Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
1421Publicado 2020Tabla de Contenidos: “…Die grafische Oberfläche Gnome -- 4.1 Gnome, Ihr Arbeitsplatz -- 4.2 Gnome an die eigenen Bedürfnisse anpassen -- Kapitel 5: Windows-Programme mit Linux nutzen -- 5.1 Wine (Wine Is Not an Emulator) -- 5.2 PlayOnLinux und Winetricks -- 5.3 Die Königsdisziplin: Die virtuelle Maschine -- Kapitel 6: Linux-Alternativen bekannter Windows-Programme -- 6.1 Office-Programme (Microsoft Office) -- 6.2 Textverarbeitungen (Microsoft Word) -- 6.3 Tabellenkalkulationen (Microsoft Excel) -- 6.4 Datenbanken (Microsoft Access) -- 6.5 Präsentationssoftware (Microsoft PowerPoint) -- 6.6 Projektmanagement-Software (Microsoft Project) -- 6.7 Webdesign (FrontPage, Dreamweaver) -- 6.8 Webbrowser (Edge, Internet Explorer, Chrome) -- 6.9 E-Mail-Clients (Microsoft Outlook)…”
Libro electrónico -
1422por Gutiérrez Salazar, PabloTabla de Contenidos: “…-- ESTRUCTURA DEL LIBRO -- CÓMO OBTENER AYUDA -- 1. FUNDAMENTOS -- LINUX -- TERMINAL DE LINUX -- INSTALANDO HERRAMIENTAS -- INTERFAZ DE RED -- REDES, PROTOCOLOS Y PUERTOS -- MODELO OSI -- TCP / IP -- PUERTOS -- FIREWALL -- COOKIES -- SEGURIDAD INFORMÁTICA -- FILOSOFÍAS DE HACKING -- SEGURIDAD DE LA INFORMACIÓN Y SEGURIDAD INFORMÁTICA -- CUALIDADES DE LA SEGURIDAD DE LA INFORMACIÓN -- METODOLOGÍA PARA MEJORAR LA SEGURIDAD DE LA INFORMACIÓN -- RETOS EN LA SEGURIDAD DE LA INFORMACIÓN -- INGENIERÍA SOCIAL -- PRUEBA DE PENETRACIÓN -- FORMAS DE OCULTAR INFORMACIÓN -- CRIPTOGRAFÍA -- CIFRADO EN ARCHIVOS -- ESTEGANOGRAFÍA -- PRACTICA -- PREPARACIÓN DEL LABORATORIO -- VIRTUALIZACIÓN -- WINDOWS & -- MACINTOSH -- SISTEMAS OPERATIVOS -- INSTALANDO LINUX VULNERABLE DE PRUEBAS -- INSTALANDO EMULADOR ANDROID -- INSTALANDO SERVIDOR WEB VULNERABLE -- 2. …”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1423por Kammer, DavidTabla de Contenidos: “…1928994423.pdf; 1928994423.pdf; Cover; Foreword; Table of Contents; Chapter 1 Introducing Bluetooth Applications; Chapter 2 Exploring the Foundations of Bluetooth; Chapter 3 Power Management; Chapter 4 Security Management; Chapter 5 Service Discovery; Chapter 6 Linux Bluetooth Development; Chapter 7 Embedding Bluetooth Applications; Chapter 8 Using the Palm OS for Bluetooth Applications; Chapter 9 Designing an Audio Application; Chapter 10 Personal Information Base Case Study; Appendix: Bluetooth Application Developer's Guide Fast Track; Glossary; Index; Related Titles…”
Publicado 2002
Libro electrónico -
1424por Rittinghouse, John W.Tabla de Contenidos: “…Cover; Title; Copyright; Contents; Foreword; Preface; Introduction; Chapter 1: The Evolution of Cloud Computing; Chapter 2: Web Services Delivered from the Cloud; Chapter 3: Building Cloud Networks; Chapter 4: Virtualization Practicum; Chapter 5: Federation, Presence, Identity, and Privacy in the Cloud; Chapter 6: Security in the Cloud; Chapter 7: Common Standards in Cloud Computing; Chapter 8: End-User Access to Cloud Computing; Chapter 9: Mobile Internet Devices and the Cloud; Appendix A: Virtualization Practicum (Linux); Appendix B: Executive Scenario for Cloud Migration; Index…”
Publicado 2009
Libro electrónico -
1425por Reddy, Niranjan. authorTabla de Contenidos: “…Chapter 1: Introduction to Cyber Forensics- Chapter 2: Windows Forensics -- Chapter 3: Linux Forensics -- Chapter 4: MAC Forensics -- Chapter 5: Anti Forensics Techniques & Detection -- Chapter 6: Network forensics -- Chapter 7: Mobile forensics -- Chapter 8: Cloud forensics -- Chapter 9: Investigating Malware attacks -- Chapter 10: Investigating web attacks -- Chapter 11: Investigating email crimes -- Chapter 12: SSD Forensics -- Chapter 13: BitCoin Forensics.…”
Publicado 2019
Libro electrónico -
