Mostrando 2,661 - 2,680 Resultados de 2,988 Para Buscar '"Linux"', tiempo de consulta: 0.09s Limitar resultados
  1. 2661
    por Goel, Anita
    Publicado 2012
    Tabla de Contenidos: “…2.2.2 Bioinformatics -- 2.2.3 Healthcare -- 2.2.4 Remote Sensing and Geographic Information System -- 2.2.5 Meteorology and Climatology -- 2.2.6 Computer Gaming -- 2.2.7 Multimedia and Animation -- 2.2.8 Home and Entertainment -- Summary -- Key Words -- Questions -- Unit II: Operating System and Programming Languages -- Chapter 3: Operating System -- 3.1 Introduction -- 3.1.1 Definition -- 3.1.2 Objectives of Operating System -- 3.2 Functions of Operating System -- 3.2.1 Process Management -- 3.2.1.1 CPU Scheduling -- 3.2.1.2 Process Synchronization -- 3.2.1.3 Deadlock -- 3.2.2 Memory Management -- 3.2.2.1 Memory Allocation -- 3.2.2.2 Virtual Memory -- 3.2.3 File Management -- 3.2.4 Device Management -- 3.2.5 Protection and Security -- 3.2.6 User Interface and Command Interpreter -- 3.3 Types of Operating System -- 3.3.1 Batch Systems -- 3.3.2 Multitasking Operating Systems -- 3.3.3 Multi-user Operating systems -- 3.3.4 Multiprocessing Operating Systems -- 3.3.5 Real-time Operating Systems -- 3.3.6 Embedded Operating Systems -- 3.4 Examples of Operating Systems -- 3.4.1 MS-DOS -- 3.4.2 Windows Family of OS -- 3.4.2.1 Brief History of Windows OS -- 3.4.3 Linux OS -- Summary -- Key Words -- Questions -- Chapter 4: Programming Languages -- 4.1 Introduction -- 4.2 Programming Languages: Generations -- 4.2.1 First-generation Languages -- 4.2.1.1 Advantages of First-generation Languages -- 4.2.1.2 Drawbacks of First-generation Languages -- 4.2.2 Second-generation Languages -- 4.2.2.1 Advantages of Second-generation Languages -- 4.2.2.2 Drawbacks of Second-generation Languages -- 4.2.3 Third-generation Languages -- 4.2.3.1 Advantages of Third-generation Languages -- 4.2.3.2 Drawbacks of Third-generation Languages -- 4.2.4 Fourth-generation Languages -- 4.2.4.1 Advantages of Fourth-generation Languages -- 4.2.4.2 Drawbacks of Fourth-generation Languages…”
    Libro electrónico
  2. 2662
    Publicado 2016
    “…Sander has been teaching Red Hat, SUSE, and LPI Linux classes since 1994. As a consultant, he specializes in Linux high availability solutions and performance optimization. …”
    Video
  3. 2663
    Publicado 2017
    “…Sander has been teaching Red Hat, SUSE, and LPI Linux classes since 1994. As a consultant, he specializes in Linux high availability solutions and performance optimization. …”
    Video
  4. 2664
    por Ferrer Martínez, Juan
    Publicado 2014
    Tabla de Contenidos: “…INSTALACIÓN DE APLICACIONES WEB DE ESCRITORIO -- 10.1 ESCRITORIO WEB -- 10.1.1 Historia -- 10.1.2 Escritorio web vs. escritorio tradicional -- 10.1.3 Aplicaciones de escritorio web -- 10.2 APLICACIONES DE CORREO WEB 10.2 APLICACIONES DE CORREO WEB -- 10.3 INSTALACIÓN -- 10.3.1 Instalación en Windows -- 10.3.2 Instalación en Linux -- 10.4 GESTIÓN DE USUARIOS -- 10.4.1 Gestión de usuarios en Thunderbird -- 10.4.2 Gestión de usuarios en Gmail -- RESUMEN DEL CAPÍTULO -- EJERCICIOS PROPUESTOS -- TEST DE CONOCIMIENTOS -- 11. …”
    Libro electrónico
  5. 2665
    Publicado 2003
    “…Next, the book details the technical setup instructions needed for both the Linux and FreeBSD operating systems. Some of the topics covered include: Station Security for Linux, FreeBSD, Open BSD, Mac OS X and Windows Setting Up Access Point Security Gateway Security, including building Gateways, firewall Rules, Auditing, etc. …”
    Libro electrónico
  6. 2666
    Publicado 2016
    “…You're a developer deploying your code to production You're a systems administrator looking for a better way to automate You need a quick introduction to leveraging an idempotent resource model for immutable infrastructure Prerequisites Be familiar with at least one Linux distribution (e.g., Ubuntu, RHEL/CentOS, SUSE) Be familiar with basic Linux system administration tasks, e.g., know how to: Connect to a remote machine using SSH Interact with the bash command-line shell (pipes and redirection) Install packages Use the sudo command Check and set file permissions Start and stop services Set environment variables Write scripts (any language) Learn some YAML and Jinja2 Materials or downloads needed in advance Have a Linux server with which to practice This Lesson is taken from Ansible: Up and Running by Lorin Hochstein…”
    Libro electrónico
  7. 2667
    Publicado 2017
    “…Many of his video training courses can be found on Pluralsight.com, and links to his other books (on Linux administration and server virtualization) can be found at https://bootstrap-it.com…”
    Libro electrónico
  8. 2668
    Publicado 2020
    “…Topics include: Understanding Kubernetes Container Fundamentals Installing Kubernetes Discovering Kubernetes Managing Kubernetes Applications Exposing Applications Configuring Storage Managing the Kubernetes API Running Kubernetes in the Enterprise Managing Kubernetes in the Enterprise Troubleshooting Kubernetes About the Instructor Sander van Vugt has been teaching Linux classes since 1995 and has written more than 60 books about different Linux-related topics, including the best-selling RHCSA-RHCE 7 Cert Guide . …”
    Video
  9. 2669
    Publicado 2023
    “…Course requirement: A working knowledge of Linux. To build a strong understanding of working with Linux, watch Linux Fundamentals, 2nd edition by Sander van Vugt. https://learning.oreilly.com/videos/linux-fundamentals-2nd/9780137929313/ A basic understanding of containers. …”
    Video
  10. 2670
    Publicado 2024
    “…A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. …”
    Video
  11. 2671
    Publicado 1999
    “…Covers: PPP implementations in Windows 95/98/NT, Solaris, and Linux Authentication (CHAP, PAP, Microsoft variants, and other techniques) Virtual networks and tunnels, including PPTP Modems and serial lines Related technologies, including DNS and ARP Optimizing and customizing a connection Debugging techniques…”
    Libro electrónico
  12. 2672
    Publicado 2020
    “…About the Instructor Sander van Vugt has been teaching Linux classes since 1995 and has written more than 60 books about different Linux-related topics, including the best-selling RHCSA-RHCE 7 Cert Guide . …”
    Video
  13. 2673
    por Eliasz, Andrew
    Publicado 2024
    “…By analogy with embedded Linux programming books, this book will be akin a Linux course that focuses on application development using the Posix API. …”
    Libro electrónico
  14. 2674
    Publicado 2018
    “…A bonus lesson includes a quick primer on the Linux command line as used with Hadoop and Spark. …”
    Video
  15. 2675
    por Jakobsen, Adam Tilmar
    Publicado 2024
    Tabla de Contenidos: “…6.4.9.8 Browser Password -- 6.4.9.9 Supercookies -- 6.4.10 Mail -- 6.4.10.1 Mail Archives -- 6.4.10.2 Offline Folder Files -- 6.4.10.3 Unread Mail -- 6.4.11 Persistence -- 6.4.11.1 Auto Start Programs -- 6.4.11.2 Scheduled Tasks -- 6.4.11.3 Service -- 6.4.12 Evidence Destruction -- 6.4.12.1 Log Clearing -- 6.4.12.2 File Deletion Detection Using J -- 6.5 Summary -- Chapter 7 macOS Forensics -- 7.1 File System -- 7.1.1 Native File Types -- 7.2 Security -- 7.3 Acquisition -- 7.3.1 Memory -- 7.3.1.1 Hibernation and RAM -- 7.4 Analysis -- 7.5 Evidence Location -- 7.5.1 System Configuration -- 7.5.2 User Accounts and Activity -- 7.5.2.1 Keychain -- 7.5.2.2 Notes -- 7.5.2.3 Recent Items -- 7.5.3 System Logs -- 7.5.4 Browser Usage -- 7.5.5 Email -- 7.5.6 Persistence Mechanisms -- 7.5.6.1 Login Item -- 7.5.6.2 Launch Items (Agents and Daemons) -- 7.5.6.3 Log In/Log Out Hooks -- 7.5.6.4 Dynamic Libraries (dylib) -- 7.5.6.5 At Tasks -- 7.5.6.6 Event Monitor Rules -- 7.5.6.7 Re‐opened Applications -- 7.5.7 Evidence of Destruction -- 7.6 Summary -- Chapter 8 Linux Forensics -- 8.1 File System -- 8.1.1 File System Timestamps -- 8.2 Security -- 8.3 Acquisition -- 8.3.1 Dump Memory -- 8.4 Analysis -- 8.4.1 chroot -- 8.5 Evidence Location -- 8.5.1 System Info -- 8.5.1.1 System Version -- 8.5.1.2 Computer Name -- 8.5.1.3 Localtime Settings -- 8.5.1.4 Boot Logs -- 8.5.1.5 Kernel Logs -- 8.5.1.6 Apt Install Repository Sources -- 8.5.1.7 Hosts File -- 8.5.1.8 Root UUID -- 8.5.1.9 Services -- 8.5.1.10 Syslogs -- 8.5.1.11 Background Processes -- 8.5.1.12 Disk Partitions -- 8.5.2 User Activity -- 8.5.2.1 Accounts and Groups -- 8.5.2.2 Group Information -- 8.5.2.3 Command History -- 8.5.2.4 Authentication -- 8.5.2.5 Last Login -- 8.5.2.6 Failed Logon Attempts -- 8.5.2.7 Installation of Software -- 8.5.2.8 File Edit -- 8.5.3 Network -- 8.5.3.1 Interfaces…”
    Libro electrónico
  16. 2676
    Publicado 2022
    “…Appendices highlight attack signatures, IOC's (Indicator's of Compromise), UNIX / Linux commands, PowerShell commands, Windows commands, Cisco commands, and more. …”
    Libro electrónico
  17. 2677
    Publicado 2009
    “…Choose the right network hardware and software and use it to build efficient, reliable networks Implement secure, high-speed Internet connections Provide reliable remote access to your users Administer networks to support users of Microsoft, Linux, and UNIX environments Use low-cost Linux servers to provide file and print services to Windows PCs Protect your networks and data against today’s most dangerous threats Use virtualization to save money and improve business flexibility Utilize RAID technologies to provide flexible storage at lower cost Troubleshoot and fix network problems one step at a time Preview and prepare for the future of networking Introduction 1 Hour 1: An Overview of Networking 3 Hour 2: The Benefits of Networking 19 Hour 3: Getting Data from Here to There: How Networking Works 29 Hour 4: Computer Concepts 49 Hour 5: Network Concepts 71 Hour 6: Extending LANs with Wide Area Networks (WANs) 95 Hour 7: Mobile Wireless Networking 117 Hour 8: Remote Networking 129 Hour 9: Planning for the Network 143 Hour 10: Designing a Network 155 Hour 11: Selecting Network Hardware and Software 179 Hour 12: Assembling a Network 199 Hour 13: Network Applications 211 Hour 14: Connecting to the Internet: Initial Operations 231 Hour 15: Connecting to the Internet: Key Supporting Operations 247 Hour 16: Microsoft Networking 271 Hour 17: UNIX and Linux Networking 289 Hour 18: Putting the Pieces Together 301 Hour 19: Role of the Network Administrator 309 Hour 20: Security 319 Hour 21: Managing a Network ..…”
    Libro electrónico
  18. 2678
    Publicado 2009
    “…Four hours of video lessons with interactive labs and quizzes A simple WYSIWYG web page editor for Windows, Mac, and Linux An easy-to-install package to set up a web server learning environment on your own computer The jEdit programming editor for Windows, Mac, and Linux Source files for all the examples and learning labs How to Watch the Videos All that’s needed to watch the video lessons in this kit is a basic computer equipped for DVDs and the web: A Windows, Mac, or Linux PC with a DVD drive that can read data DVDs. …”
    Vídeo online
  19. 2679
    Publicado 2023
    “…The prerequisites include basic Linux knowledge, domain name, VPS or physical server, and computer with macOS/Linux/Windows. …”
    Video
  20. 2680
    Publicado 2007
    “…This book provides information about configuration and usage of Linux on System z with the System z Cryptographic features documenting their hardware and software configuration. …”
    Libro electrónico