Mostrando 221 - 240 Resultados de 292 Para Buscar '"GNU"', tiempo de consulta: 0.09s Limitar resultados
  1. 221
    Publicado 2014
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- About the Authors -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I: Essential Knowledge -- Chapter 1: Getting Started -- Installing Hudson -- Trying Hudson with the Easy Installation Method -- Installing Hudson as a Windows Service -- Installing Hudson to Start When a User Logs in to Mac OS X -- Installing Hudson Within Tomcat -- Installing Hudson on GNU/Linux -- Basic Hudson Configuration -- Your First Job: Back Everything Up -- Summary -- Chapter 2: Hudson Precondition Primer -- Hudson in the Software Development Lifecycle -- Developer -- Tester -- Manager -- Architect -- Release Engineer -- Example: Orchestration of Roles Around Hudson -- Software Development as Marionette Theatre Production -- Development Platforms -- Software Configuration Management -- Builders -- Integrated Development Environments -- Eclipse -- Oracle JDeveloper -- IntelliJ IDEA -- NetBeans -- Testing Tools -- Soft Correctness Testing Tools -- Summary -- Chapter 3: Basic Concepts -- Intermediate Hudson Configuration -- Adding Source Code Management (SCM) to Your Jobs -- Your Second Job: A Simple Java Program -- Your Third Job: A Simple Servlet -- Using the Plugin Center -- Your Fourth Job: Advanced Backup Options -- Hudson Authentication Security -- Adding Quality Assurance Systems -- Build Notifiers -- Configuring E-mail Server -- Configuring the Job to Send Build Status Message -- Summary -- Part II: Applying Hudson -- Chapter 4: Hudson as a Continuous Integration Server -- What Is Continuous Integration? …”
    Libro electrónico
  2. 222
    Publicado 2023
    Tabla de Contenidos: “…-- Generating a native SDK for on-device development -- Understanding the types of cross-development SDKs -- Using the Standard SDK -- Using the Extensible SDK -- Building an image using devtool -- Running an image on QEMU -- Creating a recipe from an external Git repository -- Building a recipe using devtool -- Deploying to the target using devtool -- Extending the SDK -- Summary -- Chapter 10: Debugging with the Yocto Project -- Differentiating metadata and application debugging -- Tracking image, package, and SDK contents -- Debugging packaging -- Inspecting packages -- Logging information during task execution -- Debugging metadata variables -- Utilizing a development shell -- Using the GNU Debugger for debugging -- Summary -- Chapter 11: Exploring External Layers -- Powering flexibility with layers -- Detailing a layer's source code -- Adding meta layers -- The Yocto Project layer ecosystem -- Summary -- Chapter 12: Creating Custom Layers -- Making a new layer -- Adding metadata to the layer -- Creating an image -- Adding a package recipe -- Adding support to a new machine definition -- Using a custom distribution -- MACHINE_FEATURES versus DISTRO_FEATURES -- Understanding the scope of a variable -- Summary -- Chapter 13: Customizing Existing Recipes -- Understanding common use cases -- Extending a task -- Adding extra options to recipes based on Autotools -- Applying a patch -- Adding extra files to the existing packages -- Understanding file searching paths -- Changing recipe feature configuration -- Configuration fragments for Kconfig-based projects…”
    Libro electrónico
  3. 223
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Linux Basics -- Chapter 1: Getting to Know Linux -- The structure of a Linux system -- The Linux kernel and Linux-based operating systems -- Kernel versus user space -- The Linux kernel and the GNU project -- Open source software licenses -- Permissive and copyleft licenses -- Patent grant, tivoization, and SaaS concerns -- Linux distributions -- Package managers and package repositories -- Differences between distributions -- Linux usage in the modern world -- Summary -- Chapter 2: The Shell and Its Commands -- What is a shell? …”
    Libro electrónico
  4. 224
