Mostrando 1,201 - 1,220 Resultados de 2,988 Para Buscar '"Linux"', tiempo de consulta: 0.07s Limitar resultados
  1. 1201
    Publicado 2020
    “…This IBM® Redpaper® publication is a blueprint for configuration, testing results, and tuning guidelines for running SAS workloads on Red Hat Enterprise Linux that use IBM Spectrum® Scale and IBM Elastic Storage® System (ESS) 3000. …”
    Libro electrónico
  2. 1202
    Publicado 2018
    “…Since its inception, the Linux operating system has enjoyed tremendous popularity and an ever increasing installed base. …”
    Video
  3. 1203
    Publicado 2016
    “…This IBM® Redpaper Redbooks® publication presents the IBM PowerKVM virtualization for scale-out Linux systems, including the new LC IBM Power SystemsTM. …”
    Libro electrónico
  4. 1204
    Publicado 2015
    “…The other two volumes relate to Red Hat and SUSE: The Virtualization Cookbook for IBM z Systems Volume 2: Red Hat Enterprise Linux Server 7.1, SG24-8303 The Virtualization Cookbook for IBM z Systems Volume 3: SUSE Linux Enterprise Server 12, SG24-8890 It is recommended that you start with Volume 1 of this series because IBM z/VM® is the base “layer” when you install Linux on z Systems. …”
    Libro electrónico
  5. 1205
    Publicado 2020
    Tabla de Contenidos: “…Python essentials for DevOps -- Automating files and the Filesystem -- Working with the command line -- Useful Linux utilities -- Package management -- Continuous integration and continuous deployment -- Monitoring and logging -- Pytest for DevOps -- Cloud computing -- Infrastructure as code -- Container technologies : Docker and Docker compose -- Container orchestration : Kubernetes -- Serverless technologies -- MLOps and machine learning engineering -- Data engineering -- DevOps war stories and interviews…”
    Libro electrónico
  6. 1206
    Publicado 2007
    “…—James Pyles, Reviewer, "The Linux Tutorial" "Well written in an easy-to-follow format. …”
    Libro electrónico
  7. 1207
    Publicado 2001
    Libro
  8. 1208
    por Cinar, Onur
    Publicado 2012
    Tabla de Contenidos: “…Downloading and Installing the GNU Make on LinuxDownloading and Installing the Android SDK on Linux; Downloading and Installing the Android NDK on Linux; Downloading and Installing the Eclipse on Linux; Downloading and Installing the ADT; Installing the Android Platform Packages; Configuring the Emulator; Summary; Chapter 2 Exploring the Android NDK; Components Provided with the Android NDK; Structure of the Android NDK; Starting with an Example; Specifying the Android NDK Location; Importing the Sample Project; Adding Native Support to Project; Running the Project…”
    Libro electrónico
  9. 1209
    por Edwards, Lewin A. R. W.
    Publicado 2005
    Tabla de Contenidos: “…4.1 A Brief Introduction to Embedding Linux on PC Hardware4.2 Configuring the Development System and Creating Our Custom Kernel; 4.3 The Linux Boot Process-Creating a Bootable CompactFlash Card; 4.4 Creating a Root Filesystem for our Embedded System; 4.5 Creating a Bootable Linux System-Restore CD-ROM Disc; 4.6 Using the Parallel Port as a General-Purpose I/O Interface in Linux; 4.7 Implementing Graphical Control Interfaces; 4.8 Infra-Red Remote Control in Linux Using LIRC; 4.9 Introduction to Machine Vision Using Video4Linux; 4.10 Customizing Your BIOS-The Structure of a Modem BIOS…”
    Libro electrónico
  10. 1210
    Publicado 2018
    Tabla de Contenidos: “…Starting Nexpose -- Start a scan -- Exploitation -- Post-exploitation -- Infrastructure analysis -- Pillaging -- High-profile targets -- Data exfiltration -- Persistence -- Further penetration into infrastructure -- Cleanup -- Reporting -- Executive summary -- Technical report -- Penetration testing limitations and challenges -- Pentesting maturity and scoring model -- Realism -- Methodology -- Reporting -- Summary -- Chapter 2: Advanced Linux Exploitation -- Linux basics -- Linux commands -- Streams -- Redirection -- Linux directory structure -- Users and groups -- Permissions -- The chmod command -- The chown command -- The chroot command -- The power of the find command -- Jobs, cron, and crontab -- Security models -- Security controls -- Access control models -- Linux attack vectors -- Linux enumeration with LinEnum -- OS detection with Nmap -- Privilege escalation -- Linux privilege checker -- Linux kernel exploitation -- UserLand versus kernel land -- System calls -- Linux kernel subsystems -- Process -- Threads -- Security-Enhanced Linux -- Memory models and the address spaces -- Linux kernel vulnerabilities -- NULL pointer dereference -- Arbitrary kernel read/write -- Case study CVE-2016-2443 Qualcomm MSM debug fs kernel arbitrary write -- Memory corruption vulnerabilities -- Kernel stack vulnerabilities -- Kernel heap vulnerabilities -- Race conditions -- Logical and hardware-related bugs -- Case study CVE-2016-4484 - Cryptsetup Initrd root Shell -- Linux Exploit Suggester -- Buffer overflow prevention techniques -- Address space layout randomization -- Stack canaries -- Non-executable stack -- Linux return oriented programming -- Linux hardening -- Summary -- Chapter 3: Corporate Network and Database Exploitation -- Networking fundamentals -- Network topologies -- Bus topology -- Star topology -- Ring topology -- Tree topology…”
    Libro electrónico
  11. 1211
    Publicado 2009
    “…Die CD zum Buch enthält eine lauffähige, angepasste Linux-Umgebung (zum Start von der CD oder zur Nutzung in einer gängigen Virtualisierungs-Lösung), aus der heraus direkt mit Nagios gearbeitet werden kann. …”
    Libro electrónico
  12. 1212
    Publicado 2019
    “…These new Linux scale-out systems provide differentiated performance, scalability, and low acquisition cost, and include the following features: Superior throughput and performance for high-value Linux workloads. …”
    Libro electrónico
  13. 1213
    Publicado 1998
    “…The fourth edition covers the highlights of the Linux operating system. It's a handy book for someone just starting with UNIX or Linux, as well as someone who encounters a UNIX system on the Internet. …”
    Libro electrónico
  14. 1214
    Publicado 2022
    “…ISV zPDT is a personal computer (PC) Linux application. When ISV zPDT is installed on Linux, normal IBM zSystems operating systems (such as IBM z/OS®) may be run on it. …”
    Libro electrónico
  15. 1215
    por Fowler-Magerl, Linda
    Publicado 2003
    CDROM
  16. 1216
    Publicado 2015
    Tabla de Contenidos: “…""Cover""; ""Copyright""; ""Credits""; ""About the Authors""; ""About the Reviewers""; ""www.PacktPub.com""; ""Table of Contents""; ""Preface""; ""Chapter 1: Getting Started with OpenJDK""; ""Introduction""; ""Distinguishing OpenJDK from Oracle JDK""; ""Installing OpenJDK on Windows""; ""Configuring OpenJDK on Windows""; ""Installing OpenJDK on Linux""; ""Configuring OpenJDK on Linux""; ""Navigating through OpenJDK groups and projects""; ""Chapter 2: Building OpenJDK 6""; ""Introduction""; ""Preparing CA certificates""; ""Building OpenJDK 6 on Ubuntu Linux 12.04 LTS""…”
    Libro electrónico
  17. 1217
    Publicado 2021
    Tabla de Contenidos: “…Chapter 1: Introduction to Db2 for Linux and Windows -- Chapter 2: Installing Db2 Db2 on Linux and Windows -- Chapter 3: Db2 Management -- Chapter 4: Database Physical Design -- Chapter 5: Db2 Utilities -- Chapter 6: Business Rules and Constraints -- Chapter 7: Writing Good SQL for Db2 -- Chapter 8: Python and Db2 - The ibm_db Module -- Chapter 9: ibm_db Module Documentation -- Chapter 10: Where Is The ibm_db Module Going?…”
    Libro electrónico
  18. 1218
    por Barr, Michael, 1971-
    Publicado 2006
    Tabla de Contenidos: “…Table of Contents; Foreword; Preface; Introduction; Getting to Know the Hardware; Your First Embedded Program; Compiling, Linking, and Locating; Downloading and Debugging; Memory; Peripherals; Interrupts; Putting It All Together; Operating Systems; eCos Examples; Embedded Linux Examples; Extending Functionality; Optimization Techniques; The Arcom VIPER-Lite Development Kit; Setting Up Your Software Development Environment; Building the GNU Software Tools; Setting Up the eCos Development Environment; Setting Up the Embedded Linux Development Environment; Index…”
    Libro electrónico
  19. 1219
    Publicado 2024
    Tabla de Contenidos: “…Exploiting Windows services and applications -- Server-side exploits -- Client-side exploits -- Exploring the Windows Registry -- Windows Registry exploitation -- Exploiting the Windows logs -- Summary -- Lab -- Brute force password crack -- Rainbow table crack -- Assessment -- Answers -- Chapter 6: Hacking the Linux Operating System -- Exploiting the Linux operating system -- Exploring the Linux filesystem -- Exploiting the filesystem -- Linux hidden files -- Important files -- Exploiting Linux networking -- Exploiting Linux authentication -- Cracking passwords -- Linux updates and patching -- The Linux logging system -- Exploiting the Linux kernel -- Checking your kernel version -- Exploiting the kernel -- Lab -- Summary -- Assessment -- Answers -- Chapter 7: Ethical Hacking of Web Servers -- Web servers' architecture, configuration, and vulnerabilities -- Adding processing logic -- Threats, vulnerabilities, and exploits to web services -- Web server authentication -- Basic authentication -- OAuth -- Some real-world web servers and ways to combat attacks -- IIS hardening tasks -- Apache web server hardening tasks -- Types of web server/website attacks -- Website defacement -- DoS/DDoS attack -- HTTP response-splitting attack -- Cross-Site Request Forgery -- Deep linking -- Directory traversal attack -- Man-in-the-Middle/sniffing attack -- Cookie tampering -- Cookie-based session attacks -- Session hijacking -- DNS -- Lab -- Summary -- Assessment -- Answer -- Chapter 8: Hacking Databases -- Finding databases on the network -- Discovering databases on the network -- Mitigating database discovery -- Exploring databases and database structures -- Database threats and vulnerabilities -- Network-based database attacks -- Database engine faults and bugs -- Brute-force attacks on weak or default passwords -- Misconfigurations -- Remote code execution…”
    Libro electrónico
  20. 1220
    Publicado 2020
    Libro electrónico