Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
2501Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Started with Java 9 -- Getting started with Java -- Installing Java -- Installation on Windows -- Installation on MAC OS X -- Installation on Linux -- Setting JAVA_HOME -- Executing jshell -- Looking at the byte code -- Packaging classes into a JAR file -- Managing the running Java application -- Using an IDE -- NetBeans -- Eclipse -- IntelliJ -- IDE services -- IDE screen structure -- Editing files -- Managing projects -- Build the code and run it -- Debugging Java -- Summary -- Chapter 2: The First Real Java Program - Sorting Names -- Getting started with sorting -- Bubble sort -- Getting started with project structure and build tools -- Make -- Ant -- Installing Ant -- Using Ant -- Maven -- Installing Maven -- Using Maven -- Gradle -- Installing Gradle -- Setting up the project with Maven -- Coding the sort -- Understanding the algorithm and language constructs -- Blocks -- Variables -- Types -- Arrays -- Expressions -- Loops -- Conditional execution -- Final variables -- Classes -- Inner, nested, local, and anonymous classes -- Packages -- Methods -- Interfaces -- Argument passing -- Fields -- Modifiers -- Object initializers and constructors -- Compiling and running the program -- Summary -- Chapter 3: Optimizing the Sort - Making Code Professional -- The general sorting program -- A brief overview of various sorting algorithms -- Quick sort -- Project structure and build tools -- Maven dependency management -- Code the sort -- Creating the interfaces -- Creating BubbleSort -- Amending the interfaces -- Architectural considerations -- Creating unit tests -- Adding JUnit as dependency -- Writing the BubbleSortTest class -- Good unit tests -- A good unit test is readable…”
Libro electrónico -
2502Publicado 2015Tabla de Contenidos: “…Reading and Writing Files -- Files and File Paths -- Backslash on Windows and Forward Slash on OS X and Linux -- The Current Working Directory -- Absolute vs. …”
Libro electrónico -
2503por Ridder, DetlefTabla de Contenidos: “…-- 1.2 Großer Funktionsumfang durch Zusatzpakete -- 1.3 Download und Installation -- 1.3.1 Windows -- 1.3.2 macOS -- 1.3.3 Linux -- 1.4 Umgang mit FreeCAD -- 1.5 Die FreeCAD-Benutzeroberfläche -- Kapitel 2: Übersicht über die Arbeitsbereiche -- 2.1 FreeCADs Arbeitsbereiche -- 2.2 Bevor Sie loslegen: Grundeinstellungen -- 2.3 Die Statusleiste -- 2.4 Arbeitsbereich »Part Design« -- 2.5 Der Sketcher -- 2.5.1 Werkzeugkasten »Skizze« -- 2.5.2 Werkzeugkasten »Skizzengeometrien« -- 2.5.3 Werkzeugkasten »Skizzen Beschränkungen« -- 2.5.4 Vollständige Skizze, Beschränkungen und Freiheitsgrade -- 2.5.5 Werkzeugkasten »Skizzen-Werkzeuge« -- 2.5.6 Werkzeugkasten »B-Spline Werkzeuge« -- 2.5.7 Werkzeugkasten »Virtueller Bereich« -- 2.6 3D-Modellieren unter Verwendung von Skizzen -- 2.6.1 Mehrere Körper (Body), mehrere Skizzen (Sketch) -- 2.6.2 Werkzeugkasten »Part Design Modeling« -- 2.6.3 Funktionen zum additiven Erzeugen von Körpern aus Skizzen -- 2.7 Funktionen zum Abziehen von Volumenteilen -- 2.7.1 Tasche -- 2.7.2 Bohrung -- 2.7.3 Nut -- 2.7.4 Ausformung -- 2.7.5 Rohr -- 2.7.6 Wendel -- 2.7.7 Grundkörper abziehen -- 2.8 Detailbearbeitungen -- 2.8.1 Verrundung -- 2.8.2 Fase -- 2.8.3 Formschräge -- 2.8.4 Dicke, Wandstärke -- 2.8.5 Sonderkonstruktionen -- 2.9 Anordnungen -- 2.9.1 Spiegeln -- 2.9.2 Lineares Muster -- 2.9.3 Polares Muster -- 2.9.4 Mehrfache Transformation -- 2.10 Boolesche Operationen mit zwei oder mehreren Körpern -- Kapitel 3: Komplett-Beispiel Volumenmodellierung: Schraubenschlüssel -- 3.1 Der Schraubenschlüssel -- 3.2 Neue Konstruktion und grober Umriss -- 3.2.1 Skizzieren -- 3.2.2 Volumenkörper erzeugen und bearbeiten -- 3.2.3 Optimierung mit Kantenverrundung…”
