Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
2561Publicado 2017Tabla de Contenidos: “…. -- shared_buffers -- temp_buffers -- work_mem -- maintenance_work_mem -- wal_buffers -- max_stack_depth -- effective_cache_size -- How it works... -- Handling Linux/Unix memory parameters -- Getting ready -- How to do it... -- kernel.shmmax -- kernel.shmall -- kernel.shmmni -- vm.swappiness -- vm.overcommit_memory -- vm.overcommit_ratio -- vm.dirty_background_ratio -- vm.dirty_ratio -- How it works... -- CPU scheduling parameters -- Getting ready -- How to do it... -- kernel.sched_autogroup_enabled -- kernel.sched_min_granularity_ns -- kernel.sched_latency_ns -- kernel.sched_wakeup_granularity_ns -- kernel.sched_migration_cost_ns -- How it works... -- Disk tuning parameters -- Getting ready -- How to do it... -- CFQ -- noop -- Deadline -- How it works... -- Identifying checkpoint overhead -- Getting ready -- How to do it... -- How it works... -- Analyzing buffer cache contents -- Getting ready -- How to do it... -- How it works... -- 4. …”
Libro electrónico -
2562Publicado 2017“…Master over 100 recipes to design and implement a highly available server with the advanced features of PostgreSQL About This Book Create a PostgreSQL cluster that stays online even when disaster strikes Avoid costly downtime and data loss that can ruin your business Updated to include the newest features introduced in PostgreSQL 9.6 with hands-on industry-driven recipes Who This Book Is For If you are a PostgreSQL DBA working on Linux systems who want a database that never gives up, this book is for you. …”
Libro electrónico -
2563Publicado 2017“…If you have basic knowledge of GNU/Linux and storage systems, with no experience of software defined storage solutions and Ceph, but eager to learn then this book is for you What You Will Learn Understand, install, configure, and manage the Ceph storage system Get to grips with performance tuning and benchmarking, and learn practical tips to help run Ceph in production Integrate Ceph with OpenStack Cinder, Glance, and Nova components Deep dive into Ceph object storage, including S3, Swift, and Keystone integration Configure a disaster recovery solution with a Ceph Multi-Site V2 gateway setup and RADOS Block Device mirroring Gain hands-on experience with Ceph Metrics and VSM for cluster monitoring Familiarize yourself with Ceph operations such as maintenance, monitoring, and troubleshooting Understand advanced topics including erasure-coding, CRUSH map, cache pool, and general Ceph cluster maintenance In Detail Ceph is a unified distributed storage system designed for reliability and scalability. …”
Libro electrónico -
2564Publicado 2023Tabla de Contenidos: “…6.1 Robustness of SR-SELL(0) and SR-SELL on Existing Attacks -- 6.2 Robustness of SR-SELL(0) and SR-SELL on SyntAk -- 6.3 Overhead of SR-SELL(0) and SR-SELL -- 7 Related Work -- 8 Conclusions -- References -- Symbolic Quantum Simulation with Quasimodo -- 1 Introduction -- 2 Background on Quantum Simulation -- 3 Quasimodo's Programming and Analysis Interface -- 3.1 Extending Quasimodo -- 4 The Internals of Quasimodo -- 5 Experiments -- 6 Conclusion -- References -- Verifying the Verifier: eBPF Range Analysis Verification -- 1 Introduction -- 2 Background on Abstract Interpretation -- 3 Abstract Interpretation in the Linux Kernel -- 4 Automatic Verification of the Kernel's Algorithms -- 4.1 Soundness Specification for Abstraction/Reduction Operators -- 4.2 Refining Soundness Specification with Input Preconditioning -- 4.3 Automatically Producing Programs Exercising Soundness Bugs -- 5 C to Logic for Kernel's Abstract Operators -- 6 Experimental Evaluation -- 7 Limitations and Caveats -- 8 Related Work -- 9 Conclusion -- References -- Software Verification -- Automated Verification of Correctness for Masked Arithmetic Programs -- 1 Introduction -- 2 Preliminaries -- 3 The Core Language -- 4 Overview of the Approach -- 4.1 Our Approach -- 5 Term Rewriting System -- 6 Algorithmic Verification -- 6.1 Term Normalization Algorithm -- 6.2 Computing Affine Constants -- 6.3 Verification Algorithm -- 6.4 Implementation Remarks -- 7 Evaluation -- 7.1 Evaluation for Computing Affine Constants -- 7.2 Evaluation for Correctness Verification -- 7.3 Scalability of FISCHER -- 7.4 Evaluation for More Boolean Masking Schemes -- 7.5 Evaluation for Arithmetic/Boolean Masking Conversions -- 8 Conclusion -- References -- Automatic Program Instrumentation for Automatic Verification -- 1 Introduction -- 2 Instrumentation Framework -- 2.1 The Core Language…”
