Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
1201Publicado 2020“…This IBM® Redpaper® publication is a blueprint for configuration, testing results, and tuning guidelines for running SAS workloads on Red Hat Enterprise Linux that use IBM Spectrum® Scale and IBM Elastic Storage® System (ESS) 3000. …”
Libro electrónico -
1202Publicado 2018“…Since its inception, the Linux operating system has enjoyed tremendous popularity and an ever increasing installed base. …”
Video -
1203Publicado 2016“…This IBM® Redpaper Redbooks® publication presents the IBM PowerKVM virtualization for scale-out Linux systems, including the new LC IBM Power SystemsTM. …”
Libro electrónico -
1204Publicado 2015“…The other two volumes relate to Red Hat and SUSE: The Virtualization Cookbook for IBM z Systems Volume 2: Red Hat Enterprise Linux Server 7.1, SG24-8303 The Virtualization Cookbook for IBM z Systems Volume 3: SUSE Linux Enterprise Server 12, SG24-8890 It is recommended that you start with Volume 1 of this series because IBM z/VM® is the base “layer” when you install Linux on z Systems. …”
Libro electrónico -
1205Publicado 2020Tabla de Contenidos: “…Python essentials for DevOps -- Automating files and the Filesystem -- Working with the command line -- Useful Linux utilities -- Package management -- Continuous integration and continuous deployment -- Monitoring and logging -- Pytest for DevOps -- Cloud computing -- Infrastructure as code -- Container technologies : Docker and Docker compose -- Container orchestration : Kubernetes -- Serverless technologies -- MLOps and machine learning engineering -- Data engineering -- DevOps war stories and interviews…”
Libro electrónico -
1206Publicado 2007“…—James Pyles, Reviewer, "The Linux Tutorial" "Well written in an easy-to-follow format. …”
Libro electrónico -
1207
-
1208por Cinar, OnurTabla de Contenidos: “…Downloading and Installing the GNU Make on LinuxDownloading and Installing the Android SDK on Linux; Downloading and Installing the Android NDK on Linux; Downloading and Installing the Eclipse on Linux; Downloading and Installing the ADT; Installing the Android Platform Packages; Configuring the Emulator; Summary; Chapter 2 Exploring the Android NDK; Components Provided with the Android NDK; Structure of the Android NDK; Starting with an Example; Specifying the Android NDK Location; Importing the Sample Project; Adding Native Support to Project; Running the Project…”
Publicado 2012
Libro electrónico -
1209por Edwards, Lewin A. R. W.Tabla de Contenidos: “…4.1 A Brief Introduction to Embedding Linux on PC Hardware4.2 Configuring the Development System and Creating Our Custom Kernel; 4.3 The Linux Boot Process-Creating a Bootable CompactFlash Card; 4.4 Creating a Root Filesystem for our Embedded System; 4.5 Creating a Bootable Linux System-Restore CD-ROM Disc; 4.6 Using the Parallel Port as a General-Purpose I/O Interface in Linux; 4.7 Implementing Graphical Control Interfaces; 4.8 Infra-Red Remote Control in Linux Using LIRC; 4.9 Introduction to Machine Vision Using Video4Linux; 4.10 Customizing Your BIOS-The Structure of a Modem BIOS…”
Publicado 2005
Libro electrónico -
1210Publicado 2018Tabla de Contenidos: “…Starting Nexpose -- Start a scan -- Exploitation -- Post-exploitation -- Infrastructure analysis -- Pillaging -- High-profile targets -- Data exfiltration -- Persistence -- Further penetration into infrastructure -- Cleanup -- Reporting -- Executive summary -- Technical report -- Penetration testing limitations and challenges -- Pentesting maturity and scoring model -- Realism -- Methodology -- Reporting -- Summary -- Chapter 2: Advanced Linux Exploitation -- Linux basics -- Linux commands -- Streams -- Redirection -- Linux directory structure -- Users and groups -- Permissions -- The chmod command -- The chown command -- The chroot command -- The power of the find command -- Jobs, cron, and crontab -- Security models -- Security controls -- Access control models -- Linux attack vectors -- Linux enumeration with LinEnum -- OS detection with Nmap -- Privilege escalation -- Linux privilege checker -- Linux kernel exploitation -- UserLand versus kernel land -- System calls -- Linux kernel subsystems -- Process -- Threads -- Security-Enhanced Linux -- Memory models and the address spaces -- Linux kernel vulnerabilities -- NULL pointer dereference -- Arbitrary kernel read/write -- Case study CVE-2016-2443 Qualcomm MSM debug fs kernel arbitrary write -- Memory corruption vulnerabilities -- Kernel stack vulnerabilities -- Kernel heap vulnerabilities -- Race conditions -- Logical and hardware-related bugs -- Case study CVE-2016-4484 - Cryptsetup Initrd root Shell -- Linux Exploit Suggester -- Buffer overflow prevention techniques -- Address space layout randomization -- Stack canaries -- Non-executable stack -- Linux return oriented programming -- Linux hardening -- Summary -- Chapter 3: Corporate Network and Database Exploitation -- Networking fundamentals -- Network topologies -- Bus topology -- Star topology -- Ring topology -- Tree topology…”
Libro electrónico -
1211Publicado 2009“…Die CD zum Buch enthält eine lauffähige, angepasste Linux-Umgebung (zum Start von der CD oder zur Nutzung in einer gängigen Virtualisierungs-Lösung), aus der heraus direkt mit Nagios gearbeitet werden kann. …”
Libro electrónico -
1212Publicado 2019“…These new Linux scale-out systems provide differentiated performance, scalability, and low acquisition cost, and include the following features: Superior throughput and performance for high-value Linux workloads. …”
Libro electrónico -
1213Publicado 1998“…The fourth edition covers the highlights of the Linux operating system. It's a handy book for someone just starting with UNIX or Linux, as well as someone who encounters a UNIX system on the Internet. …”
Libro electrónico -
1214Publicado 2022“…ISV zPDT is a personal computer (PC) Linux application. When ISV zPDT is installed on Linux, normal IBM zSystems operating systems (such as IBM z/OS®) may be run on it. …”
Libro electrónico -
1215
-
1216Publicado 2015Tabla de Contenidos: “…""Cover""; ""Copyright""; ""Credits""; ""About the Authors""; ""About the Reviewers""; ""www.PacktPub.com""; ""Table of Contents""; ""Preface""; ""Chapter 1: Getting Started with OpenJDK""; ""Introduction""; ""Distinguishing OpenJDK from Oracle JDK""; ""Installing OpenJDK on Windows""; ""Configuring OpenJDK on Windows""; ""Installing OpenJDK on Linux""; ""Configuring OpenJDK on Linux""; ""Navigating through OpenJDK groups and projects""; ""Chapter 2: Building OpenJDK 6""; ""Introduction""; ""Preparing CA certificates""; ""Building OpenJDK 6 on Ubuntu Linux 12.04 LTS""…”
Libro electrónico -
1217Publicado 2021Tabla de Contenidos: “…Chapter 1: Introduction to Db2 for Linux and Windows -- Chapter 2: Installing Db2 Db2 on Linux and Windows -- Chapter 3: Db2 Management -- Chapter 4: Database Physical Design -- Chapter 5: Db2 Utilities -- Chapter 6: Business Rules and Constraints -- Chapter 7: Writing Good SQL for Db2 -- Chapter 8: Python and Db2 - The ibm_db Module -- Chapter 9: ibm_db Module Documentation -- Chapter 10: Where Is The ibm_db Module Going?…”
Libro electrónico -
1218por Barr, Michael, 1971-Tabla de Contenidos: “…Table of Contents; Foreword; Preface; Introduction; Getting to Know the Hardware; Your First Embedded Program; Compiling, Linking, and Locating; Downloading and Debugging; Memory; Peripherals; Interrupts; Putting It All Together; Operating Systems; eCos Examples; Embedded Linux Examples; Extending Functionality; Optimization Techniques; The Arcom VIPER-Lite Development Kit; Setting Up Your Software Development Environment; Building the GNU Software Tools; Setting Up the eCos Development Environment; Setting Up the Embedded Linux Development Environment; Index…”
Publicado 2006
Libro electrónico -
1219Publicado 2024Tabla de Contenidos: “…Exploiting Windows services and applications -- Server-side exploits -- Client-side exploits -- Exploring the Windows Registry -- Windows Registry exploitation -- Exploiting the Windows logs -- Summary -- Lab -- Brute force password crack -- Rainbow table crack -- Assessment -- Answers -- Chapter 6: Hacking the Linux Operating System -- Exploiting the Linux operating system -- Exploring the Linux filesystem -- Exploiting the filesystem -- Linux hidden files -- Important files -- Exploiting Linux networking -- Exploiting Linux authentication -- Cracking passwords -- Linux updates and patching -- The Linux logging system -- Exploiting the Linux kernel -- Checking your kernel version -- Exploiting the kernel -- Lab -- Summary -- Assessment -- Answers -- Chapter 7: Ethical Hacking of Web Servers -- Web servers' architecture, configuration, and vulnerabilities -- Adding processing logic -- Threats, vulnerabilities, and exploits to web services -- Web server authentication -- Basic authentication -- OAuth -- Some real-world web servers and ways to combat attacks -- IIS hardening tasks -- Apache web server hardening tasks -- Types of web server/website attacks -- Website defacement -- DoS/DDoS attack -- HTTP response-splitting attack -- Cross-Site Request Forgery -- Deep linking -- Directory traversal attack -- Man-in-the-Middle/sniffing attack -- Cookie tampering -- Cookie-based session attacks -- Session hijacking -- DNS -- Lab -- Summary -- Assessment -- Answer -- Chapter 8: Hacking Databases -- Finding databases on the network -- Discovering databases on the network -- Mitigating database discovery -- Exploring databases and database structures -- Database threats and vulnerabilities -- Network-based database attacks -- Database engine faults and bugs -- Brute-force attacks on weak or default passwords -- Misconfigurations -- Remote code execution…”
Libro electrónico -
1220