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Name -- Copyright and Credits -- Dedicated -- Contributors -- Table of Contents -- Preface -- Part 1: Begin with NGINX -- Chapter 1: Downloading and Installing NGINX -- Installing NGINX via package managers -- NGINX-provided packages -- Compiling NGINX from source -- Installing GNU Compiler Collection -- The PCRE library -- The zlib library -- OpenSSL -- Downloading and compiling the NGINX source code -- Websites and resources -- Version branches -- Features -- Downloading and extracting -- Exploring the options for configuring the compilation -- The easy way -- Path options -- Build configuration issues -- Compiling and installing -- Controlling the NGINX service -- Daemons and services -- Users and groups -- NGINX command-line switches -- Starting and stopping the daemon -- Testing the configuration -- Other switches -- Adding NGINX as a system service -- systemd unit file -- Handling system errors -- A quick overview of the possibilities offered by NGINX Plus -- Summary -- Chapter 2: Basic NGINX Configuration -- Delving into the configuration file syntax -- Configuration directives -- Organization and inclusions -- Directive blocks -- Advanced language rules -- Looking at the base module directives -- What are base modules? …”
    Libro electrónico
  5. 225
    Publicado 2017
    Tabla de Contenidos: “…SECURING COMMUNICATIONS -- The Favored Operating System: Linux -- Step 1: Let Us Get Secure: Encrypting Files and Using Secure Shell -- Gnu Privacy Guard -- Encrypting and Decrypting Using GNU Privacy Guard -- Secure Shell Access to Servers -- Moving Files Securely -- Exercise for the Reader -- 4. …”
    Libro electrónico
  6. 226
    por Rash, Michael
    Publicado 2007
    Tabla de Contenidos:
    Libro electrónico
  7. 227
    por Loshin, Peter
    Publicado 2013
    Tabla de Contenidos: “…3.3.9 KeePassX3.3.10 Metadata Anonymization Toolkit; 3.3.11 Claws Mail; 3.3.12 GNU Privacy Guard; 4 Tor Relays, Bridges, and Obfsproxy; 4.1 When Basic Tor Is Not Enough; 4.1.1 How China Blocked Tor; 4.1.2 Is Tor Down, or Do You Need a Bridge; 4.2 Bridge Relays; 4.2.1 Getting a Bridge Relay Using BridgeDB; 4.2.2 Getting Bridge Relays by E-mail; 4.2.3 Other Ways to Get Bridge Relays; 4.3 Setting Up to Use a Bridge Relay; 4.4 Pluggable Transports and Obfsproxy; 4.4.1 Pluggable Transport Proxies; 4.4.2 Flash Proxy; 4.4.3 Using Pluggable Transports; 5 Sharing Tor Resources…”
    Libro electrónico
  8. 228
    por Peikari, Cyrus
    Publicado 2004
    Tabla de Contenidos: “…Debugging with ptrace; 3.4.3. The GNU BFD Library; 3.4.4. Disassembling with libopcodes; 3.5. …”
    Libro electrónico
  9. 229
    por Yaghmour, Karim
    Publicado 2003
    Tabla de Contenidos: “…Development Tools; 4.2. GNU Cross-Platform Development Toolchain; 4.2.1.2. …”
    Libro electrónico
  10. 230
    por Kirch, Olaf
    Publicado 2000
    Tabla de Contenidos: “…Handling Name Server Lookups More About Network Address Translation Important Network Features Inetd Super Server Tcpd Access Control Facility Services and Protocols Files Remote Procedure Call Configuring Remote Login and Execution Network Information System Getting Acquainted with NIS NIS Versus NIS+ Client Side of NIS Running an NIS Server NIS Server Security Setting Up an NIS Client with GNU libc Choosing the Right Maps Using the passwd and group Maps Using NIS with Shadow Support Network File System Preparing NFS Mounting an NFS Volume NFS Daemons Exports File Kernel-Based NFSv2 Server Support Kernel-Based NFSv3 Server Support…”
    Libro electrónico
  11. 231
    Publicado 2006
    Tabla de Contenidos: “…Objective 6: Use Red Hat Package Manager (RPM); 4.6.2. Running rpm; 5. GNU and Unix Commands (Topic 1.103); 5.1.1.2. Entering commands at the command prompt…”
    Libro electrónico
  12. 232
    Publicado 2017
    Tabla de Contenidos: “…How It Works -- Running the Script -- The Results -- Hacking the Script -- Chapter 4: Tweaking Unix -- #27 Displaying a File with Line Numbers -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #28 Wrapping Only Long Lines -- The Code -- How It Works -- Running the Script -- The Results -- #29 Displaying a File with Additional Information -- The Code -- How It Works -- Running the Script -- The Results -- #30 Emulating GNU-Style Flags with quota -- The Code -- How It Works -- Running the Script -- The Results -- #31 Making sftp Look More Like ftp -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #32 Fixing grep -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #33 Working with Compressed Files -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #34 Ensuring Maximally Compressed Files -- The Code -- How It Works -- Running the Script -- The Results -- Chapter 5: System Administration: Managing Users -- #35 Analyzing Disk Usage -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #36 Reporting Disk Hogs -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #37 Improving the Readability of df Output -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #38 Figuring Out Available Disk Space -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #39 Implementing a Secure locate -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #40 Adding Users to the System -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #41 Suspending a User Account -- The Code -- How It Works…”
    Libro electrónico
  13. 233
    Publicado 2001
    Tabla de Contenidos: “…On Publishing Cryptographic Algorithms -- Two More Open-Source Fallacies -- The Microsoft Fallacy -- The Java Fallacy -- An Example: GNU Mailman Security -- More Evidence: Trojan Horses -- To Open Source or Not to Open Source -- Another Security Lesson from Buffer Overflows -- Beating the Drum -- Conclusion -- 5 Guiding Principles for Software Security -- Principle 1: Secure the Weakest Link -- Principle 2: Practice Defense in Depth -- Principle 3: Fail Securely -- Principle 4: Follow the Principle of Least Privilege -- Principle 5: Compartmentalize -- Principle 6: Keep It Simple -- Principle 7: Promote Privacy -- Principle 8: Remember That Hiding Secrets Is Hard -- Principle 9: Be Reluctant to Trust -- Principle 10: Use Your Community Resources -- Conclusion -- 6 Auditing Software -- Architectural Security Analysis -- Attack Trees -- Reporting Analysis Findings -- Implementation Security Analysis -- Auditing Source Code -- Source-level Security Auditing Tools -- Using RATS in an Analysis -- The Effectiveness of Security Scanning of Software -- Conclusion -- 7 Buffer Overflows -- What Is a Buffer Overflow? …”
    Libro electrónico
  14. 234
    por Gödl, Robert
    Publicado 2022
    Tabla de Contenidos: “…6.2.5 FreeCAD - Alternative zu AutoCAD -- 6.2.6 GIMP - Alternative zu Photoshop -- 6.2.7 GNU Paint - Alternative zu Microsoft Paint -- 6.2.8 Darktable - Alternative zu Adobe Lightroom -- 6.2.9 Evolution - Verbindung zu Microsoft Exchange (Office 365) -- 6.2.10 Digikam - Alternative zu ACDSee Photo Studio und ähnlichen Fotosammlungen -- 6.2.11 Kdenlive - Alternative zu Adobe Premiere -- 6.3 Weitere Software -- Kapitel 7: Sicherheit unter Ubuntu -- 7.1 Ist Ubuntu sicherer als Windows? …”
    Libro electrónico
  15. 235
    Publicado 2021
    Tabla de Contenidos: “…Parallel Pipelines -- Overview -- Serial Processing -- Looping Over Numbers -- Looping Over Lines -- Looping Over Files -- Parallel Processing -- Introducing GNU Parallel -- Specifying Input -- Controlling the Number of Concurrent Jobs -- Logging and Output -- Creating Parallel Tools -- Distributed Processing -- Get List of Running AWS EC2 Instances -- Running Commands on Remote Machines -- Distributing Local Data Among Remote Machines -- Processing Files on Remote Machines -- Summary…”
    Libro electrónico
  16. 236
    Publicado 2023
    Tabla de Contenidos: “…_OS -- 5.4.2 VirtualBox - Windows unter Linux installieren -- Kapitel 6: Anwendungen -- 6.1 Alternativen zu Windows-Anwendungen -- 6.1.1 Master PDF Editor - Alternative zu Adobe Acrobat Pro -- 6.1.2 Scribus - freie Alternative zu Adobe Acrobat Pro, Affinity Publisher und VivaDesigner -- 6.1.3 Onlyoffice - Alternative zu Microsoft Office -- 6.1.4 BricsCAD - Alternative zu AutoCAD -- 6.1.5 FreeCAD - freie Alternative zu AutoCAD -- 6.1.6 GIMP - Alternative zu Photoshop -- 6.1.7 GNU Paint - Alternative zu Microsoft Paint -- 6.1.8 Darktable - Alternative zu Adobe Lightroom -- 6.1.9 Evolution - Verbindung zu Microsoft Exchange (Microsoft 365) -- 6.1.10 digiKam - Alternative zu ACDSee Photo Studio und ähnlichen Fotosammlungen -- 6.1.11 Kdenlive - Alternative zu Adobe Premiere -- 6.2 Weitere Software -- Kapitel 7: Sicherheit unter Pop!…”
    Libro electrónico
  17. 237
    Publicado 2021
