Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 72
- Operating systems (Computers) 64
- Engineering & Applied Sciences 44
- Computer Science 40
- UNIX (Computer file) 19
- Computer networks 18
- Open source software 18
- Programming 16
- Computer security 12
- Embedded computer systems 12
- Security measures 12
- Development 10
- Computer programs 9
- Computer programming 8
- GNU Emacs 8
- Certification 7
- Computer software 7
- Data processing 7
- UNIX Shells 7
- Application software 6
- Electronic data processing personnel 6
- Examinations 6
- GIMP (Computer file) 6
- Linux (Sistema operativo de ordenadores) 6
- Robots 6
- Software engineering 6
- C (Computer program language) 5
- C++ (Computer program language) 5
- Computer graphics 5
- Computers 5
-
241Publicado 2022Tabla de Contenidos: “…-- The Linux kernel -- System memory management -- Software program management -- Hardware management -- GNU utilities -- Linux user interfaces -- The X Window system -- The KDE Plasma desktop -- The GNOME desktop -- The command-line interface -- Linux Distributions: Why So Many? …”
Libro electrónico -
242Publicado 2017Tabla de Contenidos: “…. -- Using text editors (Vim and GNU nano) -- Getting ready -- How to do it... -- How it works... -- Keeping Kali updated -- Getting ready -- How to do it... -- How it works... -- Managing Kali services -- Getting ready -- How to do it... -- How it works... -- Configuring and using SSH -- Getting ready -- How to do it... -- How it works... -- Installing Nessus on Kali Linux -- Getting ready -- How to do it... -- How it works... -- Chapter 2: Reconnaissance -- Introduction -- Using Google to find subdomains -- Getting ready -- How to do it... -- How it works... -- Finding e-mail addresses using theHarvester -- Getting ready -- How to do it... -- How it works... -- Enumerating DNS using the host command -- Getting ready -- How to do it... -- How it works... -- Enumerating DNS using DNSRecon -- Getting ready -- How to do it... -- Standard DNS enumeration -- Reverse lookups -- Zone transfer -- How it works... -- Enumerating DNS using the dnsenum command -- Getting ready -- How to do it... -- Default settings -- Brute-force -- How it works... -- Chapter 3: Discovery -- Introduction…”
Libro electrónico -
243Publicado 2017Tabla de Contenidos: “…-- Creating resources with Hiera data -- Building resources from Hiera arrays -- Building resources from Hiera hashes -- The advantages of managing resources with Hiera data -- Managing secret data -- Setting up GnuPG -- Setting up hiera-eyaml-gpg -- Creating an encrypted secret -- How Hiera decrypts secrets -- Editing or adding encrypted secrets -- Distributing the decryption key -- Summary -- Chapter 7: Mastering modules -- Using Puppet Forge modules -- What is the Puppet Forge? …”
Libro electrónico -
244Publicado 2018“…Basic knowledge of C++ and Python programming with the GNU/Linux environment is strongly recommended to assist with understanding the key concepts covered in the book. …”
Libro electrónico -
