Mostrando 2,101 - 2,120 Resultados de 2,988 Para Buscar '"Linux"', tiempo de consulta: 0.09s Limitar resultados
  1. 2101
    Publicado 2015
    Tabla de Contenidos: “…""Copyright""; ""Table of Contents""; ""Ruby Pocket Reference""; ""Introduction""; ""Conventions Used in This Book""; ""Using Code Examples""; ""Safari® Books Online""; ""How to Contact Us""; ""Acknowledgments""; ""Running Ruby""; ""Running the Ruby Interpreter""; ""Interactive Ruby (irb)""; ""Using a Shebang Comment on Unix/Linux""; ""Associating File Types on Windows""; ""Ruby's Keywords""; ""Ruby's Operators""; ""Comments""; ""Numbers""; ""Variables""; ""Local Variables""; ""Instance Variables""; ""Class Variables""; ""Global Variables""; ""Constants""; ""Parallel Variable Assignment""…”
    Libro electrónico
  2. 2102
    Publicado 2022
    Tabla de Contenidos: “…PART I 0́3 THEORY AND CONCEPTSCHAPTER 1 0́3 The Internet of Things (IoT)1.1A New Design Paradigm: The Internet of Things1.2Introduction to the IoT Framework1.3Understanding the FULL Potential of the Internet of Things1.4Challenges of Implementing effective IoT Systems1.5Effective Implementation of IoT Systems: A step-by-step Process1.6Case studies of Successful IoT Applications1.7IoT of Tomorrow: Emerging Trends of the Internet of ThingsCHAPTER 2 0́3 Foundation Topics: Concepts2.1Terminologies & Fundamentals2.2Embedded Systems: Introduction2.3Embedded Systems: Hardware Considerations2.4Embedded Systems: Software Considerations2.5Embedded Systems: Peripherals2.6Online Resources: The Journey ContinuesPART II 0́3 HANDS-ON SYSTEM DEVELOPMENTCHAPTER 3 0́3 Foundation Topics: Programming & Coding3.1Programming Languages: C++3.2Programming Languages: Python3.3The Linux Operating SystemCHAPTER 4 0́3 Controller Boards IoT Systems (Arduino Systems)4.1The Arduino Boards4.2Arduino Peripherals4.3The Arduino Integrated Development Environment (Arduino IDE)4.4Hands-on Projects: Arduino Autonomous Systems4.5Hands-on Projects: Arduino-based IoT SystemsCHAPTER 5 0́3 Computer Boards IoT Systems (Raspberry Pi Systems)5.1The Raspberry Pi Boards5.2The Raspberry Pi Peripherals5.4Hands-on Projects: Raspberry Pi Autonomous Systems5.5Hands-on Projects: Raspberry Pi-based IoT Systems…”
    Libro electrónico
  3. 2103
    por Fitzgerald, Michael, 1957-
    Publicado 2009
    Tabla de Contenidos: “…Contents; Ruby Pocket Reference; Conventions Used in This Book; Comments and Questions; Acknowledgments; Running Ruby; Running the Ruby Interpreter; Using a Shebang Line on Unix/Linux; Associating File Types on Windows; Reserved Words; Operators; Comments; Numbers; Variables; Local Variables; Instance Variables; Class Variables; Global Variables; Constants; Parallel Assignment of Variables; Symbols; Predefined Variables; Pseudovariables; Global Constants; Ranges; Methods; Parentheses; Return Values; Method Name Conventions; Default Arguments; Variable Arguments; Aliasing Methods; Blocks…”
    Libro electrónico
  4. 2104
    Publicado 2006
    Tabla de Contenidos: “…Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. …”
    Libro electrónico
  5. 2105
    por Lázaro Domínguez, Francisco
    Publicado 2014
    Tabla de Contenidos: “…-- 5.1.2 Linux en la investigación forense -- 5.1.3 Poniendo en marcha una estación de trabajo con Linux -- 5.1.4 Descarga, compilación e instalación de herramientas -- 5.1.5 Montaje automático de particiones -- 5.2 ESTRUCTURA TÍPICA DE UN SISTEMA LINUX -- 5.2.1 Arquitectura y sistemas de archivos -- 5.2.2 Jerarquía de directorios -- 5.2.3 Archivos y permisos -- 5.2.4 Marcas de tiempo -- 5.3 INFORMACIÓN VOLÁTIL -- 5.3.1 Fecha y hora del sistema -- 5.3.2 Información de interés -- 5.3.3 Puertos y conexiones abiertas -- 5.3.4 Procesos en ejecución -- 5.4 ADQUISICIÓN FORENSE -- 5.4.1 Adquisición con dd -- 5.4.2 Adepto -- 5.5 ANÁLISIS -- 5.5.1 La línea de tiempo -- 5.5.2 Herramientas para elaborar una línea de tiempo -- 5.5.3 Recuperación de archivos borrados -- 5.6 OTRAS HERRAMIENTAS -- 5.6.1 Chkrootkit y Rkhunter -- 5.6.2 Md5deep -- 6 REDES E INTERNET -- 6.1 COMPONENTES DE UNA RED -- 6.1.1 Visión general de una red corporativa -- 6.1.2 Archivos de registro -- 6.1.3 Preservación de elementos de evidencia en redes -- 6.1.4 Siguiendo pistas -- 6.2 PROTOCOLOS -- 6.2.1 Capa de transporte: TCP -- 6.2.2 Puertos -- 6.2.3 Capa de red: IP -- 6.2.4 Enrutamiento -- 6.2.5 Capa de enlace de datos: interfaces Ethernet -- 6.2.6 Protocolos de nivel superior: HTTP y SMB…”