    Tabla de Contenidos: “…. -- 1.3.5 FUNCIONES DE LOS SISTEMAS OPERATIVOS -- 1.3.6 DISTINTOS SISTEMAS OPERATIVOS -- 1.3.6.1 LA FAMILIA MICROSOFT WINDOWS -- 1.3.6.2 LA FAMILIA GNU/LINUX -- 1.3.6.3 DISTRIBUCIONES LINUX -- 1.4 SUITES OFIMÁTICAS -- 1.4.1 LA SUITE MICROSOFT OFFICE -- 1.4.1.1 WORD -- 1.4.1.2 EXCEL -- 1.4.1.3 POWERPOINT -- 1.4.2 LA SUITE OPENOFFICE -- 1.4.2.1 WRITER -- 1.4.2.2 CALC -- 1.4.2.3 IMPRESS -- 1.4.2.4 MATH -- 1.5 LENGUAJES DE PROGRAMACIÓN -- 1.5.1 CLASIFICACIÓN DE LOS LENGUAJES DE PROGRAMACIÓN -- 1.5.1.1 LENGUAJES DE BAJO NIVEL -- 1.5.1.2 LENGUAJES DE MEDIO NIVEL -- 1.5.1.3 LENGUAJES DE ALTO NIVEL -- 1.5.1.4 LENGUAJES COMPILADOS -- 1.5.1.5 LENGUAJES INTERPRETADOS -- 1.5.2 EJEMPLOS DE LENGUAJES DE PROGRAMACIÓN -- 1.6 COMO USAR EL CD DE PUPPYLINUX 2.7183 NOP -- 1.6.1 PUPPYLINUX -- 1.6.2 CÓMO TRABAJAR CON EL CD DE PUPPYLINUX -- 1.6.3 APLICACIONES DISPONIBLES EN EL LIVECD -- 1.7 BIBLIOGRAFÍA -- UNIDAD 2: INTRODUCCIÓN A LA PROGRAMACIÓN - PARTE I -- 2.1 EL LENGUAJE DE PROGRAMACIÓN GNUOCTAVE -- 2.2 INTRODUCCIÓN AL USO DE GNUOCTAVE -- 2.2.1 ENTORNO INTERACTIVO DE TRABAJO -- 2.2.2 CONSTANTES Y VARIABLES -- 2.2.3 OPERACIONES ARITMÉTICAS…”
    Libro electrónico
  18. 238
    Publicado 2018
    Tabla de Contenidos: “…. -- There's more... -- Using GnuPG to encrypt secrets -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Comparing package versions -- How to do it... -- How it works... -- Chapter 5: Users and Virtual Resources -- Introduction -- Using virtual resources -- How to do it... -- How it works... -- There's more... -- Managing users with virtual resources -- How to do it... -- How it works... -- There's more... -- See also -- Managing users' SSH access -- How to do it... -- How it works... -- There's more... -- Managing users' customization files -- How to do it... -- How it works... -- There's more... -- See also -- Using exported resources -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 6: Managing Resources and Files -- Introduction -- Distributing cron jobs efficiently -- How to do it... -- How it works... -- There's more... -- See also -- Scheduling when resources are to be applied -- How to do it... -- How it works... -- There's more... -- Using host resources -- How to do it... -- How it works... -- There's more... -- Using exported host resources -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using multiple file sources -- How to do it... -- How it works... -- There's more…”
    Libro electrónico
  19. 239
    Publicado 2024
    Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Getting Started -- History and Evolution of the RISC-V CPU -- What You Will Learn -- Ten Reasons to Learn Assembly Language Programming -- Running Programs on RISC-V Systems -- Coding a Simple "Hello World" Program -- Hello World on the Starfive Visionfive 2 -- Programming Hello World in the QEMU Emulator -- Install QEMU on Windows -- Install QEMU on Linux -- Compiling in Emulated Linux -- About Hello World on the ESP32-C3 Microcontroller -- Summary -- Exercises -- Chapter 2: Loading and Adding -- Computers and Numbers -- Negative Numbers -- About Two's Complement -- RISC-V Assembly Instructions -- CPU Registers -- RISC-V Instruction Format -- About the GCC Assembler -- Adding Registers -- 32-bits in a 64-bit World -- Moving Registers -- About Pseudoinstructions -- About Immediate Values -- Loading the Top -- Shifting the Bits -- Loading Larger Numbers into Registers -- More Shift Instructions -- About Subtraction -- Summary -- Exercises -- Chapter 3: Tooling Up -- GNU Make -- Rebuild a Project -- Rule for Building .S files -- Define Variables -- Build with CMake -- Debugging with GDB -- Preparation to Debug -- Setup for Linux -- Start GDB -- Set Up gdb for the ESP32-C3 -- Debugging with GDB -- Summary -- Exercises -- Chapter 4: Controlling Program Flow -- Creating Unconditional Jumps -- Understanding Conditional Branches -- Using Branch Pseudoinstructions -- Constructing Loops -- Create FOR Loops -- Code While Loops -- Coding If/Then/Else -- Manipulating Logical Operators -- Using AND -- Using XOR -- Using OR -- Adopting Design Patterns -- Converting Integers to ASCII -- Using Expressions in Immediate Constants -- Storing a Register to Memory -- Why Not Print in Decimal? …”
    Libro electrónico
  20. 240
    por Horvath, Joan. author
    Publicado 2014
    Tabla de Contenidos: “…; Safety and ventilation -- Open source: Open source infrastructure ; GNU licenses ; Wikis, forums, and open source repositories ; Open source pros and cons ; Meeting the open source 3D-printing community ; The maker movement ; Makerspaces and hackerspaces ; Contributing to the open source community…”
    Libro electrónico