1426Publicado 2016Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- Acknowledgments -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Deploying Ubuntu Server -- Setting up our lab -- Determining your server's role -- Obtaining Ubuntu Server -- Deciding between 32-bit and 64-bit installations -- Creating a bootable Ubuntu Server flash drive (Windows) -- Creating a bootable Ubuntu Server flash drive (Linux) -- Creating a bootable Ubuntu Server flash drive (Mac) -- Planning the partition layout -- Installing Ubuntu Server -- Installing Ubuntu Server (Raspberry Pi) -- Summary -- Chapter 2: Managing Users -- Understanding when to use root -- Creating and removing users -- Understanding the /etc/passwd and /etc/shadow files -- Distributing default configuration files with /etc/skel -- Switching between users -- Managing groups -- Managing passwords and password policies -- Configuring administrator access with sudo -- Setting permissions on files and directories -- Summary -- Chapter 3: Managing Storage Volumes -- Viewing disk usage -- Adding additional storage volumes -- Partitioning and formatting volumes -- Mounting and unmounting storage volumes -- Understanding the /etc/fstab file -- Managing swap -- Utilizing LVM volumes -- Using symbolic and hard links -- Summary -- Chapter 4: Connecting to Networks -- Setting the hostname -- Managing network interfaces -- Assigning static IP addresses -- Understanding Linux name resolution -- Understanding Network Manager -- Getting started with OpenSSH -- Getting started with SSH key management -- Simplifying SSH connections with a ~/.ssh/config file -- Summary -- Chapter 5: Managing Software Packages -- Understanding Linux package management -- Installing and removing software -- Searching for packages -- Managing software repositories -- Keeping your server up to date…”
Libro electrónico -
1427Publicado 2018Tabla de Contenidos: “…-- YAML file formatting -- Text editor tips -- Building a golden configuration with Jinja2 -- Reading templates from the filesystem -- Using Jinja2 loops and conditions -- Summary -- Chapter 7: Parallel Execution of Python Script -- How a computer executes your Python script -- Python multiprocessing library -- Getting started with multiprocessing -- Intercommunication between processes -- Summary -- Chapter 8: Preparing a Lab Environment -- Getting the Linux operating system -- Downloading CentOS -- Downloading Ubuntu -- Creating an automation machine on a hypervisor -- Creating a Linux machine over VMware ESXi -- Creating a Linux machine over KVM -- Getting started with Cobbler -- Understanding how Cobbler works -- Installing Cobbler on an automation server -- Provisioning servers through Cobbler -- Summary -- Chapter 9: Using the Subprocess Module -- The popen() subprocess -- Reading stdin, stdout, and stderr -- The subprocess call suite -- Summary…”
Libro electrónico -
1428Publicado 2024Tabla de Contenidos: “…-- Using Macros to Improve Code -- Summary -- Exercises -- Chapter 7: Linux Operating System Services -- So Many Services -- Calling Convention -- Finding Linux System Call Numbers -- Return Codes -- Structures -- About Wrappers -- Converting a File to Uppercase -- Building .S Files -- Opening a File -- Error Checking -- Looping -- Summary -- Exercises -- Chapter 8: Programming GPIO Pins -- GPIO Overview -- In Linux, Everything is a File -- Flashing LEDs -- Moving Closer to the Metal -- Virtual Memory -- In Devices, Everything is Memory -- Registers in Bits -- GPIO Enable Registers -- GPIO Output Set Registers -- More Flashing LEDs -- GPIOTurnOn in Detail -- Root Access -- Summary -- Exercises -- Chapter 9: Interacting with C and Python -- Calling C Routines -- Printing Debug Information -- Preserving State -- Calling Printf -- Passing a String -- Register Masking Revisited -- Calling Assembly Routines from C -- Packaging the Code -- Static Library -- Shared Library -- Embedding Assembly Language Code inside C Code…”
Libro electrónico -
1429Publicado 2024Tabla de Contenidos: “…Tanenbaum -- Unix Network Programming by W. Richard Stevens -- Linux System Programming Techniques: Become a proficient Linux system programmer using expert recipes and techniques -- Mastering Embedded Linux Programming - Third Edition: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell) -- Modern Operating Systems by Andrew S. …”
Libro electrónico -
1430por Cardador Cabello, Antonio LuísTabla de Contenidos: “…Instalación sistema operativo. Linux -- 8. Cómo se instala un sistema operativo windows y otro linux en el mismo equipo -- 9. …”
Publicado 2021
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
1431Publicado 2007Tabla de Contenidos: “…IS audit process -- Technology and audit -- IS audit function knowledge -- IS risk and fundamental auditing concepts -- Standards and guidelines for IS auditing -- Internal controls concepts knowledge -- Risk management of the IS function -- Audit planning process -- Audit management -- Audit evidence process -- Audit reporting follow-up -- Information systems/information technology governance -- Management -- Strategic planning -- Management issues -- Support tools and frameworks -- Governance techniques -- Systems and infrastructure lifecycle management -- Information systems planning -- Information management and usage -- Development, acquisition, and maintenance of information systems -- Impact of information technology on the business processes and solutions -- Software development -- Audit and control of purchased packages -- Audit role in feasibility studies and conversions -- Audit and development of application controls -- Information technology service delivery and support -- Technical infrastructure -- Service center management -- Protection of information assets -- Information assets security management -- Logical information technology security -- Applied information technology security -- Physical and environmental security -- Business continuity and disaster recovery -- Protection of the information technology architecture and assets: disaster recovery planning -- Insurance -- Advanced is auditing -- Auditing e-commerce systems -- Auditing UNIX / LINUX -- Auditing windows -- Foiling the system hackers -- Investigating information technology fraud -- Appendices -- Appendix A Ethics and standards for the IS auditor -- Appendix B Audit program for application systems auditing -- Appendix C Logical access control audit program -- Appendix D Audit program for auditing UNIX / LINUX Environments -- Appendix E Audit program for auditing windows XP/2000 environments…”
Libro electrónico -
1432Publicado 2014Tabla de Contenidos: “…-- Sketching in Hardware -- First Steps -- Tour of the Board -- Helpful Tools and Components -- Writing Programs to Control Your Galileo -- Getting Familiar with the Development Environment -- Connecting the Board -- Uploading Code -- Taking It Further -- Outputs -- Back to Blinking: Digital Output -- Setup and Loop -- Variables -- Pin Numbers -- Circuits and the Flow of Electricity -- pinMode() -- digitalWrite( -- delay -- Code and Syntax Notes -- Going Further with Digital Output -- Analog Output -- analogWrite -- Code and Syntax Notes -- Other Outputs -- Serial Data Output -- Controlling A/C Appliances with Relays -- Controlling Servos -- Looking at Linux -- Connecting via Telnet -- Working with Pins -- Taking It Further -- Inputs -- Switches: Digital Input -- digitalRead -- Code and Syntax Notes -- Analog Input -- Potentiometers -- analogRead() -- Code and Syntax Notes -- Variable Resistors -- Code and Syntax Notes -- Going Further -- Going Further with Code -- Data Types -- int -- float -- long -- boolean -- char -- String Object -- millis -- Other Loops -- while -- Do While -- For Loops -- More Serial -- Serial.available and Serial.read -- Taking It Further -- Getting Online -- Connecting and Testing an Ethernet Connection -- Connecting and Testing with a WiFi Connection -- Connecting Using Linux Commands -- system -- Getting Galileo's IP Address Using system() -- Connecting to Servers -- How Many Days Until MAKE Comes Out? …”
Libro electrónico -
1433
-
1434Publicado 2021“…To help you practice, the book includes a downloadable Linux VM image with a suite of preconfigured tools so you can experiment quickly—without risk…”
Vídeo online -
1435Publicado 2014“…Der Leser erfährt, wie eigene NFC-Anwendungen für das Android-Smartphone, für den Arduino und Embedded-Linux-Geräte erstellt werden…”
Libro electrónico -
1436
-
1437Publicado 2011“…Después de 1990 Linus Torvalds lanzo Linux y cambio por completo las reglas del juego. …”
Electrónico -
1438Publicado 2020“…IBM® Cloud Hyper Protect Services provide built-in data-at-rest and data-in-flight protection to help developers easily build secure cloud applications by using a portfolio of cloud services that are powered by IBM LinuxONE. The LinuxONE platform ensures that client data is always encrypted, whether at rest or in transit. …”
Libro electrónico -
1439Publicado 2020Tabla de Contenidos: “…Storage -- 6. Oracle Autonomous Linux -- 7. Autonomous Databases -- 8. Load Balancers -- 9. …”
Libro electrónico -
1440Publicado 2015Tabla de Contenidos: “…Making Sure Your Machine Has Bluetooth LEOS X; Apple iOS; Linux; Android; Microsoft Windows; What Haven't We Told You About Bluetooth LE?…”
Libro electrónico