Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
2621por Kammermann, MarkusTabla de Contenidos: “…11.2 Dynamic Host Configuration Protocol -- 11.3 DNS (Domain Name System) -- 11.3.1 hosts -- 11.3.2 Der Windows Internet Naming Service (WINS) -- 11.3.3 Das Domain Name System -- 11.3.4 Der Aufbau von DNS -- 11.3.5 Das Konzept des dynamischen DNS -- 11.4 Web- und Mail-Protokolle -- 11.4.1 HTTP -- 11.4.2 FTP -- 11.4.3 TFTP -- 11.4.4 NNTP -- 11.4.5 SMTP -- 11.4.6 POP3 und IMAP4 -- 11.5 Weitere Dienstprotokolle -- 11.5.1 NTP -- 11.5.2 SSH -- 11.5.3 Telnet -- 11.6 Fragen zu diesem Kapitel -- Kapitel 12: Netzwerke betreiben -- 12.1 Grundlagen der Verwaltung -- 12.1.1 Arbeitsgruppen und Domänen -- 12.1.2 Der Client/Server-Ansatz -- 12.1.3 Client/Server-Bausteine -- 12.1.4 Wichtige Fragen zum Einsatz eines NOS -- 12.2 Verschiedene Systeme kurz vorgestellt -- 12.2.1 Apple -- 12.2.2 Unix -- 12.2.3 Linux -- 12.2.4 Von Windows NT bis Windows 2022 -- 12.2.5 Citrix und VMWare -- 12.2.6 Die Bedeutung von SMB über Betriebssysteme hinweg -- 12.3 Die Virtualisierung -- 12.4 Cloud Computing -- 12.4.1 Servicemodelle in der Cloud -- 12.4.2 Betriebsmodelle -- 12.4.3 Angebote aus der Cloud -- 12.5 Ein Wort zum Thema Speicher -- 12.6 Sicherheitsfragen zu Cloud-Modellen und Rechenzentren -- 12.7 Die Administration des Netzwerks -- 12.8 Ressourcen im Netzwerk teilen -- 12.9 Identifikation und Rechte im Netzwerk -- 12.9.1 Benutzer einrichten -- 12.9.2 Das Erstellen von Gruppen -- 12.9.3 Datei- und Ordnerrechte -- 12.9.4 Drucken im Netzwerk -- 12.10 Fragen zu diesem Kapitel -- Kapitel 13: Sicherheitsverfahren im Netzwerkverkehr -- 13.1 Identifikation und Authentifikation -- 13.1.1 Aller Anfang ist ... das Passwort -- 13.1.2 Das Zero Trust-Konzept -- 13.2 Authentifikationsverfahren -- 13.2.1 Single Sign On und Mehr-Faktor-Authentifizierung -- 13.2.2 PAP und CHAP -- 13.2.3 EAP -- 13.2.4 Kerberos -- 13.2.5 RADIUS -- 13.3 Die Hash-Funktion -- 13.4 Verschlüsselung…”
Publicado 2022
Libro electrónico -
2622Publicado 2018Tabla de Contenidos: “…Setting Up The Lab Environment -- 5.1 Lab Requirements -- 5.2 Overview Of Lab Architecture -- 5.3 Setting Up And Configuring Linux VM -- 5.4 Setting Up And Configuring Windows VM -- 6. …”
Libro electrónico -
2623Publicado 2023Tabla de Contenidos: “…Development environment set up -- A.1 Development machine -- A.1.1 Clone the book repository -- A.2 Automation Server -- A.2.1 Set up Jenkins -- A.3 Linux environment -- index…”
Libro electrónico -
2624Publicado 2018Tabla de Contenidos: “…Cover -- Half Title -- Title -- Copyright Page -- Contents -- Foreword 25 -- Preface 27 -- Before You Begin 47 -- 1 Introduction to Computers, the Internet and Java 53 -- 1.1 Introduction 54 -- 1.2 Hardware and Software 56 -- 1.2.1 Moore's Law 56 -- 1.2.2 Computer Organization 57 -- 1.3 Data Hierarchy 59 -- 1.4 Machine Languages, Assembly Languages and High-Level Languages 61 -- 1.5 Introduction to Object Technology 62 -- 1.5.1 Automobile as an Object 63 -- 1.5.2 Methods and Classes 63 -- 1.5.3 Instantiation 63 -- 1.5.4 Reuse 63 -- 1.5.5 Messages and Methopd Calls 64 -- 1.5.6 Attributes and Instance Variables 64 -- 1.5.7 Encapsulation and Information Hiding 64 -- 1.5.8 Inheritance 64 -- 1.5.9 Interfaces 65 -- 1.5.10 Object-Oriented Analysis and Design (OOAD) 65 -- 1.5.11 The UML (Unified Modeling Language) 65 -- 1.6 Operating Systems 66 -- 1.6.1 Windows-A Proprietary Operating System 66 -- 1.6.2 Linux-An Open-Source Operating System 66 -- 1.6.3 Apple's macOS and Apple's iOS for iPhone®, iPad® 67 -- 1.6.4 Google's Android 67 -- 1.7 Programming Languages 68 -- 1.8 Java 70 -- 1.9 A Typical Java Development Environment 71 -- 1.10 Test-Driving a Java Application 74 -- 1.11 Internet and World Wide Web 78 -- 1.11.1 Internet: A Network of Networks 79 -- 1.11.2 World Wide Web: Making the Internet User-Friendly 79 -- 1.11.3 Web Services and Mashups 79 -- 1.11.4 Internet of Things 80 -- 1.12 Software Technologies 81 -- 1.13 Getting Your Questions Answered 83 -- 2 Introduction to Java Applications -- Input/Output and Operators 87 -- 2.1 Introduction 88 -- 2.2 Your First Program in Java: Printing a Line of Text 88 -- 2.2.1 Compiling the Application 92 -- 2.2.2 Executing the Application 93 -- 2.3 Modifying Your First Java Program 94 -- 2.4 Displaying Text with printf 96 -- 2.5 Another Application: Adding Integers 97 -- 2.5.1 import Declarations 98.…”
Libro electrónico -
2625por Brühlmann, ThomasTabla de Contenidos: “…Auflage -- 1.2 Aufbau des Buchs -- 1.3 Mehr Informationen -- 1.4 Weitere Quellen -- 1.5 Danksagung -- Kapitel 2: Arduino-Plattform -- 2.1 Am Anfang war der König -- 2.2 Be a Maker -- 2.3 Arduino-Plattform -- 2.4 Hardware -- 2.4.1 Arduino Uno R4 -- 2.4.2 Arduino UNO R4 WIFI -- 2.4.3 Arduino UNO R3 -- 2.5 Software -- 2.6 Installation der Software -- 2.6.1 Installation -- 2.6.2 Installation Windows -- 2.6.3 Installation macOS -- 2.6.4 Installation des USB-Treibers unter Windows 10/11 -- 2.6.5 Installation des USB-Treibers unter macOS -- 2.6.6 Installation des USB-Treibers unter Linux -- 2.7 Get Connected -- 2.7.1 Verbindungskabel -- 2.7.2 Verbindung und »Blink« -- 2.7.3 Projekt Blink -- 2.8 Arduino-Entwicklungsumgebung -- 2.8.1 Voreinstellungen -- 2.8.2 Aufbau Entwicklungsumgebung -- 2.8.3 Menü- und Symbolleiste -- 2.8.4 Editor -- 2.8.5 Ausgabefenster -- 2.8.6 Bibliotheken verwalten -- 2.9 Arduino-Boards -- 2.9.1 Arduino Leonardo -- 2.9.2 Arduino Mega 2560 -- 2.9.3 Arduino Nano -- 2.9.4 Arduino Mini 05 -- 2.10 Arduino-kompatible Boards -- Kapitel 3: Startschuss -- 3.1 Das Arduino-Board -- 3.1.1 Stromlaufplan -- 3.1.2 Microcontroller - Das Gehirn -- 3.1.3 Anschlussbelegung UNO R4 -- 3.1.4 Anschlussbelegung UNO R3 -- 3.1.5 Stromversorgung -- 3.2 Steckbrett - Experimentieren ohne Löten -- 3.2.1 Spannungsversorgung auf dem Steckbrett -- 3.3 Spannung, Strom und Herr Ohm -- 3.4 Widerstand & -- Co -- 3.4.1 Widerstand -- 3.4.2 Potentiometer -- 3.4.3 Kondensator -- 3.4.4 Diode -- 3.4.5 Leuchtdiode -- 3.4.6 Transistor -- 3.4.7 Integrierte Schaltung (IC) -- 3.4.8 Relais -- 3.4.9 Schalter -- 3.4.10 Taster -- 3.5 Programmcode -- 3.5.1 Integer, Typen und Variablen -- 3.5.2 Struktur -- 3.6 Testen -- 3.6.1 Serieller Monitor -- 3.6.2 Code-Debugging -- 3.7 Projekt Blink -- 3.8 Projekt Wechselblinker…”
Publicado 2023
Libro electrónico -
2626por Weigend, Michael“…Nach dem Erlernen der Programmierkonzepte finden Sie besonders in der zweiten Hälfte des Buches eine Fülle von kleinen Projekten, die auf die besondere Hardware des Raspberry Pi und das Linux-Betriebssystem Raspberry Pi OS zugeschnitten sind. …”
Publicado 2024
Libro electrónico -
2627Publicado 2017Tabla de Contenidos: “…. -- See also -- Fine tuning basic Linux system limits -- Getting ready -- How to do it... -- See also -- Integrating ngx_pagespeed -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 12: OpenResty -- Introduction -- Installing OpenResty -- Getting ready -- How to do it... -- CentOS -- Ubuntu -- How it works... -- See also -- Getting started with OpenResty Lua -- Getting ready -- How to do it... -- How it works... -- See also -- Lua microservices with OpenResty -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Simple hit counter with a Redis backend -- Getting ready -- How to do it... -- How it works... -- See also -- Powering API Gateways with OpenResty…”
Libro electrónico -
2628Publicado 2023Tabla de Contenidos: “…Fail Securely -- Separation of Duties (SoD) -- Keep It Simple -- Trust, but Verify -- Zero Trust -- Security Models -- Reading Down and Writing Up -- State Machine Model -- Bell-LaPadula Model -- Simple Security Property -- *Security Property (Star Security Property) -- Strong and Weak Tranquility Property -- Lattice-Based Access Controls -- Integrity Models -- Biba Model -- Simple Integrity Axiom -- * Integrity Axiom -- Clark-Wilson -- Well Formed Transactions -- Certification, Enforcement, and Separation of Duties -- Information Flow Model -- Chinese Wall Model -- Non-interference -- Take-Grant -- Access Control Matrix -- Zachman Framework for Enterprise Architecture -- Graham-Denning Model -- Harrison-Ruzzo-Ullman Model -- Evaluation Methods, Certification, and Accreditation -- The International Common Criteria -- Common Criteria Terms -- Levels of Evaluation -- Secure System Design Concepts -- Layering -- Abstraction -- Security Domains -- The Ring Model -- Open and Closed Systems -- Secure Hardware Architecture -- The System Unit and Motherboard -- The Computer Bus -- Northbridge and Southbridge -- The CPU -- Arithmetic Logic Unit and Control Unit -- Fetch and Execute -- Pipelining -- Interrupts -- Processes and Threads -- Multitasking and Multiprocessing -- Watchdog Timers -- CISC and RISC -- Memory Addressing -- Memory Protection -- Process Isolation -- Hardware Segmentation -- Virtual Memory -- Swapping and Paging -- BIOS -- WORM Storage -- Trusted Platform Module -- Data Execution Prevention and Address Space Layout Randomization -- Secure Operating System and Software Architecture -- The Kernel -- Reference Monitor -- Users and File Permissions -- Linux and UNIX permissions -- Microsoft NTFS Permissions -- Privileged Programs -- Virtualization, Cloud, and Distributed Computing -- Virtualization -- Hypervisor -- Virtualization Benefits…”
Libro electrónico -
2629Publicado 2018Tabla de Contenidos: “…-- Autoscaling and autohealing -- Capital expenditure (CAPEX) versus operating expenses (OPEX) -- Career implications -- Summary -- Chapter 2: Introduction to Google Cloud Platform -- Global, regional, and zonal resources -- Accessing the Google Cloud Platform -- Projects and billing -- Setting up a GCP account -- Using the Cloud Shell -- Summary -- Chapter 3: Compute Choices - VMs and the Google Compute Engine -- Google Compute Engine - GCE -- Creating VMs -- Creating a VM instance using the web console -- Creating a VM instance using the command line -- VM customization options -- Operating system -- Compute zone -- Machine type -- Networks - aka VPCs -- Storage options -- Persistent disks and local SSDs - block storage for GCE -- Understanding persistent disks and local SSDs -- Creating and attaching a persistent disk -- Linux procedure for formatting and mounting a persistent disk -- Sharing a persistent disk between multiple instances -- Resizing a persistent disk -- More on working with GCE VMs -- Rightsizing recommendations -- Availability policies -- Auto-restart -- Preemptibillity -- Load balancing -- Autoscaling and managed instance groups -- Billing -- Labels and tags -- Startup scripts -- Snapshots and images -- How to snapshot a disk -- How to create an image of a disk -- Cloud launcher -- Deploying LAMP stack using GCE -- Modifying GCE VMs -- Summary -- Chapter 4: GKE, App Engine, and Cloud Functions -- GKE -- Contrasting containers and VMs -- What is a container? …”
Libro electrónico -
2630Publicado 2017Tabla de Contenidos: “…-- History of Git -- Industry-Standard Tooling -- The Git Ecosystem -- Core Git -- Git-Hosting Sites -- Self-Hosting Packages -- Ease-of-Use Packages -- Plug-ins -- Tools That Incorporate Git -- Git Libraries -- Git's Advantages and Challenges -- The Advantages -- The Challenges -- Summary -- Chapter 2: Key Concepts -- Design Concepts: User-Facing -- Centralized Model -- Distributed Model -- Design Concepts: Internal -- Delta Storage -- Snapshot Storage -- Git's Storage Requirements -- Repository Design Considerations -- Repository Scope -- File Scope -- Summary -- Chapter 3: The Git Promotion Model -- The Levels of Git -- Dev-Test-Prod and Git -- The Core Git Commands for Moving Content -- Summary -- About Connected Lab 1: Installing Git -- Connected Lab 1 Installing Git -- Installing Git for Windows -- Steps -- Installing Git on Mac OS X -- Installing Git on Linux -- Part II Using Git -- Chapter 4: Configuration and Setup -- Executing Commands in Git -- Operand Types -- Porcelain versus Plumbing Commands -- Specifying Arguments -- Auto-complete -- Configuring Git -- Telling Git Who You Are -- Configuration Scope -- Default Editor -- End of Line Settings -- Aliases -- Windows Filesystem Cache -- Initializing a Repository -- Git Init -- Git Clone -- Advanced Topics -- Git Init Demystified -- Looking Further into a Git Repository -- Mapping Config Commands to Configuration Files -- Creating Parameterized Aliases -- Summary -- Chapter 5: Getting Productive -- Getting Help -- The Multiple Repositories Model…”
Libro electrónico -
2631Publicado 2005Tabla de Contenidos: “…Introduction to DB2 for z/OS and OS/390 -- 1.1 Relational database management systems -- 1.2 The DB2 Universal Database Family -- 1.2.1 DB2 UDB for Linux, UNIX®, and Windows® -- 1.2.2 DB2 UDB for iSeriesTM -- 1.2.3 DB2 Server for VSE and VM -- 1.2.4 More information on the DB2 UDB family, related tools, and products -- 1.3 Components of DB2 UDB for z/OS and OS/390 -- 1.3.1 DB2 UDB for z/OS and OS/390 address spaces -- 1.3.2 DB2 attachment facilities -- 1.4 DB2 data structures -- 1.4.1 Databases -- 1.4.2 Storage groups -- 1.4.3 Data sets -- 1.4.4 Table spaces -- 1.4.5 Tables -- 1.4.6 Indexes -- 1.5 Structured query language (SQL) -- 1.5.1 Static SQL -- 1.5.2 Dynamic SQL -- 1.5.3 Industry standards -- 1.6 DB2 concepts -- 1.6.1 Referential constraints -- 1.6.2 DB2 packages, plans, collections, and package lists -- 1.6.3 Schemas -- 1.7 Accessing DB2 from a Java environment -- 1.7.1 JDBC fundamentals -- 1.7.2 JDBC driver types -- 1.7.3 IBM DB2 Legacy Driver -- 1.8 IBM DB2 Universal Driver for SQLJ and JDBC -- 1.8.1 IBM z/OS Application Connectivity to DB2 for z/OS and OS/390 -- 1.9 Using the DB2 Universal Driver for SQLJ and JDBC -- 1.9.1 Required environment variable settings -- 1.9.2 DB2 Universal Driver stored procedures and metadata -- 1.9.3 Binding DB2 Universal JDBC Driver packages with the DB2Binder utility -- 1.9.4 DB2T4XAIndoubtUtil utility for DB2 UDB for OS/390 and z/OS Version 7 -- 1.9.5 Differences between the DB2 Universal Driver and DB2 Legacy Driver -- 1.9.6 JDBC 3.0 APIs specific to the DB2 Universal Driver -- Chapter 2. …”
Libro electrónico -
2632Publicado 2010Tabla de Contenidos: “…Mix and match with old Windows and Macs -- Networking with other operating systems -- Internetworking with Windows Vista, XP, and 2000 -- Internetworking with Windows 95, 98, and Me -- Internetworking with UNIX and Linux -- Internetworking with Macintosh -- Installing optional network components -- The hosts file -- 19. …”
Libro electrónico -
2633Publicado 2021Tabla de Contenidos: “…Command Injection Attacks -- LDAP Injection Attacks -- Exploiting Authentication Vulnerabilities -- Password Authentication -- Session Attacks -- Kerberos Exploits -- Exploiting Authorization Vulnerabilities -- Insecure Direct Object References -- Directory Traversal -- File Inclusion -- Privilege Escalation -- Exploiting Web Application Vulnerabilities -- Cross-Site Scripting (XSS) -- Request Forgery -- Clickjacking -- Unsecure Coding Practices -- Source Code Comments -- Error Handling -- Hard-Coded Credentials -- Race Conditions -- Unprotected APIs -- Unsigned Code -- Steganography -- Application Testing Tools -- Static Application Security Testing (SAST) -- Dynamic Application Security Testing (DAST) -- Mobile Tools -- Summary -- Exam Essentials -- Lab Exercises -- Activity 9.1: Application Security Testing Techniques -- Activity 9.2: Using the ZAP Proxy -- Activity 9.3: Creating a Cross-Site Scripting Vulnerability -- Review Questions -- Chapter 10 Attacking Hosts, Cloud Technologies, and Specialized Systems -- Attacking Hosts -- Linux -- Windows -- Cross-Platform Exploits -- Credential Attacks and Testing Tools -- Credential Acquisition -- Offline Password Cracking -- Credential Testing and Brute-Forcing Tools -- Wordlists and Dictionaries -- Remote Access -- SSH -- NETCAT and Ncat -- Metasploit and Remote Access -- Proxies and Proxychains -- Attacking Virtual Machines and Containers -- Virtual Machine Attacks -- Containerization Attacks -- Attacking Cloud Technologies -- Attacking Cloud Accounts -- Attacking and Using Misconfigured Cloud Assets -- Other Cloud Attacks -- Tools for Cloud Technology Attacks -- Attacking Mobile Devices -- Attacking IoT, ICS, Embedded Systems, and SCADA Devices -- Attacking Data Storage -- Summary -- Exam Essentials -- Lab Exercises -- Activity 10.1: Dumping and Cracking the Windows SAM and Other Credentials…”
Libro electrónico -
2634Publicado 2019Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Discovering Deep Learning -- Chapter 1 Introducing Deep Learning -- Defining What Deep Learning Means -- Starting from Artificial Intelligence -- Considering the role of AI -- Focusing on machine learning -- Moving from machine learning to deep learning -- Using Deep Learning in the Real World -- Understanding the concept of learning -- Performing deep learning tasks -- Employing deep learning in applications -- Considering the Deep Learning Programming Environment -- Overcoming Deep Learning Hype -- Discovering the start-up ecosystem -- Knowing when not to use deep learning -- Chapter 2 Introducing the Machine Learning Principles -- Defining Machine Learning -- Understanding how machine learning works -- Understanding that it's pure math -- Learning by different strategies -- Training, validating, and testing data -- Looking for generalization -- Getting to know the limits of bias -- Keeping model complexity in mind -- Considering the Many Different Roads to Learning -- Understanding there is no free lunch -- Discovering the five main approaches -- Delving into some different approaches -- Awaiting the next breakthrough -- Pondering the True Uses of Machine Learning -- Understanding machine learning benefits -- Discovering machine learning limits -- Chapter 3 Getting and Using Python -- Working with Python in this Book -- Obtaining Your Copy of Anaconda -- Getting Continuum Analytics Anaconda -- Installing Anaconda on Linux -- Installing Anaconda on MacOS -- Installing Anaconda on Windows -- Downloading the Datasets and Example Code -- Using Jupyter Notebook -- Defining the code repository -- Getting and using datasets -- Creating the Application…”
Libro electrónico -
2635por Hochstein, LorinTabla de Contenidos: “…SSH -- Native SSH -- SSH Agent -- Starting Up ssh-agent -- Mac OS X -- Linux -- Agent Forwarding -- Sudo and Agent Forwarding -- Host Keys -- Appendix B. …”
Publicado 2015
Libro electrónico -
2636Publicado 2018Tabla de Contenidos: “…Introduction to reactive programming -- Spring Reactive -- ReactiveX -- Introduction to Command Query Responsibility Segregation -- Introduction to the Event Sourcing pattern -- Introduction to Eventual consistency -- Building an event-driven Reactive Asynchronous System -- Introducing Spring Cloud Streaming -- Adding Kafka to your application -- Installing and running Kafka -- Configuration properties for Kafka -- Service used to write to Kafka -- Rest API controller -- Listening to a Kafka topic -- Summary -- Chapter 10: Building Resilient Systems Using Hystrix and Turbine -- Circuit-breaker pattern -- Using the Hystrix library with a reference implementation -- Configuring Hystrix in your application -- Maven dependency -- Enabling circuit-breaker -- Adding the Hystrix annotation in services -- Error propagation -- Implementing a REST controller in customer service -- Building and testing customer service -- Customizing the default configuration -- Hystrix Metrics Stream -- Implementing Hystrix Dashboard in our project -- Turbine dashboard -- Turbine stream -- REST consumer with Hystrix and Feign -- Summary -- Chapter 11: Testing Spring Boot Application -- Test-driven development -- Unit testing -- Advantages -- Disadvantages -- Other mock libraries -- Integration testing -- Benefits of testing with Spring -- Activating profiles for a test class -- JUnit tests for the Spring Boot application -- Using Mockito for mocking services -- Postman for testing RESTful service contracts -- Summary -- Chapter 12: Containerizing Microservice -- Introducing containers to the microservice architecture -- Virtual machines versus containers -- Benefits of a container-oriented approach -- Drawbacks of a container-oriented approach -- Key concepts of the containers-oriented approach -- Getting started with Docker -- Installing Docker -- Installing Docker on Linux…”
Libro electrónico -
2637Publicado 2022Tabla de Contenidos: “…Understanding Ansible modules -- Improving your playbooks with roles -- Executing Ansible -- Using the preview or dry run option -- Increasing the log level output -- Protecting data with Ansible Vault -- Using variables in Ansible for better configuration -- Protecting sensitive data with Ansible Vault -- Using a dynamic inventory for an Azure infrastructure -- Summary -- Questions -- Further reading -- Chapter 4: Optimizing Infrastructure Deployment with Packer -- Technical requirements -- An overview of Packer -- Installing Packer -- Creating Packer templates for Azure VMs with scripts -- The structure of the Packer template -- Building an Azure image with the Packer template -- Using Ansible in a Packer template -- Writing the Ansible playbook -- Integrating an Ansible playbook in a Packer template -- Executing Packer -- Configuring Packer to authenticate to Azure -- Checking the validity of the Packer template -- Running Packer to generate our VM image -- Writing Packer templates with HCL format -- Using a Packer image with Terraform -- Summary -- Questions -- Further reading -- Chapter 5: Authoring the Development Environment with Vagrant -- Technical requirements -- Installing Vagrant -- Installing manually on Windows -- Installing Vagrant by script on Windows -- Installing Vagrant by script on Linux -- Writing a Vagrant configuration file -- Using Vagrant Cloud for Vagrant Boxes -- Writing the Vagrant configuration file -- Creating a local VM using the Vagrant CLI -- Creating the VM -- Connecting to the VM -- Summary -- Questions -- Further reading -- Section 2: DevOps CI/CD Pipeline -- Chapter 6: Managing Your Source Code with Git -- Technical requirements -- Overviewing Git and its principal command lines -- Git installation -- Git configuration -- Useful Git vocabulary -- Git command lines…”
Libro electrónico -
2638Publicado 2024Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Data Science and Python -- Chapter 1 Discovering the Match between Data Science and Python -- Understanding Python as a Language -- Viewing Python's various uses as a general-purpose language -- Interpreting Python -- Compiling Python -- Defining Data Science -- Considering the emergence of data science -- Outlining the core competencies of a data scientist -- Linking data science, big data, and AI -- Creating the Data Science Pipeline -- Understanding Python's Role in Data Science -- Considering the shifting profile of data scientists -- Working with a multipurpose, simple, and efficient language -- Learning to Use Python Fast -- Loading data -- Training a model -- Viewing a result -- Chapter 2 Introducing Python's Capabilities and Wonders -- Working with Python -- Contributing to data science -- Getting a taste of the language -- Understanding the need for indentation -- Working with Jupyter Notebook and Google Colab -- Performing Rapid Prototyping and Experimentation -- Considering Speed of Execution -- Visualizing Power -- Using the Python Ecosystem for Data Science -- Accessing scientific tools using SciPy -- Performing fundamental scientific computing using NumPy -- Performing data analysis using pandas -- Implementing machine learning using Scikit-learn -- Going for deep learning with Keras and TensorFlow -- Performing analysis efficiently using XGBoost -- Plotting the data using Matplotlib -- Creating graphs with NetworkX -- Chapter 3 Setting Up Python for Data Science -- Working with Anaconda -- Using Jupyter Notebook -- Accessing the Anaconda Prompt -- Installing Anaconda on Windows -- Installing Anaconda on Linux…”
Libro electrónico -
2639Publicado 2024Tabla de Contenidos: “…Worker Nodes -- Creating a Highly Available Kubernetes Cluster with Kubespray and Ansible -- Available Options to Deploy Kubernetes -- Prerequisites and Initial Setup -- Creating The Inventory -- Creating the Cluster -- How Kubespray Works -- Step 1: Pre-Configuration Checks and Setup -- Step 2: Setting Up Container Runtime -- Step 3: Network Plugin Installation -- Step 4: Kubernetes Components Installation -- Step 5: Initialization of the First Control Plane Node -- Step 6: Setting Up etcd Cluster -- Step 7: Joining Additional Control Plane Nodes -- Step 8: Joining Worker Nodes -- Step 9: Cluster Configuration With Addons -- Step 10: Cluster Verification And Health Checks -- Step 11: Security Configuration -- Step 12: Applying Custom Configurations -- Step 13: Cluster Ready For Deployment -- Start Using The Cluster -- Deploying to Kubernetes with Ansible -- Deploying to Kubernetes with Ansible and the K8s Module -- Using Remote Manifests -- Inline Manifests -- Validating Kubernetes Definitions -- Managing Multiple Clusters -- Patching Resources -- Restarting Deployments -- Deploying to Kubernetes with Ansible and Helm -- Templating Kubernetes Resources With Ansible -- Troubleshooting Kubernetes with Ansible -- Creating Generic Debug Tasks to View Kubernetes Resources -- Viewing Kubernetes Pod Logs with Ansible -- Ansible + Kubernetes = A Powerful Combination -- Ansible Cheat Sheet -- Installing Ansible -- On Linux -- On macOS -- On Windows -- Configuring Ansible -- Inventory -- Setting Up the Inventory File (INI) -- Setting Up the Inventory File (YAML) -- Ansible Host Variables -- Testing Your Setup -- Playbook Structure -- Playbook Keywords -- Common Modules -- Running a Command -- Running a Shell Command -- Running a Raw Command -- Copying a File -- Installing a Package -- Restarting a Service -- Copying a File with Permissions…”
Libro electrónico -
2640por Ceballos Sierra, Francisco JavierTabla de Contenidos: “…ENTORNOS DE DESARROLLO -- MICROSOFT VISUAL STUDIO -- INSTALACIÓN -- DEPURAR LA APLICACIÓN -- A TENER EN CUENTA -- INTERFAZ DE LÍNEA DE ÓRDENES -- CREAR UNA BIBLIOTECA -- CODEBLOCKS -- INSTALACIÓN -- MINGW -- CODEBLOCKS -- ESCRIBIR UNA APLICACIÓN -- LINUX: INTERFAZ DE LÍNEA DE ÓRDENES -- EL DEPURADOR GDB DE GNU -- APÉNDICE D. …”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico