Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
2101Publicado 2015Tabla de Contenidos: “…""Copyright""; ""Table of Contents""; ""Ruby Pocket Reference""; ""Introduction""; ""Conventions Used in This Book""; ""Using Code Examples""; ""Safari® Books Online""; ""How to Contact Us""; ""Acknowledgments""; ""Running Ruby""; ""Running the Ruby Interpreter""; ""Interactive Ruby (irb)""; ""Using a Shebang Comment on Unix/Linux""; ""Associating File Types on Windows""; ""Ruby's Keywords""; ""Ruby's Operators""; ""Comments""; ""Numbers""; ""Variables""; ""Local Variables""; ""Instance Variables""; ""Class Variables""; ""Global Variables""; ""Constants""; ""Parallel Variable Assignment""…”
Libro electrónico -
2102Publicado 2022Tabla de Contenidos: “…PART I 0́3 THEORY AND CONCEPTSCHAPTER 1 0́3 The Internet of Things (IoT)1.1A New Design Paradigm: The Internet of Things1.2Introduction to the IoT Framework1.3Understanding the FULL Potential of the Internet of Things1.4Challenges of Implementing effective IoT Systems1.5Effective Implementation of IoT Systems: A step-by-step Process1.6Case studies of Successful IoT Applications1.7IoT of Tomorrow: Emerging Trends of the Internet of ThingsCHAPTER 2 0́3 Foundation Topics: Concepts2.1Terminologies & Fundamentals2.2Embedded Systems: Introduction2.3Embedded Systems: Hardware Considerations2.4Embedded Systems: Software Considerations2.5Embedded Systems: Peripherals2.6Online Resources: The Journey ContinuesPART II 0́3 HANDS-ON SYSTEM DEVELOPMENTCHAPTER 3 0́3 Foundation Topics: Programming & Coding3.1Programming Languages: C++3.2Programming Languages: Python3.3The Linux Operating SystemCHAPTER 4 0́3 Controller Boards IoT Systems (Arduino Systems)4.1The Arduino Boards4.2Arduino Peripherals4.3The Arduino Integrated Development Environment (Arduino IDE)4.4Hands-on Projects: Arduino Autonomous Systems4.5Hands-on Projects: Arduino-based IoT SystemsCHAPTER 5 0́3 Computer Boards IoT Systems (Raspberry Pi Systems)5.1The Raspberry Pi Boards5.2The Raspberry Pi Peripherals5.4Hands-on Projects: Raspberry Pi Autonomous Systems5.5Hands-on Projects: Raspberry Pi-based IoT Systems…”
Libro electrónico -
2103por Fitzgerald, Michael, 1957-Tabla de Contenidos: “…Contents; Ruby Pocket Reference; Conventions Used in This Book; Comments and Questions; Acknowledgments; Running Ruby; Running the Ruby Interpreter; Using a Shebang Line on Unix/Linux; Associating File Types on Windows; Reserved Words; Operators; Comments; Numbers; Variables; Local Variables; Instance Variables; Class Variables; Global Variables; Constants; Parallel Assignment of Variables; Symbols; Predefined Variables; Pseudovariables; Global Constants; Ranges; Methods; Parentheses; Return Values; Method Name Conventions; Default Arguments; Variable Arguments; Aliasing Methods; Blocks…”
Publicado 2009
Libro electrónico -
2104Publicado 2006Tabla de Contenidos: “…Dealing with Spyware in a Non-Microsoft World; Introduction; Spyware and Linux; Spyware and the Macintosh; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. …”
Libro electrónico -
2105por Lázaro Domínguez, FranciscoTabla de Contenidos: “…-- 5.1.2 Linux en la investigación forense -- 5.1.3 Poniendo en marcha una estación de trabajo con Linux -- 5.1.4 Descarga, compilación e instalación de herramientas -- 5.1.5 Montaje automático de particiones -- 5.2 ESTRUCTURA TÍPICA DE UN SISTEMA LINUX -- 5.2.1 Arquitectura y sistemas de archivos -- 5.2.2 Jerarquía de directorios -- 5.2.3 Archivos y permisos -- 5.2.4 Marcas de tiempo -- 5.3 INFORMACIÓN VOLÁTIL -- 5.3.1 Fecha y hora del sistema -- 5.3.2 Información de interés -- 5.3.3 Puertos y conexiones abiertas -- 5.3.4 Procesos en ejecución -- 5.4 ADQUISICIÓN FORENSE -- 5.4.1 Adquisición con dd -- 5.4.2 Adepto -- 5.5 ANÁLISIS -- 5.5.1 La línea de tiempo -- 5.5.2 Herramientas para elaborar una línea de tiempo -- 5.5.3 Recuperación de archivos borrados -- 5.6 OTRAS HERRAMIENTAS -- 5.6.1 Chkrootkit y Rkhunter -- 5.6.2 Md5deep -- 6 REDES E INTERNET -- 6.1 COMPONENTES DE UNA RED -- 6.1.1 Visión general de una red corporativa -- 6.1.2 Archivos de registro -- 6.1.3 Preservación de elementos de evidencia en redes -- 6.1.4 Siguiendo pistas -- 6.2 PROTOCOLOS -- 6.2.1 Capa de transporte: TCP -- 6.2.2 Puertos -- 6.2.3 Capa de red: IP -- 6.2.4 Enrutamiento -- 6.2.5 Capa de enlace de datos: interfaces Ethernet -- 6.2.6 Protocolos de nivel superior: HTTP y SMB…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2106Publicado 2009“…Después de una presentación general de la arquitectura interna de un servidor Oracle (memoria, procesos), el libro detalla las diferentes tareas de administración de una base de datos: instalación (sobre Windows y Linux), configuración Oracle Net, creación de una nueva base de datos, gestión de la memoria, gestión del almacenamiento, gestión de los usuarios y sus derechos, copias de seguridad y recuperación con RMAN (Recovery Manager). …”
Acceso con credenciales UPSA.
Libro electrónico -
2107“…Today’s environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. …”
Libro electrónico -
2108por Milanesi, Carlo. author“…Learn to program with Rust in an easy, step-by-step manner on Unix, Linux shell, macOS and the Windows command line. …”
Publicado 2018
Libro electrónico -
2109por Whitt, Phillip“…Because it is cross-platform friendly you can turn “unfixable” photos into digital art on Windows, macOS, and Linux enhancing your learning experience. Beginning Photo Retouching and Restoration Using GIMP provides insight into the powerful program's wide set of features for just about any type of retouching or restoration work. …”
Publicado 2023
Libro electrónico -
2110por Mutch, John“…Instead of going through the step-by-step process of implementation, the book points out the implications of allowing users to run with unlimited administrator rights, discusses the technology and supplementation of Microsoft’s Group Policy, and dives into the different environments least privilege affects, such as Unix and Linux servers, and databases. Readers will learn ways to protect virtual environments, how to secure multi-tenancy for the cloud, information about least privilege for applications, and how compliance enters the picture. …”
Publicado 2011
Libro electrónico -
2111por Wempen, Faithe“…This up-to-date edition features new or expanded coverage of cloud and virtualization, Windows 10, Linux, mobile devices and operating systems, enhanced security, and advanced software troubleshooting…”
Publicado 2022
Libro electrónico -
2112Publicado 2014Tabla de Contenidos: “…Using it: Toyota Motor Corporation -- Chapter 23: Good strategy, bad strategy (Rumelt) -- Using it: Wal-Mart -- Chapter 24: Innovation hot spots (Gratton) -- Using it: Linux -- Chapter 25: The Suns & Clouds Chart (Evans) -- Using it: Madonna -- Conclusion -- Ten useful strategy books to read next -- Glossary of terms -- References and further reading -- Index…”
Libro electrónico -
2113por Carter, Peter A. author“…Other new content includes coverage of Query Store, resumable index operations, installation on Linux, and containerized SQL. Pro SQL Server 2019 Administration takes DBAs on a journey that begins with planning their SQL Server deployment and runs through installing and configuring the instance, administering and optimizing database objects, and ensuring that data is secure and highly available. …”
Publicado 2019
Libro electrónico -