Publicado 2023
Libro electrónico -
2504Publicado 2013“…The final section covers software support, in particular O/S (linux, research and technology organization (RTO))"--…”
Libro electrónico -
2505Publicado 2017Tabla de Contenidos: “…-- Readability -- Libraries and community -- Interactive mode -- Scalable -- Understanding the twelve-factor app -- Setting up the Python environment -- Installing Git -- Installing Git on Debian-based distribution Linux (such as Ubuntu) -- Seting up Git on a Debian-based distribution -- Installing Git on Windows -- Using Chocolatey -- Installing Git on Mac -- Installing the command-line tools for OS X -- Installing Git for OS X -- Installing and configuring Python -- Installing Python on a Debian-based distribution (such as Ubuntu) -- Using the APT package management tools -- Using source code -- Installing Python on Windows -- Installing Python on Mac -- Installing the command-line tools for OS X -- Installing Python for OS X -- Getting familiar with the GitHub and Git commands -- Summary -- Chapter 2: Building Microservices in Python -- Python concepts -- Modules -- Functions -- Modeling microservices -- Building microservices -- Building resource user methods -- GET /api/v1/users -- GET /api/v1/users/[user_id] -- POST /api/v1/users -- DELETE /api/v1/users -- PUT /api/v1/users -- Building resource tweets methods -- GET /api/v2/tweets -- POST /api/v2/tweets -- GET /api/v2/tweets/[id] -- Testing the RESTful API -- Unit testing -- Summary…”
Libro electrónico -
2506Publicado 2017Tabla de Contenidos: “…Getting a property from an object -- Demethodizing - turning methods into functions -- Finding the optimum -- Questions -- Summary -- Chapter 7: Transforming Functions - Currying and Partial Application -- A bit of theory -- Currying -- Dealing with many parameters -- Currying by hand -- Currying with bind() -- Currying with eval() -- Partial application -- Partial application with arrow functions -- Partial application with eval() -- Partial application with closures -- Partial currying -- Partial currying with bind() -- Partial currying with closures -- Final thoughts -- Parameter order -- Being functional -- Questions -- Summary -- Chapter 8: Connecting Functions - Pipelining and Composition -- Pipelining -- Piping in Unix/Linux -- Revisiting an example -- Creating pipelines -- Building pipelines by hand -- Using other constructs -- Debugging pipelines -- Using tee -- Tapping into a flow -- Using a logging wrapper -- Chaining and fluent interfaces -- Pointfree style -- Defining pointfree functions -- Converting to pointfree style -- Composing -- Some examples of composition -- Unary operators -- Counting files -- Finding unique words -- Composing with higher order functions -- Testing composed functions -- Questions -- Summary -- Chapter 9: Designing Functions - Recursion -- Using recursion -- Thinking recursively -- Decrease and Conquer: searching -- Decrease and Conquer: doing powers -- Divide and conquer: The Tower of Hanoi -- Divide and conquer: sorting -- Dynamic programming: making change -- Higher order functions revisited -- Mapping and filtering -- Other higher-order functions -- Searching and backtracking -- The Eight Queens puzzle -- Traversing a tree structure -- Recursion techniques -- Tail call optimization -- Continuation passing style -- Trampolines and thunks -- Recursion elimination -- Questions -- Summary…”