    Libro electrónico
  6. 2106
    Publicado 2009
    “…Después de una presentación general de la arquitectura interna de un servidor Oracle (memoria, procesos), el libro detalla las diferentes tareas de administración de una base de datos: instalación (sobre Windows y Linux), configuración Oracle Net, creación de una nueva base de datos, gestión de la memoria, gestión del almacenamiento, gestión de los usuarios y sus derechos, copias de seguridad y recuperación con RMAN (Recovery Manager). …”
    Acceso con credenciales UPSA.
    Libro electrónico
  7. 2107
    “…Today’s environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. …”
    Libro electrónico
  8. 2108
    por Milanesi, Carlo. author
    Publicado 2018
    “…Learn to program with Rust in an easy, step-by-step manner on Unix, Linux shell, macOS and the Windows command line. …”
    Libro electrónico
  9. 2109
    por Whitt, Phillip
    Publicado 2023
    “…Because it is cross-platform friendly you can turn “unfixable” photos into digital art on Windows, macOS, and Linux enhancing your learning experience. Beginning Photo Retouching and Restoration Using GIMP provides insight into the powerful program's wide set of features for just about any type of retouching or restoration work. …”
    Libro electrónico
  10. 2110
    por Mutch, John
    Publicado 2011
    “…Instead of going through the step-by-step process of implementation, the book points out the implications of allowing users to run with unlimited administrator rights, discusses the technology and supplementation of Microsoft’s Group Policy, and dives into the different environments least privilege affects, such as Unix and Linux servers, and databases. Readers will learn ways to protect virtual environments, how to secure multi-tenancy for the cloud, information about least privilege for applications, and how compliance enters the picture. …”
    Libro electrónico
  11. 2111
    por Wempen, Faithe
    Publicado 2022
    “…This up-to-date edition features new or expanded coverage of cloud and virtualization, Windows 10, Linux, mobile devices and operating systems, enhanced security, and advanced software troubleshooting…”
    Libro electrónico
  12. 2112
    Publicado 2014
    Tabla de Contenidos: “…Using it: Toyota Motor Corporation -- Chapter 23: Good strategy, bad strategy (Rumelt) -- Using it: Wal-Mart -- Chapter 24: Innovation hot spots (Gratton) -- Using it: Linux -- Chapter 25: The Suns & Clouds Chart (Evans) -- Using it: Madonna -- Conclusion -- Ten useful strategy books to read next -- Glossary of terms -- References and further reading -- Index…”
    Libro electrónico
  13. 2113
    por Carter, Peter A. author
    Publicado 2019
    “…Other new content includes coverage of Query Store, resumable index operations, installation on Linux, and containerized SQL. Pro SQL Server 2019 Administration takes DBAs on a journey that begins with planning their SQL Server deployment and runs through installing and configuring the instance, administering and optimizing database objects, and ensuring that data is secure and highly available. …”
    Libro electrónico
  14. 2114
    Publicado 2022
