Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
2401Publicado 2015“…If you have some experience working with command lines or using Linux admin or just using Unix and want to know more about Git, then this book is ideal for you…”
Libro electrónico -
2402por Li, Weinan“…An easy-to-follow guide full of hands-on examples of real-world administration tasks.JBoss EAP6 High Availability is ideal for those who want to learn how to use JBoss EAP6 to set up a cluster. Basic knowledge of Linux/Unix is required…”
Publicado 2013
Libro electrónico -
2403Publicado 2015“…If you are an IT administrator and you want to enter the world of cloud storage using OpenStack Swift, then this book is ideal for you. Basic knowledge of Linux and server technology is beneficial to get the most out of the book…”
Libro electrónico -
2404Publicado 2023Tabla de Contenidos: “…Cover -- Exam Voucher -- FM -- Copyright -- Contributors -- Table of Contents -- Preface -- How to Use This Book -- Approach for Navigating Multiple-Choice Queries -- Exercising Caution in Testing -- Advice on Additional Resources - Practical Exercise -- Chapter 1: Operating Systems -- Introduction -- Practice Exam Questions -- 1.1 Identify basic features of Microsoft Windows editions -- 1.2 Given a scenario, use the appropriate Microsoft command-line tool -- 1.3 Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS) -- 1.4 Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility -- 1.5 Given a scenario, use the appropriate Windows settings -- 1.6 Given a scenario, configure Microsoft Windows networking features on a client/desktop -- 1.7 Given a scenario, apply application installation and configuration concepts -- 1.8 Explain common OS types and their purposes -- 1.9 Given a scenario, perform OS installations and upgrades in a diverse OS environment -- 1.10 Identify common features and tools of the macOS/desktop OS -- 1.11 Identify common features and tools of the Linux client/desktop OS -- Chapter 2: Security -- Introduction -- Practice Exam Questions -- 2.1 Summarize various security measures and their purposes -- 2.2 Compare and contrast wireless security protocols and authentication methods -- 2.3 Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods -- 2.4 Explain common social-engineering attacks, threats, and vulnerabilities -- 2.5 Given a scenario, manage and configure basic security settings in the Microsoft Windows OS -- 2.6 Given a scenario, configure a workstation to meet best practices for security -- 2.7 Explain common methods for securing mobile and embedded devices…”
Libro electrónico -
2405por Gralla, PrestonTabla de Contenidos: “…Make Your Own Cursors and Icons; 20. Instant Linux; 2.14.2. Boot Knoppix from a CD; 2.14.3. Boot Knoppix from a Floppy; 2.14.4. …”
Publicado 2005
Libro electrónico -
2406por Bradski, Gary R.Tabla de Contenidos: “…; Downloading and Installing OpenCV; Linux; MacOS X; Getting the Latest OpenCV via CVS; More OpenCV Documentation; Documentation via the Wiki; OpenCV Structure and Content; Portability; Exercises…”
Publicado 2008
Libro electrónico -
2407por Vallath, MuraliTabla de Contenidos: “…Installation and Configuration 4.1 Optimal Flexible Architecture; 4.2 Selecting the clusterware; 4.3 Operating system configuration; 4.4 Network configuration; 4.5 NIC bonding; 4.6 Verify interprocess communication buffer sizes; 4.7 Jumbo frames; 4.8 Remote access setup; 4.9 Configuring the kernel; 4.10 Configuring the hangcheck timer on Linux systems; 4.11 Configuring and synchronizing the system clock; 4.12 Installing Oracle; 4.13 Additional information; 4.14 Conclusion; Chapter 5. …”
Publicado 2006
Libro electrónico -
2408Publicado 2015Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Neo4j; Introduction; Single node installation of Neo4j over Linux; Single node installation of Neo4j over Windows; Single node installation of Neo4j over Mac OS X; Creating your first graph with Neo4j; Importing data from the CSV format to Neo4j; Importing data from RDBMS to Neo4j; Importing data from the Geoff format to Neo4j; Importing data from OrientDB to Neo4j; Importing data from InfiniteGraph to Neo4j…”
Libro electrónico -
