Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
2381por Meyer, RobertTabla de Contenidos: “…-- Installation per Docker (alle Betriebssysteme) -- Manuelle Installation von TYPO3 auf Linux -- Durchführung der Erstinstallation -- Wichtige Aufgaben im Install-Tool -- Das Install-Tool im Detail -- TYPO3 über die Kommandozeile bedienen -- Kapitel 3: Das Backend kennenlernen -- Der ideale Browser und Browsereinstellungen -- Begriffe der TYPO3-Welt -- Der erste Frontend-Aufruf -- Log-in in das Backend -- Die Backend-Module kennenlernen -- Die Backend-Sprache ändern -- Zugangsdaten ändern -- Eine erste Seite anlegen -- Kapitel 4: Das Praxisbeispiel vorbereiten -- Die Anforderungen an das Praxisbeispiel -- Eine Designvorlage erstellen -- Aufbau der Navigationsstruktur -- Eine Seitenkonfiguration erstellen -- Hilfsseiten und Verweise -- Die Navigationsstruktur und URLs -- TYPO3-Fehlermeldungen -- Kapitel 5: TypoScript in der Praxis -- Was genau ist TypoScript? …”
Publicado 2020
Libro electrónico -
2382Publicado 2020Tabla de Contenidos: “…Ausnahmen -- Daten speichern -- Zusammenfassung -- Code testen -- Funktionen testen -- Klassen testen -- Zusammenfassung -- Projekte -- Alien Invasion -- Das eigene Kampfschiff -- Das Projekt planen -- Pygame installieren -- Erste Schritte für das Spielprojekt -- Das Bild eines Raumschiffs hinzufügen -- Refactoring: Die Methoden _check_events() und _update_screen() -- Das Schiff bewegen -- Zwischenstand -- Geschosse -- Zusammenfassung -- Die Außerirdischen -- Überblick über das Projekt -- Das erste Invasionsschiff -- Die Invasionsflotte erstellen -- Die Flotte in Bewegung setzen -- Invasoren abschießen -- Spielende -- Zusammenfassung -- Das Wertungssystem -- Eine Play-Schaltfläche hinzufügen -- Levels -- Die Punktwertung -- Zusammenfassung -- Datenvisualisierung -- Daten generieren -- Matplotlib installieren -- Einfache Liniendiagramme -- Zufallsbewegungen -- Würfeln mit Plotly -- Zusammenfassung -- Daten herunterladen -- Das Dateiformat CSV -- Globale Daten im JSON-Format visualisieren -- Zusammenfassung -- APIs -- Web-APIs -- Angaben zu Repositories mit Plotly visualisieren -- Die API von Hacker News -- Zusammenfassung -- Webanwendungen -- Erste Schritte mit Django -- Ein Projekt einrichten -- Eine App anlegen -- Seiten erstellen: die Startseite von Learning Log -- Weitere Seiten erstellen -- Zusammenfassung -- Benutzerkonten -- Dateneingabe durch die Benutzer -- Benutzerkonten einrichten -- Die Benutzer als Besitzer ihrer eigenen Daten -- Zusammenfassung -- Eine App gestalten und bereitstellen -- Learning Log gestalten -- Learning Log bereitstellen -- Zusammenfassung -- Nachwort -- Installation und Fehlerbehebung -- Python unter Windows -- Python unter macOS -- Python unter Linux -- Schlüsselwörter und integrierte Funktionen -- Texteditoren und IDEs -- Die Einstellungen von Sublime Text anpassen -- Weitere Texteditoren und IDEs -- Hilfe finden…”
Libro electrónico -
2383por Northrup, Tony, 1974-Tabla de Contenidos: “…Schedule the script; Instructions for Linux; 1. Connect the X10 computer interface…”
Publicado 2005
Libro electrónico -
2384Publicado 2019Tabla de Contenidos: “…10.6.2 Example of using TabBarIOS -- 10.7 Using ActionSheetIOS to show action or share sheets -- 10.7.1 Use cases for ActionSheetIOS -- 10.7.2 Example of using ActionSheetIOS -- Summary -- Chapter 11: Implementing Android-specific components and APIs -- 11.1 Creating a menu using DrawerLayoutAndroid -- 11.2 Creating a toolbar with ToolbarAndroid -- 11.3 Implementing scrollable paging with ViewPagerAndroid -- 11.4 Using the DatePickerAndroid API to show a native date picker -- 11.5 Creating a time picker with TimePickerAndroid -- 11.6 Implementing Android toasts using ToastAndroid -- Summary -- Part 4: Bringing it all together -- Chapter 12: Building a Star Wars app using cross-platform components -- 12.1 Creating the app and installing dependencies -- 12.1.1 Importing the People component and creating the Container component -- 12.1.2 Creating the navigation component and registering routes -- 12.1.3 Creating the main class for the initial view -- 12.2 Creating the People component using FlatList, Modal, and Picker -- 12.2.1 Creating the state and setting up a fetch call to retrieve data -- 12.2.2 Adding the remaining class methods -- 12.2.3 Implementing the render method -- 12.3 Creating the HomeWorld component -- 12.3.1 Creating the HomeWorld class and initializing state -- 12.3.2 Fetching data from the API using the url prop -- 12.3.3 Wrapping up the HomeWorld component -- Summary -- appendix: Installing and running React Native -- Developing for iOS devices -- Getting started -- Testing the installation on iOS -- Developing for Android devices -- Mac and Android -- Windows and Android -- Linux and Android -- Creating a new project (Mac/Windows/Linux) -- Running a project (Mac/Windows/Linux) -- Index -- List of Figures -- List of Tables -- List of Listings…”