    Tabla de Contenidos: “…-- Trust Based on Authority -- Trusting Individuals -- Trusting Ourselves -- Trusting Others -- Trust, But Verify -- Attacks from Within -- The Dangers of Anthropomorphism -- Identifying the Real Trustee -- Chapter 3 Trust Operations and Alternatives -- Trust Actors, Operations, and Components -- Reputation, Transitive Trust, and Distributed Trust -- Agency and Intentionality -- Alternatives to Trust -- Legal Contracts -- Enforcement -- Verification -- Assurance and Accountability -- Trust of Non-Human or Non-Adult Actors -- Expressions of Trust -- Relating Trust and Security -- Misplaced Trust -- Chapter 4 Defining Trust in Computing -- A Survey of Trust Definitions in Computer Systems -- Other Definitions of Trust within Computing -- Applying Socio-Philosophical Definitions of Trust to Systems -- Mathematics and Trust -- Mathematics and Cryptography -- Mathematics and Formal Verification -- Chapter 5 The Importance of Systems -- System Design -- The Network Stack -- Linux Layers -- Virtualisation and Containers: Cloud Stacks -- Other Axes of System Design -- "Trusted" Systems -- Trust Within the Network Stack -- Trust in Linux Layers -- Trust in Cloud Stacks…”
    Libro electrónico
  15. 2115
    por Krikorian, Raffi
    Publicado 2003
    Tabla de Contenidos: “…Accept a PPP Connection from TiVo on Your PC; Configuring Linux; Testing Your PPP-over-Serial Connection; 49. …”
    Libro electrónico
  16. 2116
    por Brittain, Jason
    Publicado 2003
    Tabla de Contenidos: “…Installing Tomcat from a Jakarta Linux RPM; 1.1.2. Installing Tomcat on Solaris; 1.1.3. …”
    Libro electrónico
  17. 2117
    Publicado 2015
    Tabla de Contenidos: “…-- 3.12 - Tip 12: participate in open-source projects -- 3.13 - Tip 13: brush up on your written skills -- 3.14 - Tip 14: attend cybersecurity conferences and volunteer -- 3.15 - Tip 15: learn Linux! -- 3.16 - Tip 16: get work experience -- 3.17 - Tip 17: government sponsored initiatives…”
    Libro electrónico
  18. 2118
    Publicado 2018
    Tabla de Contenidos:
    Libro electrónico
  19. 2119
    Publicado 2023
    Tabla de Contenidos: “…Lifting and shifting Windows applications -- Migrating a database to Azure -- Azure SQL Database -- Migrating a database from SQL Server to Azure SQL Database using Azure DMS -- Summary -- Further reading -- Chapter 4: Exploring the Use Cases and Application Architecture -- Healthcare sample solution use cases -- Monolithic versus microservices -- Monolithic architecture -- Microservices architecture -- Challenges and solutions for distributed data management -- Solution architecture -- Summary -- Part 2 - Building Cloud-Oriented Applications Using Patterns and Technologies in Azure -- Chapter 5: Learning Cloud Patterns and Technologies -- An introduction to patterns and technologies -- Using cloud design patterns -- Interoperability and portability -- Scalability -- Performance issues -- Reliability and availability -- Loosely coupled service design -- Application security -- Cloud design pattern -- Using different cloud technologies -- Containers -- Container orchestration -- Service Fabric -- Summary -- Further reading -- Chapter 6: Setting Up an Environment to Build and Deploy Cloud-Based Applications -- Prerequisites to build a cloud-native application -- Visual Studio 2022 -- Visual Studio Code -- Microsoft Azure -- Azure Cloud Shell -- Docker Hub account -- Docker Desktop -- Podman -- Podman Desktop -- Git -- Azure DevOps -- GitHub -- Setting up a development environment on Windows -- Installing and configuring Docker Desktop on Windows -- Configuring Git on Windows -- Setting up a development environment on Linux -- Installing and configuring Docker Desktop on Linux -- Configuring Git on Linux -- Summary -- Questions -- Chapter 7: Using Azure App Service to Deploy Your First Application -- Azure App Service basics -- Azure App Service plans -- App Service environments -- Creating and configuring an App Service plan…”
    Libro electrónico
  20. 2120
    Publicado 2008
    Tabla de Contenidos: “….); Página legal; Índice; Introducción; Parte 1 Modelos conceptuales; Representación mediante mapas conceptuales de las competencias que deben adquirir los graduados en Información y Documentación; La investigación-acción como modelo de autoformación del profesorado de lenguas extranjeras para traducción/interpretación; Parte 2 Herramientas informáticas aplicadas al aprendizaje; Desarrollo de una metadistribución Linux adaptada a la docencia en el grado en Información y Documentación…”
    Libro electrónico