using exported resources -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 6: Managing Resources and Files -- Introduction -- Distributing cron jobs efficiently -- How to do it... -- How it works... -- There's more... -- See also -- Scheduling when resources are to be applied -- How to do it... -- How it works... -- There's more... -- Using host resources -- How to do it... -- How it works... -- There's more... -- Using exported host resources -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using multiple file sources -- How to do it... -- How it works... -- There's more…”
Libro electrónico -
239Publicado 2024Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Getting Started -- History and Evolution of the RISC-V CPU -- What You Will Learn -- Ten Reasons to Learn Assembly Language Programming -- Running Programs on RISC-V Systems -- Coding a Simple "Hello World" Program -- Hello World on the Starfive Visionfive 2 -- Programming Hello World in the QEMU Emulator -- Install QEMU on Windows -- Install QEMU on Linux -- Compiling in Emulated Linux -- About Hello World on the ESP32-C3 Microcontroller -- Summary -- Exercises -- Chapter 2: Loading and Adding -- Computers and Numbers -- Negative Numbers -- About Two's Complement -- RISC-V Assembly Instructions -- CPU Registers -- RISC-V Instruction Format -- About the GCC Assembler -- Adding Registers -- 32-bits in a 64-bit World -- Moving Registers -- About Pseudoinstructions -- About Immediate Values -- Loading the Top -- Shifting the Bits -- Loading Larger Numbers into Registers -- More Shift Instructions -- About Subtraction -- Summary -- Exercises -- Chapter 3: Tooling Up -- GNU Make -- Rebuild a Project -- Rule for Building .S files -- Define Variables -- Build with CMake -- Debugging with GDB -- Preparation to Debug -- Setup for Linux -- Start GDB -- Set Up gdb for the ESP32-C3 -- Debugging with GDB -- Summary -- Exercises -- Chapter 4: Controlling Program Flow -- Creating Unconditional Jumps -- Understanding Conditional Branches -- Using Branch Pseudoinstructions -- Constructing Loops -- Create FOR Loops -- Code While Loops -- Coding If/Then/Else -- Manipulating Logical Operators -- Using AND -- Using XOR -- Using OR -- Adopting Design Patterns -- Converting Integers to ASCII -- Using Expressions in Immediate Constants -- Storing a Register to Memory -- Why Not Print in Decimal? …”
Libro electrónico -
240por Horvath, Joan. authorTabla de Contenidos: “…; Safety and ventilation -- Open source: Open source infrastructure ; GNU licenses ; Wikis, forums, and open source repositories ; Open source pros and cons ; Meeting the open source 3D-printing community ; The maker movement ; Makerspaces and hackerspaces ; Contributing to the open source community…”
Publicado 2014
Libro electrónico