Mostrando 2,501 - 2,520 Resultados de 2,988 Para Buscar '"Linux"', tiempo de consulta: 0.11s Limitar resultados
  1. 2501
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Started with Java 9 -- Getting started with Java -- Installing Java -- Installation on Windows -- Installation on MAC OS X -- Installation on Linux -- Setting JAVA_HOME -- Executing jshell -- Looking at the byte code -- Packaging classes into a JAR file -- Managing the running Java application -- Using an IDE -- NetBeans -- Eclipse -- IntelliJ -- IDE services -- IDE screen structure -- Editing files -- Managing projects -- Build the code and run it -- Debugging Java -- Summary -- Chapter 2: The First Real Java Program - Sorting Names -- Getting started with sorting -- Bubble sort -- Getting started with project structure and build tools -- Make -- Ant -- Installing Ant -- Using Ant -- Maven -- Installing Maven -- Using Maven -- Gradle -- Installing Gradle -- Setting up the project with Maven -- Coding the sort -- Understanding the algorithm and language constructs -- Blocks -- Variables -- Types -- Arrays -- Expressions -- Loops -- Conditional execution -- Final variables -- Classes -- Inner, nested, local, and anonymous classes -- Packages -- Methods -- Interfaces -- Argument passing -- Fields -- Modifiers -- Object initializers and constructors -- Compiling and running the program -- Summary -- Chapter 3: Optimizing the Sort - Making Code Professional -- The general sorting program -- A brief overview of various sorting algorithms -- Quick sort -- Project structure and build tools -- Maven dependency management -- Code the sort -- Creating the interfaces -- Creating BubbleSort -- Amending the interfaces -- Architectural considerations -- Creating unit tests -- Adding JUnit as dependency -- Writing the BubbleSortTest class -- Good unit tests -- A good unit test is readable…”
    Libro electrónico
  2. 2502
    Publicado 2015
    Tabla de Contenidos: “…Reading and Writing Files -- Files and File Paths -- Backslash on Windows and Forward Slash on OS X and Linux -- The Current Working Directory -- Absolute vs. …”
    Libro electrónico
  3. 2503
    por Ridder, Detlef
    Publicado 2023
    Tabla de Contenidos: “…-- 1.2 Großer Funktionsumfang durch Zusatzpakete -- 1.3 Download und Installation -- 1.3.1 Windows‌ -- 1.3.2 macOS‌ -- 1.3.3 Linux‌ -- 1.4 Umgang mit FreeCAD -- 1.5 Die FreeCAD-Benutzeroberfläche‌ -- Kapitel 2: Übersicht über die Arbeitsbereiche -- 2.1 FreeCADs Arbeitsbereiche -- 2.2 Bevor Sie loslegen: Grundeinstellungen‌ -- 2.3 Die Statusleiste‌ -- 2.4 Arbeitsbereich »Part Design« -- 2.5 Der Sketcher -- 2.5.1 Werkzeugkasten »Skizze‌« -- 2.5.2 Werkzeugkasten »Skizzengeometrien‌« -- 2.5.3 Werkzeugkasten »Skizzen Beschränkungen‌« -- 2.5.4 Vollständige Skizze, Beschränkungen‌ und Freiheitsgrade‌ -- 2.5.5 Werkzeugkasten »Skizzen-Werkzeuge« -- 2.5.6 Werkzeugkasten »B-Spline Werkzeuge« -- 2.5.7 Werkzeugkasten »Virtueller Bereich‌« -- 2.6 3D-Modellieren‌ unter Verwendung von Skizzen -- 2.6.1 Mehrere Körper (Body), mehrere Skizzen (Sketch) -- 2.6.2 Werkzeugkasten »Part Design Modeling« -- 2.6.3 Funktionen zum additiven Erzeugen von Körpern aus Skizzen -- 2.7 Funktionen zum Abziehen‌‌ von Volumenteilen -- 2.7.1 Tasche‌ -- 2.7.2 Bohrung‌ -- 2.7.3 Nut‌ -- 2.7.4 Ausformung -- 2.7.5 Rohr‌ -- 2.7.6 Wendel -- 2.7.7 Grundkörper abziehen -- 2.8 Detailbearbeitungen -- 2.8.1 Verrundung -- 2.8.2 Fase‌ -- 2.8.3 Formschräge -- 2.8.4 Dicke, Wandstärke -- 2.8.5 Sonderkonstruktionen‌ -- 2.9 Anordnungen‌ -- 2.9.1 Spiegeln -- 2.9.2 Lineares Muster -- 2.9.3 Polares Muster‌ -- 2.9.4 Mehrfache Transformation -- 2.10 Boolesche Operationen mit zwei oder mehreren Körpern -- Kapitel 3: Komplett-Beispiel Volumenmodellierung: Schraubenschlüssel -- 3.1 Der Schraubenschlüssel -- 3.2 Neue Konstruktion und grober Umriss -- 3.2.1 Skizzieren -- 3.2.2 Volumenkörper erzeugen‌ und bearbeiten -- 3.2.3 Optimierung mit Kantenverrundung…”
    Libro electrónico
  4. 2504
    Publicado 2013
    “…The final section covers software support, in particular O/S (linux, research and technology organization (RTO))"--…”
    Libro electrónico
  5. 2505
    Publicado 2017
    Tabla de Contenidos: “…-- Readability -- Libraries and community -- Interactive mode -- Scalable -- Understanding the twelve-factor app -- Setting up the Python environment -- Installing Git -- Installing Git on Debian-based distribution Linux (such as Ubuntu) -- Seting up Git on a Debian-based distribution -- Installing Git on Windows -- Using Chocolatey -- Installing Git on Mac -- Installing the command-line tools for OS X -- Installing Git for OS X -- Installing and configuring Python -- Installing Python on a Debian-based distribution (such as Ubuntu) -- Using the APT package management tools -- Using source code -- Installing Python on Windows -- Installing Python on Mac -- Installing the command-line tools for OS X -- Installing Python for OS X -- Getting familiar with the GitHub and Git commands -- Summary -- Chapter 2: Building Microservices in Python -- Python concepts -- Modules -- Functions -- Modeling microservices -- Building microservices -- Building resource user methods -- GET /api/v1/users -- GET /api/v1/users/[user_id] -- POST /api/v1/users -- DELETE /api/v1/users -- PUT /api/v1/users -- Building resource tweets methods -- GET /api/v2/tweets -- POST /api/v2/tweets -- GET /api/v2/tweets/[id] -- Testing the RESTful API -- Unit testing -- Summary…”
    Libro electrónico
  6. 2506
    Publicado 2017
    Tabla de Contenidos: “…Getting a property from an object -- Demethodizing - turning methods into functions -- Finding the optimum -- Questions -- Summary -- Chapter 7: Transforming Functions - Currying and Partial Application -- A bit of theory -- Currying -- Dealing with many parameters -- Currying by hand -- Currying with bind() -- Currying with eval() -- Partial application -- Partial application with arrow functions -- Partial application with eval() -- Partial application with closures -- Partial currying -- Partial currying with bind() -- Partial currying with closures -- Final thoughts -- Parameter order -- Being functional -- Questions -- Summary -- Chapter 8: Connecting Functions - Pipelining and Composition -- Pipelining -- Piping in Unix/Linux -- Revisiting an example -- Creating pipelines -- Building pipelines by hand -- Using other constructs -- Debugging pipelines -- Using tee -- Tapping into a flow -- Using a logging wrapper -- Chaining and fluent interfaces -- Pointfree style -- Defining pointfree functions -- Converting to pointfree style -- Composing -- Some examples of composition -- Unary operators -- Counting files -- Finding unique words -- Composing with higher order functions -- Testing composed functions -- Questions -- Summary -- Chapter 9: Designing Functions - Recursion -- Using recursion -- Thinking recursively -- Decrease and Conquer: searching -- Decrease and Conquer: doing powers -- Divide and conquer: The Tower of Hanoi -- Divide and conquer: sorting -- Dynamic programming: making change -- Higher order functions revisited -- Mapping and filtering -- Other higher-order functions -- Searching and backtracking -- The Eight Queens puzzle -- Traversing a tree structure -- Recursion techniques -- Tail call optimization -- Continuation passing style -- Trampolines and thunks -- Recursion elimination -- Questions -- Summary…”
    Libro electrónico
  7. 2507
    por Levine, John R.