Libro electrónico -
2565Publicado 1999“…Python is growing in popularity because: It is available on all important platforms: Windows NT, Windows 95, Windows 98, Linux, all major UNIX platforms, MacOS, and even the BeOS. …”
Libro electrónico -
2566Publicado 2003Libro electrónico
-
2567Publicado 2011Tabla de Contenidos: “…Selecting a Password -- Components of a Good Password -- Password Aging -- Operating System and Network Operating System Hardening -- Hardening Microsoft Operating Systems -- Hardening UNIX- or Linux-Based Operating Systems -- Network Hardening -- Software Updates -- Device Configuration -- Ports and Services -- Traffic Filtering -- Securing Management Interfaces -- VLAN Management -- IPv4 vsIPv6 -- Application Hardening -- Application Configuration Baseline -- Application Patches -- Patch Management -- Web Servers -- Mail Servers -- FTP Servers -- DNS Servers -- File and Print Services -- Active Directory -- Host Software Baselining -- Group Policies -- Security Templates -- Chapter Review -- Questions -- Answers -- Chapter 13 Types of Attacks and Malicious Software -- Avenues of Attack -- The Steps in an Attack -- Minimizing Possible Avenues of Attack -- Attacking Computer Systems and Networks -- Denial-of-Service Attacks -- Backdoors and Trapdoors -- Null Sessions -- Sniffing -- Spoofing -- Man-in-the-Middle Attacks -- Replay Attacks -- TCP/IP Hijacking -- Attacks on Encryption -- Address System Attacks -- Password Guessing -- Software Exploitation -- Client-Side Attacks -- Malicious Code -- Secure Software Development Lifecycle -- War-Dialing and War-Driving -- Social Engineering -- Auditing -- Chapter Review -- Questions -- Answers -- Chapter 14 E-Mail and Instant Messaging -- Security of E-Mail -- Malicious Code -- Hoax E-Mails -- Unsolicited Commercial E-Mail (Spam) -- Mail Encryption -- Instant Messaging -- Chapter Review -- Questions -- Answers -- Chapter 15 Web Components -- Current Web Components and Concerns -- Protocols -- Encryption (SSL and TLS) -- The Web (HTTP and HTTPS) -- Directory Services (DAP and LDAP) -- File Transfer (FTP and SFTP) -- Vulnerabilities -- Code-Based Vulnerabilities -- Buffer Overflows -- Java and JavaScript…”
Libro electrónico -
2568por Iwazaki, DaltonTabla de Contenidos: “…. -- How it works... -- Monitoring Linux with SAR -- Getting ready -- How to do it... -- How it works... -- There's more... -- Collecting SAR data every minute -- Sending e-mail notifications with WLDF -- Getting ready -- How to do it... -- How it works... -- See also -- Generating an SNMP trap -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating the SNMP Agent by using WLST -- See also -- Creating a Monitoring Dashboard custom view -- Getting ready -- How to do it... -- How it works... -- See also -- Viewing historical data in the monitoring dashboard using a database -- Getting ready -- How to do it... -- How it works... -- See also -- 6. …”
Publicado 2013
Libro electrónico -
2569Publicado 2015Tabla de Contenidos: “…-- Programming a "Human Computer" -- Creating the algorithm -- Setting the tire-changing language -- Constructing the program -- Computer processors -- Computer Languages -- High-level languages -- The C++ language -- Chapter 2: Installing Code::Blocks -- Reviewing the Compilation Process -- Installing Code::Blocks -- Windows installation -- Ubuntu Linux installation -- Mac OS installation -- Setting up Code::Blocks -- Testing the Code::Blocks Installation -- Creating the project -- Testing your default project -- Chapter 3: Writing Your First Program -- Creating a New Project -- Filename extensions -- Entering Your Program -- Building the Program -- Finding What Could Go Wrong -- Misspelled commands -- Missing semicolon -- Using the Online Material -- Running the Program -- How the Program Works -- The template -- The Conversion program -- Part II: Writing a Program: Decisions, Decisions -- Chapter 4: Integer Expressions -- Declaring Variables -- Variable names -- Assigning a value to a variable -- Initializing a variable at declaration -- Integer Constants -- Expressions -- Binary operators -- Unraveling compound expressions -- Unary Operators -- The Special Assignment Operators -- Chapter 5: Character Expressions…”
