Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Operating systems (Computers) 32
- Engineering & Applied Sciences 27
- Examinations 26
- Linux 24
- History 22
- Computer Science 21
- Certification 19
- Computer networks 18
- Electronic data processing personnel 17
- Client/server computing 15
- Database management 15
- Microcomputers 13
- Computing Technology Industry Association 11
- Computer technicians 9
- Microsoft Windows server 9
- Relational databases 9
- Storage area networks (Computer networks) 9
- Maintenance and repair 8
- Programming 8
- Social aspects 8
- Virtual computer systems 8
- Computer storage devices 7
- Electrical & Computer Engineering 7
- Information storage and retrieval systems 7
- Management 7
- Oracle (Computer file) 7
- Microsoft Windows (Computer file) 6
- Security measures 6
- Computer security 5
- Microsoft software 5
-
181Publicado 2016Tabla de Contenidos: “…4.5.2 Single- und Dual-Port -- 4.5.3 SAS-Stecker und -Kabel -- 4.6 Fibre Channel -- 4.6.1 Architekturen -- 4.6.2 Fibre Channel over Ethernet -- 4.7 iSCSI -- 4.8 DAS und NAS -- 4.9 Storage Area Network -- 4.10 Fragen zu diesem Kapitel -- Kapitel 5: Stabilität durch Fehlertoleranz -- 5.1 RAID -- 5.1.1 RAID-Level -- 5.1.2 Duplexing -- 5.1.3 Übersicht RAID -- 5.2 Energieversorgung -- 5.2.1 Grundlegende Betrachtungen -- 5.2.2 USV -- 5.2.3 Notstromgruppen -- 5.2.4 Einsatzszenarien -- 5.2.5 Rotationsenergiestromversorgungen -- 5.3 Clustering -- 5.3.1 Network Loadbalancing -- 5.3.2 Multiprocessing -- 5.3.3 Cluster -- 5.4 Hardwareredundanz -- 5.4.1 Steckkarten -- 5.4.2 Netzteile (Power Supply) -- 5.4.3 Kühlsystem/Lüfter -- 5.4.4 Arbeitsspeicher -- 5.5 Fragen zu diesem Kapitel -- Kapitel 6: Server installieren und aktualisieren -- 6.1 Sicherheitsmaßnahmen -- 6.1.1 Statische Entladung (ESD) -- 6.1.2 MSDS -- 6.1.3 Heben und Tragen -- 6.2 Installation eines Servers -- 6.2.1 Der Installationsplan -- 6.2.2 Dokumentation -- 6.3 Server umbauen -- 6.4 Was bei einem Umbau zu beachten ist -- 6.4.1 Ersatz des Motherboards -- 6.4.2 Prozessor -- 6.4.3 BIOS -- 6.4.4 Speicheraufrüstung -- 6.4.5 Festplatten -- 6.4.6 SATA-/SAS-Controller -- 6.4.7 Erweiterungskarten -- 6.5 Fragen zu diesem Kapitel -- Kapitel 7: Hardware im Netzwerk -- 7.1 Die wichtigsten Übertragungsmedien -- 7.1.1 Twisted-Pair-Kabel -- 7.1.2 Unshielded Twisted Pair -- 7.1.3 Shielded Twisted Pair -- 7.1.4 Koaxialkabel -- 7.1.5 Lichtwellenleiter -- 7.2 Netzwerkkarten -- 7.2.1 Wake on LAN -- 7.2.2 Adapter Teaming -- 7.3 Lasst die Leitungen sich verbinden -- 7.3.1 Repeater -- 7.3.2 Bridge -- 7.4 So funktionieren Switches -- 7.4.1 Methoden der Durchleitung -- 7.4.2 Spanning Tree Protocol -- 7.4.3 Managed Switches -- 7.5 Konvertieren und Verbinden -- 7.5.1 Medienkonverter -- 7.5.2 Modems -- 7.5.3 Multiplexer…”
Libro electrónico -
182por Gómez López, JulioTabla de Contenidos: “…ASPECTOS BÁSICOS; 1.1 TAREAS DEL ADMINISTRADOR; 1.2 HARDWARE DEL SERVIDOR; 1.2.1 CPD; 1.2.2 SISTEMA DE RACK; 1.2.3 SERVIDORES; 1.2.4 SISTEMAS RAID; 1.3 SOFTWARE DEL SERVIDOR; RESUMEN DEL CAPÍTULO; EJERCICIOS PROPUESTOS; TEST DE CONOCIMIENTOS; CAPÍTULO 2. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
183Publicado 2022Tabla de Contenidos: “…-- How to Prevent Social Engineering Attacks on Your Business -- UI and UX Design -- Internal Threats -- Hacktivism -- Chapter 8 Step 8: Build Redundancy and Resilience -- Understanding Data and Networks -- Building Capacity and Scalability with the Power of the Cloud -- Back It Up, Back It Up, Back It Up -- RAID -- What Ransomware Taught Business About Backups -- Business Continuity -- Disaster Recovery -- Chapter 9 Afterword -- Step 1 -- The Most Notorious Cyberattacker Was Actually a Con Man -- A Strong Security Culture Requires All Hands on Deck -- Hackers Are the Good Guys, Actually -- What Is Security Culture? …”