2114Publicado 2022Tabla de Contenidos: “…-- Trust Based on Authority -- Trusting Individuals -- Trusting Ourselves -- Trusting Others -- Trust, But Verify -- Attacks from Within -- The Dangers of Anthropomorphism -- Identifying the Real Trustee -- Chapter 3 Trust Operations and Alternatives -- Trust Actors, Operations, and Components -- Reputation, Transitive Trust, and Distributed Trust -- Agency and Intentionality -- Alternatives to Trust -- Legal Contracts -- Enforcement -- Verification -- Assurance and Accountability -- Trust of Non-Human or Non-Adult Actors -- Expressions of Trust -- Relating Trust and Security -- Misplaced Trust -- Chapter 4 Defining Trust in Computing -- A Survey of Trust Definitions in Computer Systems -- Other Definitions of Trust within Computing -- Applying Socio-Philosophical Definitions of Trust to Systems -- Mathematics and Trust -- Mathematics and Cryptography -- Mathematics and Formal Verification -- Chapter 5 The Importance of Systems -- System Design -- The Network Stack -- Linux Layers -- Virtualisation and Containers: Cloud Stacks -- Other Axes of System Design -- "Trusted" Systems -- Trust Within the Network Stack -- Trust in Linux Layers -- Trust in Cloud Stacks…”
Libro electrónico -
2115por Krikorian, RaffiTabla de Contenidos: “…Accept a PPP Connection from TiVo on Your PC; Configuring Linux; Testing Your PPP-over-Serial Connection; 49. …”
Publicado 2003
Libro electrónico -
2116por Brittain, JasonTabla de Contenidos: “…Installing Tomcat from a Jakarta Linux RPM; 1.1.2. Installing Tomcat on Solaris; 1.1.3. …”
Publicado 2003
Libro electrónico -
2117Publicado 2015Tabla de Contenidos: “…-- 3.12 - Tip 12: participate in open-source projects -- 3.13 - Tip 13: brush up on your written skills -- 3.14 - Tip 14: attend cybersecurity conferences and volunteer -- 3.15 - Tip 15: learn Linux! -- 3.16 - Tip 16: get work experience -- 3.17 - Tip 17: government sponsored initiatives…”
Libro electrónico -
2118Publicado 2018Tabla de Contenidos:Libro electrónico
-
2119Publicado 2023Tabla de Contenidos: “…Lifting and shifting Windows applications -- Migrating a database to Azure -- Azure SQL Database -- Migrating a database from SQL Server to Azure SQL Database using Azure DMS -- Summary -- Further reading -- Chapter 4: Exploring the Use Cases and Application Architecture -- Healthcare sample solution use cases -- Monolithic versus microservices -- Monolithic architecture -- Microservices architecture -- Challenges and solutions for distributed data management -- Solution architecture -- Summary -- Part 2 - Building Cloud-Oriented Applications Using Patterns and Technologies in Azure -- Chapter 5: Learning Cloud Patterns and Technologies -- An introduction to patterns and technologies -- Using cloud design patterns -- Interoperability and portability -- Scalability -- Performance issues -- Reliability and availability -- Loosely coupled service design -- Application security -- Cloud design pattern -- Using different cloud technologies -- Containers -- Container orchestration -- Service Fabric -- Summary -- Further reading -- Chapter 6: Setting Up an Environment to Build and Deploy Cloud-Based Applications -- Prerequisites to build a cloud-native application -- Visual Studio 2022 -- Visual Studio Code -- Microsoft Azure -- Azure Cloud Shell -- Docker Hub account -- Docker Desktop -- Podman -- Podman Desktop -- Git -- Azure DevOps -- GitHub -- Setting up a development environment on Windows -- Installing and configuring Docker Desktop on Windows -- Configuring Git on Windows -- Setting up a development environment on Linux -- Installing and configuring Docker Desktop on Linux -- Configuring Git on Linux -- Summary -- Questions -- Chapter 7: Using Azure App Service to Deploy Your First Application -- Azure App Service basics -- Azure App Service plans -- App Service environments -- Creating and configuring an App Service plan…”
Libro electrónico -
2120Publicado 2008Tabla de Contenidos: “….); Página legal; Índice; Introducción; Parte 1 Modelos conceptuales; Representación mediante mapas conceptuales de las competencias que deben adquirir los graduados en Información y Documentación; La investigación-acción como modelo de autoformación del profesorado de lenguas extranjeras para traducción/interpretación; Parte 2 Herramientas informáticas aplicadas al aprendizaje; Desarrollo de una metadistribución Linux adaptada a la docencia en el grado en Información y Documentación…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico