Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 72
- Operating systems (Computers) 64
- Engineering & Applied Sciences 44
- Computer Science 40
- UNIX (Computer file) 19
- Computer networks 18
- Open source software 18
- Programming 16
- Computer security 12
- Embedded computer systems 12
- Security measures 12
- Development 10
- Computer programs 9
- Computer programming 8
- GNU Emacs 8
- Certification 7
- Computer software 7
- Data processing 7
- UNIX Shells 7
- Application software 6
- Electronic data processing personnel 6
- Examinations 6
- GIMP (Computer file) 6
- Linux (Sistema operativo de ordenadores) 6
- Robots 6
- Software engineering 6
- C (Computer program language) 5
- C++ (Computer program language) 5
- Computer graphics 5
- Computers 5
-
261por Cattini, RolandTabla de Contenidos: “…11.3 Hardware-Monitoring -- 11.4 Baseline-Management -- 11.5 Leistungsüberwachung -- 11.5.1 Schlüsselwerte -- 11.5.2 Microsoft Performance-Monitor -- 11.5.3 Data Collector Sets/Performance-Logs -- 11.5.4 Der Ressourcenmonitor -- 11.5.5 MRTG und RRDtool -- 11.6 SNMP -- 11.7 Web-Based Enterprise Management (WBEM) -- 11.8 Windows-Verwaltungsmechanismen -- 11.8.1 Windows Management Instrumentarium (WMI) -- 11.8.2 PowerShell -- 11.9 Hilfen -- 11.9.1 Offlinehilfen -- 11.9.2 Onlinehilfen der Hersteller -- 11.9.3 Herstellerfremde Onlinehilfen -- 11.9.4 Manpages -- 11.9.5 GNU info und How-tos -- 11.9.6 Windows-Hilfe -- 11.9.7 Microsoft Knowledge Base -- 11.10 Fragen zu diesem Kapitel -- Kapitel 12: Ein Server, viele Server, Wolke -- 12.1 Deployment-Szenarien -- 12.1.1 Datenorganisation -- 12.1.2 Namenskonzepte -- 12.1.3 Berechtigungskonzepte -- 12.1.4 Lizenzierung -- 12.1.5 Serverrollen -- 12.1.6 Anwendungen -- 12.1.7 Netzwerklayout -- 12.2 Virtualisierung -- 12.2.1 Hardware-Virtualisierung -- 12.2.2 Produkte -- 12.2.3 Virtuelle Lizenzierung -- 12.2.4 Einsatzszenarien -- 12.2.5 Desktop-Virtualisierung -- 12.2.6 Anwendungsvirtualisierung -- 12.2.7 Storage-Virtualisierung -- 12.3 Cloud Computing -- 12.3.1 Cloud-Computing-Servicemodelle -- 12.3.2 Cloud-Computing-Betriebsmodelle -- 12.3.3 Beispiele von Clouds -- 12.3.4 SaaS ohne Ende -- 12.3.5 Es ist Ihre Wahl -- 12.4 Fragen zu diesem Kapitel -- Kapitel 13: Sicherheit für Ihre Server -- 13.1 Der sichere Serverraum -- 13.1.1 Wo kommt der Server hin? …”
Publicado 2022
Libro electrónico -
262por Ceballos Sierra, Francisco JavierTabla de Contenidos: “…ENTORNOS DE DESARROLLO -- MICROSOFT VISUAL STUDIO -- INSTALACIÓN -- DEPURAR LA APLICACIÓN -- A TENER EN CUENTA -- INTERFAZ DE LÍNEA DE ÓRDENES -- CREAR UNA BIBLIOTECA -- CODEBLOCKS -- INSTALACIÓN -- MINGW -- CODEBLOCKS -- ESCRIBIR UNA APLICACIÓN -- LINUX: INTERFAZ DE LÍNEA DE ÓRDENES -- EL DEPURADOR GDB DE GNU -- APÉNDICE D. CÓDIGOS DE CARACTERES -- ÍNDICE…”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
263Publicado 2018Tabla de Contenidos: “…Setting expiry data on a per-account basis, with useradd and usermod -- Setting expiry data on a per-account basis, with chage -- Hands-on lab for setting account and password expiry data -- Preventing brute-force password attacks -- Configuring the pam_tally2 PAM module -- Hands-on lab for configuring pam_tally2 -- Locking user accounts -- Using usermod to lock a user account -- Using passwd to lock user accounts -- Locking the root user account -- Setting up security banners -- Using the motd file -- Using the issue file -- Using the issue.net file -- Summary -- Chapter 3: Securing Your Server with a Firewall -- An overview of iptables -- Basic usage of iptables -- Hands-on lab for basic iptables usage -- Uncomplicated Firewall for Ubuntu systems -- Basic usage of ufw -- Hands-on lab for basic ufw usage -- firewalld for Red Hat systems -- Verifying the status of firewalld -- firewalld zones -- firewalld services -- Adding ports to a firewalld zone -- firewalld rich language rules -- Hands-on lab for firewalld commands -- nftables - a more universal type of firewall system -- nftables tables and chains -- Getting started with nftables -- Using nft commands -- Hands-on lab for nftables on Ubuntu -- Summary -- Chapter 4: Encrypting and SSH Hardening -- GNU Privacy Guard -- Creating your GPG keys -- Symmetrically encrypting your own files -- Hands-on lab - combining gpg and tar for encrypted backups -- Using private and public keys for asymmetric encryption and signing -- Signing a file without encryption -- Encrypting partitions with Linux Unified Key Setup - LUKS -- Disk encryption during operating system installation -- Adding an encrypted partition with LUKS -- Configuring the LUKS partition to mount automatically -- Encrypting directories with eCryptfs -- Home directory and disk encryption during Ubuntu installation…”
Libro electrónico -
264Publicado 2021Tabla de Contenidos: “…-- Understanding the basics of the boot process on the x86 -- More on the initramfs framework -- Step 7 - customizing the GRUB bootloader -- Customizing GRUB - the basics -- Selecting the default kernel to boot into -- Booting our VM via the GNU GRUB bootloader -- Experimenting with the GRUB prompt -- Verifying our new kernel's configuration -- Kernel build for the Raspberry Pi -- Step 1 - cloning the kernel source tree -- Step 2 - installing a cross-toolchain -- First method - package install via apt -- Second method - installation via the source repo -- Step 3 - configuring and building the kernel -- Miscellaneous tips on the kernel build -- Minimum version requirements -- Building a kernel for another site -- Watching the kernel build run…”
Libro electrónico -
265Publicado 2016Tabla de Contenidos: “…Introduction -- The TDD Development Cycle -- Test Framework -- Test Automation -- Installing the Unity Framework -- Exercise 11.1 Test Driven Development -- Adding the Unity Test Framework -- Configuring the Project Build Targets -- Adding the Test Cases -- Automating the TDD Cycle -- Testing RTOS Threads -- Exercise 11.2 Testing RTOS Threads -- Decoupling Low Level Functions -- Testing Interrupts -- Exercise 11.3 Testing with Interrupts -- Conclusion -- 12 Software Components -- Introduction -- CMSIS Driver -- CMSIS Driver API -- Exercise 12.1 CMSIS-Driver -- Driver Validation -- Exercise 12.2 Driver Validation -- Designing a Software Component -- Exercise 12.3 GPS Component -- Creating a Software Pack -- Software Pack Structure -- Software Pack Utilities -- Configuration Wizard -- Exercise 12.4 Configuration Wizard -- Deploying Software Components -- Conclusion -- 13 ARMv8-M -- Introduction -- Common Architectural Enhancements -- ARMv8 Baseline Enhancements -- ARMv8-M Mainline Enhancements -- TrustZone -- Interrupts and Exceptions -- Software Development -- Compiler -- Real-Time Operating System -- Debugger -- Cortex Microcontroller Software Interface Standard -- Conclusion -- Appendix -- Contact Details -- Appendices -- Debug Tools and Software -- Commercial GNU-Based Toolchains -- Commercial Toolchains -- Rapid Prototyping and Evaluation Modules -- Real-Time Operating Systems -- Digital Signal Processing -- Books -- Programming -- Cortex-M Processor -- Standards -- Digital Signal Processing -- Real-Time Operating System -- Silicon Vendors -- Training -- Index -- Back Cover…”