Libro electrónico -
184por Amberg, EricTabla de Contenidos: “…2.2.4 Netzwerkkonfiguration2.2.5 Host- und Domainname; 2.2.6 Benutzer und Passwörter einrichten; 2.2.7 Partitionierung; 2.2.8 Weitere Installationsschritte; 2.3 Experteninstallation; 2.3.1 Bootoptionen; 2.3.2 Experteninstallation; 2.3.3 Menüpunkte der manuellen Partitionierung; 2.3.4 Logical Volume Manager; 2.3.5 RAID; 2.4 Zusammenfassung und Weiterführendes; Kapitel 3: Debian-Paketmanagement; 3.1 dpkg - das Basistool; 3.1.1 dpkg-Optionen; 3.1.2 Workshop: Pakete mit dpkg verwalten; 3.2 Die APT-Tools; 3.2.1 Das »motivierende Einstiegsbeispiel«; 3.2.2 Einführung in die APT-Tools…”
Publicado 2014
Libro electrónico -
185por Bartosh, MichaelTabla de Contenidos: “…Redundant Array of Inexpensive Disks (RAID ); 1.1.2.8. Apple storage productsstorage products; 1.1.2.9. …”
Publicado 2005
Libro electrónico -
186por Kovalick, AlTabla de Contenidos: “…3A.1.4 Distributed File Systems (DFS)3A.1.5 Virtualization or CFS: How to Choose; 3A.2 CLIENT TRANSACTION TYPES AND STORAGE PERFORMANCE; 3A.2.1 Optimizing Storage Array Data Throughput; 3A.2.2 Fragmentation, OS Caching, and Command Reordering; 3A.3 STORAGE SUBSYSTEMS; 3A.3.1 HDD Capacity and Access Data Rate; 3A.3.2 Aggregate Array I/O Rates; 3A.3.3 General Storage Requirements; 3A.4 JBOD AND RAID ARRAYS; 3A.5 NAS AND SAN STORAGE; 3A.6 OBJECT STORAGE; 3A.7 HIERARCHICAL AND ARCHIVAL STORAGE; 3A.7.1 Data Flows across Tiered Storage; 3A.7.2 Managing Storage; 3A.7.3 Archive Storage Choices…”
Publicado 2006
Libro electrónico -
187por Lucas, Michael, 1967-Tabla de Contenidos: “…Vnodes -- Common Foreign Filesystems -- MS-DOS -- NTFS -- ext2fs -- CD -- Foreign Filesystem Ownership -- Removable Media -- Mounting Filesystem Images -- Attaching Vnode Devices to Disk Images -- Detaching Vnode Devices from Images -- Basic NFS Setup -- The OpenBSD NFS Server -- Exporting Filesystems -- Read-Only Mounts -- NFS and Users -- Permitted Clients -- Multiple Exports for One Partition -- NFS Clients -- Software RAID -- RAID Types -- Preparing Disks for softraid -- Creating softraid Devices -- softraid Status -- Identifying Failed softraid Volumes -- Rebuilding Failed softraid Volumes -- Deleting softraid Devices -- Reusing softraid Disks -- Booting from a softraid Device -- Encrypted Disk Partitions -- Creating Encrypted Partitions -- Using Encrypted Partitions -- Automatic Decryption -- 10. …”
Publicado 2013
Libro electrónico -
188Publicado 2013Tabla de Contenidos: “…Lab Exercise 3.03: Configuring and Clearing CMOS Setup Program Passwords -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 3.04: Removing a Motherboard -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 3.05: Installing a Motherboard -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 3.06: Testing Power Supply Output -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Analysis Test -- Key Term Quiz -- Chapter 4: Implementing Hard Drives -- Lab Exercise 4.01: Creating and Formatting Partitions with the Windows XP and Vista/7 Installation Media -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 4.02: Creating and Formatting Partitions with Gnome Partition Editor (GParted) -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 4.03: Using Windows Tools to Create and Format Partitions -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 4.04: Installing Multiple Hard Drives in Preparation for RAID -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 4.05: Converting Basic Disks to Dynamic Disks with Disk Management -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 4.06: Implementing Software RAID 0 with Disk Management -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 4.07: Troubleshooting Hard Drive Installations -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business -- Lab Exercise 4.08: Maintaining and Troubleshooting Hard Drives -- Learning Objectives -- Lab Materials and Setup -- Getting Down to Business…”
Libro electrónico -
189Publicado 2009Tabla de Contenidos: “…'baked in' -- Editing Software -- Apple Final Cut Pro -- Adobe Premiere Pro -- Avid -- Storage Options -- JBOD -- RAIDs -- Monitor Options -- First Person POV: Michael Cioni -- CHAPTER 9: Using Helper Applications -- RED Applications -- RED Alert! …”
Libro electrónico -
190por Preston, W. CurtisTabla de Contenidos: “…Access to Storage Resources; 3.3.1.2. Striping/RAID; 3.3.2. Implementations of Virtualization; 3.3.2.2. …”
Publicado 2002
Libro electrónico -
191Publicado 2014Tabla de Contenidos: “…CentOS Filesystems - A Deeper Look -- A magician's secret -- Hard links -- Symbolic links -- Special permissions -- The SUID bit -- The SGID bit -- The sticky bit -- Naming your pipes -- Understanding the command stat -- The last access time -- The last modified time -- The last changed time -- Enterprise filesystem shootout -- What BTRFS has to offer -- Installing BTRFS -- Creating a BTRFS filesystem -- Expanding a BTRFS filesystem -- Volume management with BTRFS -- Balancing the filesystem -- Adding an entry to /etc/fstab -- Creating an RAID1 mirror -- Using BTRFS snapshots -- Summary -- 4. …”
Libro electrónico -
192Publicado 2014Tabla de Contenidos: “….) -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1 ASPECTOS BÁSICOS -- 1.1 TAREAS DEL ADMINISTRADOR -- 1.2 HARDWARE DEL SERVIDOR -- 1.2.1 CPD -- 1.2.2 Sistema de rack -- 1.2.3 Servidores -- 1.2.4 Sistemas RAID -- 1.3 SOFTWARE DEL SERVIDOR -- 2 REDES DE ORDENADORES -- 2.1 CABLEADO -- 2.2 DISPOSITIVOS DE INTERCONEXIÓN -- 2.3 DIRECCIONAMIENTO IP -- 2.3.1 Clases de direcciones -- 2.3.2 Direcciones específicas -- 2.3.3 Direcciones privadas -- 2.3.4 Subredes -- 2.4 CONFIGURACIÓN DE ROUTERS -- 2.4.1 Tablas de enrutado -- 2.4.2 Ejemplo de creación de una tabla de enrutado -- 3 SERVICIOS -- 3.1 INTRODUCCIÓN -- 3.2 SERVICIO DHCP -- 3.3 SERVICIO DNS -- 3.3.1 Espacio de nombres de dominio -- 3.3.2 Registrar un dominio -- 3.3.3 Tipos de registro -- 3.4 SERVICIO FTP -- 3.5 SERVICIO WEB -- 3.5 SERVICIO WEB -- 3.6 SERVICIO DE CORREO ELECTRÓNICO -- 3.7 SERVICIO DE ACCESO REMOTO -- 4 SEGURIDAD -- 4.1 LAS DIEZ LEYES INMUTABLES DE LA SEGURIDAD -- 4.2 CONCEPTOS BÁSICOS SOBRE SEGURIDAD -- 4.2.1 Amenazas de seguridad -- 4.2.2 Ataques pasivos -- 4.2.3 Ataques activos -- 4.2.4 Tipos de ataques -- 4.3 OBTENCIÓN DE INFORMACIÓN DE UN ATACANTE -- 4.3.1 Identificar los servicios TCP y UDP -- 4.3.2 Identificar el sistema operativo -- 4.3.3 Identificar las versiones de los servicios -- 4.3.4 Escaneo de vulnerabilidades -- 4.4 MEDIDAS DE SEGURIDAD EN LOS SISTEMAS -- 4.4.1 Prevención -- 4.4.2 Detección: sistemas de detección de intrusos -- 4.4.3 Colocación de un NIDS -- 4.4.4 Tipos de sistemas de detección de intrusos -- 4.4.5 Recuperación: copias de seguridad -- 4.4.6 Técnicas de análisis forense -- WINDOWS 2008 R2 -- 5 INSTALACIÓN Y CONFIGURACIÓN -- 5.1 PREPARACIÓN DEL SISTEMA -- 5.1.1 Primeros pasos -- 5.1.2 Instalación -- 5.1.3 Finalización de la instalación y configuración -- 5.2 AGREGAR O QUITAR FUNCIONES (...)…”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universitat Ramon Llull)Enlace del recurso
Libro electrónico -
193Publicado 2003Tabla de Contenidos: “…3.2.1 Can your system scale -- 3.2.2 Moving from a 4-way to an n-way -- 3.2.3 Windows considerations -- 3.2.4 Taking advantage of greater parallelism -- 3.2.5 Observing the performance change -- 3.3 Adding additional memory -- 3.3.1 Physically adding more memory -- 3.3.2 Configuring Windows -- 3.3.3 xSeries information -- 3.3.4 Adjusting your DB2 configuration -- 3.3.5 How you see how much is allocated -- 3.3.6 Case studies -- 3.4 Adding additional storage -- 3.4.1 Storage and Windows Server 2003 -- 3.4.2 DB2 storage considerations -- 3.4.3 DB2 tablespace design -- 3.4.4 Database managed space -- 3.4.5 DB2 DMS device considerations -- 3.4.6 Using raw I/O in DB2 -- 3.4.7 Tablespace disk I/O -- 3.4.8 Optimizing tablespace performance on RAID devices -- 3.4.9 DB2 Storage Management view -- 3.4.10 DB2 Health Monitor for storage management -- Chapter 4. …”
Libro electrónico -
194Publicado 2016Tabla de Contenidos: “…Prerequisites for .NET 5 -- Installing DNVM, DNU and DNX -- Installing DNX -- Running the MVC website -- MVC and nginx -- Other .NET applications -- Installing PHP -- Installing a database -- Installing MySQL -- Installing phpMyAdmin -- Installing SQLite -- Summary -- Chapter 5: Setting Up the Raspberry Pi as a File Server -- Connecting the external storage -- Preparing the storage medium -- Listing the available drives -- Formatting a drive -- Creating a EXT4 partition -- Mounting the drives -- Remounting a disk after reboot -- Accessing files -- The FTP service -- Connecting with FileZilla -- Connecting with WinSCP -- The Samba service -- Installing and configuring Samba -- Network shares -- AFP for Macintosh -- Installing and configuring Netatalk -- Shares and Time Machine -- BitTorrent Sync -- Installing BTSync 2 -- The hardware RAID -- Configuration -- Massive storage -- Redundant storage -- Summary -- Chapter 6: Setting Up Game Servers -- Updating to Jessie -- Selective settings -- Game servers -- OpenTTD -- Installing OpenTTD -- Configuring OpenTTD -- Playing OpenTTD -- Freeciv -- Installing Freeciv -- Configuring Freeciv -- Playing Freeciv -- OpenArena -- Installing OpenArena -- Configuring OpenArena -- Playing OpenArena -- Minecraft -- Installing the Java Hard-Float -- Installing the Minecraft server -- Configuring Minecraft -- Playing Minecraft -- Summary -- Chapter 7: Streaming Live HD Video -- Installing UV4L -- Configuring the UV4L-RaspiCAM -- Installing WebRTC -- WebRTC streaming -- Real time HTTP streaming -- Web conferencing -- Streaming the X desktop -- Text overlay -- Object detection and tracking -- Removing the overlay watermark -- The HUD sample -- Using the overlay binary -- Inline variables -- Compiling the overlay code yourself -- Summary -- Chapter 8: Setting Up the Pi as a Media Center Server -- Slideshows -- Using fbi…”
Libro electrónico -
195Publicado 2006Tabla de Contenidos: “…-- Opening Old Project Files -- Imovie'S Interface -- Review and Fast-Forward -- Changing View Preferences -- Monitoring Your Movies -- Chapter 7: Importing Footage -- Making a Magic Imovie -- Pretty Prestidigitation -- Importing Clips -- The Biggest Hard Drive Isn'T Large Enough -- Raid Storage -- How Much Disk Space for Hdv? -- Backing Up Video -- Mixing Video Formats -- Importing Footage From An Analog Camcorder -- Importing Old Vhs Tapes Using a Dv Camcorder -- How Imovie Manages Clips -- Managing Clips -- Working With the Trash -- Imovie Hd Does Not Rewrite Media Files -- Extracting Footage From a Dvd -- Copy-Protected Dvds -- Chapter 8: Editing Video -- Timecode -- Adding Clips to the Movie -- Working Through the Video Editing Backlog…”