    Publicado 2004
    “…Mail and Hotmail, while remaining compact and manageable enough for the smallest Unix- and Linux-based PC systems. Its component design makes it easy to extend and customize while keeping its key functions secure, so it's no wonder that adoption of qmail continues at a rapid pace. …”
    Libro electrónico
  8. 2508
    Publicado 2025
    Tabla de Contenidos: “…SECURING COMMUNICATIONS -- The Favored Operating System: Linux -- Step 1: Let Us Get Secure: Encrypting Files and Using Secure Shell -- Gnu Privacy Guard -- Encrypting and Decrypting Using GNU Privacy Guard -- Secure Shell Access to Servers -- Moving Files Securely -- Exercise for the Reader -- 4. …”
    Libro electrónico
  9. 2509
    Publicado 2004
    Tabla de Contenidos: “…Installing and configuring EWLM -- 2.1 Overview -- 2.2 The ITSO test environment -- 2.3 Virtualization Engine suite -- 2.4 EWLM configuration in our ITSO environment -- 2.4.1 Configuring domain manager on Linux -- 2.4.2 Configuring managed servers on AIX and Windows -- 2.5 Installing the domain manager on other operating systems -- 2.5.1 Domain manager on AIX -- 2.5.2 Domain manager on Windows -- 2.5.3 Domain manager on i5/OS -- 2.6 Configuring managed servers on other operating systems -- 2.6.1 Managed server on i5/OS -- 2.6.2 Managed server on Solaris -- 2.7 Uninstalling -- Chapter 3. …”
    Libro electrónico
  10. 2510
    Publicado 2001
    Tabla de Contenidos: “…Time-of-Check, Time-of-Use -- Broken passwd -- Avoiding TOCTOU Problems -- Secure File Access -- Temporary Files -- File Locking -- Other Race Conditions -- Conclusion -- 10 Randomness and Determinism -- Pseudo-random Number Generators -- Examples of PRNGs -- The Blum-Blum-Shub PRNG -- The Tiny PRNG -- Attacks Against PRNGs -- How to Cheat in On-line Gambling -- Statistical Tests on PRNGs -- Entropy Gathering and Estimation -- Hardware Solutions -- Software Solutions -- Poor Entropy Collection: How to Read "Secret" Netscape Messages -- Handling Entropy -- Practical Sources of Randomness -- Tiny -- Random Numbers for Windows -- Random Numbers for Linux -- Random Numbers in Java -- Conclusion -- 11 Applying Cryptography -- General Recommendations -- Developers Are Not Cryptographers -- Data Integrity -- Export Laws -- Common Cryptographic Libraries -- Cryptlib -- OpenSSL -- Crypto++ -- BSAFE -- Cryptix -- Programming with Cryptography -- Encryption -- Hashing -- Public Key Encryption -- Threading -- Cookie Encryption -- More Uses for Cryptographic Hashes -- SSL and TLS (Transport Layer Security) -- Stunnel -- One-Time Pads -- Conclusion -- 12 Trust Management and Input Validation -- A Few Words on Trust -- Examples of Misplaced Trust -- Trust Is Transitive -- Protection from Hostile Callers -- Invoking Other Programs Safely -- Problems from the Web -- Client-side Security -- Perl Problems -- Format String Attacks -- Automatically Detecting Input Problems -- Conclusion -- 13 Password Authentication -- Password Storage -- Adding Users to a Password Database -- Password Authentication -- Password Selection -- More Advice -- Throwing Dice -- Passphrases -- Application-Selected Passwords -- One-Time Passwords -- Conclusion -- 14 Database Security -- The Basics -- Access Control -- Using Views for Access Control -- Field Protection…”
    Libro electrónico
  11. 2511
    por Powers, Shelley
    Publicado 2003
    “…With the growing popularity of Linux and the advent of Darwin, Unix has metamorphosed into something new and exciting. …”
    Libro electrónico
  12. 2512
    Publicado 2010
    Tabla de Contenidos: “…Cover -- Table of Contents -- Introduction -- Part I: Unleashing Windows Home Server Configuration -- 1 Setting Up Your Windows Home Server Network -- Configuring Windows Home Server for Networking -- Viewing the Windows Home Server Network -- Troubleshooting Network Problems -- Handling Multiple Network Subnets -- Making a Remote Desktop Connection to the Server -- From Here -- 2 Setting Up and Working with User Accounts -- Understanding Security Groups -- Adding a New User -- Synchronizing the Client and Windows Home Server Passwords -- Automating Client Logons -- Modifying User Accounts -- From Here -- 3 Adding Devices to the Windows Home Server Network -- Installing Windows Home Server Connector on the Client Computers -- Rediscovering the Windows Home Server -- Using a Mac on Your Windows Home Server Network -- Using a Linux Client on Your Windows Home Server Network -- Connecting Other Devices to the Windows Home Server Network -- From Here -- 4 Configuring Windows Home Server -- Changing the Name of the Home Server -- Running the Windows Home Server Console -- Changing the Date and Time on Windows Home Server -- Selecting the Windows Home Server Region -- Configuring Windows Update -- Changing the Windows Home Server Password -- Restarting or Shutting Down Windows Home Server -- Configuring an Uninterruptible Power Supply -- Configuring the Windows Home Server Startup -- From Here -- 5 Setting Up and Using Home Server Storage -- Understanding Windows Home Server Storage -- Adding Storage to the Home Server -- Viewing Storage Status -- Repairing Storage -- Removing Storage from the Home Server -- From Here -- Part II: Unleashing Windows Home Server Networking -- 6 Sharing Folders and Files on the Home Server -- Examining the Predefined Windows Home Server Shares -- Creating a New Shared Folder -- Toggling Duplication for a Shared Folder…”
    Libro electrónico
  13. 2513
    Publicado 2022
    Tabla de Contenidos: “…Azure Blobs -- Managing File Shares -- Mapping File Shares -- File Share Snapshots -- Azure File Sync -- Managing Storage -- Azure Storage Explorer -- AzCopy -- Import/Export Service -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 Azure Virtual Machines -- Virtual Machine Planning -- Virtual Network -- Name -- Location and Pricing -- Size -- Storage -- Operating System -- Deploying Virtual Machines -- Connecting to Virtual Machines -- Windows Connections -- Linux Connections -- Azure Bastion -- Availability of Virtual Machines -- Scaling Concepts -- Vertical Scaling -- Horizontal Scaling -- Virtual Machine Scale Sets -- Implementing a Scale Set -- Autoscaling -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Automation, Deployment, and Configuration of Resources -- Azure Resource Manager -- ARM Templates -- Template Design -- Template Modes -- Template Sections -- Composing Templates -- Exporting Templates -- Configuring Virtual Hard Disk Templates -- Create a VM from a VHD -- Virtual Machine Extensions -- Custom Script Extension -- Desired State Configuration -- Summary -- Exam Essentials -- Review Questions -- Chapter 9 PaaS Compute Options -- Azure App Service Plans -- Pricing Tiers -- Scaling -- Azure App Services -- Continuous Deployment -- Deployment Slots -- Securing App Service -- Custom Domains -- Backup -- Container Instances -- Docker -- Azure Container Instances -- Container Groups -- Azure Kubernetes Service -- Terminology -- Cluster Components -- Networking -- Storage -- Cluster Upgrade -- Scaling -- Summary -- Exam Essentials -- Review Questions -- Chapter 10 Data Protection -- File and Folder Backups -- Azure Backup -- Creating Recovery Services Vault -- Configuring a Recovery Services Vault -- Virtual Machine Data Protection…”
    Libro electrónico
  14. 2514
    Publicado 2023
    Tabla de Contenidos: “…OTHER CONSIDERATIONS FOR NEW APPLICATIONS -- CHAPTER 8: Operating System Types -- WORKSTATION OSs -- CELL PHONE/TABLET OSs -- VARIOUS FILESYSTEM TYPES -- VENDOR LIFE-CYCLE LIMITATIONS -- COMPATIBILITY CONCERNS BETWEEN OSs -- CHAPTER 9: Operating System Installations and Upgrades -- BOOT METHODS -- TYPES OF INSTALLATIONS -- PARTITIONING -- DRIVE FORMAT -- UPGRADE CONSIDERATIONS -- FEATURE UPDATES -- CHAPTER 10: macOS -- INSTALLATION AND UNINSTALLATION OF APPLICATIONS -- APPLE ID AND CORPORATE RESTRICTIONS -- BEST PRACTICES -- SYSTEM PREFERENCES -- FEATURES -- DISK UTILITY -- FILEVAULT -- TERMINAL -- FORCE QUIT -- CHAPTER 11: Linux -- COMMON COMMANDS -- BEST PRACTICES -- TOOLS -- PART II: Domain 2.0: Security -- CHAPTER 12: Physical Security -- PHYSICAL SECURITY -- PHYSICAL SECURITY FOR STAFF -- CHAPTER 13: Logical Security -- LOGICAL SECURITY -- MOBILE DEVICE MANAGEMENT (MDM) -- ACTIVE DIRECTORY -- CHAPTER 14: Wireless Security -- PROTOCOLS AND ENCRYPTION -- AUTHENTICATION -- CHAPTER 15: Malware -- MALWARE -- MALWARE PREVENTION AND REMOVAL TOOLS AND METHODS -- CHAPTER 16: Social Engineering and Security Threats -- SOCIAL ENGINEERING -- THREATS -- VULNERABILITIES -- CHAPTER 17: Windows Security -- DEFENDER ANTIVIRUS -- FIREWALL -- USERS AND GROUPS -- LOGIN OS OPTIONS -- NTFS VS. …”
    Libro electrónico
  15. 2515
    Publicado 2024
    Tabla de Contenidos: “…. -- There's more... -- GPT-powered Kali Linux terminals -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 7: Threat Monitoring and Detection -- Technical requirements -- Threat Intelligence Analysis -- Getting ready -- How to do it... -- How it works... -- There's more... -- Real-Time Log Analysis -- Getting ready -- How to do it... -- How it works... -- There's more... -- Detecting APTs using ChatGPT for Windows Systems -- Getting ready -- How to do it... -- How it works... -- There's more... -- Building Custom Threat Detection Rules -- Getting ready -- How to do it... -- How it works... -- There's more... -- Network Traffic Analysis and Anomaly Detection with PCAP Analyzer -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 8: Incident Response -- Technical requirements -- ChatGPT-assisted incident analysis and triage -- Getting ready -- How to do it... -- How it works... -- There's more... -- Generating incident response playbooks…”
    Libro electrónico
  16. 2516
    Publicado 2023
    “…With techniques like embedded machine learning, developers can capture human intuition and deploy it to any target--from ultra-low power microcontrollers to embedded Linux devices. This practical guide gives engineering professionals, including product managers and technology leaders, an end-to-end framework for solving real-world industrial, commercial, and scientific problems with edge AI. …”
    Libro electrónico
  17. 2517
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Recent Developments in the Field, Installations, and Hello World Applications -- Chapter 1: From Bag-of-Words to the Transformers -- Evolution of NLP approaches -- Recalling traditional NLP approaches -- Language modeling and generation -- Leveraging DL -- Considering the word order with RNN models -- LSTMs and gated recurrent units -- Contextual word embeddings and TL -- Overview of the Transformer architecture -- Attention mechanism -- Multi-head attention mechanisms -- Using TL with Transformers -- Multimodal learning -- Summary -- References -- Chapter 2: A Hands-On Introduction to the Subject -- Technical requirements -- Installing transformer with Anaconda -- Installation on Linux -- Installation on Windows -- Installation on macOS -- Installing TensorFlow, PyTorch, and Transformer -- Installing and using Google Colab -- Working with language models and tokenizers -- Working with community-provided models -- Working with multimodal transformers -- Working with benchmarks and datasets -- Important benchmarks -- GLUE benchmark -- SuperGLUE benchmark -- XTREME benchmark -- XGLUE benchmark -- SQuAD benchmark -- Accessing the datasets with an application programming interface -- Data manipulation using the datasets library -- Sorting, indexing, and shuffling -- Caching and reusability -- Dataset filter and map function -- Processing data with the map function -- Working with local files -- Preparing a dataset for model training -- Benchmarking for speed and memory -- Summary -- Part 2: Transformer Models: From Autoencoders to Autoregressive Models -- Chapter 3: Autoencoding Language Models -- Technical requirements -- BERT - one of the autoencoding language models -- BERT language model pretraining tasks…”
    Libro electrónico
  18. 2518
    por Raya González, Laura
    Publicado 2014
    Tabla de Contenidos: “….) -- 7.1 EL ENTORNO GRÁFICO DE LINUX -- 7.1.1 GNOME…”
    Libro electrónico
  19. 2519
    Publicado 2018
    Tabla de Contenidos: “…Chapter 6 - OpenMP Runtime -- 6.1 Introduction -- 6.2 Offloading Library Design -- 6.3 Tasking Runtime -- 6.3.1 Task Dependency Management -- 6.4 Experimental Results -- 6.4.1 Offloading Library -- 6.4.2 Tasking Runtime -- 6.4.2.1 Applications with a linear generation pattern -- 6.4.2.2 Applications with a recursive generation pattern -- 6.4.2.3 Applications with mixed patterns -- 6.4.2.4 Impact of cutoff on LINEAR and RECURSIVE applications -- 6.4.2.5 Real applications -- 6.4.3 Evaluation of the Task Dependency Mechanism -- 6.4.3.1 Performance speedup and memory usage -- 6.4.3.2 The task dependency mechanism on the MPPA -- 6.5 Summary -- References -- Chapter 7 - Embedded Operating Systems -- 7.1 Introduction -- 7.2 State of The Art -- 7.2.1 Real-time Support in Linux -- 7.2.1.1 Hard real-time support -- 7.2.1.2 Latency reduction -- 7.2.1.3 Real-time CPU scheduling -- 7.2.2 Survey of Existing Embedded RTOSs -- 7.2.3 Classification of Embedded RTOSs -- 7.3 Requirements for The Choice of The Run Time System -- 7.3.1 Programming Model -- 7.3.2 Preemption Support -- 7.3.3 Migration Support -- 7.3.4 Scheduling Characteristics -- 7.3.5 Timing Analysis -- 7.4 RTOS Selection -- 7.4.1 Host Processor -- 7.4.2 Manycore Processor -- 7.5 Operating System Support -- 7.5.1 Linux -- 7.5.2 ERIKA Enterprise Support -- 7.5.2.1 Exokernel support -- 7.5.2.2 Single-ELF multicore ERIKA Enterprise -- 7.5.2.3 Support for limited preemption, job, and global scheduling -- 7.5.2.4 New ERIKA Enterprise primitives -- 7.5.2.5 New data structures -- 7.5.2.6 Dynamic task creation -- 7.5.2.7 IRQ handlers as tasks -- 7.5.2.8 File hierarchy -- 7.5.2.9 Early performance estimation -- 7.6 Summary -- References -- Index -- About the Editors -- Back Cover…”
    Libro electrónico
  20. 2520
    Tabla de Contenidos: “…; 1.2.8 ORGANIZACIÓN DE LA INFORMACIÓN; 1.2.9 OTROS SISTEMAS OPERATIVOS. LINUX; 1.3 REDES; 1.3.1 TIPOS DE REDES; 1.3.2 TOPOLOGÍA DE REDES…”
    Libro electrónico