Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Microsoft Windows (Computer file) 602
- Operating systems (Computers) 423
- Engineering & Applied Sciences 321
- Computer Science 279
- Microsoft Windows server 234
- Microsoft Windows (Programa de ordenador) 124
- Examinations 122
- Certification 105
- Computer networks 104
- Electronic data processing personnel 100
- Application software 99
- Development 93
- Microsoft software 83
- Microsoft .NET Framework 77
- Client/server computing 72
- Computer security 58
- Management 56
- Computer programs 45
- Security measures 45
- Windows PowerShell (Computer program language) 45
- Electrical & Computer Engineering 43
- Microsoft Windows NT (Programa de ordenador) 40
- Telecommunications 40
- Virtual computer systems 39
- Windows (Computer programs) 36
- Microsoft Windows 2000 (Programa de ordenador) 35
- Historia 30
- Directory services (Computer network technology) 29
- Linux 29
- Microsoft and .NET 28
-
1661por Nieuwendijk, Robert van den“…It's assumed that you have some experience in administrating a VMware vSphere environment. Knowledge of Microsoft's Windows PowerShell is not a prerequisite…”
Publicado 2014
Libro electrónico -
1662Publicado 2013“…C# is a complex programming language for building .NET-connected software for Microsoft Windows, cloud computing, the Web, and a wide range of devices. …”
Libro electrónico -
1663por MacDonald, Matthew“…Microsoft's Windows Presentation Foundation (WPF) provides you with a development framework for building high-quality user experiences for the Windows operating system. …”
Publicado 2012
Libro electrónico -
1664Publicado 2022“…You'll go beyond just Linux machines to use Ansible to automate Microsoft Windows machines, network devices, and private and public cloud platforms such as VMWare, AWS, and GCP. …”
Libro electrónico -
1665por Martínez, José M.Tabla de Contenidos: “…ARCORE -- 6.1 INTRODUCCIÓN -- 6.2 CONFIGURACIÓN DEL MOTOR -- 6.3 DETECCIÓN DE IMÁGENES -- 6.4 DETECCIÓN DE PLANOS -- 6.4.1 EL POZO -- 6.4.2 EL PORTAL -- CAPÍTULO 7. MICROSOFT WINDOWS MIXED REALITY -- 7.1 INTRODUCCIÓN -- 7.2 INSTALACIÓN Y PRIMEROS PASOS -- 7.3 CONFIGURAR UNITY PARA CREAR UN PROYECTO (...) -- 7.4 EL PRIMER PROYECTO EN WMR -- 7.5 LOS MOTION CONTROLLERS DE WMR -- 7.6 EL WINDOWS MIXED REALITY TOOLKIT -- 7.7 EL CONTROL POR VOZ -- MATERIAL ADICIONAL…”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1666por Wilcox, MarkTabla de Contenidos: “…5.1 Popular APIs You Can't Use Directly5.2 How to Create a Hybrid Port; 5.3 Example: Guitune; 5.4 Summary; 6 Other Port Enablers; 6.1 Real-time Graphics and Audio Libraries; 6.2 Simple DirectMedia Layer; 6.3 OpenKODE; 6.4 Qt; 6.5 Summary; 7 Porting from Mobile Linux; 7.1 Major Players in the Mobile Linux Space; 7.2 Porting from Linux to Symbian; 7.3 Summary; 8 Porting from Microsoft Windows; 8.1 Architecture Comparison; 8.2 Application Compatibility; 8.3 Development Languages and SDKs; 8.4 SDKs and APIs; 8.5 Porting an Application; 8.6 Windows-specific Issues; 8.7 Signing and Security…”
Publicado 2009
Libro electrónico -
1667Publicado 2005Tabla de Contenidos: “…5.1 Install the development node -- 5.1.1 Install Microsoft Windows operating system -- 5.1.2 Install IBM WebSphere Studio Application Developer Integration Edition V5.1.1 -- 5.1.3 Install IBM Portal Toolkit V5.0.2.3 -- 5.2 Import the source code -- 5.3 Summary -- Part 3 Installation and configuration -- Chapter 6. …”
Libro electrónico -
1668Publicado 2004Tabla de Contenidos: “…WebSphere Portal V5 prerequisites and planning -- 3.1 Overview -- 3.2 Architecture review -- 3.2.1 HTTP server separation -- 3.2.2 Simple-machine -- 3.2.3 Multiple-machine -- 3.2.4 Multiple-tier -- 3.2.5 Vertical scaling -- 3.2.6 Horizontal scaling -- 3.3 Hardware and software prerequisites -- 3.3.1 Microsoft Windows 2000 -- 3.3.2 SUSE SLES 8 -- 3.3.3 IBM AIX 5.2 -- 3.3.4 Sun Solaris 8.0 -- 3.3.5 zLinux -- 3.4 Planning for the database -- 3.4.1 Using Cloudscape or another robust database -- 3.4.2 Local or remote database server -- 3.4.3 Database preparation -- 3.4.4 Database migration -- 3.4.5 Database prerequisites -- 3.5 Planning for the LDAP -- 3.6 Planning for Web servers -- 3.6.1 Existing Web server -- 3.6.2 Local or remote Web server -- 3.6.3 Web server product choice -- 3.6.4 Port conflict avoidance -- 3.6.5 Web server prerequisites…”
Libro electrónico -
1669Publicado 2014Tabla de Contenidos: “…Working with the XenDesktop® SDK -- Microsoft Windows PowerShell -- PowerShell snap-ins and cmdlets for XenDesktop® -- Using the XenDesktop® SDK -- Creating an SDK script -- Troubleshooting using the XD PowerShell SDK -- Useful desktop cmdlets -- Useful controller cmdlets -- Site debugging tools -- Citrix Ready® -- Summary -- 12. …”
Libro electrónico -
1670Publicado 2013Tabla de Contenidos: “…-- A History of Oracle Business Intelligence -- Oracle Product Release History -- Oracle Business Intelligence 11g Release 1 Architecture -- Oracle Business Intelligence 11g and Oracle Fusion Middleware -- Chapter 2: Installation and Upgrading Oracle Business Intelligence -- Preparing for the Installation -- Microsoft Windows-Specific Preinstallation Tasks -- Linux- and Unix-Specific Preinstallation Tasks -- Database Server Requirements -- Creating the Supporting Database Schemas -- What Schemas Are Created During the Installation Process? …”
Libro electrónico -
1671por MacDonald, Matthew“…Microsoft's Windows Presentation Foundation (WPF) provides you with a development framework for building high-quality user experiences for the Windows operating system. …”
Publicado 2012
Libro electrónico -
1672Publicado 2018Tabla de Contenidos: “…-- Installation -- Fabric operations -- Using run operation -- Using get operation -- Using put operation -- Using sudo operation -- Using prompt operation -- Using reboot operation -- Executing your first Fabric file -- More about the fab tool -- Discover system health using Fabric -- Other useful features in Fabric -- Fabric roles -- Fabric context managers -- Summary -- Chapter 11: Generating System Reports and System Monitoring -- Collecting data from Linux -- Sending generated data through email -- Using the time and date modules -- Running the script on a regular basis -- Managing users in Ansible -- Linux systems -- Microsoft Windows -- Summary -- Chapter 12: Interacting with the Database -- Installing MySQL on an automation server -- Securing the installation -- Verifying the database installation -- Accessing the MySQL database from Python -- Querying the database -- Inserting records into the database -- Summary -- Chapter 13: Ansible for System Administration -- Ansible terminology -- Installing Ansible on Linux -- On RHEL and CentOS -- Ubuntu -- Using Ansible in ad hoc mode -- How Ansible actually works -- Creating your first playbook -- Understanding Ansible conditions, handlers, and loops -- Designing conditions -- Creating loops in ansible -- Trigger tasks with handlers -- Working with Ansible facts -- Working with the Ansible template -- Summary -- Chapter 14: Creating and Managing VMware Virtual Machines -- Setting up the environment -- Generating a VMX file using Jinja2 -- Building the VMX template -- Handling Microsoft Excel data -- Generating VMX files -- VMware Python clients -- Installing PyVmomi -- First steps with pyvmomi -- Changing the virtual machine state -- There's more -- Using Ansible playbook to manage instances…”
Libro electrónico -
1673Publicado 2023Tabla de Contenidos: “…-- CORE 1 EXAM 220-1102 EXAM OBJECTIVES -- CORE 2 EXAM 220-1102 CERTIFICATION EXAM OBJECTIVE MAP -- HOW TO CONTACT THE PUBLISHER -- PART I: Domain 1.0: Operating Systems -- CHAPTER 1: Microsoft Windows Editions -- WINDOWS 10 EDITIONS -- FEATURE DIFFERENCES BETWEEN EDITIONS -- UPGRADE PATHS -- CHAPTER 2: Microsoft Command-Line Tools -- NAVIGATION -- COMMAND-LINE TOOLS -- CHAPTER 3: Windows 10 Operating System Tools -- TASK MANAGER -- MICROSOFT MANAGEMENT CONSOLE (MMC) SNAP-IN -- ADDITIONAL TOOLS -- CHAPTER 4: Windows 10 Control Panel -- CONTROL PANEL OVERVIEW -- OPENING CONTROL PANEL -- INTERNET OPTIONS -- DEVICES AND PRINTERS -- PROGRAMS AND FEATURES -- NETWORK AND SHARING CENTER -- SYSTEM -- WINDOWS DEFENDER FIREWALL -- MAIL -- SOUND -- USER ACCOUNTS -- DEVICE MANAGER -- INDEXING OPTIONS -- ADMINISTRATIVE TOOLS -- FILE EXPLORER OPTIONS -- POWER OPTIONS -- EASE OF ACCESS -- CHAPTER 5: Windows Settings -- ACCESSING SETTINGS -- TIME & -- LANGUAGE -- UPDATE & -- SECURITY -- PERSONALIZATION -- APPS -- PRIVACY -- SYSTEM -- DEVICES -- NETWORK & -- INTERNET -- GAMING -- ACCOUNTS -- CHAPTER 6: Windows Networking -- WORKGROUP VS. …”
Libro electrónico -
1674por Parasram, Shiva V. N.Tabla de Contenidos: “…Configuring our WINE installation -- Testing our WINE installation -- Summary -- Part 2: Digital Forensics and Incident Response Fundamentals and Best Practices -- Chapter 6: Understanding File Systems and Storage -- History and types of storage media -- IBM and the history of storage media -- Removable storage media -- Magnetic tape drives -- Floppy disks -- Optical storage media -- Blu-ray Disc -- Flash storage media -- USB ash drives -- Flash memory cards -- Hard disk drives -- Integrated Drive Electronics HDDs -- Serial Advanced Technology Attachment HDDs -- Solid-state drives -- File systems and operating systems -- Microsoft Windows -- Macintosh (macOS) -- Linux -- Data types and states -- Metadata -- Slack space -- Volatile and non-volatile data and the order of volatility -- The importance of RAM, the paging file, and cache in DFIR -- Summary -- Chapter 7: Incident Response, Data Acquisitions, and DFIR Frameworks -- Evidence acquisition procedures -- Incident response and first responders -- Evidence collection and documentation -- Physical acquisition tools -- Live versus post-mortem acquisition -- Order of volatility -- Powered-on versus powered-off device acquisition -- The CoC -- The importance of write blockers -- Data imaging and maintaining evidence integrity -- Message Digest (MD5) hash -- Secure Hashing Algorithm (SHA) -- Data acquisition best practices and DFIR frameworks -- DFIR frameworks -- Summary -- Part 3: Kali Linux Digital Forensics and Incident Response Tools -- Chapter 8: Evidence Acquisition Tools -- Using the fdisk command for partition recognition -- Device identification using the fdisk command -- Creating strong hashes for evidence integrity -- Drive acquisition using DC3DD -- Verifying the hash output of image files -- Erasing a drive using DC3DD -- Drive acquisition using DD -- Drive acquisition using Guymager…”
Publicado 2023
Libro electrónico -
1675Publicado 2021Tabla de Contenidos: “…. -- 1.3.5 FUNCIONES DE LOS SISTEMAS OPERATIVOS -- 1.3.6 DISTINTOS SISTEMAS OPERATIVOS -- 1.3.6.1 LA FAMILIA MICROSOFT WINDOWS -- 1.3.6.2 LA FAMILIA GNU/LINUX -- 1.3.6.3 DISTRIBUCIONES LINUX -- 1.4 SUITES OFIMÁTICAS -- 1.4.1 LA SUITE MICROSOFT OFFICE -- 1.4.1.1 WORD -- 1.4.1.2 EXCEL -- 1.4.1.3 POWERPOINT -- 1.4.2 LA SUITE OPENOFFICE -- 1.4.2.1 WRITER -- 1.4.2.2 CALC -- 1.4.2.3 IMPRESS -- 1.4.2.4 MATH -- 1.5 LENGUAJES DE PROGRAMACIÓN -- 1.5.1 CLASIFICACIÓN DE LOS LENGUAJES DE PROGRAMACIÓN -- 1.5.1.1 LENGUAJES DE BAJO NIVEL -- 1.5.1.2 LENGUAJES DE MEDIO NIVEL -- 1.5.1.3 LENGUAJES DE ALTO NIVEL -- 1.5.1.4 LENGUAJES COMPILADOS -- 1.5.1.5 LENGUAJES INTERPRETADOS -- 1.5.2 EJEMPLOS DE LENGUAJES DE PROGRAMACIÓN -- 1.6 COMO USAR EL CD DE PUPPYLINUX 2.7183 NOP -- 1.6.1 PUPPYLINUX -- 1.6.2 CÓMO TRABAJAR CON EL CD DE PUPPYLINUX -- 1.6.3 APLICACIONES DISPONIBLES EN EL LIVECD -- 1.7 BIBLIOGRAFÍA -- UNIDAD 2: INTRODUCCIÓN A LA PROGRAMACIÓN - PARTE I -- 2.1 EL LENGUAJE DE PROGRAMACIÓN GNUOCTAVE -- 2.2 INTRODUCCIÓN AL USO DE GNUOCTAVE -- 2.2.1 ENTORNO INTERACTIVO DE TRABAJO -- 2.2.2 CONSTANTES Y VARIABLES -- 2.2.3 OPERACIONES ARITMÉTICAS…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1676Publicado 2018Tabla de Contenidos: “…-- Community and Enterprise Editions of Odoo -- Getting started with Odoo Online -- Taking advantage of Odoo Online Instant Access -- Odoo browser requirements -- Odoo mobile phone and tablet support -- Accessing the Odoo free online trial -- Continuing to use the trial version of Odoo -- Subscribing to Odoo -- Using Odoo without subscription fees -- Getting to know the Odoo architecture -- Introducing the PostgreSQL database -- Writing code with Python -- Following the Model-View-Controller design -- Designing models -- Rendering views -- Authoring controllers -- Choosing your installation operating system -- Choosing a Microsoft Windows Odoo installation -- Learning Ubuntu is not required -- Introducing Ubuntu -- Choosing an Ubuntu Odoo installation -- Choosing another OS option for Odoo -- Understanding Odoo releases -- Upgrading Odoo -- Installing Odoo on Windows OS -- Performing an all-in-one Odoo installation on Windows -- Configuring PostgresSQL on Windows -- Installing Odoo on Ubuntu -- Modifying the sources.list file -- Testing your Odoo installation -- Troubleshooting and Odoo management tips -- Checking your browser destination -- Verifying that the Odoo service is running -- Checking for the Odoo services running in Windows -- Checking for Odoo services running in Ubuntu -- Starting and stopping Odoo services in Ubuntu -- Finding the primary Odoo log file -- Modifying the Odoo configuration file -- Changing port numbers -- Accessing the database management tools -- Changing the admin password -- Finding additional resources on installing Odoo -- Summary -- Chapter 2: Installing Your First Application -- What's new in Odoo 11? …”
Libro electrónico -
1677Publicado 2017“…Learn to audit the security of networks, web applications, databases, mail servers, Microsoft Windows servers/workstations and even ICS systems. …”
Libro electrónico -
1678Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Reactive Programming Model - Overview and History -- Event-driven programming model -- Event-driven programming on X Windows -- Event-driven programming on Microsoft Windows -- Event-driven programming under Qt -- Event-driven programming under MFC -- Other event-driven programming models -- Limitations of classical event processing models -- Reactive programming model -- Functional reactive programming -- The key interfaces of a reactive program -- Pull-versus push-based reactive programming -- The IEnumerable/IObservable duality -- Converting events to IObservable< -- T> -- -- The philosophy of our book -- Summary -- Chapter 2: A Tour of Modern C++ and its Key Idioms -- The key concerns of the C++ programming language -- Zero cost abstraction -- Expressivity -- Substitutability -- Enhancements to C++ for writing better code -- Type deduction and inference -- Uniform initialization of variables -- Variadic templates -- Rvalue references -- Move semantics -- Smart pointers -- Lambda functions -- Functors and Lambdas -- Composition, currying, and partial function application -- Function wrappers -- Composing functions together with the pipe operator -- Miscellaneous features -- Fold expressions -- Variant type -- Other important topics -- Range-based for loops and observables -- Summary -- Chapter 3: Language-Level Concurrency and Parallelism in C++ -- What is concurrency? …”
Libro electrónico -
1679Publicado 2018Tabla de Contenidos: “…-- Time to say goodbye to SSL and early TLS -- SSL certificate component -- Root certificate -- Intermediate certificate -- SSL certificates classes -- TLS versus SSL -- Public Key Infrastructure -- Symmetric encryption -- Asymmetric encryption -- Hash function -- Attacks against PKI -- Microsoft Windows and IIS -- OpenSSL -- SSL Management tools -- Summary -- Questions -- Further reading -- Chapter 10: Firewall Placement and Detection Techniques -- Technical requirements -- Firewall and design considerations -- Firewall terminology -- Firewall generations -- Firewall performance -- Firewall placement and design network topology -- Single firewall architecture -- Single firewall architecture with a single IP subnet -- Single firewall architecture with multiple IP subnets -- Multilayer firewall architecture -- Firewall sandwich design -- Demilitarized Zone -- DMZ to Internal Access Policy -- OSI model versus TCP/IP model -- Firewall performance, capabilities, and function -- Firewall management -- Application proxies -- Detecting firewalls -- Debugging tools -- Summary -- Questions -- Further Reading -- Chapter 11: VPN and WAN Encryption -- Overview -- Classes of VPN -- Type of VPN protocol -- Point-to-Point tunneling protocol -- Layer 2 Tunneling Protocol -- Secure Socket Tunneling protocol -- Internet Protocol Security -- SSL VPN…”
Libro electrónico -
1680Publicado 2022Tabla de Contenidos: “…-- Core Linux distributions -- Specialized Linux distributions -- Chapter 2 Installing Linux -- Dual-Booting with Linux and Microsoft Windows -- Installing a second hard drive -- Partitioning an existing drive -- Partitioning using Windows tools -- Partitioning using Linux tools -- Finally, Finally, Before You Get Started -- Disabling the secure boot feature -- Creating a boot disk -- Creating a bootable DVD -- Creating a bootable USB stick -- Installing Ubuntu -- Your First Ubuntu Boot -- Chapter 3 Living in a Virtual World -- What Are Virtual Servers? …”
Libro electrónico