Libro electrónico -
196Publicado 2004Tabla de Contenidos: “…Using an IBM ESS with an Oracle database -- 9.1 Overview of ESS -- 9.2 RAID arrays -- 9.3 Disk and I/O -- 9.3.1 Random reads -- 9.3.2 Sequential reads -- 9.3.3 Sequential writes -- 9.3.4 Random writes -- 9.4 Conclusion -- Appendix A. …”
Libro electrónico -
197Publicado 2023Tabla de Contenidos: “…3.7 Given a scenario, install and replace the printer consumables -- Chapter 4: Virtualization and Cloud Computing -- Introduction -- Practice Exam Questions -- 4.1 Summarize cloud computing concepts -- 4.2 Summarize aspects of client-side virtualization -- Chapter 5: Hardware and Network Troubleshooting -- Introduction -- Practice Exam Questions -- 5.1 Given a scenario, apply the best-practice methodology to resolve the problem -- 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPU, and power -- 5.3 Given a scenario, troubleshoot and diagnose problems with storage drives and RAID arrays -- 5.4 Given a scenario, troubleshoot video, projector, and display issues -- 5.5 Given a scenario, troubleshoot common issues with mobile devices -- 5.6 Given a scenario, troubleshoot and resolve printer issues -- 5.7 Given a scenario, troubleshoot problems with wired and wireless networks -- Chapter 6: Mock Exam: Core 1 (220-1101) -- Chapter 7: Operating Systems -- Introduction -- Practice Exam Questions -- 7.1 Identify basic features of Microsoft Windows editions -- 7.2 Given a scenario, use the appropriate Microsoft command-line tool -- 7.3 Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS) -- 7.4 Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility -- 7.5 Given a scenario, use the appropriate Windows settings -- 7.6 Given a scenario, configure Microsoft Windows networking features on a client/desktop -- 7.7 Given a scenario, apply application installation and configuration concepts -- 7.8 Explain common OS types and their purposes -- 7.9 Given a scenario, perform OS installations and upgrades in a diverse OS environment -- 7.10 Identify common features and tools of the macOS/desktop OS -- 7.11 Identify common features and tools of the Linux client/desktop OS…”
Libro electrónico -
198Tabla de Contenidos: “…-- Telephony History -- PBX Architecture and Call Control Basics -- IP-Based Call Control -- The Network Is the Platform -- Cisco Unified Communications Manager -- Endpoint Network Access -- Integrated Services Routers -- Applications -- Application Extension Platform -- CUAE -- Conferencing -- UC Mobility -- Voice Messaging -- Unified Presence -- User Experience -- Clients -- CIPC -- CUCIMOC -- CUMC -- CUPC -- Cisco Unified Video Advantage -- User Workspace -- Summary -- Chapter 2 Cisco Unified Presence Overview -- Cisco Unified Presence Components -- CUCM Presence Capabilities -- CUCM Presence: BLF/Speed Dials -- CUCM Presence: Phone Directories -- Cisco Unified Presence User -- SIP PUBLISH with CUP Server -- Deployment Models -- Cisco Unified Presence Cluster -- Cisco Unified Presence Redundancy -- Cisco Unified Presence Platform Scalability -- CUCM Deployments -- CUP Server Single Cluster Deployment -- CUP Server Multicluster Deployment -- Federated Deployment -- CUP Server Scalability and High Availability -- CUP Server Multinode Scalability -- Multinode Deployment Models -- Balanced Redundant High-Availability Deployment -- Balanced Nonredundant High-Availability Deployment -- Active/Standby Redundant High-Availability Deployment -- Nonhigh-Availability Deployment -- Summary -- Chapter 3 Installing Cisco Unified Presence Server 7 -- Preinstallation Tasks -- Supported Server Platforms -- RAID and BIOS Settings -- Supported Browsers -- Preparing for the Installation -- CUCM Installation Tasks -- Adding an Application Server -- Adding an AXL Group and User -- Installing the CUPS Software -- Post-Install Configuration -- Licensing -- Service Activation -- CUCM/CUPS Synchronization -- Adding a Presence Gateway -- Creating a SIP Trunk on the CUCM…”
Libro electrónico -
199Publicado 2004Tabla de Contenidos: “…Introduction -- 1.1 IBM TotalStorage Resiliency Family -- 1.2 ESS Family of Enterprise Storage Servers -- 1.3 IBM TotalStorage Enterprise Storage Server Model 800 -- 1.3.1 ESS Model 800 highlights -- 1.4 IBM TotalStorage Enterprise Storage Server Model 750 -- 1.4.1 Features of the ESS Model 750 -- 1.4.2 Compatibility -- 1.5 ESS Model 750 and 800 hardware features -- 1.6 Disaster Recovery -- 1.7 Data protection and availability -- 1.7.1 Fault-tolerant design -- 1.7.2 RAID-5 or RAID-10 data protection -- 1.7.3 FlashCopy Version 1 -- 1.7.4 FlashCopy Version 2 -- 1.7.5 Peer-to-Peer Remote Copy (PPRC) Version 1 -- 1.7.6 PPRC Version 2 -- 1.7.7 PPRC Extended Distance (PPRC-XD) -- 1.7.8 Extended Remote Copy (XRC) -- 1.7.9 Concurrent Copy -- 1.8 Combinations of copy services -- 1.9 Terminology -- Chapter 2. …”
Libro electrónico -
200Publicado 2018Tabla de Contenidos: “…Group management -- Login management -- Summary -- Questions -- Further reading -- Chapter 4: Managing Azure -- Technical requirements -- Storage services -- Storage accounts -- Managed disks -- Azure Files -- Blob storage -- Networking -- Virtual network -- Subnets -- Network Security Group -- Public IP address and network interface -- Components for your virtual machine -- Azure profile -- Resource group -- Storage account -- Virtual network -- NSG -- Public IP address and network interface -- Summary -- Questions -- Further reading -- Chapter 5: Advanced Linux Administration -- Technical requirements -- Software management -- The RPM software manager -- The DPKG software manager -- Software management with YUM -- Software management with Zypp -- Software management with apt -- Networking -- Identifying the network interfaces -- Identifying the IP address -- Showing the route table -- Network configuration -- Changes in the network configuration -- Hostname -- DNS -- Storage -- Storage provided by block devices -- Adding a data disk -- Partitioning -- Filesystems in Linux -- Ext4 filesystem -- XFS filesystem -- ZFS filesystem -- BTRFS filesystem -- Swap filesystem -- Linux software RAID -- Systemd -- Working with units -- Services -- Targets -- Scheduled tasks -- Mounting local filesystems -- Mounting remote filesystems -- Summary -- Questions -- Further reading -- Chapter 6: Managing Linux Security and Identities -- Linux security tips -- Technical requirements -- Linux firewall -- Firewalld zones -- Firewalld services -- Firewalld network sources -- Linux Security Modules -- SELinux -- SELinux configuration -- SELinux context on ports -- SELinux context on files -- SELinux Boolean -- AppArmor -- AppArmor status -- Generating AppArmor profiles -- Systemd security -- Restricting access to the filesystem -- Restricting network access…”
Libro electrónico