Libro electrónico -
2570Publicado 2014Tabla de Contenidos: “…High-performance Computing -- Introduction -- CPython and concurrent programming -- Compiler-related installation instructions -- Linux -- Mac OS X -- Windows -- Python 32-bit -- Python 64-bit -- DLL hell -- References -- Accelerating pure Python code with Numba and just-in-time compilation -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Accelerating array computations with Numexpr -- Getting ready -- How to do it... -- How it works... -- See also -- Wrapping a C library in Python with ctypes -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accelerating Python code with Cython -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Optimizing Cython code by writing less Python and more C -- How to do it... -- How it works... -- There's more... -- See also -- Releasing the GIL to take advantage of multicore processors with Cython and OpenMP -- Getting ready -- How to do it... -- How it works... -- See also -- Writing massively parallel code for NVIDIA graphics cards (GPUs) with CUDA -- Getting ready -- How to do it... -- How it works...…”
Libro electrónico -
2571Publicado 2018Tabla de Contenidos: “…-- Johnny-Five - letting us code hardware in Node.js -- Installing the operating system -- Downloading Raspbian Lite -- Burning the image to an SD card -- Editing files on the SD card -- Booting up the Pi -- SSHing from a Linux or Mac -- SSHing from Windows -- Setting up your password and hardware interfaces -- First things first - change your password! …”
Libro electrónico -
2572Publicado 2011Tabla de Contenidos: “…-- Cross-Browser and Cross-Platform Compatibility -- Windows and Macintosh -- Linux -- Alternatives to Silverlight -- In the Web Browser -- Out of the Browser -- Legacy Technologies -- A Short History of Silverlight -- Silverlight 1.0 -- Silverlight 2 -- Silverlight 3 -- And Silverlight 4 -- Previewing the Future of Silverlight -- Installing Silverlight 4 as a User -- Opening a Silverlight 4 Application -- What to Do If Silverlight Is Not Installed? …”
Libro electrónico -
2573Publicado 2012Tabla de Contenidos: “…Physical Security Is Often Completely Neglected -- Wireless Reconnaissance -- Kismet -- Airodump -- Sniffing Insecure Communications -- Capturing Packets -- Can We Force the Client to Talk to Us? -- Creating a Linux Access Point -- Forcing the Client to Talk to Us -- Default Operations -- Man-in-the-Middle Attacks -- DNS Spoofing -- Fake Webauth -- SSL MITM -- SSL Stripping -- Fake AV Updates -- We've Covered -- Exotic wireless devices -- Wireless client vulnerabilities -- Wireless reconnaissance -- Sniffing insecure communications -- Can we force the client to talk to us? …”
Libro electrónico -
2574por Chen, Whei-JenTabla de Contenidos: “…4.3.3 Install and configure the Siebel Application in console mode -- 4.4 Installing Siebel on Windows -- 4.4.1 Installation and configuration of DB2 UDB server on Windows -- 4.4.2 Creating the Siebel install image -- 4.4.3 Installation and configuration of Siebel Application on Windows -- 4.5 Installation and configuration of DB2 UDB server on Linux -- 4.6 Siebel Developer Web Client -- 4.7 Installation troubleshooting -- 4.7.1 Environment Verification Tool -- 4.7.2 Error messages -- Chapter 5. …”
Publicado 2005
Libro electrónico -
2575Publicado 2024Tabla de Contenidos: “…Designing fast selection logic -- Selecting from a huge number of items -- Interoperability with .NET 8 -- Tip - creating a service in Linux -- Achieving security by design -- List of practices for achieving a safe architecture -- Authentication -- Sensitive data -- Web security -- Summary -- Questions -- Further reading -- Chapter 3: Managing Requirements -- Technical requirements -- Introducing Azure DevOps -- Managing system requirements in Azure DevOps -- Epic work items -- Feature work items -- Product Backlog items/User Story work items -- Azure DevOps repository -- Package feeds -- Test Plans -- Pipelines -- Usage -- Introducing GitHub projects -- Summary -- Questions -- Chapter 4: Best Practices in Coding C# 12 -- Technical requirements -- The simpler your code, the better a programmer you are -- Maintainability index -- Cyclomatic complexity -- Depth of inheritance -- Class coupling -- Number of lines of code -- Using a version control system -- Dealing with version control systems in teams -- Writing safe code in C# -- try-catch -- try-finally and using -- The IDisposable interface -- .NET 8 tips and tricks for coding -- Identifying well-written code -- Understanding and applying tools that can evaluate C# code -- Applying extension tools to analyze code -- Applying SonarAnalyzer -- Checking the final code after analysis -- Summary -- Questions -- Further reading -- Chapter 5: Implementing Code Reusability in C# 12 -- Technical requirements -- Understanding the principles of code reusability -- What code reuse is not -- What code reuse is -- Reusability in the development life cycle -- Using .NET 8 for code reuse -- Creating a reusable class library -- How does C# deal with code reuse? …”
Libro electrónico -
2576por Vanhove, SanderTabla de Contenidos: “…Synchronizing the end of the game -- Running the game on multiple computers -- Showing the IP address of the server -- Connecting from another computer -- Additional exercises - Sharpening the axe -- Summary -- Quiz time -- Part 3: Deepening Our Knowledge -- Chapter 12: Exporting to Multiple Platforms -- Technical requirements -- Exporting for Windows, Mac, and Linux -- Downloading the export template -- Making the actual exports of the game -- Uploading our game to Itch.io -- What is Itch.io? …”
Publicado 2024
Libro electrónico -
2577Publicado 2024Tabla de Contenidos: “…Intro -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1 - A Whirlwind of Stable Diffusion -- Chapter 1: Introducing Stable Diffusion -- Evolution of the Diffusion model -- Before Transformer and Attention -- Transformer transforms machine learning -- CLIP from OpenAI makes a big difference -- Generate images -- DALL-E 2 and Stable Diffusion -- Why Stable Diffusion -- Which Stable Diffusion to use -- Why this book -- References -- Chapter 2: Setting Up the Environment for Stable Diffusion -- Hardware requirements to run Stable Diffusion -- GPU -- System memory -- Storage -- Software requirements -- CUDA installation -- Installing Python for Windows, Linux, and macOS -- Installing PyTorch -- Running a Stable Diffusion pipeline -- Using Google Colaboratory -- Using Google Colab to run a Stable Diffusion pipeline -- Summary -- References -- Chapter 3: Generating Images Using Stable Diffusion -- Logging in to Hugging Face -- Generating an image -- Generation seed -- Sampling scheduler -- Changing a model -- Guidance scale -- Summary -- References -- Chapter 4: Understanding the Theory Behind Diffusion Models -- Understanding the image-to-noise process -- A more efficient forward diffusion process -- The noise-to-image training process -- The noise-to-image sampling process -- Understanding Classifier Guidance denoising -- Summary -- References -- Chapter 5: Understanding How Stable Diffusion Works -- Stable Diffusion in latent space -- Generating latent vectors using diffusers -- Generating text embeddings using CLIP -- Initializing time step embeddings -- Initializing the Stable Diffusion UNet -- Implementing a text-to-image Stable Diffusion inference pipeline -- Implementing a text-guided image-to-image Stable Diffusion inference pipeline -- Summary -- References…”
Libro electrónico -
2578Publicado 2017Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- About the Author -- About the Technical Editor -- Credits -- Acknowledgments -- Contents at a glance -- Contents -- Foreword -- Introduction -- Coming Full Circle -- Advanced Persistent Threat (APT) -- Next Generation Technology -- "Hackers" -- Forget Everything You Think You Know About Penetration Testing -- How This Book Is Organized -- Chapter 1: Medical Records (In)security -- An Introduction to Simulating Advanced Persistent Threat -- Background and Mission Briefing -- Payload Delivery Part 1: Learning How to Use the VBA Macro -- How NOT to Stage a VBA Attack -- Examining the VBA Code -- Avoid Using Shellcode -- Automatic Code Execution -- Using a VBA/VBS Dual Stager -- Keep Code Generic Whenever Possible -- Code Obfuscation -- Enticing Users -- Command and Control Part 1: Basics and Essentials -- The Attack -- Bypassing Authentication -- Summary -- Exercises -- Chapter 2: Stealing Research -- Background and Mission Briefing -- Payload Delivery Part 2: Using the Java Applet for Payload Delivery -- Java Code Signing for Fun and Profit -- Writing a Java Applet Stager -- Create a Convincing Pretext -- Signing the Stager -- Notes on Payload Persistence -- Microsoft Windows -- Linux -- OSX -- Command and Control Part 2: Advanced Attack Management -- Adding Stealth and Multiple System Management -- Implementing a Command Structure -- Building a Management Interface -- The Attack -- Situational Awareness -- Using AD to Gather Intelligence -- Analyzing AD Output -- Attack Against Vulnerable Secondary System -- Credential Reuse Against Primary Target System -- Summary -- Exercises -- Chapter 3: Twenty-First Century Heist -- What Might Work? …”