Libro electrónico -
2385Publicado 2018Tabla de Contenidos: “…-- Windows users -- macOS users -- Linux users -- Testing Qt installation -- Installing OpenCV -- Preparing for an OpenCV build -- Where to get OpenCV? …”
Libro electrónico -
2386por Arundel, John“…It also requires some experience of Linux systems administration, including familiarity with the command line, file system, and te…”
Publicado 2011
Libro electrónico -
2387por Gassner, David L.“…A complete and thorough reference for developers on the new Flex 4 platform Create desktop applications that behave identically on Windows, Mac OS X, and Linux with Adobe's new Flash Builder 4 platform and this in-depth guide. …”
Publicado 2010
Libro electrónico -
2388Publicado 2016Tabla de Contenidos: “…-- Unikernels -- Hybrid Virtualization -- Security Trade-offs -- Securing Linux -- Not sharing -- Security-The Lowest Common Denominator -- Current Packet Handling -- Application Processing -- Background-Context Switch/Data Copy Reduction -- Background-Scalar Versus Vectorization -- Ongoing-Intel Advancements (and Academic Work) -- Netmap and vhost-User -- Software packet handling bottom line -- Turnkey Optimization (Is There an EASY Button?) …”
Libro electrónico -
2389Publicado 2015“… Power and Performance: Software Analysis and Optimization is a guide to solving performance problems in modern Linux systems. Power-efficient chips are no help if the software those chips run on is inefficient. …”
Libro electrónico -
2390por Jackson, Wallace. author“…What You Will Learn • What Comprises a digital illustration 2D modeling and rendering pipeline • What are the concepts and principles behind digital illustration content production • How to install and utilize 64-bit Inkscape 0.91 for Windows, Mac OSX and Linux • What are the concepts behind Spline Curves, Strokes, Fills, Patterns and Rendering and how to use and apply them • How to understand and handle digital illustration data formats and data footprint optimization…”
Publicado 2015
Libro electrónico -
2391Publicado 2015“…If you're comfortable with the Linux command line, you'll gain confidence in using OpenStack…”
Libro electrónico -
2392por Tyler, Chris“…The X Window System underlies graphical desktops on Linux and Unix systems, and supports advanced features of modern graphics cards. …”
Publicado 2007
Libro electrónico -
2393Publicado 2023Tabla de Contenidos: “…VDR -- Moving Forward -- Using SBOM with Other Attestations -- Source Authenticity -- Build Attestations -- Dependency Management and Verification -- Sigstore -- Adoption -- Sigstore Components -- Commit Signing -- SBOM Critiques and Concerns -- Visibility for the Attacker -- Intellectual Property -- Tooling and Operationalization -- Summary -- Chapter 5 Challenges in Software Transparency -- Firmware and Embedded Software -- Linux Firmware -- Real-Time Operating System Firmware -- Embedded Systems -- Device-Specific SBOM -- Open Source Software and Proprietary Code -- User Software -- Legacy Software -- Secure Transport -- Summary -- Chapter 6 Cloud and Containerization -- Shared Responsibility Model -- Breakdown of the Shared Responsibility Model -- Duties of the Shared Responsibility Model -- The 4 Cs of Cloud Native Security -- Containers -- Kubernetes -- Serverless Model -- SaaSBOM and the Complexity of APIs -- CycloneDX SaaSBOM -- Tooling and Emerging Discussions -- Usage in DevOps and DevSecOps -- Summary -- Chapter 7 Existing and Emerging Commercial Guidance -- Supply Chain Levels for Software Artifacts -- Google Graph for Understanding Artifact Composition -- CIS Software Supply Chain Security Guide -- Source Code -- Build Pipelines -- Dependencies -- Artifacts -- Deployment -- CNCF's Software Supply Chain Best Practices -- Securing the Source Code -- Securing Materials -- Securing Build Pipelines -- Securing Artifacts -- Securing Deployments…”
Libro electrónico -
2394Publicado 2023Tabla de Contenidos: “…Configuring the Deployment Server -- Configuring serverclass -- Installing the universal forwarder -- Installation in Windows OS -- Installation in Linux OS -- Configuring forwarding -- Configuring deploymentclient -- Forwarder monitoring -- Summary -- Self-assessment -- Reviewing answers -- Chapter 5: Splunk Index Management -- Understanding Splunk indexes -- Understanding buckets -- Creating Splunk indexes -- Splunk Web -- CLI -- indexes.conf explained -- Backing up indexes -- Monitoring Splunk indexes -- Summary -- Self-assessment -- Reviewing answers -- Chapter 6: Splunk Configuration Files -- Understanding conf files -- File format and access -- Structure and syntax -- Config layering and inheritance -- Default stanzas and global settings -- Merging multiple conf files -- Understanding conf file precedence -- Search-time precedence -- Index-time precedence -- Troubleshooting conf files using the btool command -- Summary -- Self-assessment -- Reviewing answers -- Chapter 7: Exploring Distributed Search -- Understanding distributed search -- Search head and indexer clustering overview -- Search head clustering -- Indexer clustering -- Configuring distributed search -- The Splunk CLI -- Splunk Web -- Understanding knowledge bundles -- Knowledge bundle replication -- Summary -- Self-assessment -- Reviewing answers -- Part 2: Splunk Data Administration -- Chapter 8: Getting Data In -- Understanding Splunk data inputs -- Understanding metadata fields -- Source types -- Data indexing phases -- Input -- Parsing -- Indexing -- Splunk Web - Add Data feature -- Summary -- Self-assessment -- Reviewing answers -- Chapter 9: Configuring Splunk Data Inputs -- File and directory monitoring -- Handling network data input -- TCP and UDP input -- Discussing scripted inputs -- Understanding HEC input -- Configuring HEC -- Sending data to HEC…”
Libro electrónico -
2395Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Part 1: Attack Preparation -- Chapter 1: Mindset and Methodologies -- Approach and mindset -- The approach -- The process -- The testing techniques -- The baseline competencies -- The mindset -- Methodologies and frameworks -- NIST SP 800-115 -- Penetration Testing Execution Standard (PTES) -- OWASP's WSTG -- ISECOM's OSSTMM -- The recipe -- Summary -- Further reading -- Chapter 2: Toolset for Web Attacks and Exploitation -- Technical requirements -- Operating systems and the tools of the trade -- Operating system -- Linux -- Windows -- macOS -- Browser -- Interception proxy -- Python for automating web tasks -- Virtualization and containerization systems -- VirtualBox -- Docker -- Summary -- Further reading -- Part 2: Evergreen Attacks -- Chapter 3: Attacking the Authentication Layer - a SAML Use Case -- Technical requirements -- Scenario files -- The Doors of Durin SAML login scenario -- How does SAML work and what are its vulnerabilities? …”
Libro electrónico -
2396Publicado 2005“…Covering all aspects of the Unix operating system and assuming no prior knowledge of Unix, this book begins with the fundamentals and works from the ground up to some of the more advanced programming techniquesThe authors provide a wealth of real-world experience with the Unix operating system, delivering actual examples while showing some of the common misconceptions and errors that new users makeSpecial emphasis is placed on the Apple Mac OS X environment as well as Linux, Solaris, and migrating from Windows to UnixA unique conversion section of the book de…”
Libro electrónico -
2397por Gorton, Benjamin“…Find all the tips, techniques, and best practices you need to succeed in this comprehensive reference, including installing AIR across Windows, Mac, or Linux; learning AIR programming, development, and debugging essentials; and much more…”
Publicado 2008
Libro electrónico -
2398por Watt, Andrew, 1953-“…MSH is a new command-line shell for Microsoft server products, including the long-awaited Longhorn server, and will eventually ship with all major Microsoft products, making it the must-know technologyMSH will replace current command lines in new Microsoft products and can be used to write shell scripts similar to those used with Unix and LinuxDiscusses how MSH enables all of the .NET Framework objects to become accessible via scripting, making it a very powerful addition to any developer's or administrator's toolboxReaders are guided through all the ins and outs of MSH and…”
Publicado 2007
Libro electrónico -
2399por Ballad, TriciaTabla de Contenidos: “…-- Reflected XSS -- Stored XSS -- Patching the Application to Prevent XSS Attacks -- Wrapping It Up -- Part V: Locking Up for the Night -- Chapter 11 Securing Apache and MySQL -- Programming Languages, Web Servers, and Operating Systems Are Inherently Insecure -- Securing a UNIX, Linux, or Mac OS X Environment -- Securing Apache -- Securing MySQL -- Wrapping It Up -- Chapter 12 Securing IIS and SQL Server -- Securing a Windows Server Environment -- Securing IIS -- Securing SQL Server -- Wrapping It Up -- Chapter 13 Securing PHP on the Server -- Using the Latest Version of PHP -- Using the Security Features Built into PHP and Apache -- Using ModSecurity -- Hardening php.ini -- Wrapping It Up -- Chapter 14 Introduction to Automated Testing -- Why Are We Talking About Testing in a Security Book? …”
Publicado 2009
Libro electrónico -
2400Publicado 2014“…You will be able to get a grasp quickly if you are comfortable with learning and building large infrastructures for MariaDB using Linux…”
Libro electrónico