Libro electrónico -
266Publicado 2023Tabla de Contenidos: “…Understanding centralized user management -- Microsoft Active Directory -- Samba on Linux -- FreeIPA/Identity Management on RHEL-type distros -- Summary -- Questions -- Further reading -- Answers -- Chapter 4: Securing Your Server with a Firewall - Part 1 -- Technical requirements -- An overview of the Linux firewall -- An overview of iptables -- Mastering the basics of iptables -- Blocking ICMP with iptables -- Blocking everything that isn't allowed with iptables -- Hands-on lab for basic iptables usage -- Blocking invalid packets with iptables -- Restoring the deleted rules -- Hands-on lab for blocking invalid IPv4 packets -- Protecting IPv6 -- Hands-on lab for ip6tables -- nftables - a more universal type of firewall system -- Learning about nftables tables and chains -- Getting started with nftables -- Configuring nftables on Ubuntu -- Using nft commands -- Hands-on lab for nftables on Ubuntu -- Summary -- Questions -- Further reading -- Answers -- Chapter 5: Securing Your Server with a Firewall - Part 2 -- Technical requirements -- The Uncomplicated Firewall for Ubuntu systems -- Configuring ufw -- Working with the ufw configuration files -- Hands-on lab for basic ufw usage -- firewalld for Red Hat systems -- Verifying the status of firewalld -- Working with firewalld zones -- Adding services to a firewalld zone -- Adding ports to a firewalld zone -- Blocking ICMP -- Using panic mode -- Logging dropped packets -- Using firewalld rich language rules -- Looking at iptables rules in RHEL/CentOS 7 firewalld -- Creating direct rules in RHEL/CentOS 7 firewalld -- Looking at nftables rules in RHEL/AlmaLinux 8 and 9 firewalld -- Creating direct rules in RHEL/AlmaLinux firewalld -- Hands-on lab for firewalld commands -- Summary -- Questions -- Further reading -- Answers -- Chapter 6: Encryption Technologies -- GNU Privacy Guard (GPG)…”
Libro electrónico -
267Publicado 2016Tabla de Contenidos: “…Adding UARTs to the RPi -- Summary -- Chapter 10 Interacting with the Physical Environment -- Interfacing to Actuators -- DC Motors -- Stepper Motors -- Relays -- Interfacing to Analog Sensors -- Linear Analog Sensors -- Nonlinear Analog Sensors -- Analog Sensor Signal Conditioning -- Interfacing to an Analog Accelerometer -- Interfacing to Local Displays -- MAX7219 Display Modules -- Character LCD Modules -- OLED Dot-Matrix Display -- Building C/C++ Libraries -- Makefiles -- CMake -- Summary -- Chapter 11 Real-Time Interfacing Using the Arduino -- The Arduino -- An Arduino Serial Slave -- A UART Echo Test Example -- UART Command Control of an Arduino -- An Arduino I2C Slave -- An I2C Test Circuit -- I2C Register Echo Example -- I2C Temperature Sensor Example -- I2C Temperature Sensor with a Warning LED -- Arduino Slave Communication Using C/C++ -- An I2C Ultrasonic Sensor Application -- An Arduino SPI Slave -- Programming the Arduino from the RPi Command Line -- Summary -- Part III Advanced Interfacing and Interaction -- Chapter 12 The Internet of Things -- The Internet of Things (IoT) -- The RPi as an IoT Sensor -- The RPi as a Sensor Web Server -- Nginx -- GNU Cgicc Applications (Advanced) -- A C/C++ Web Client -- Network Communications Primer -- A C/C++ Web Client -- Secure Communication Using OpenSSL -- The RPi as a "Thing" -- ThingSpeak -- The Linux Cron Scheduler -- Sending E-mail from the RPi -- If This Then That (IFTTT) -- Large-Scale IoT Frameworks -- MQ Telemetry Transport (MQTT) -- IBM Bluemix Internet of Things -- An IBM IoT MQTT Node.js Publish Example -- An IBM IoT MQTT C++ Publish Example -- Visualize Data Using IBM Quickstart -- The C++ Client/Server -- IoT Device Management -- Remote Monitoring of the RPi -- RPi Watchdog Timers -- Static IP Addresses -- Power over Ethernet (PoE) -- Summary…”
Libro electrónico -
268por Pérez-Cisneros, MarcoTabla de Contenidos: “….) -- APÉNDICE D -- D.1 PAQUETE TEGRA ANDROID DEVELOPER PACK -- D.2 CONTROLADOR FANTOM DRIVER -- D.3 LEJOS NXJ -- D.4 KIT DE DESARROLLO DE JAVA (JDK) -- D.5 ECLIPSE -- APÉNDICE E -- E.1 REQUISITOS -- E.2 DESCARGA DEL ENTORNO DE PROGRAMACIÓN OSEK -- E.3 DESCARGA DEL DRIVER -- E.4 INSTALACIÓN CYGWIN -- E.5 INSTALACIÓN GNU ARM -- E.6 INSTALACIÓN DEL NXT USB DRIVER -- E.7 INSTALAR NXTTOOL -- E.8 INSTALAR NXTOSEK Y ARCHIVO ECROBOTNXTSETUP.M -- E.9 VISTA DE PANTALLA LCD DEL LEGO NXT -- APÉNDICE F -- F.1 INSTALACIÓN -- F.2 TRANSFERIR EL MOTORCONTROL22.RXE AL NXT -- F.3 INSTALANDO EL LEGO MINDSTORMS NXT SUPPORT PACKAGE -- BIBLIOGRAFÍA…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
269por Bogdani, JulianTabla de Contenidos: “…. -- Table 7: Building the Museo delle Culture 'Villa Garibaldi (MUDECU), GNU' site. Some free licensed CMS for museum sites. -- Table 8: Overview of FLOS software used, debugged, developed for training and labs in public museums. -- Table 9: Utility of FLOSS technologies in heritage-institution management. -- Table 10: The business model for developing techno-creative spaces. -- The virtual countryman. …”
Publicado 2021
Libro electrónico -
270Publicado 2006“…Coverage includes · Understanding the Linux environment: GNU binutils, Java environments, shells, packaging options, and more · Uncovering and addressing project unknowns, variables, and other risks · Handling specific platform differences: standards, compilers, linkers, versioning, system/library calls, threads, and more · Testing and debugging ported applications using the GNU debugger and Linux memory leak and performance tracing tools · Contains quick references to UNIX ® and Linux APIs, compilers, and linker options, and a discussion of porting issues unique to IBM’s POWER TM architecture Whether you need a start-to-finish guide or a concise reference, you’ll find this book an indispensable resource for all your UNIX®-to-Linux porting projects…”
Libro electrónico -
271Publicado 2013“…Compared with other Linux books, A Practical Guide to FedoraTMand Red Hat®Enterprise Linux ®, Seventh Edition, delivers Complete, up-to-the-minute coverage of Fedora 19 and RHEL 7 (beta) New programming chapters that cover Python and MariaDB/MySQL, plus a new tutorial on using GnuPG to encrypt communications Information on state-of-the-art security: SELinux, ACLs, firewalld ( firewall-config and firewall-cmd ), iptables ( system-config-firewall ), GnuPG, and OpenSSH New chapter on VMs (virtual machines) and cloud computing, including VMware, QEMU/KVM, virt-manager , virsh , GNOME Boxes, and AWS (Amazon Web Services) Expanded command-line coverage, including a new chapter that details 32 important utilities Practical information on Internet server configuration, including Apache, sendmail , NFSv4, DNS/BIND, the new LDAP Dynamic Server, and IPv..…”
Libro electrónico -
272Publicado 2015“…Obtain data from websites, APIs, databases, and spreadsheets Perform scrub operations on plain text, CSV, HTML/XML, and JSON Explore data, compute descriptive statistics, and create visualizations Manage your data science workflow using Drake Create reusable tools from one-liners and existing Python or R code Parallelize and distribute data-intensive pipelines using GNU Parallel Model data with dimensionality reduction, clustering, regression, and classification algorithms…”
Libro electrónico -
273Publicado 2014“…Learn how to work with objects and classes Conquer advanced programming and troubleshooting Discover how lambda expressions can make your code more concise and readable See Standard Library features, such as dynamic arrays, in action Online resources include source code from examples in the book as well as a C++ GNU compiler. If you need to learn C++, this is the fastest, most effective way to do it. …”
Libro electrónico -
274por Smith, Roderick W.“…Wherever pertinent, the author addresses the differences between Caldera OpenLinux, Debian GNU/Linux, Mandrake, Red Hat, Slackware, SuSE, and TurboLinux. …”
Publicado 2002
Libro electrónico -
275Publicado 2014“…Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options Vulnerability scanners: OpenVAS, Metasploit File system monitors: AIDE, Samhain, Tripwire Windows auditing tools: Nbtstat, Cain, MBSA, PsTools Command-line networking tools: Netcat, Cryptcat, Ncat, Socat Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay Port scanners: Nmap, THC-Amap Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort Network defenses: firewalls, packet filters, and intrusion detection systems War dialers: ToneLoc, THC-Scan, WarVOX Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR…”
Libro electrónico -
276Publicado 2020“…Part I covers system architecture, Linux installation and Package management, GNU and Unix Commands, and devices, and Linux filesystems and filesystem hierarchy. …”
Libro electrónico -
277Publicado 2004“…Readers learn how to Use development tools available on Linux, such as the GNU Compiler for Java (gcj), Ant, the NetBeans IDE, IBM's Eclipse Java IDE, JUnit, and SunONE Studio Develop business logic layers using Java DataBase Connectivity (JDBC) Add a Web interface using servlets and JSPs Add a GUI using Sun's Abstract Window Toolkit (AWT) and IBM's SWT Deploy EJBs in Linux The authors conclude by demonstrating how a hierarchy of budgets can be created, tracked, and shared with Concurrent Versions System (CVS). …”
Libro electrónico -
278Publicado 1999“…Samba is also open source software, licensed under the GNU General Public License. The authors present the most common configurations and problems in an easy-to-follow manner, along with instructions for getting the most out of Samba. …”
Libro electrónico -
279Publicado 2006“…Linux ® Administration Handbook, Second Edition, reflects the current versions of these leading distributions: Red Hat ® Enterprise Linux ® Fedora TM Core SUSE ® Linux Enterprise Debian ® GNU/Linux Ubuntu ® Linux Sharing their war stories and hard-won insights, the authors capture the behavior of Linux systems in the real world, not just in ideal environments. …”
Libro electrónico -
280Publicado 2018“…This book will get you started with administering Linux, giving you the knowledge and tools you need to troubleshoot day-to-day problems, ranging from a Raspberry Pi to a server in Azure, while giving you a good understanding of the fundamentals of how GNU/Linux works. Through the course of the book, you'll install and configure a system, while the author regales you with errors and anecdotes from his vast experience as a data center hardware engineer, systems administrator, and DevOps consultant. …”
Libro electrónico