Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
1501Publicado 2024“…This course is ideal for individuals with a basic understanding of Linux programming, and it provides a solid foundation in network defense and information security. …”
Vídeo online -
1502Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Hello Qt -- Installing Qt -- Maintaining your installation -- Qt Creator -- Scratchpad project -- qmake -- Summary -- Chapter 2: Project Structure -- Projects, MVC, and unit testing -- Project creation -- cm-lib -- cm-tests -- cm-ui -- Mastering MVC -- QObject -- QML -- Project output -- Summary -- Chapter 3: User Interface -- UX -- Creating views -- StackView -- Anchors -- Sizing -- Navigation -- Fixing conflicts -- Summary -- Chapter 4: Style -- Style resource -- Font Awesome -- Components -- Styling the navigation bar -- Clicking -- Commands -- Command bar -- Summary -- Chapter 5: Data -- JSON -- Object hierarchy -- DataDecorators -- Entities -- Entity collections -- Data models -- Custom TextBox -- Summary -- Chapter 6: Unit Testing -- Unit testing -- The default Qt approach -- Custom approach -- DataDecorator tests -- Entity Tests -- Mocking -- Summary -- Chapter 7: Persistence -- SQLite -- Primary keys -- Creating clients -- Panels -- Finding clients -- Editing clients -- Deleting clients -- Summary -- Chapter 8: Web Requests -- Network access -- Web Requests -- RSS View -- RSS -- Summary -- Chapter 9: Wrapping Up -- Object factory -- UI scaling -- Dashboard -- Enumerator selectors -- Contacts -- Deployment preparation -- OS X -- Linux -- Windows -- Qt Installer framework -- Installation -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
1503Publicado 2016Tabla de Contenidos: “…Hacking operating systems. Windows ; Linux -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. …”
Libro electrónico -
1504Publicado 2021“…The book teaches 64-bit x86 assembly language running on the Linux operating system. However, even if you are not running Linux, a provided Docker image will allow you to use a Mac or Windows computer as well. …”
Libro electrónico -
1505Publicado 2014“…NFC裝置貼近在一起後,便能透過無線電波傳遞訊號交換資料,本書內容包含大量的範例、原始程式碼、練習題、以及一步一步引導讀者的專案建構步驟,這是一份集結實務經驗的指引手冊,示範如何為Android、Arduino微控制器和嵌入式Linux設備打造NFC應用軟體。 您將學習如何使用NFC資料交換格式(NFC Data Exchange Format,NDEF)來撰寫應用程式,涵蓋的開發平台包括PhoneGap、Arduino與Node.js,讓NFC裝置能夠讀取被動式NFC標籤裡的訊息、與其他NFC裝置互相交換資料;若您已經懂得HTML與JavaScript,那就可以馬上進入NFC的開發工作。 …”
Libro electrónico -
1506Publicado 2015Tabla de Contenidos: “…Chapter 1 All about AndroidThe Consumer Perspective; The Developer Perspective; Java; XML; Linux; The Business Perspective; Chapter 2 Installing the Software Tools; Installing Oracle's Java Development Kit; Adding Apple's Java to the Stew; The Many Faces of Java (for Inquiring Readers Only); Setting Up the Software; Downloading the software; Installing the software; Launching the Android Studio IDE; In Windows; On a Mac; In Linux; Fattening Up the Android SDK; The more things stay the same, the more they change; Installing new versions (and older versions) of Android…”
Libro electrónico -
1507por Henry, Kevin M.Tabla de Contenidos: “…Port scanningCountermeasures to active reconnaissance; Key learning points; Questions; Chapter 5: Vulnerability Assessments; The attack vectors; References and sources of vulnerabilities; Using vulnerability assessment tools; PCI DSS requirements; Malicious code; Reporting on the vulnerability assessment; Key learning points; Questions; Chapter 6: Hacking Windows® and Unix; Having fun; Common hacking initiatives; Defeating data theft; Protecting against unauthorized access; Access controls; Actions of the attacker; Focus on UNIX/Linux; Advanced attacks; Source code review…”
Publicado 2012
Libro electrónico -