2409Publicado 2018Tabla de Contenidos: “…Cover -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Quick Start - The Odoo Developer Mode and Concepts -- The Odoo architecture -- The Developer mode -- Introducing the Library project -- Creating a work database -- Enabling the developer tools -- Adding a field to an existing Model -- Adding Menus, Models, and Views -- Creating menus -- Creating a Custom Model -- Creating Views -- Configuring access control security -- About Odoo base Models -- Summary -- Chapter 2: Installing and Organizing the Development Environment -- Setting up a host for the Odoo server -- Using a virtual machine -- Installing a Linux server -- Installing Odoo from source -- Initializing a new Odoo database -- Managing Odoo databases -- A word about Odoo product versions -- More server configuration options -- Odoo server configuration files -- Changing the listening port -- The database filter option -- Managing server log messages -- Developing from a remote workstation -- Using a Linux text editor -- Installing and configuring Samba -- Installing additional modules -- Finding community modules -- Configuring the addons path -- Updating the apps list -- Summary -- Chapter 3: Your First Odoo Application - A Practical Overview -- Creating a new addon module -- Creating the module's basic skeleton -- Adding an icon -- A word about licenses -- Discovering and installing new modules -- Adding to the addons path -- Installing the new module -- Upgrading a module -- The server development mode -- The model layer -- Creating the data model -- Extending existing models -- The view layer -- Adding menu items -- Creating the form view -- Business document form views -- Adding action buttons -- Using groups to organize forms -- The complete form view -- Adding list and search views -- Extending views…”
Libro electrónico -
2410Publicado 2023Tabla de Contenidos: “…-- Using threat intelligence -- The key to using threat intelligence -- Threat intelligence sharing -- CTI sharing protocols -- Traffic Light Protocol -- STIX and TAXII -- Reasons not to share CTI -- How to identify credible cyber threat intelligence -- Data sources -- Time periods -- Recognizing hype -- Predictions about the future -- Vendors' motives -- Summary -- References -- Chapter 3: Using Vulnerability Trends to Reduce Risk and Costs -- Introduction -- Vulnerability Management Primer -- Vulnerability Disclosure Data Sources -- Industry Vulnerability Disclosure Trends -- Vendor and Product Vulnerability Trends -- Reducing Risk and Costs - Measuring Vendor and Product Improvement -- Microsoft Vulnerability Trends -- Oracle Vulnerability Trends -- Google Vulnerability Trends -- Debian Vulnerability Trends -- Apple Vulnerability Trends -- Vendor Vulnerability Trend Summary -- Operating System Vulnerability Trends -- Google Android Vulnerability Trends -- Apple iOS Vulnerability Trends -- Mobile Operating System Summary -- Microsoft Windows 10 Vulnerability Trends -- Apple macOS Vulnerability Trends -- Desktop Operating System Summary -- Ubuntu Linux Vulnerability Trends -- Linux Kernel Vulnerability Trends…”
Libro electrónico -
2411por Nunes, Fabio MazanattiTabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Overview of WebLogic Server 12c and Related Technologies -- Introducing Oracle WebLogic Server 12c -- WebLogic Server @ Oracle -- Most relevant features -- Overview of JDK 7 -- The Project Coin -- The diamond operator -- The try-with-resources statement -- Strings in switch statements -- Manipulating binary integral literals -- Exception handling with multicatch statements -- Delving into Java EE 6 -- Other technologies in the book -- Oracle Enterprise Pack for Eclipse -- Oracle Coherence -- PrimeFaces -- MySQL -- The Cloud Application Foundation (CAF) -- Oracle Traffic Director -- Oracle Tuxedo -- Oracle Virtual Assembly Builder -- Oracle Exalogic and WebLogic 12c -- Web resources -- Java and Java EE 6 -- WebLogic 12c -- Coherence -- Other tools -- Summary -- Chapter 2: Setting Up the Environment -- About the directory structure -- Installing JDK 1.7 -- Installing Oracle WebLogic Server -- Installing Oracle Enterprise Pack for Eclipse (OEPE) -- Installing MySQL -- Installing on Linux using a package manager -- Downloading and installing manually -- Disabling case sensitivity for tables on Unix/Linux -- Some Windows specifics -- Configuring MySQL databases -- Preparing PrimeFaces -- Downloading the binaries -- Creating a shared library -- Setting up a WebLogic domain -- Configuring Eclipse and OEPE -- Linking WebLogic's runtime environment -- Adding a reference to the PrimeFaces' shared library -- Linking WebLogic Server's instance -- Referencing MySQL databases -- Creating WebLogic data sources -- Adding database connections to Eclipse -- Using OpenLDAP -- Installing OpenLDAP -- Configuring an OpenLDAP server -- Loading sample entries and testing -- Web resources -- Summary…”
