Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
1181por Gay, Warren. author“…Raspberry Pi is Linux, but it's a unique flavor of Linux, specifically for the ARM-based Pi. …”
Publicado 2014
Libro electrónico -
1182Publicado 2014“…It includes the Linux open source technology of KVM virtualization, and it complements the performance, scalability, and security qualities of Linux. …”
Libro electrónico -
1183Publicado 2017“…Abstract This IBM® Redbooks® publication provides both introductory information and technical details about the IBM System z® Personal Development Tool (IBM zPDT®), which produces a small System z environment suitable for application development. zPDT is a PC Linux application. When zPDT is installed (on Linux), normal System z operating systems (such as IBM z/OS®) can be run on it. zPDT provides the basic System z architecture and emulated IBM 3390 disk drives, 3270 interfaces, OSA interfaces, and so on. …”
Libro electrónico -
1184Publicado 2017“…SSH (Secure Socket Shell) is one of the most important Linux administration tools. Understanding its use gives systems admins the ability to securely connect to Linux servers and to transfer files to and from these servers. …”
Video -
1185Publicado 2013Tabla de Contenidos: “…Top Tips for Naming Your Files in LinuxCreating Directories; Deleting Files in Linux; Using Wildcards to Select Multiple Files in Linux; Removing Directories; Copying and Renaming Files; Installing and Managing Software on Your Raspberry Pi; Managing User Accounts on Your Raspberry Pi; Learning More About Linux Commands; Customizing Your Shell with Your Own Linux Commands; Part III: Using the Raspberry Pi for Both Work and Play; Chapter 6: Being Productive with the Raspberry Pi; Installing LibreOffice on Your Raspberry Pi; Starting LibreOffice on the Raspberry Pi; Saving Your Work…”
Libro electrónico -
1186
-
1187
-
1188Publicado 2020“…With most organizations adopting the open source Linux and Unix operating systems, there is an ever-increasing demand for developers with Linux and Unix skills. …”
-
1189Publicado 2007Tabla de Contenidos: “…Using metasploit -- Using the BackTrack LiveCD Linux distribution. Pt. III. Exploits 101. Programming survival skills -- Basic Linux exploits -- Advanced Linux exploits -- Shellcode strategies -- Writing Linux shellcode -- Basic Windows exploits. …”
Libro electrónico -
1190Publicado 2005“…As an administrator of a Novell® Open Enterprise Server (OES) on a SUSE® LINUX system, you are looking for ways to leverage it as a platform for delivering Novell's robust network services. …”
Libro electrónico -
1191Publicado 2019Tabla de Contenidos: “…Chapter 1: Setting Up the Lab -- Chapter 2: 32-bit Assembly on Linux and the ELF Specification -- Chapter 3: 64-bit Assembly on Linux and the ELF Specification -- Chapter 4: Creating a Binary Analysis Methodology -- Chapter 5: Linux Tools for Binary Analysis -- Chapter 6: Analyzing a Simple Bind Shell -- Chapter 7: Analyzing a Simple Reverse Shell -- Chapter 8: Identifying Vulnerabilities -- Chapter 9: Understanding Anti-Analysis Techniques -- Chapter 10: A Simple Reverse Shell With Polymorphism…”
Libro electrónico -
1192por Choi, BrendanTabla de Contenidos: “…Introduction to Ansible Network Automation -- Chapter 2. Shall We Linux (Part I) -- Chapter 3. Shall We Linux (Part II) -- Chapter 4. …”
Publicado 2023
Libro electrónico -
1193por Choi, BrendanTabla de Contenidos: “…Chapter 1: Introduction to Python Network Automation -- Chapter 2: Learning Python Fundamentals on Windows -- Chapter 3: Practicing More Python Exercises -- Chapter 4: Navigating VMware Workstation -- Chapter 5: Creating an Ubuntu Linux Server -- Chapter 6: Creating a Fedora Linux Server -- Chapter 7: Mastering File Systems in Linux -- Chapter 8: Understanding TCP/IP Services in Linux -- Chapter 9: Using Regular Expressions for Network Automation -- Chapter 10: Exploring GNS3 Essentials -- Chapter 11: Cisco IOS, Linux, TFTP, and Telnet Lab -- Chapter 12: Setting Up a Python Automation Lab -- Chapter 13: Basic Telnet Lab.…”
Publicado 2024
Libro electrónico -
1194Publicado 2024“…A thorough examination of Ubuntu and Linux security, encompassing both graphical and command-line interfaces, ensures a well-rounded understanding. …”
Video -
1195Publicado 2018“…About This Video How to install Python on Windows, Mac, and Linux. A practical tutorial designed for Python beginners. …”
-
1196Publicado 2024“…MySQL for Data Engineering Learning Linux Hacker Style Coding Description: Extract MySQL data through queries and bash pipelines Dump query results to CSV files. …”
Video -
1197Publicado 2017“…Abstract This IBM® Redbooks® publication provides both introductory information and technical details about the IBM System z® Personal Development Tool (IBM zPDT®), which produces a small System z environment suitable for application development. zPDT is a PC Linux application. When zPDT is installed (on Linux), normal System z operating systems (such as IBM z/OS®) can be run on it. zPDT provides the basic System z architecture and emulated IBM 3390 disk drives, 3270 interfaces, OSA interfaces, and so on. …”
Libro electrónico -
1198Publicado 2018“…This book assumes that the reader knows the basics of Linux, such as editing configuration files and running basic commands. …”
Libro electrónico -
1199Publicado 2020“…Learn how to install, use, and administer CentOS 8 with the help of expert guidance and engaging examples Key Features Become familiar with a popular and stable Red Hat Enterprise Linux distribution Gain a thorough overview of the operating system by learning concepts such as disk partitioning, KVM virtualization, and more Explore advanced topics such as logical volume management and firewall configuration Book Description Linux kernel development is perhaps the world's largest collaborative project to date. …”
Libro electrónico -
1200Publicado 2010Tabla de Contenidos: “…Building a secure organization -- A cryptography primer -- Preventing system intrusions -- Guarding against network intrusions -- Unix and Linux security -- Eliminating the security weakness of Linux and Unix operating systems -- Internet security -- The botnet problem -- Intranet security -- Local area network security -- Wireless network security -- Cellular network security -- Radio frequency identification security…”
Libro electrónico