1508por Durand, BenoitTabla de Contenidos: “…1928994237.pdf; 1928994237.pdf; Cover; Table of Contents; Introduction; Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers; Chapter 2: Securing Outlook 2000; Chapter 3: Securing Outlook Express 5.0 and Eudora 4.3; Chapter 4: Web-based Mail Issues; Chapter 5: Client-Side Anti-Virus Applications; Chapter 6: Mobile Code Protection; Chapter 7: Personal Firewalls; Chapter 8: Securing Windows 2000 Advanced Server and Red Hat Linux 6 for E-mail Services; Chapter 9: Microsoft Exchange Server 5.5; Chapter 10: Sendmail and IMAP Security…”
Publicado 2001
Libro electrónico -
1509Publicado 2023Tabla de Contenidos: “…Table of Contents Microsoft and Modern Cybersecurity Threats Microsoft 365 Defender: The Big Picture The Fundamentals of Microsoft Defender for Endpoint Onboarding Windows Clients and Servers Getting Started with Microsoft Defender Antivirus for Windows Advanced Microsoft Defender Antivirus for Windows Managing Attack Surface Reduction for Windows Managing Additional Capabilities for Windows Onboarding and Managing macOS Onboarding and Managing Linux Servers Onboarding and Managing iOS and Android Deploying Microsoft Defender for Identity Managing Defender for Identity Deploying Exchange Online Protection Deploying Defender for Office 365 Implementing and Managing Microsoft Defender for Cloud Apps Maintaining Security Hygiene and Threat Awareness Extended Detection and Response with Microsoft 365 Defender Advanced Hunting with KQL Microsoft Sentinel Integration Understanding Microsoft 365 Defender APIs Glossary Answers…”
Libro electrónico -
1510Publicado 2016Tabla de Contenidos: “…The mobile application penetration testing methodologyDiscovery; Analysis/assessment; Exploitation; Reporting; The OWASP mobile security project; OWASP mobile top 10 risks; Vulnerable applications to practice; Summary; Chapter 2: Snooping Around the Architecture; The importance of architecture; The Android architecture; The Linux kernel; Confusion between Linux and the Linux kernel; Android runtime; The java virtual machine; The Dalvik virtual machine; Zygote; Core Java libraries; ART; Native libraries; The application framework; The applications layer; Native Android or system apps…”
Libro electrónico -
1511Publicado 2016Tabla de Contenidos: “…Cover; Title Page; Copyright; About the Authors; About the Technical Editor; Credits; Acknowledgments; Contents; Foreword; Introduction; Chapter 1: Getting Started ; System Requirements for Windows, Mac OS X, and Linux; Installing Java; Installing Java for Windows OS; Install Java; Setting Paths for Java on Windows 10; Installing Java for MacOS X; Installing Java for Linux; Installing Android Studio; Installing Android Studio for Microsoft Windows 10; Installing Android Studio for Mac OS X; Installing Android Studio for Linux; Launching Android Studio for the First Time…”
Libro electrónico -
1512Publicado 2007Tabla de Contenidos: “…Hardcore Vulnerability ExploitationAuthenticated Scans; Chapter 12: Linux; Linux Vulnerabilities; Choosing Tools; Information Gathering; Unneeded Services; .rhosts and hosts.equiv Files; NFS; File Permissions; Buffer Overflows; Physical Security; General Security Tests; Patching Linux; Chapter 13: Novell NetWare; NetWare Vulnerabilities; Choosing Tools; Getting Started; Authentication; Solid Practices for Minimizing NetWare Security Risks; Part V: Hacking Applications; Chapter 14: Messaging Systems; Messaging System Vulnerabilities; E-Mail Attacks; Instant Messaging; Voice over IP…”
Libro electrónico -
1513
-
1514por Renders, StevenTabla de Contenidos: “…Installing Microsoft's DirectX SDKTime for action - compiling Irrlicht as a dynamic library; Time for action - compiling the Irrlicht dynamic library; with modifications; Additional configurations; Building an example with Visual Studio; Time for action - building an Irrlicht example; Using Irrlicht with CodeBlocks; Time for action - creating an application using the; CodeBlocks wizard; CodeBlocks under Linux; Irrlicht on Linux; Time for action - compiling the static library; Making Irrlicht available on the whole system; Time for action - compiling ""Hello World"" on Ubuntu…”
Publicado 2011
Libro electrónico -
1515por Bhmer, MarioTabla de Contenidos: “…; Supported Android Devices; Setting Up the Development Environment; The Java Development Kit; Installing on Windows; Installing on Linux; Installing on Mac OS X; The Android SDK…”
Publicado 2012
Libro electrónico -
1516Publicado 2015Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Raspberry Pi; Getting to know your Raspberry Pi; Different types of operating systems; The Raspbian OS; The Arch Linux ARM OS; The RISC OS; OpenELEC and Raspbmc; Other operating systems; Command summary; Installation methods; NOOBS and BerryBoot; Installing Raspbian using RAW images; Writing an image using Windows; Writing an image using Linux; Raspbian OS interface ; Expanding the filesystem; Installing Raspbian using raspbian-ua-netinst…”
Libro electrónico -
1517Publicado 2015Tabla de Contenidos: “…Installing the softwareWindows; Mac OS X; Linux; In case of trouble; Installing the drivers; Windows; Mac OS X; Linux; Running the Arduino development environment for the first time; The toolbar; The code editor; The message area; Preflight checks; Uploading our first sketch; Main menus and commands; The Arduino language; Summary; Chapter 3: Interacting with the Environment the Digital Way; Digital versus analog signals; Our first circuit; Using a breadboard; The LED circuit; Circuit schematic; Breadboard connections diagram; Asymmetric blinking code; C language syntax considerations…”
Libro electrónico -
1518por Cinar, OnurTabla de Contenidos: “…Content ProvidersViews, Widgets, Layouts, and Menus; Resources; Datastorage; Android Life Cycles; Activity Life Cycle; Service Life Cycle; Packaging; Android Manifest; Summary; Chapter 3: Eclipse Primer; Eclipse History; Eclipse Architecture; Installing the Java Development Kit; Installing the JDK on Windows; Installing the JDK on Mac OS X; Installing the JDK on Linux; Installing Eclipse; Installing Eclipse on Windows; Installing Eclipse on Mac OS X; Installing Eclipse on Linux; Exploring Eclipse; Workspace; Workbench; Perspectives; Editors; Views; Fast Views; Quick Views; Menus; Toolbars…”
Publicado 2012
Libro electrónico -
1519por Smith, GregoryTabla de Contenidos: “…Summary Chapter 4: Disk Setup; Maximum file system sizes; File system crash recovery; Journaling file systems; Linux file systems; ext2; ext3; ext4; XFS; Other Linux file systems; Write barriers; Drive support for barriers; File system support for barriers; General Linux file system tuning; Read-ahead; File access times; Read caching and swapping; Write cache sizing; I/O scheduler elevator; Solaris and FreeBSD file systems; Solaris UFS; FreeBSD UFS2; ZFS; Windows filesystems; FAT32; NTFS; Adjusting mounting behaviour; Disk layout for PostgreSQL; Symbolic links; Tablespaces; Database directory tree…”
Publicado 2010
Libro electrónico -
1520por Von Hagen, WilliamTabla de Contenidos: “…Types of Virtual Machines Supported by XenPopular Xen and Virtualization Resources on the Internet; Other Popular Virtualization Software; Popular Emulation Software; Summary; Chapter 3: Obtaining and Installing Xen; Hardware Requirements for Xen; Software Packages Required for Running Xen; Downloading and Installing Xen from Binaries; Getting the Xen Source Code; Building Xen from Source Code; Installing Xen; Summary; Chapter 4: Booting and Configuring a Xen Host; Overview of Xen and Linux System Startup; Configuring GRUB for Xen; Hiding PCI Devices from domain0; Summary…”
Publicado 2008
Libro electrónico