Libro electrónico -
2579por Kereki, FedericoTabla de Contenidos: “…Testing impure functions -- Summary -- Questions -- Chapter 5: Programming Declaratively - A Better Style -- Transformations -- Reducing an array to a value -- Applying an operation - map() -- Dealing with arrays of arrays -- More general looping -- Logical HOFs -- Filtering an array -- Searching an array -- Higher-level predicates - every() and some() -- Checking negatives - none() -- Working with async functions -- Some strange behaviors -- Async-ready looping -- Working with parallel functions -- Unresponsive pages -- A frontend worker -- A backend worker -- Workers, FP style -- Long-living pooled workers -- Summary -- Questions -- Chapter 6: Producing Functions - Higher-Order Functions -- Wrapping functions - keeping behavior -- Logging -- Timing functions -- Memoizing functions -- Altering a function's behavior -- Doing things once, revisited -- Logically negating a function -- Inverting the results -- Arity changing -- Throttling and debouncing -- Changing functions in other ways -- Turning operations into functions -- Turning functions into promises -- Getting a property from an object -- Demethodizing - turning methods into functions -- Methodizing - turning functions into methods -- Finding the optimum -- Summary -- Questions -- Chapter 7: Transforming Functions - Currying and Partial Application -- A bit of theory -- Currying -- Dealing with many parameters -- Currying by hand -- Currying with bind() -- Partial application -- Partial application with arrow functions -- Partial application with closures -- Partial currying -- Partial currying with bind() -- Partial currying with closures -- Final thoughts -- Variable number of parameters -- Parameter order -- Being functional -- Summary -- Questions -- Chapter 8: Connecting Functions - Pipelining, Composition, and More -- Pipelining -- Piping in Unix/Linux -- Revisiting an example…”
Publicado 2023
Libro electrónico -
2580Publicado 2023Tabla de Contenidos: “…-- The bring your own device model -- The choose your own device model -- Key considerations -- Comparing options -- Protection and governance options -- Identity and access management -- Information protection -- Device configuration -- Application management -- Storage sync options -- OneDrive for Business -- Work Folders -- Alternative EUC delivery options -- Windows 365 Cloud PC and Azure Virtual Desktop -- Enabling virtual private networks -- Publishing applications via proxy -- End user behavior analytics -- Summary -- Chapter 8: Windows 11 Security -- Introducing security posture -- Zero trust -- Defense in depth -- Ensuring hardware security -- TPM -- Microsoft Pluton security processor -- Windows Defender System Guard -- Hypervisor-protected Code Integrity -- Ensuring that we operate system security -- Introducing Secure Boot and Trusted Boot -- Exploring the Windows Security app -- Using BitLocker for encryption -- Security baselines -- Ensuring user identity security -- Windows Hello for Business -- Microsoft Defender Credential Guard -- Summary -- Chapter 9: Advanced Configurations -- Virtual desktops -- On-prem virtual desktop best practices -- VDI configurations -- The Windows Configuration Designer -- Windows 11 Kiosk Mode -- Windows Autopilot -- The Set up School PCs application -- Device lockdown -- Windows Subsystem for Linux -- Group Policy Editor -- Remote Desktop Protocol -- Windows Hello and Windows Hello for Business -- Windows Firewall with Advanced Security -- Hyper-V -- Windows Task Scheduler -- Enabling BitLocker drive encryption -- Storage Spaces Direct -- Windows Defender Application Guard -- Summary -- Chapter 10: Windows 11 21H2 and 22H2 Changes (versus Windows 10) -- New Start menu and taskbar…”
Libro electrónico