245Publicado 2023Tabla de Contenidos: “…Security considerations -- Monitoring considerations -- Summary -- Chapter 6: Verifying Your Code -- Technical requirements -- Building code in a CI/CD pipeline -- Compiling Java with javac -- Compiling Java with Maven -- Compiling C with Gnu Compiler Collection (GCC) -- Storing built code as artifacts -- Checking code quality in a CI/CD pipeline -- Enabling Code Quality -- Viewing Code Quality results -- Running automated functional tests in a CI/CD pipeline -- Enabling automated functional tests -- Viewing automated functional test results -- Fuzz testing in a CI/CD pipeline -- The architecture and workflow of fuzz testing -- A fuzz testing workflow -- Viewing the results of fuzz testing -- Extra considerations when fuzz testing -- Fuzz testing with a corpus -- Checking accessibility in a CI/CD pipeline -- Enabling accessibility testing -- Viewing accessibility testing results -- Additional ways to verify your code -- Code coverage -- Browser performance testing -- Load performance testing -- Summary -- Chapter 7: Securing Your Code -- Technical requirements -- Understanding GitLab's security scanning strategy -- GitLab uses open-source scanners -- Scanners are packaged as Docker images -- Some scanners use different analyzers for different languages -- Vulnerabilities don't stop the pipeline -- Findings appear in three different reports -- Pipelines can use non-GitLab-provided scanners -- Using SAST to scan your source code for vulnerabilities -- Understanding SAST -- Enabling SAST -- Configuring SAST -- Viewing SAST's findings -- Using Secret Detection to find private information in your repository -- Understanding Secret Detection -- Enabling and configuring Secret Detection -- Viewing Secret Detection's findings -- Using DAST to find vulnerabilities in web applications -- Understanding DAST -- Enabling and configuring DAST…”
Libro electrónico -
246Publicado 2017Tabla de Contenidos: “…. -- Analyzing FM -- RTL-SDR for GSM analysis -- Working with GNU Radio -- There's more... -- Understanding and exploiting ZigBee -- Getting ready -- How to do it... -- There's more... -- Gaining insight into Z-Wave -- How to do it... -- Understanding and exploiting BLE -- Getting ready -- How to do it... -- There's more... -- Chapter 8: Firmware Security Best Practices -- Introduction -- Preventing memory-corruption vulnerabilities -- Getting ready -- How to do it... -- See also -- Preventing injection attacks -- How to do it... -- See also -- Securing firmware updates -- How to do it... -- Securing sensitive information -- How to do it... -- See also -- Hardening embedded frameworks -- Getting ready -- How to do it... -- Securing third-party code and components -- Getting ready -- How to do it... -- Chapter 9: Mobile Security Best Practices -- Introduction -- Storing data securely -- Getting ready -- How to do it... -- See also -- Implementing authentication controls…”
Libro electrónico -
247Publicado 2017“…If you have basic knowledge of GNU/Linux and storage systems, with no experience of software defined storage solutions and Ceph, but eager to learn then this book is for you What You Will Learn Understand, install, configure, and manage the Ceph storage system Get to grips with performance tuning and benchmarking, and learn practical tips to help run Ceph in production Integrate Ceph with OpenStack Cinder, Glance, and Nova components Deep dive into Ceph object storage, including S3, Swift, and Keystone integration Configure a disaster recovery solution with a Ceph Multi-Site V2 gateway setup and RADOS Block Device mirroring Gain hands-on experience with Ceph Metrics and VSM for cluster monitoring Familiarize yourself with Ceph operations such as maintenance, monitoring, and troubleshooting Understand advanced topics including erasure-coding, CRUSH map, cache pool, and general Ceph cluster maintenance In Detail Ceph is a unified distributed storage system designed for reliability and scalability. …”
Libro electrónico -
248Publicado 2010Tabla de Contenidos: “…Cover -- Contents -- 1 Introduction to the Linux Kernel -- History of Unix -- Along Came Linus: Introduction to Linux -- Overview of Operating Systems and Kernels -- Linux Versus Classic Unix Kernels -- Linux Kernel Versions -- The Linux Kernel Development Community -- Before We Begin -- 2 Getting Started with the Kernel -- Obtaining the Kernel Source -- Using Git -- Installing the Kernel Source -- Using Patches -- The Kernel Source Tree -- Building the Kernel -- Configuring the Kernel -- Minimizing Build Noise -- Spawning Multiple Build Jobs -- Installing the New Kernel -- A Beast of a Different Nature -- No libc or Standard Headers -- GNU C -- No Memory Protection -- No (Easy) Use of Floating Point -- Small, Fixed-Size Stack -- Synchronization and Concurrency -- Importance of Portability -- Conclusion -- 3 Process Management -- The Process -- Process Descriptor and the Task Structure -- Allocating the Process Descriptor -- Storing the Process Descriptor -- Process State -- Manipulating the Current Process State -- Process Context -- The Process Family Tree -- Process Creation -- Copy-on-Write -- Forking -- vfork() -- The Linux Implementation of Threads -- Creating Threads -- Kernel Threads -- Process Termination -- Removing the Process Descriptor -- The Dilemma of the Parentless Task -- Conclusion -- 4 Process Scheduling -- Multitasking -- Linux's Process Scheduler -- Policy -- I/O-Bound Versus Processor-Bound Processes -- Process Priority -- Timeslice -- The Scheduling Policy in Action -- The Linux Scheduling Algorithm -- Scheduler Classes -- Process Scheduling in Unix Systems -- Fair Scheduling -- The Linux Scheduling Implementation -- Time Accounting -- Process Selection -- The Scheduler Entry Point -- Sleeping and Waking Up -- Preemption and Context Switching -- User Preemption -- Kernel Preemption -- Real-Time Scheduling Policies…”
Libro electrónico -
249por Bryant, RussellTabla de Contenidos: “…Base Configuration -- Initial Configuration -- make menuselect -- Updating Asterisk -- Common Issues -- -bash: wget: command not found -- configure: error: no acceptable C compiler found in PATH -- make: gcc: command not found -- configure: error: C++ preprocessor "/lib/cpp" fails sanity check -- configure: error: *** Please install GNU make. It is required to build Asterisk! …”
Publicado 2013
Libro electrónico -
250Publicado 2017Tabla de Contenidos: “…-- Creating resources with Hiera data -- Building resources from Hiera arrays -- Building resources from Hiera hashes -- The advantages of managing resources with Hiera data -- Managing secret data -- Setting up GnuPG -- Adding an encrypted Hiera source -- Creating an encrypted secret -- How Hiera decrypts secrets -- Editing or adding encrypted secrets -- Distributing the decryption key -- Summary -- Chapter 7: Mastering modules -- Using Puppet Forge modules -- What is the Puppet Forge? …”
Libro electrónico -
251Publicado 2011Tabla de Contenidos: “…Cover -- CONTENTS -- List of JumpStarts -- Preface -- CHAPTER 1: WELCOME TO LINUX -- Ubuntu Linux -- The History of UNIX and GNU-Linux -- The Heritage of Linux: UNIX -- Fade to 1983 -- Next Scene, 1991 -- The Code Is Free -- Have Fun! …”
Libro electrónico -
252Publicado 2024Tabla de Contenidos: “…Java Jzero code -- Running the Jzero scanner -- Regular expressions are not always enough -- Summary -- Questions -- Chapter 4: Parsing -- Technical requirements -- Syntax analysis -- Context-free grammars -- Writing context-free grammar rules -- Writing rules for programming constructs -- Using iyacc and BYACC/J -- Declaring symbols in the header section -- Advanced yacc declarations -- Putting together the yacc context-free grammar section -- Understanding yacc parsers -- Fixing conflicts in yacc parsers -- Syntax error recovery -- Putting together a toy example -- Writing a parser for Jzero -- The Jzero lex specification -- The Jzero yacc specification -- Unicon Jzero code -- Java Jzero parser code -- Running the Jzero parser -- Improving syntax error messages -- Adding detail to Unicon syntax error messages -- Adding detail to Java syntax error messages -- Using Merr to generate better syntax error messages -- Summary -- Questions -- Chapter 5: Syntax Trees -- Technical requirements -- Using GNU Make -- Learning about trees -- Defining a syntax tree type -- Parse trees versus syntax trees -- Creating leaves from terminal symbols -- Wrapping tokens in leaves -- Working with YACC's value stack -- Wrapping leaves for the parser's value stack -- Determining which leaves you need -- Building internal nodes from production rules -- Accessing tree nodes on the value stack -- Using the tree node factory method -- Forming syntax trees for the Jzero language -- Debugging and testing your syntax tree -- Avoiding common syntax tree bugs -- Printing your tree in a text format -- Printing your tree using dot -- Summary -- Questions -- Section 2: Syntax Tree Traversals -- Chapter 6: Symbol Tables -- Technical requirements -- Establishing the groundwork for symbol tables -- Declarations and scopes -- Assigning and dereferencing variables…”
Libro electrónico -
253Publicado 2023Tabla de Contenidos: “…- Hilfe am Terminal und Optionen -- 4.3.4 Arbeiten mit Dateien und Ordnern am Terminal -- 4.3.5 Kopieren und Einfügen am Terminal -- 4.4 Drucker- und Scannertreiber -- Kapitel 5: Software unter Linux Mint verwalten -- 5.1 Linux Mint aktuell halten -- 5.2 Software installieren und aktualisieren -- 5.2.1 Der Linux-Mint-Standard - Debian-Pakete -- 5.2.2 Flatpak - noch mehr Software -- 5.2.3 AppImages - ausführbare Dateien -- 5.2.4 PPAs - Software von Ubuntu- und Linux-Mint-Benutzern -- 5.2.5 Snap - der Ubuntu-Standard -- 5.3 Wichtige Treiber installieren -- 5.4 Weitere Schriften installieren -- 5.5 Windows-Software unter Linux Mint -- 5.5.1 Wine - Windows-Software direkt unter Linux Mint -- 5.5.2 VirtualBox - Windows unter Linux installieren -- Kapitel 6: Anwendungen -- 6.1 Standard-Anwendungen unter Linux Mint -- 6.1.1 Firefox - der Webbrowser -- 6.1.2 Thunderbird - der E-Mail-Client -- 6.1.3 LibreOffice - die Office-Suite -- 6.1.4 Multimedia-Anwendungen -- 6.1.5 Hypnotix - Player für Internet-TV (IP-TV) -- 6.1.6 Warpinator - Dateien im lokalen Netzwerk teilen -- 6.1.7 Laufwerke - interne und externe Speichermedien formatieren -- 6.2 Alternativen zu Windows-Anwendungen -- 6.2.1 Master PDF Editor - Alternative zu Adobe Acrobat Pro -- 6.2.2 Scribus - freie Alternative zu Adobe Acrobat Pro, Affinity Publisher und VivaDesigner -- 6.2.3 Onlyoffice - Alternative zu Microsoft Office -- 6.2.4 GIMP - Alternative zu Photoshop -- 6.2.5 GNU Paint - Alternative zu Microsoft Paint -- 6.2.6 Darktable - Alternative zu Adobe Lightroom -- 6.2.7 Evolution - Verbindung zu Microsoft Exchange (Office 365) -- 6.2.8 Digikam - Alternative zu ACDSee Photo Studio und ähnlichen Fotosammlungen -- 6.2.9 Kdenlive - Alternative zu Adobe Premiere…”
Libro electrónico -
254Publicado 2017“…Basic knowledge of ROS, GNU/Linux, and programming concepts is assumed. …”
Libro electrónico -
255Publicado 2017“…It gives the robotics beginner and the ROS newbie an immensely practical introduction to robot building and robotics application coding. Basic knowledge of GNU/Linux and the ability to write simple applications is assumed, but no robotics knowledge, practical or theoretical, is needed. …”
Libro electrónico -
256Publicado 2018“…In order to learn from this book, you should have a basic knowledge of ROS, GNU/Linux, and C++ programming concepts. The book is also excellent for programmers who want to explore the advanced features of ROS. …”
Libro electrónico -
257Publicado 2014Tabla de Contenidos: “…10.2.3 Creación de un directorio virtual -- 10.2.4 Utilización -- 10.2.5 Seguridad -- 10.3 SERVIDOR DE CORREO ELECTRÓNICO (EXCHANGE) -- 10.3.1 Instalación -- 10.3.2 Configuración -- 10.3.3 Seguridad -- 11 DIRECTORIO ACTIVO -- 11.1 INTRODUCCIÓN -- 11.2 INSTALACIÓN DEL CONTROLADOR DE DOMINIO -- 11.2.1 Tareas previas -- 11.2.2 Instalación -- 11.3 ADMINISTRACIÓN DEL DIRECTORIO ACTIVO -- 11.3.1 Herramientas administrativas -- 11.3.2 Administración básica de objetos -- 11.4 ADMINISTRACIÓN DE DIRECTIVAS DE GRUPO -- 11.4.1 Directivas de seguridad -- 11.4.2 Directivas de grupo local -- 11.4.3 Administración de directivas de grupo -- GNU/LINUX -- 12 INSTALACIÓN Y CONFIGURACIÓN -- 12.1 INTRODUCCIÓN -- 12.1.1 Distribuciones -- 12.1.2 Licencias de software -- 12.2 INSTALACIÓN -- 12.2.1 Ubuntu -- 12.2.2 Fedora -- 12.3 X-WINDOWS -- 12.4 PRIMEROS PASOS -- 12.4.1 Intérprete de comandos -- 12.4.2 Estructura de directorios -- 12.4.3 Instalar y quitar componentes -- 12.4.4 Webmin -- 13 PUESTA EN MARCHA DEL SISTEMA -- 13.1 ADMINISTRACIÓN DE USUARIOS -- 13.1.1 Intérprete de comandos -- 13.1.2 Ficheros utilizados -- 13.1.3 Configuración con asistentes -- 13.2 SISTEMA DE FICHEROS -- 13.2.1 Particionamiento -- 13.2.2 Sistemas RAID -- 13.2.3 Monitorización -- 13.2.4 Cuotas de disco -- 13.3 PERMISOS -- 13.3.1 Establecer los permisos -- 13.3.2 Establecer el usuario y grupo propietario -- 14 ADMINISTRACIÓN BÁSICA DEL SISTEMA -- 14.1 ARRANQUE Y PARADA -- 14.1.1 Gestor de arranque -- 14.1.2 Proceso de arranque y parada del sistema -- 14.1.3 Servicios del sistema -- 14.1.4 Procesos -- 14.1.5 Programación de tareas -- 14.1.6 Reinicio y parada del sistema -- 14.2 MONITORIZACIÓN DEL SISTEMA -- 14.2.1 Herramientas básicas -- 14.2.2 Directorio /proc -- 14.2.3 Archivos de registro (syslog) -- 14.3 COPIAS DE SEGURIDAD -- 14.3.1 Comandos básicos -- 14.3.2 Herramientas gráficas…”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universitat Ramon Llull)Enlace del recurso
Libro electrónico -
258por Lidon Mañas, MarcosTabla de Contenidos: “…INTRODUCCIÓN A BLENDER -- 1.1 INTRODUCCIÓN -- 1.1.1 LA HISTORIA DE BLENDER -- 1.1.2 BLENDER Y LICENCIA GPL O GNU -- 1.1.3 LA COMUNIDAD DE BLENDER -- 1.2 INSTALACIÓN -- 1.2.1 DESCARGA Y EJECUCIÓN -- 1.2.2 REQUERIMIENTOS DEL SISTEMA -- 1.3 LA INTERFAZ -- 1.3.1 EL TECLADO Y EL RATÓN -- 1.3.2 ENTENDER LA INTERFAZ -- 1.3.3 LAS VENTANAS -- 1.3.4 INTERFAZ POR DEFECTO -- 1.3.5 BOTONES Y CONTROLADORES -- 1.3.6 NAVEGAR POR EL ESPACIO 3D -- 1.3.7 FUNCIONES BÁSICAS -- 1.4 PROYECTO CAPÍTULO -- 1.4.1 CONOCIENDO BLENDER -- 2. …”
Publicado 2017
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
259Publicado 2016Tabla de Contenidos: “…12.5.1 Das SMB-Protokoll -- 12.5.2 Samba -- 12.6 Fragen zu diesem Kapitel -- Kapitel 13: Servermanagement -- 13.1 Remoteverbindungen -- 13.1.1 Telnet -- 13.1.2 SSH -- 13.1.3 VNC -- 13.1.4 RDP (Remote Desktop Protocol) -- 13.1.5 MSTSC (Remote Desktop-Client) -- 13.1.6 rdesktop (Linux) -- 13.2 Ereignisanzeige und Ereignisprotokoll -- 13.2.1 Das Ereignisprotokoll -- 13.2.2 Die Windows-Ereignisanzeige -- 13.3 Hardware-Monitoring -- 13.4 Baseline-Management -- 13.5 Leistungsüberwachung -- 13.5.1 Schlüsselwerte -- 13.5.2 Microsoft Performance-Monitor -- 13.5.3 Data Collector Sets/Performance-Logs -- 13.5.4 MRTG und RRDtool -- 13.6 SNMP -- 13.7 Web-Base Enterprise Management (WBEM) -- 13.8 Windows-Verwaltungsmechanismen -- 13.8.1 Windows Management Instrumentarium (WMI) -- 13.8.2 PowerShell -- 13.9 Hilfen -- 13.9.1 Manpages -- 13.9.2 GNU info und How-tos -- 13.9.3 Windows-Hilfe -- 13.9.4 Microsoft Knowledge Base -- 13.10 Fragen zu diesem Kapitel -- Kapitel 14: Ein Server, viele Server, Wolke -- 14.1 Deployment-Szenarien -- 14.2 Virtualisierung -- 14.2.1 Hardwarevirtualisierung -- 14.2.2 Desktop-Virtualisierung -- 14.2.3 Anwendungsvirtualisierung -- 14.2.4 Storage-Virtualisierung -- 14.3 Cloud Computing -- 14.3.1 Cloud-Computing-Servicemodelle -- 14.3.2 Cloud-Computing-Betriebsmodelle -- 14.3.3 Beispiele von Clouds -- 14.3.4 SaaS ohne Ende -- 14.3.5 Es ist Ihre Wahl -- 14.4 Fragen zu diesem Kapitel -- Kapitel 15: Physische Sicherheit für Ihre Server -- 15.1 Der sichere Serverraum -- 15.1.1 Wo kommt der Server hin -- 15.1.2 Rack oder Tower? …”
Libro electrónico -
260Publicado 2023Tabla de Contenidos: “…8.1.1 Different Types of Cryptography -- 8.1.1.1 Symmetric Key Cryptography -- 8.1.1.2 Asymmetric Key Cryptography -- 8.1.1.3 Hash Functions -- 8.1.2 Cryptographic Schemes -- 8.1.2.1 Simple Substitution Cipher -- 8.1.2.2 Caesar Cipher -- 8.1.2.3 Vigenère Cipher -- 8.1.2.4 Transposition Cipher -- 8.2 Playfair Cipher -- 8.2.1 Encryption Algorithm -- 8.2.1.1 Step 1 - Generate Squares (5 * 5) -- 8.2.1.2 Step 2 - Algorithm to Encrypt Plaintext -- 8.2.2 Decryption Algorithm -- 8.2.2.1 Step 1 - Generate Squares (5 * 5) -- 8.2.2.2 Step 2 - Algorithm to Decrypt the Ciphertext -- 8.2.3 Advantages and Disadvantages -- 8.2.3.1 Advantages -- 8.2.3.2 Disadvantages -- 8.3 Hill Cipher -- 8.3.1 Substitution Scheme -- 8.3.1.1 Encryption -- 8.3.1.2 Decryption -- 8.4 RSA Algorithm in Cryptography -- 8.4.1 Working Mechanism -- 8.4.1.1 Generating the Public Key -- 8.4.1.2 Generating a Private Key -- 8.5 Multiple Precision Arithmetic Library -- 8.5.1 GNU Multiple Precision Arithmetic Library -- 8.5.2 RSA Algorithm Implementation Using GMP Library -- 8.5.3 Weak RSA Decryption with Chinese Remainder Theorem -- 8.6 SHA-512 Hash in Java -- 8.7 Cybersecurity -- 8.7.1 Common Cyberattacks -- 8.7.1.1 Denial-of-Service Attacks -- 8.7.1.2 Malware -- 8.7.1.3 Man-in-the-Middle Attack -- 8.7.1.4 Phishing -- 8.7.1.5 Structured Language Query Injection -- 8.7.1.6 Latest Cyberthreats -- 8.7.2 Key Cybersecurity Features -- 8.7.3 Blockchain for Cybersecurity -- 8.7.4 Pros and Cons of Blockchain in Cybersecurity -- 8.7.4.1 Pros -- 8.7.4.2 Cons -- 8.7.5 Real-world Examples -- 8.7.5.1 Australian Government -- 8.7.5.2 Barclays -- 8.7.5.3 Chinese Military -- 8.7.5.4 Cisco -- 8.7.5.5 Coinbase -- 8.7.5.6 Colorado State -- 8.7.5.7 Founders Bank -- 8.7.5.8 Health Linkage -- 8.7.5.9 JP Morgan -- 8.7.5.10 Mobile Coin -- 8.7.5.11 Philips Healthcare -- 8.7.5.12 Santander Bank -- 8.7.5.13 Wall Street…”
Libro electrónico