Libro electrónico -
2507por Levine, John R.“…Mail and Hotmail, while remaining compact and manageable enough for the smallest Unix- and Linux-based PC systems. Its component design makes it easy to extend and customize while keeping its key functions secure, so it's no wonder that adoption of qmail continues at a rapid pace. …”
Publicado 2004
Libro electrónico -
2508Publicado 2025Tabla de Contenidos: “…SECURING COMMUNICATIONS -- The Favored Operating System: Linux -- Step 1: Let Us Get Secure: Encrypting Files and Using Secure Shell -- Gnu Privacy Guard -- Encrypting and Decrypting Using GNU Privacy Guard -- Secure Shell Access to Servers -- Moving Files Securely -- Exercise for the Reader -- 4. …”
Libro electrónico -
2509Publicado 2004Tabla de Contenidos: “…Installing and configuring EWLM -- 2.1 Overview -- 2.2 The ITSO test environment -- 2.3 Virtualization Engine suite -- 2.4 EWLM configuration in our ITSO environment -- 2.4.1 Configuring domain manager on Linux -- 2.4.2 Configuring managed servers on AIX and Windows -- 2.5 Installing the domain manager on other operating systems -- 2.5.1 Domain manager on AIX -- 2.5.2 Domain manager on Windows -- 2.5.3 Domain manager on i5/OS -- 2.6 Configuring managed servers on other operating systems -- 2.6.1 Managed server on i5/OS -- 2.6.2 Managed server on Solaris -- 2.7 Uninstalling -- Chapter 3. …”
Libro electrónico -
2510Publicado 2001Tabla de Contenidos: “…Time-of-Check, Time-of-Use -- Broken passwd -- Avoiding TOCTOU Problems -- Secure File Access -- Temporary Files -- File Locking -- Other Race Conditions -- Conclusion -- 10 Randomness and Determinism -- Pseudo-random Number Generators -- Examples of PRNGs -- The Blum-Blum-Shub PRNG -- The Tiny PRNG -- Attacks Against PRNGs -- How to Cheat in On-line Gambling -- Statistical Tests on PRNGs -- Entropy Gathering and Estimation -- Hardware Solutions -- Software Solutions -- Poor Entropy Collection: How to Read "Secret" Netscape Messages -- Handling Entropy -- Practical Sources of Randomness -- Tiny -- Random Numbers for Windows -- Random Numbers for Linux -- Random Numbers in Java -- Conclusion -- 11 Applying Cryptography -- General Recommendations -- Developers Are Not Cryptographers -- Data Integrity -- Export Laws -- Common Cryptographic Libraries -- Cryptlib -- OpenSSL -- Crypto++ -- BSAFE -- Cryptix -- Programming with Cryptography -- Encryption -- Hashing -- Public Key Encryption -- Threading -- Cookie Encryption -- More Uses for Cryptographic Hashes -- SSL and TLS (Transport Layer Security) -- Stunnel -- One-Time Pads -- Conclusion -- 12 Trust Management and Input Validation -- A Few Words on Trust -- Examples of Misplaced Trust -- Trust Is Transitive -- Protection from Hostile Callers -- Invoking Other Programs Safely -- Problems from the Web -- Client-side Security -- Perl Problems -- Format String Attacks -- Automatically Detecting Input Problems -- Conclusion -- 13 Password Authentication -- Password Storage -- Adding Users to a Password Database -- Password Authentication -- Password Selection -- More Advice -- Throwing Dice -- Passphrases -- Application-Selected Passwords -- One-Time Passwords -- Conclusion -- 14 Database Security -- The Basics -- Access Control -- Using Views for Access Control -- Field Protection…”
Libro electrónico -
2511por Powers, Shelley“…With the growing popularity of Linux and the advent of Darwin, Unix has metamorphosed into something new and exciting. …”
Publicado 2003
Libro electrónico -
2512Publicado 2010Tabla de Contenidos: “…Cover -- Table of Contents -- Introduction -- Part I: Unleashing Windows Home Server Configuration -- 1 Setting Up Your Windows Home Server Network -- Configuring Windows Home Server for Networking -- Viewing the Windows Home Server Network -- Troubleshooting Network Problems -- Handling Multiple Network Subnets -- Making a Remote Desktop Connection to the Server -- From Here -- 2 Setting Up and Working with User Accounts -- Understanding Security Groups -- Adding a New User -- Synchronizing the Client and Windows Home Server Passwords -- Automating Client Logons -- Modifying User Accounts -- From Here -- 3 Adding Devices to the Windows Home Server Network -- Installing Windows Home Server Connector on the Client Computers -- Rediscovering the Windows Home Server -- Using a Mac on Your Windows Home Server Network -- Using a Linux Client on Your Windows Home Server Network -- Connecting Other Devices to the Windows Home Server Network -- From Here -- 4 Configuring Windows Home Server -- Changing the Name of the Home Server -- Running the Windows Home Server Console -- Changing the Date and Time on Windows Home Server -- Selecting the Windows Home Server Region -- Configuring Windows Update -- Changing the Windows Home Server Password -- Restarting or Shutting Down Windows Home Server -- Configuring an Uninterruptible Power Supply -- Configuring the Windows Home Server Startup -- From Here -- 5 Setting Up and Using Home Server Storage -- Understanding Windows Home Server Storage -- Adding Storage to the Home Server -- Viewing Storage Status -- Repairing Storage -- Removing Storage from the Home Server -- From Here -- Part II: Unleashing Windows Home Server Networking -- 6 Sharing Folders and Files on the Home Server -- Examining the Predefined Windows Home Server Shares -- Creating a New Shared Folder -- Toggling Duplication for a Shared Folder…”
Libro electrónico -
2513Publicado 2022Tabla de Contenidos: “…Azure Blobs -- Managing File Shares -- Mapping File Shares -- File Share Snapshots -- Azure File Sync -- Managing Storage -- Azure Storage Explorer -- AzCopy -- Import/Export Service -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 Azure Virtual Machines -- Virtual Machine Planning -- Virtual Network -- Name -- Location and Pricing -- Size -- Storage -- Operating System -- Deploying Virtual Machines -- Connecting to Virtual Machines -- Windows Connections -- Linux Connections -- Azure Bastion -- Availability of Virtual Machines -- Scaling Concepts -- Vertical Scaling -- Horizontal Scaling -- Virtual Machine Scale Sets -- Implementing a Scale Set -- Autoscaling -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Automation, Deployment, and Configuration of Resources -- Azure Resource Manager -- ARM Templates -- Template Design -- Template Modes -- Template Sections -- Composing Templates -- Exporting Templates -- Configuring Virtual Hard Disk Templates -- Create a VM from a VHD -- Virtual Machine Extensions -- Custom Script Extension -- Desired State Configuration -- Summary -- Exam Essentials -- Review Questions -- Chapter 9 PaaS Compute Options -- Azure App Service Plans -- Pricing Tiers -- Scaling -- Azure App Services -- Continuous Deployment -- Deployment Slots -- Securing App Service -- Custom Domains -- Backup -- Container Instances -- Docker -- Azure Container Instances -- Container Groups -- Azure Kubernetes Service -- Terminology -- Cluster Components -- Networking -- Storage -- Cluster Upgrade -- Scaling -- Summary -- Exam Essentials -- Review Questions -- Chapter 10 Data Protection -- File and Folder Backups -- Azure Backup -- Creating Recovery Services Vault -- Configuring a Recovery Services Vault -- Virtual Machine Data Protection…”
Libro electrónico -
2514Publicado 2023Tabla de Contenidos: “…OTHER CONSIDERATIONS FOR NEW APPLICATIONS -- CHAPTER 8: Operating System Types -- WORKSTATION OSs -- CELL PHONE/TABLET OSs -- VARIOUS FILESYSTEM TYPES -- VENDOR LIFE-CYCLE LIMITATIONS -- COMPATIBILITY CONCERNS BETWEEN OSs -- CHAPTER 9: Operating System Installations and Upgrades -- BOOT METHODS -- TYPES OF INSTALLATIONS -- PARTITIONING -- DRIVE FORMAT -- UPGRADE CONSIDERATIONS -- FEATURE UPDATES -- CHAPTER 10: macOS -- INSTALLATION AND UNINSTALLATION OF APPLICATIONS -- APPLE ID AND CORPORATE RESTRICTIONS -- BEST PRACTICES -- SYSTEM PREFERENCES -- FEATURES -- DISK UTILITY -- FILEVAULT -- TERMINAL -- FORCE QUIT -- CHAPTER 11: Linux -- COMMON COMMANDS -- BEST PRACTICES -- TOOLS -- PART II: Domain 2.0: Security -- CHAPTER 12: Physical Security -- PHYSICAL SECURITY -- PHYSICAL SECURITY FOR STAFF -- CHAPTER 13: Logical Security -- LOGICAL SECURITY -- MOBILE DEVICE MANAGEMENT (MDM) -- ACTIVE DIRECTORY -- CHAPTER 14: Wireless Security -- PROTOCOLS AND ENCRYPTION -- AUTHENTICATION -- CHAPTER 15: Malware -- MALWARE -- MALWARE PREVENTION AND REMOVAL TOOLS AND METHODS -- CHAPTER 16: Social Engineering and Security Threats -- SOCIAL ENGINEERING -- THREATS -- VULNERABILITIES -- CHAPTER 17: Windows Security -- DEFENDER ANTIVIRUS -- FIREWALL -- USERS AND GROUPS -- LOGIN OS OPTIONS -- NTFS VS. …”
Libro electrónico -
2515Publicado 2024Tabla de Contenidos: “…. -- There's more... -- GPT-powered Kali Linux terminals -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 7: Threat Monitoring and Detection -- Technical requirements -- Threat Intelligence Analysis -- Getting ready -- How to do it... -- How it works... -- There's more... -- Real-Time Log Analysis -- Getting ready -- How to do it... -- How it works... -- There's more... -- Detecting APTs using ChatGPT for Windows Systems -- Getting ready -- How to do it... -- How it works... -- There's more... -- Building Custom Threat Detection Rules -- Getting ready -- How to do it... -- How it works... -- There's more... -- Network Traffic Analysis and Anomaly Detection with PCAP Analyzer -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 8: Incident Response -- Technical requirements -- ChatGPT-assisted incident analysis and triage -- Getting ready -- How to do it... -- How it works... -- There's more... -- Generating incident response playbooks…”
Libro electrónico -
2516Publicado 2023“…With techniques like embedded machine learning, developers can capture human intuition and deploy it to any target--from ultra-low power microcontrollers to embedded Linux devices. This practical guide gives engineering professionals, including product managers and technology leaders, an end-to-end framework for solving real-world industrial, commercial, and scientific problems with edge AI. …”
Libro electrónico -
2517Publicado 2024Tabla de Contenidos: “…Cover -- Title page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Recent Developments in the Field, Installations, and Hello World Applications -- Chapter 1: From Bag-of-Words to the Transformers -- Evolution of NLP approaches -- Recalling traditional NLP approaches -- Language modeling and generation -- Leveraging DL -- Considering the word order with RNN models -- LSTMs and gated recurrent units -- Contextual word embeddings and TL -- Overview of the Transformer architecture -- Attention mechanism -- Multi-head attention mechanisms -- Using TL with Transformers -- Multimodal learning -- Summary -- References -- Chapter 2: A Hands-On Introduction to the Subject -- Technical requirements -- Installing transformer with Anaconda -- Installation on Linux -- Installation on Windows -- Installation on macOS -- Installing TensorFlow, PyTorch, and Transformer -- Installing and using Google Colab -- Working with language models and tokenizers -- Working with community-provided models -- Working with multimodal transformers -- Working with benchmarks and datasets -- Important benchmarks -- GLUE benchmark -- SuperGLUE benchmark -- XTREME benchmark -- XGLUE benchmark -- SQuAD benchmark -- Accessing the datasets with an application programming interface -- Data manipulation using the datasets library -- Sorting, indexing, and shuffling -- Caching and reusability -- Dataset filter and map function -- Processing data with the map function -- Working with local files -- Preparing a dataset for model training -- Benchmarking for speed and memory -- Summary -- Part 2: Transformer Models: From Autoencoders to Autoregressive Models -- Chapter 3: Autoencoding Language Models -- Technical requirements -- BERT - one of the autoencoding language models -- BERT language model pretraining tasks…”
Libro electrónico -
2518por Raya González, LauraTabla de Contenidos: “….) -- 7.1 EL ENTORNO GRÁFICO DE LINUX -- 7.1.1 GNOME…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2519Publicado 2018Tabla de Contenidos: “…Chapter 6 - OpenMP Runtime -- 6.1 Introduction -- 6.2 Offloading Library Design -- 6.3 Tasking Runtime -- 6.3.1 Task Dependency Management -- 6.4 Experimental Results -- 6.4.1 Offloading Library -- 6.4.2 Tasking Runtime -- 6.4.2.1 Applications with a linear generation pattern -- 6.4.2.2 Applications with a recursive generation pattern -- 6.4.2.3 Applications with mixed patterns -- 6.4.2.4 Impact of cutoff on LINEAR and RECURSIVE applications -- 6.4.2.5 Real applications -- 6.4.3 Evaluation of the Task Dependency Mechanism -- 6.4.3.1 Performance speedup and memory usage -- 6.4.3.2 The task dependency mechanism on the MPPA -- 6.5 Summary -- References -- Chapter 7 - Embedded Operating Systems -- 7.1 Introduction -- 7.2 State of The Art -- 7.2.1 Real-time Support in Linux -- 7.2.1.1 Hard real-time support -- 7.2.1.2 Latency reduction -- 7.2.1.3 Real-time CPU scheduling -- 7.2.2 Survey of Existing Embedded RTOSs -- 7.2.3 Classification of Embedded RTOSs -- 7.3 Requirements for The Choice of The Run Time System -- 7.3.1 Programming Model -- 7.3.2 Preemption Support -- 7.3.3 Migration Support -- 7.3.4 Scheduling Characteristics -- 7.3.5 Timing Analysis -- 7.4 RTOS Selection -- 7.4.1 Host Processor -- 7.4.2 Manycore Processor -- 7.5 Operating System Support -- 7.5.1 Linux -- 7.5.2 ERIKA Enterprise Support -- 7.5.2.1 Exokernel support -- 7.5.2.2 Single-ELF multicore ERIKA Enterprise -- 7.5.2.3 Support for limited preemption, job, and global scheduling -- 7.5.2.4 New ERIKA Enterprise primitives -- 7.5.2.5 New data structures -- 7.5.2.6 Dynamic task creation -- 7.5.2.7 IRQ handlers as tasks -- 7.5.2.8 File hierarchy -- 7.5.2.9 Early performance estimation -- 7.6 Summary -- References -- Index -- About the Editors -- Back Cover…”
Libro electrónico -
2520por Rosado Alcántara, Francisco ManuelTabla de Contenidos: “…; 1.2.8 ORGANIZACIÓN DE LA INFORMACIÓN; 1.2.9 OTROS SISTEMAS OPERATIVOS. LINUX; 1.3 REDES; 1.3.1 TIPOS DE REDES; 1.3.2 TOPOLOGÍA DE REDES…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico