Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Operating systems (Computers) 32
- Engineering & Applied Sciences 27
- Examinations 26
- Linux 24
- History 22
- Computer Science 21
- Certification 19
- Computer networks 18
- Electronic data processing personnel 17
- Client/server computing 15
- Database management 15
- Historia 14
- Microcomputers 13
- Computing Technology Industry Association 11
- Computer technicians 9
- Microsoft Windows server 9
- Relational databases 9
- Storage area networks (Computer networks) 9
- Maintenance and repair 8
- Programming 8
- Social aspects 8
- Virtual computer systems 8
- Computer storage devices 7
- Electrical & Computer Engineering 7
- Information storage and retrieval systems 7
- Management 7
- Oracle (Computer file) 7
- Microsoft Windows (Computer file) 6
- Security measures 6
- Computer security 5
-
101por Haldeman, Bonnie, 1944-Tabla de Contenidos: “…Bonnie Clark -- The Haldeman family -- Vernon Howell becomes a Branch Davidian -- Bonnie Haldeman becomes a Branch Davidian -- David Koresh's shootout with George Roden at Mount Carmel -- Resettling at Mount Carmel -- Bonnie and Roy leave Mount Carmel -- Visits back and forth with folks at Mount Carmel -- The ATF raid, February 28, 1993 -- The siege -- The fire, April 19, 1993 -- 1994 criminal trial -- 2000 civil trial -- Life after the fire -- Going back to Mount Carmel -- Remembering the people and lifestyle at Mount Carmel -- Remembering the children -- Remembering David -- Appendix: poems by David Koresh…”
Publicado 2007
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
102por Motzki, HaraldTabla de Contenidos: “…A Debate (Harald Motzki); Chapter Six. The Raid of the Hudhayl: Ibn Shihab al-Zuhri 's Version of the Event (Nicolet Boekhoff-van der Voort)…”
Publicado 2010
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
103por Smith, GregoryTabla de Contenidos: “…Performance tuning as a practice Summary; Chapter 2: Database Hardware; Balancing hardware spending; CPUs; Memory; Disks; RAID; Drive error handling; Hard drive reliability studies; Drive firmware and RAID; SSDs; Disk controllers; Hardware and Software RAID; Recommended disk controllers; Attached storage - SAN and NAS; Reliable controller and disk setup; Write-back caches; Sources of write-back caching; Disk controller monitoring; Disabling drive write caches; Performance impact of write-through caching; Summary; Chapter 3: Database Hardware Benchmarking; CPU and memory benchmarking…”
Publicado 2010
Libro electrónico -
104por Jang, Michael H.Tabla de Contenidos: “…I'm Afraid of Losing DataThe rsync Command; The Secure Shell Command; Backing Up Your Home Directory; Configuring SSH Without Passwords; Creating a cron Job for Your Backups; My Boss Insists on Real-Time Backups; RAID Basics; Tools for Software RAID; Typical RAID 1 Configuration; Networking RAID 1; I Lost Data When I Removed My Floppy/Memory Stick; Modifying /etc/fstab for Removable Media; Automatic Mounts; Customizing HAL; Disabling HAL on Red Hat/Fedora; Other Hotplug Update Methods; Configuring the Automounter for Removable Media; That Command Doesn't Write to My DVD…”
Publicado 2006
Libro electrónico -
105Publicado 2020“…As the global banking boom of the early twenty-first century expanded towards implosion, Icelandic media began calling the country's celebrity financiers útrásarvíkingar: "raiding vikings." This new coinage encapsulated the macho, medievalist nationalism which underwrote Iceland's exponential financialisation. …”
Libro electrónico -
106Publicado 2010Tabla de Contenidos: “…Conté els projectes: High-bay racking warehouse (Lüdenscheid, Germany) / Schneider + Schumacher. Concert hall (Raiding, Austria) / Atelier Kempe Thill. America's Cup Building (Valencia, Spain) / David Chipperfield. …”
Libro -
107Publicado 2024“…"Imperial conquest and colonization depended on pervasive raiding, slaving, and plunder. European empires amassed global power by asserting a right to use unilateral force at their discretion. …”
Libro -
108Publicado 2006Tabla de Contenidos: “…Consideration of Preventive Attack Against China; The Cuban Missile Crisis, 1962; The Invasion of Grenada, 1983; Appendix B - Israeli Preemptive and Preventive Attack Cases; Introduction; The Sinai Campaign, 1956; The Six-Day War, 1967; The October War, 1973; The Osirak Raid, 1981; Appendix C - Counterterrorist Anticipatory Attack Cases; Introduction; The Israeli Assassination Attempt Against Khaled Mishal,1997; The Tirana Raids, 1998; Hellfire Strike in Yemen, 2002; The Jordanian Crackdown in Ma'an, 2002…”
Libro electrónico -
109
-
110por Gelenbe, Erol, 1945-Tabla de Contenidos: “…AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results Application of a Human-Centric Approach in Security by Design for IoT Architecture Development An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction Correlation-based Anomaly Detection for the CAN Bus Botnet Attack Detection with Incremental Online Learning Optimizing Energy Usage for an Electric Drone T-RAID: TEE-based Remote Attestation for IoT Devices Secure Authentication for everyone! …”
Publicado 2022
Libro electrónico -
111Publicado 2002Tabla de Contenidos: “…Machine generated contents note: Chapter 1 Networking and Storage Concepts 3 -- Chapter 2 Introduction to Storage Area Networks 33 -- Chapter 3 Fibre Channel Basics 49 -- Chapter 4 Fibre Channel Products 81 -- Chapter 5 Fibre Channel Cabling 107 -- Chapter 6 SAN Topologies 127 -- Chapter 7 Designing and Building a SAN 153 -- Chapter 8 Implementing SAN Security 179 -- Chapter 9 Problem Isolation and Management of SANs 197 -- Chapter 10 iSCSI Technology 215 -- Chapter 11 Future of SANs 239 -- Appendix A RAID Technology and Fibre Channel Vendors 261 -- Glossary 273 -- Index 289.…”
Libro electrónico -
112por Fry, Douglas P., 1953-Tabla de Contenidos: “…-- Insights from the Outback : Geneva Conventions in the Australian bush -- Void if detached ... from reality : Australian "warriors," Yanomamö unokais, and lethal raiding psychology -- Returning to the evidence : life in the band -- Darwin got it right : sex differences in aggression -- A new evolutionary perspective : the Nomadic forager model -- Setting the record straight -- A macroscopic anthropological view -- Enhancing peace…”
Publicado 2007
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
113por Hirt, AllanTabla de Contenidos: “…Using Network-Attached Storage as a Data Store with SQL ServerStorage Area Networks; What Disk Technology to Use; Server Clusters, Failover Clustering, and Disks; Pre-Windows Disk Configuration; Step 2-Individual Drive Throughput; Step 3-Calculating Number of Spindles; Understanding Disk Drives; Understanding Your Hardware; Understanding How SQL Server Interacts with Disks; Understanding Disk Cache; A RAID Primer; Mirroring; Striped Mirrors; Mirrored Stripes; Striping with Parity; Hardware RAID versus Software RAID; Remote Mirroring; Storage Composition…”
Publicado 2009
Libro electrónico -
114por Weinstein, Jodi L.“…Far from submitting peaceably to the state�s quest for hegemony, the locals clung steadfastly to livelihood choices�chiefly illegal activities such as robbery, raiding, and banditry�that had played an integral role in their cultural and economic survival. …”
Publicado 2013
Libro electrónico -
115Publicado 1998Tabla de Contenidos: “…Slatta -- Comparative raiding economies : north and south / Kristine L. …”
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto)Reseña (HNet)
Libro -
116Publicado 2013Tabla de Contenidos: “…: Subpersons and Textual Property in Native Son and Black Boy / The Colors of Modernism : Publishing African Americans, Jews, and Irish in the 1920s / More than McKay and Guillén : The Caribbean in Hughes and Bontemps's The Poetry of the Negro (1949) / Editorial Federalism : The Hoover Raids, the New Negro Renaissance, and the Origins of FBI Literary Surveillance / Loosening the Straightjacket : Rethinking Racial Representation in African American Anthologies / Let the World Be a Black Poem? …”
Libro electrónico -
117Tabla de Contenidos: “…Chapter 1: Getting Started -- Chapter 2: Chapter 2: Working in the Shell -- Chapter 3: Managing Processes and Users -- Chapter 4: Creating and Editing Files -- Chapter 5: Managing Files and Directories -- Chapter 6: Archiving and Compressing Files -- Chapter 7: Shell Scripting -- Chapter 8: Analyzing Server Performance -- Chapter 9: Viewing and Configuring System Resources -- Chapter 10: Automating Jobs with cron -- Chapter 11: Managing Server Software -- Chapter 12: VirtualBox for Oracle -- Chapter 13: Optimizing Linux for Oracle Databases -- Chapter 14: Working Securely Across a Network -- Chapter 15: Managing X Window -- Chapter 16: Managing Remote Servers with VNC -- Chapter 17: RAID Concepts -- Chapter 18: Server Log Files. -- Index…”
Libro electrónico -
118por Barrett, Daniel J.Tabla de Contenidos: “…Anmelden, abmelden und herunterfahren -- Benutzer und deren Umgebung -- Verwaltung der Benutzerzugänge -- Gruppen verwalten -- Software installieren -- Software aus Quellcode installieren -- Quellcode herunterladen -- Den Code bauen und installieren -- Kapitel 4: Wartung des Dateisystems -- Festplatten und Dateisysteme verwenden -- Dateisysteme erstellen und anpassen -- RAID-Arrays für Redundanz -- Ein RAID-Array erstellen -- Ein Gerät in einem RAID-Array ersetzen -- Ein RAID-Array zerstören -- Logische Volumes für flexible Speicherlösungen -- Ein erstes logisches Volume erstellen -- LVM-Details anzeigen -- Ein logisches Volume hinzufügen -- Eine Volume-Gruppe um Festplatten erweitern -- Ein logisches Volume vergrößern -- Ein logisches Volume verkleinern -- Ein logisches Volume löschen -- Eine Volume-Gruppe verkleinern -- Eine Volume-Gruppe löschen -- Ein physisches Volume löschen -- ZFS: Ein modernes und universelles Dateisystem -- Einen ZFS-Pool erstellen -- Ein ZFS-Dataset erstellen -- Ein verschlüsseltes ZFS-Dataset erstellen -- Größenbegrenzungen für ZFS-Datasets setzen -- Komprimierung für ZFS-Datasets aktivieren -- Einen Snapshot für ein ZFS-Dataset erstellen -- Ein ZFS-Dataset oder einen Snapshot löschen -- Einen ZFS-Pool löschen -- Backups und externe Speicherung -- Kapitel 5: Netzwerkbefehle -- Informationen über Ihren Rechner -- Hostpositionen -- Netzwerkverbindungen -- Public-Key-Authentifizierung mit SSH -- E-Mails im Alltag -- Mehr als Mailreader -- E-Mail-Server -- Postfix: ein vollwertiger Mailserver -- Nullmailer: Einfach ausgehende E-Mails -- Im Internet surfen -- Kapitel 6: Dinge erledigen -- Bildschirmausgabe -- Kopieren und Einfügen -- Mathematik und Berechnungen -- Daten und Zeiten -- Versionsverwaltung -- Staging und Zurücknehmen von Änderungen -- Container -- Bilder anzeigen und verarbeiten -- Audio und Video…”
Publicado 2024
Libro electrónico -
119por Eldor, EladTabla de Contenidos: “…Produce Latency -- Number of JVM Threads -- Number of Context Switches -- CPU User Time, System Time, and Normalized Load Average -- Discussion -- Summary -- Chapter 8: Disk Configuration: RAID 10 vs. JBOD -- RAID 10 and JBOD Terminology -- RAID 0 (aka Stripe Set) -- RAID 1 (aka Mirror Set) -- RAID 1+0 (aka RAID 10) -- Comparing RAID 10 and JBOD -- Disk Failure -- Data Skew -- Storage Use -- Pros and Cons of RAID 10 and JBOD -- Performance of Write Operations -- Storage Usage -- Disk Failure Tolerance -- Considering the Maintenance Burden of Disk Failure in On-Premises Clusters -- Disk Health Monitoring -- Frequency of Replacing Disks -- Kafka Availability During Disk Replacement -- Balancing the Data Between the Disks in the Broker -- JBOD -- RAID 10 -- Managing Disk Health in Kafka Clusters with JBOD Configuration -- Summary -- Chapter 9: A Deep Dive Into Producer Monitoring -- Producer Metrics -- Network I/O Rate Metric -- When Network I/O Rate Is High -- When Network I/O Rate Is Low -- Importance of the Network I/O Rate Metric -- Record Queue Time Metric -- When Record Queue Time Is High -- When Record Queue Time Is Low -- Mitigating a High Record Queue Time -- Importance of the Record Queue Time Metric -- Output Bytes Metric -- When Output Bytes Is High -- When Output Bytes Is Low -- Mitigating the Output Bytes Value -- Importance of the Output Bytes Metric -- Input Bytes Metric -- The Difference Between Output Bytes and Input Bytes -- Average Batch Size Metric -- When Average Batch Size Is High -- When Average Batch Size Is Low -- Mitigating the Average Batch Size Metric -- Importance of the Average Batch Size Metric -- Buffer Available Bytes Metric -- When Buffer Available Bytes Is High -- When Buffer Available Bytes Is Low -- Mitigating the Buffer Available Bytes Metric -- Importance of the Buffer Available Bytes Metric…”
Publicado 2023
Libro electrónico -
120Publicado 2005Tabla de Contenidos: “…Blandings builds his castle / Cyclists' raid / Tomorrow / Bringing up Baby / Babylon revisited / The swimmer / The killers / The basement room / Memento mori / Red Ryder nails the Hammond Kid / My friend Flicka / Shoeless Joe Jackson comes to Iowa / In a grove / The lady with the pet dog / Where are you going, where have you been? …”
Acceso a las primeras páginas
Libro