Publicado 2013
Libro electrónico -
2412por Ferrer Martínez, JuanTabla de Contenidos: “….) -- 1.1 SEGURIDAD EN DISTINTOS SISTEMAS DE ARCHIVOS -- 1.1.1 DEFINICIÓN DE ARCHIVO -- 1.1.2 DEFINICIÓN DE SISTEMA DE ARCHIVOS -- 1.1.3 SISTEMA DE ARCHIVOS EN LINUX -- 1.1.4 SISTEMA DE ARCHIVOS EN WINDOWS -- 1.1.5 SISTEMAS DE FICHEROS EN MAC OS -- 1.2 PERMISOS DE ACCESO utilizado. o relativa. -- 1.2.1 TIPOS DE ACCESOS -- 1.2.2 ELECCIÓN DEL TIPO DE ACCESO -- 1.2.3 IMPLEMENTACIÓN DE ACCESOS EN LOS SISTEMAS OPERATIVOS -- 1.3 ÓRDENES DE CREACIÓN, MODIFICACIÓN Y BORRADO -- 1.3.1 IMPLEMENTACIÓN, DESCRIPCIÓN (...) -- EJERCICIOS PROPUESTOS -- TEST DE CONOCIMIENTOS -- 2. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2413Publicado 2018“…Although no prior experience with AWS is required, it is recommended that you have some hands-on experience of Linux, Web Services, and basic networking. What You Will Learn Take an in-depth look at what's new with AWS, along with how to effectively manage and automate your EC2 infrastructure with AWS Systems Manager Deploy and scale your applications with ease using AWS Elastic Beanstalk and Amazon Elastic File System Secure and govern your environments using AWS CloudTrail, AWS Config, and AWS Shield Learn the DevOps way using a combination of AWS CodeCommit, AWS CodeDeploy, and AWS CodePipeline Run big data analytics and workloads using Amazon EMR and Amazon Redshift Learn to back up and safeguard your data using AWS Data Pipeline Get started with the Internet of Things using AWS IoT and AWS Greengrass In Detail Many businesses are moving from traditional data centers to AWS because of its reliability, vast service offerings, lower costs, and high rate of innovation. …”
Libro electrónico -
2414Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Packt Upsell -- Table of Contents -- Preface -- Chapter 1: Applying Geometric Transformations to Images -- Installing OpenCV-Python -- Windows -- macOS X -- Linux (for Ubuntu) -- Virtual environments -- Troubleshooting -- OpenCV documentation -- Reading, displaying, and saving images -- What just happened? …”
Libro electrónico -
2415Publicado 2022“…You may know enough bash to get by, but this book will take your skills from manageable to magnificent. Whether you use Linux, Unix, Windows, or a Mac, you'll learn how to read and write scripts like an expert. …”
Libro electrónico -
2416Publicado 2016“…This book will also help IT professionals whose area of responsibility is not VMware, but who work with the VMware team. You can be Windows, Linux, Storage, or Network team; or application architects. …”
Libro electrónico -
2417Publicado 2021“…To get you started, author Jeroen Janssens provides a Docker image packed with over 80 tools—useful whether you work with Windows, macOS, or Linux. You’ll quickly discover why the command line is an agile, scalable, and extensible technology. …”
Libro electrónico -
2418Publicado 2015“…What You Will Learn Get Python up and running on Windows, Mac, and Linux in no time Grasp the fundamental concepts of coding, along with the basics of data structures and control flow. …”
Libro electrónico -
2419“…Expert F# 4.0 will help you achieve unrivaled levels of programmer productivity and program clarity across multiple platforms including Windows, Linux, Android, OSX, and iOS as well as HTML5 and GPUs. …”
Libro electrónico -
2420por Kuhn, Darl. author“…RMAN’s robust database duplication feature set plays right into this growing need for ease of provisioning, enabling easy duplication of known-good databases on demand, across operating systems such as between Linux and Solaris, and even across storage environments such as when duplicating from a RAC/ASM environment to a single-node instance using regular file system storage. …”
Publicado 2015
Libro electrónico