Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
1721Publicado 2008“…Ubuntu is a complete, free operating system that emphasizes community, support, and ease of use without compromising speed, power, or flexibility. It’s Linux for human beings—designed for everyone from computer novices to experts. …”
Libro electrónico -
1722por Black, Ann“…In this book, IBM's own enterprise WebSphere experts offer authoritative, comprehensive guidance for deploying and managing WebSphere on z/OS for mainframes, UNIX®/Linux®-based distributed systems, and Windows® servers. …”
Publicado 2005
Libro electrónico -
1723Publicado 2010“…The emphasis of this video presentation will be on MySQL versions 5.0 and 5.1, as well as XtraDB on Linux operating systems…”
-
1724Publicado 2017“…About the Instructor Chris Negus has authored or co-authored dozens of books on Linux and UNIX, including the Red Hat Linux Bible (all editions), Linux Troubleshooting Bible , Linux Bible (now in its 9th edition), Linux Toolbox series, Linux Toys , Linux Toys II , and mostly recently, Docker Containers . …”
-
1725por Brabetz, Sebastian“…Als Grundlage erhalten Sie das Basiswissen zu Exploits und Penetration Testing und setzen eine Kali-Linux-Umgebung auf. Mit dem kostenlos verfügbaren Portscanner Nmap scannen Sie Systeme auf angreifbare Dienste ab. …”
Publicado 2022
Libro electrónico -
1726Publicado 2014“…Ubuntu Unleashed 2015 Edition is filled with unique and advanced information for everyone who wants to make the most of the Linux-based Ubuntu operating system. This new edition has been thoroughly revised and updated by a long-time Ubuntu community leader to reflect the exciting new Ubuntu 14.10 while including tons of information that will continue to apply to future editions. …”
Libro electrónico -
1727Publicado 2019“…Start from scratch and learn both topics simultaneously by writing 20+ hacking programs About This Video Write a remote keylogger that can register all keystrokes and send them by email Interact with files using Python (read, write, and modify them) Convert Python programs to binary executables that work on Windows, OS X, and Linux Convert evil files into Trojans that work and function just like any other file type such as an image or a PDF Write a program that can discover hidden paths in a website Send requests to websites and analyze responses Write a program that can map a website and discover all links, subdomains, files, and directories Run dictionary attacks and guess login information on login pages Write a program that can discover weaknesses in websites In Detail This course is highly practical but doesn't neglect the theory, so we start by covering some basics for ethical hacking and Python programming, installing the required software, and then starting to program straightaway. …”
-
1728Publicado 2014“…Christopher has authored dozens of books on Linux and open source software, including the Linux Bible , Red Hat Linux Bible , Linux Toolbox series, Linux Toys , and Live Linux CDs . …”
-
1729Publicado 2015“…Chris has authored dozens of books on Linux and open source software, including the Linux Bible , Red Hat Linux Bible , Linux Toolbox series, Linux Toys, and Live Linux CDs. …”
-
1730Publicado 2019“…This IBM® RedpaperTM publication is a comprehensive guide covering the IBM Power System L922 (9008-22L) server, which was designed for data-intensive workloads such as databases and analytics in the Linux operating system. The objective of this paper is to introduce the major innovative Power L922 offering and its relevant functions: The new IBM POWER9TM processor, available at frequencies of 2.7 - 3.8 GHz, 2.9 - 3.8 GHz, and 3.4 - 3.9 GHz. …”
Libro electrónico -
1731Publicado 2018“…This IBM® RedpaperTM publication is a comprehensive guide that covers the IBM Power® System E870C (9080-MME) and IBM Power System E880C (9080-MHE) servers that support IBM AIX®, IBM i, and Linux operating systems. The objective of this paper is to introduce the major innovative Power E870C and Power E880C offerings and their relevant functions. …”
Libro electrónico -
1732por McGrath, Sean“…CD-ROM INCLUDED The accompanying CD-ROM contains everything you need to develop XML applications with Python — including complete Python distributions for Windows and Linux the Pyxie open-source libraries powerful utility programs an extensive library of sample source code tested on both Windows NT and Linux…”
Publicado 2000
Libro electrónico -
1733Publicado 2004“…Unlike most spam books, this one is written specifically for in-the-trenches system administrators: professionals who need hands-on solutions for detecting, managing, and deterring spam in Unix/Linux and/or Microsoft Windows environments. The authors offer deep, administrator-focused coverage of the most valuable open-source tools for reducing spam's impact in the enterprise—especially SpamAssassin. …”
Libro electrónico -
1734Publicado 2001“…Samba is a cross-platform triumph: it turns a Unix or Linux system into a file and print server for Microsoft Windows network clients. …”
Libro electrónico -
1735Publicado 2008“…From architecture to kernel internals, author David Chisnall exposes key code components and shows you how the technology works, providing the essential information you need to fully harness and exploit the Xen hypervisor to develop cost-effective, highperformance Linux and Windows virtual environments. Granted exclusive access to the XenSource team, Chisnall lays down a solid framework with overviews of virtualization and the design philosophy behind the Xen hypervisor. …”
Libro electrónico -
1736Publicado 2000“…Absolute basics to advanced data analysis Communicate your data: Formatting, charting, printing, and Web publishing Exchange files with Microsoft Excel users For Windows, Linux, Solaris, and other platforms Endorsed by Sun, publishers of StarOffice! …”
Libro electrónico -
1737por Fogel, Karl“…The corporate market is now embracing free, ""open source"" software like never before, as evidenced by the recent success of the technologies underlying LAMP (Linux, Apache, MySQL, and PHP). Each is the result of a publicly collaborative process among numerous developers who volunteer their time and energy to create better software. …”
Publicado 2005
Libro electrónico -
1738Publicado 2005“…This IBM Redbooks publication introduces the IBM Tivoli Configuration Manager logical and physical components and covers detailed planning and implementation steps to deploy IBM Tivoli Configuration Manager in small-to-medium and large-sized environments, including IBM AIX 5L, Microsoft Windows, Linux, and IBM OS/400 systems. In addition, we talk about best practices, advanced customization, and tuning topics for IBM Tivoli Configuration Manager. …”
Libro electrónico -
1739Publicado 2008“…If you’re coming to the IBM System z mainframe platform from UNIX ® , Linux ® , or Windows ® , you need practical guidance on leveraging its unique security capabilities. …”
Libro electrónico -
1740por Schultz, E. Eugene“…Although technical considerations, (e.g. the particular binaries in Unix and Linux and dynamically linked libraries in Windows NT and Windows 2000) that need to be inspected in case they are corrupted, the types of logging data available in major operating systems and how to interpret it to obtain information about incidents, how network attacks can be detected on the basis of information contained in packets, and so on ¿ the major focus of this book is on managerial and procedural matters. …”
Publicado 2002
Libro electrónico