Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 157
- Engineering & Applied Sciences 124
- TCP/IP (Computer network protocol) 118
- Examinations 82
- Certification 76
- Electrical & Computer Engineering 70
- Telecommunications 70
- Electronic data processing personnel 68
- Operating systems (Computers) 61
- Computer Science 57
- Security measures 50
- Internet 34
- Computer network protocols 32
- z/OS 30
- Client/server computing 28
- TCP-IP (Protocolos de comunicaciones) 28
- Linux 27
- Computer security 26
- Redes de ordenadores 26
- Management 25
- Microsoft Windows server 25
- TCP/IP (Protocol de xarxes d'ordinadors) 23
- Telecommunications engineers 23
- Microsoft Windows (Computer file) 20
- Routers (Computer networks) 18
- Computing Technology Industry Association 17
- Internetworking (Telecommunication) 17
- TFC 16
- Application software 12
- Xarxes d'ordinadors 12
-
621Publicado 2005Tabla de Contenidos: “…6.5.3 mod_deflate -- 6.5.4 Logging -- 6.5.5 HostNameLookups -- 6.5.6 KeepAliveTimeout -- 6.5.7 TCP/IP buffer sizes -- 6.5.8 Denial of service -- 6.6 Static content location -- 6.7 References -- Chapter 7. …”
Libro electrónico -
622por Blankertz, WilfriedTabla de Contenidos: “…Managing your iSeries development resources using RSE -- 5.1 Remote System Explorer -- 5.2 Connecting to your iSeries host -- 5.2.1 The first connection -- 5.2.2 Profiles -- 5.2.3 Connections -- 5.2.4 TCP/IP ports required for WDSc -- 5.3 Subsystems -- 5.3.1 iSeries Objects subsystem -- 5.3.2 iSeries Commands subsystem -- 5.3.3 iSeries Jobs subsystem -- 5.3.4 IFS (Integrated File System) files subsystem -- 5.4 Managing your iSeries objects -- 5.4.1 Filters in the iSeries Objects subsystem -- 5.4.2 Working with iSeries Objects filters -- 5.4.3 Creating objects in the iSeries Objects subsystem -- 5.4.4 Searching operations -- 5.4.5 Working with save files -- 5.5 Working with your library list -- 5.5.1 Adding a library list entry -- 5.5.2 Removing a library from the library list -- 5.5.3 Changing the current library -- 5.5.4 Moving libraries up or down in the library list -- 5.5.5 Moving libraries within the library list -- 5.5.6 Specifying initial libraries and commands -- 5.6 iSeries table views -- 5.6.1 Populating iSeries table views -- 5.6.2 Working with items in a table view -- 5.7 User actions -- 5.7.1 Creating user actions -- 5.7.2 Invoking user actions -- 5.7.3 Named types -- 5.8 Additional parameters with actions issued from a table view -- 5.9 Drag and drop functionality -- Chapter 6. …”
Publicado 2005
Libro electrónico -
623por Amberg, EricTabla de Contenidos: “…-- 6.7 Maltego - Zusammenhänge visualisieren -- 6.7.1 Einführung in Maltego -- 6.7.2 Maltego starten -- 6.7.3 Mit Maltego arbeiten -- 6.7.4 Der Transform Hub -- 6.8 Gegenmaßnahmen gegen Footprinting -- 6.9 Zusammenfassung und Prüfungstipps -- 6.9.1 Zusammenfassung und Weiterführendes -- 6.9.2 CEH-Prüfungstipps -- 6.9.3 Fragen zur CEH-Prüfungsvorbereitung -- Kapitel 7: Scanning - das Netzwerk unter der Lupe -- 7.1 Scanning - Überblick und Methoden -- 7.1.1 Die Scanning-Phase -- 7.1.2 Ziel des Scanning-Prozesses -- 7.1.3 Scanning-Methoden -- 7.2 TCP/IP-Essentials -- 7.2.1 Das OSI-Netzwerk-Referenzmodell -- 7.2.2 ARP, Switch & -- Co. - Layer-2-Technologien -- 7.2.3 Das Internet Protocol (IPv4) -- 7.2.4 Das Internet Control Message Protocol (ICMP) -- 7.2.5 Das User Datagram Protocol (UDP) -- 7.2.6 Das Transmission Control Protocol (TCP) -- 7.3 Nmap - DER Portscanner -- 7.3.1 Host Discovery -- 7.3.2 Normale Portscans -- 7.3.3 Zu scannende Ports festlegen -- 7.3.4 Besondere Portscans -- 7.3.5 Dienst- und Versionserkennung -- 7.3.6 Betriebssystem-Erkennung -- 7.3.7 Firewall/IDS-Vermeidung (Evasion) -- 7.3.8 Ausgabe-Optionen -- 7.3.9 Die Nmap Scripting Engine (NSE) -- 7.3.10 Weitere wichtige Optionen -- 7.3.11 Zenmap -- 7.4 Scannen mit Metasploit -- 7.4.1 Was ist Metasploit? …”
Publicado 2024
Libro electrónico -
624Tabla de Contenidos: “…Botnets -- A Closer Look at Spyware -- Trojans and Backdoors -- Rootkits -- Viruses and Worms -- Botnets -- Brief History of Viruses, Worms, and Trojans -- The Current Situation -- Anti-Virus Software -- Need for Anti-Virus Software -- Top 5 Commercially Available Anti-Virus Software -- Symantec Norton Anti-Virus Software -- McAfee Anti- Virus -- Kaspersky Anti- Virus -- Bitdefender Anti- Virus -- AVG Anti-Virus Software -- A Few Words of Caution -- Chapter Summary -- Chapter 8: Cryptography -- Introduction -- Cryptographic Algorithms -- Symmetric Key Cryptography -- Key Distribution -- Asymmetric Key Cryptography -- Public Key Cryptography -- RSA Algorithm -- Advantages of Public Key Cryptography -- Applications of PKC -- Public Key Infrastructure (PKI) -- Certificate Authority (CA) -- Digital Certificate -- Hash Function Cryptography -- Popular Hashes -- Digital Signatures -- Summary of Cryptography Standard Algorithms -- Disk / Drive Encryption -- Attacks on Cryptography -- Chapter Summary -- Part IV: Network Security -- Chapter 9: Understanding Networks and Network Security -- Introduction -- Networking Fundamentals -- Computer Communication -- Network and its Components -- Network Protocols -- OSI (Open Systems Interconnection) Reference Model -- TCP/IP Model -- Network Vulnerabilities and Threats -- Vulnerabilities -- Security Policy Weaknesses -- Technology Weaknesses -- Configuration Weaknesses -- Threats -- Attacks -- Reconnaissance -- Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) -- Other Attacks on Networks -- How to counter the Network Attacks -- Chapter Summary -- Chapter 10: Firewalls -- Introduction -- How Do You Protect a Network? …”
Libro electrónico -
625Publicado 2011Tabla de Contenidos: “…Selecting a Password -- Components of a Good Password -- Password Aging -- Operating System and Network Operating System Hardening -- Hardening Microsoft Operating Systems -- Hardening UNIX- or Linux-Based Operating Systems -- Network Hardening -- Software Updates -- Device Configuration -- Ports and Services -- Traffic Filtering -- Securing Management Interfaces -- VLAN Management -- IPv4 vsIPv6 -- Application Hardening -- Application Configuration Baseline -- Application Patches -- Patch Management -- Web Servers -- Mail Servers -- FTP Servers -- DNS Servers -- File and Print Services -- Active Directory -- Host Software Baselining -- Group Policies -- Security Templates -- Chapter Review -- Questions -- Answers -- Chapter 13 Types of Attacks and Malicious Software -- Avenues of Attack -- The Steps in an Attack -- Minimizing Possible Avenues of Attack -- Attacking Computer Systems and Networks -- Denial-of-Service Attacks -- Backdoors and Trapdoors -- Null Sessions -- Sniffing -- Spoofing -- Man-in-the-Middle Attacks -- Replay Attacks -- TCP/IP Hijacking -- Attacks on Encryption -- Address System Attacks -- Password Guessing -- Software Exploitation -- Client-Side Attacks -- Malicious Code -- Secure Software Development Lifecycle -- War-Dialing and War-Driving -- Social Engineering -- Auditing -- Chapter Review -- Questions -- Answers -- Chapter 14 E-Mail and Instant Messaging -- Security of E-Mail -- Malicious Code -- Hoax E-Mails -- Unsolicited Commercial E-Mail (Spam) -- Mail Encryption -- Instant Messaging -- Chapter Review -- Questions -- Answers -- Chapter 15 Web Components -- Current Web Components and Concerns -- Protocols -- Encryption (SSL and TLS) -- The Web (HTTP and HTTPS) -- Directory Services (DAP and LDAP) -- File Transfer (FTP and SFTP) -- Vulnerabilities -- Code-Based Vulnerabilities -- Buffer Overflows -- Java and JavaScript…”
Libro electrónico -
626Publicado 2012Tabla de Contenidos: “…Cover -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Security Fundamentals -- Reviewing the Requirements for SSCP -- Registering for the Exam -- Have One Year of Experience -- Passing the Exam -- Maintaining Your SSCP Certification -- Understanding the Main Goals of Information Security -- Availability -- Integrity -- Confidentiality -- Exploring Fundamentals of Security -- Defense in Depth -- AAAs of Security -- Accountability -- Nonrepudiation -- Least Privilege -- Separation of Duties -- Due Diligence -- Due Care -- Questions -- Answers -- Chapter 2 Access Controls -- Comparing Identification and Authentication -- Authentication -- Three Factors of Authentication -- Single Sign-on Authentication -- Centralized Verse Decentralized Authentication -- Offline Authentication -- One-Time Passwords -- Implementing Access Controls -- Comparing Subjects and Objects -- Logical Access Control -- Physical Access Control -- Access Control Models -- DAC -- Non-DAC -- MAC -- RBAC -- Implementing Identity Management -- Provisioning -- Maintenance -- De-provisioning -- Entitlement -- Understanding Cloud Computing -- Virtualization -- Storage -- Privacy and Data Control -- Compliance -- Questions -- Answers -- Chapter 3 Basic Networking and Communications -- The OSI Model -- The Physical Layer (Layer 1) -- The Data Link Layer (Layer 2) -- The Network Layer (Layer 3) -- The Transport Layer (Layer 4) -- The Session Layer (Layer 5) -- The Presentation Layer (Layer 6) -- The Application Layer (Layer 7) -- Comparing the OSI and TCP/IP Models -- Network Topographies -- Ethernet -- Bus -- Star -- Token Ring -- Reviewing Basic Protocols and Ports -- Address Resolution Protocol -- Internet Control Message Protocol -- Internet Group Message Protocol -- Dynamic Host Configuration Protocol -- Simple Network Management Protocol…”
Libro electrónico -
627Publicado 2013Tabla de Contenidos: “…Availability Risks -- Best Practices -- Zoning -- Arrays -- Servers -- Staff -- Offsite Data Storage -- Summary -- References -- Chapter 12: Database Security -- General Database Security Concepts -- Understanding Database Security Layers -- Server-Level Security -- Network-Level Security -- Operating System Security -- Understanding Database-Level Security -- Database Administration Security -- Database Roles and Permissions -- Object-Level Security -- Using Other Database Objects for Security -- Using Application Security -- Limitations of Application-Level Security -- Supporting Internet Applications -- Database Backup and Recovery -- Determining Backup Constraints -- Determining Recovery Requirements -- Types of Database Backups -- Keeping Your Servers Up to Date -- Database Auditing and Monitoring -- Reviewing Audit Logs -- Database Monitoring -- Summary -- References -- Part III: Network Security -- Chapter 13: Secure Network Design -- Introduction to Secure Network Design -- Acceptable Risk -- Designing Security into a Network -- Designing an Appropriate Network -- The Cost of Security -- Performance -- Availability -- Security -- Wireless Impact on the Perimeter -- Remote Access Considerations -- Internal Security Practices -- Intranets, Extranets, and DMZs -- Outbound Filtering -- Compliance with Standards -- NIST -- ISO 27002 -- COBIT -- Summary -- References -- Chapter 14: Network Device Security -- Switch and Router Basics -- MAC Addresses, IP Addresses, and ARP -- TCP/IP -- Hubs -- Switches -- Routers -- Network Hardening -- Patching -- Switch Security Practices -- Access Control Lists -- Disabling Unused Services -- Administrative Practices -- Internet Control Message Protocol (ICMP) -- Anti-Spoofing and Source Routing -- Logging -- Summary -- References -- Chapter 15: Firewalls -- Overview -- The Evolution of Firewalls…”
Libro electrónico -
628Publicado 2017Tabla de Contenidos: “…-- Our security posture -- Virtualization - cloud's best friend -- Understanding the ring architecture -- Hardware virtualization -- Full virtualization with binary translation -- Paravirtualization -- Hardware-assisted virtualization -- Distributed architecture in virtualization -- Enterprise virtualization with oVirt -- Encapsulation -- Point in time snapshots -- Isolation -- Risk assessment in cloud -- Service Level Agreement -- Business Continuity Planning - Disaster Recovery (BCP/DR) -- Business Continuity Planning -- Disaster Recovery -- Recovery Time Objective -- Recovery Point Objective -- Relation between RTO and RPO -- Real world use case of Disaster Recovery -- Use case to understand BCP/DR -- Policies and governance in cloud -- Audit challenges in the cloud -- Implementation challenges for controls on CSP side -- Vulnerability assessment and penetration testing in the cloud -- Use case of a hacked server -- Summary -- Chapter 2: Defense in Depth Approach -- The CIA triad -- Confidentiality -- Integrity -- Availability -- A use case -- Understanding all three aspects -- The use case -- Introducing Defense in Depth -- First layer - network layer -- Second layer - platform layer -- Third layer - application layer -- Fourth layer - data layer -- Fifth layer - response layer -- Summary -- Chapter 3: Designing Defensive Network Infrastructure -- Why do we need cryptography? -- The TCP/IP model -- Scenario -- The Network Transport Layer…”
Libro electrónico -
629Publicado 2017Tabla de Contenidos: “…-- About the net/http Go package -- Developing web clients -- Fetching a single URL -- Setting a timeout -- Developing better web clients -- A small web server -- The http.ServeMux type -- Using http.ServeMux -- The html/template package -- About JSON -- Saving JSON data -- Parsing JSON data -- Using Marshal() and Unmarshal() -- Using MongoDB -- Basic MongoDB administration -- Using the MongoDB Go driver -- Creating a Go application that displays MongoDB data -- Creating an application that displays MySQL data -- A handy command-line utility -- Exercises -- Summary -- Chapter 12: Network Programming -- About network programming -- About TCP/IP -- About TCP -- The TCP handshake! -- About UDP and IP -- About Wireshark and tshark -- About the netcat utility -- The net Go standard package -- Unix sockets revisited -- A Unix socket server -- A Unix socket client -- Performing DNS lookups -- Using an IP address as input -- Using a host name as input…”
Libro electrónico -
630Publicado 2023Tabla de Contenidos: “…-- Types of computer networks -- Local Area Networks -- Wide Area Networks -- Virtual Private Networks -- Introducing network protocols -- Packet switching -- TCP/IP suite -- Understanding network issues -- Security -- Packet loss -- Latency -- Introducing the Unreal Engine multiplayer system -- Network modes and server types -- The replication system -- Network role -- Pawns and PlayerControllers -- Relevance and priority -- Remote Procedure Calls -- Summary -- Credits -- Chapter 3: Testing the Multiplayer System with a Project Prototype -- Technical requirements -- Creating a multiplayer game prototype -- Setting up the project from a template -- Adding Quixel Megascans -- Modifying the Player Controller -- Testing a multiplayer game locally -- Playing as a Listen Server -- Updating over the network -- Adding additional character spawn points -- Updating properties over the network…”
Libro electrónico -
631Tabla de Contenidos: “…-- 1.3.1 Software interfaces -- 1.3.2 User interfaces -- 1.3.3 Application programming interface -- 1.3.4 TCP/IP interface -- 1.4 Library and storage location management -- 1.4.1 Removable media library -- 1.4.2 Storage location -- 1.4.3 HOME location -- 1.5 Media types -- 1.6 Volume management -- 1.6.1 Types of volumes -- 1.6.2 Volume status -- 1.6.3 Validation -- 1.7 Policies for retention and movement -- 1.7.1 Data set retention -- 1.7.2 Volume retention -- 1.7.3 SMS ACS support -- 1.7.4 Volume retention -- 1.7.5 Movement -- 1.8 DFSMSrmm automated tape library support -- 1.8.1 Cartridge entry processing -- 1.8.2 Ejecting volumes from system-managed libraries -- 1.8.3 Volume-Not-In-Library processing -- 1.8.4 Verifying the databases -- 1.8.5 VTS import/export processing -- 1.8.6 Defining stacked volumes to DFSMSrmm -- 1.9 Catalog synchronization -- 1.10 Implementing the RMMplex -- 1.10.1 RMMplex -- Chapter 2. …”
Libro electrónico -
632por Cattini, RolandTabla de Contenidos: “…6.4.7 Erweiterungskarten -- 6.5 Fragen zu diesem Kapitel -- Kapitel 7: Der TCP/IP-Stack -- 7.1 Das Modell und die Praxis -- 7.1.1 Vergleich OSI-Modell mit dem DOD-4-Modell -- 7.1.2 Der Aufbau der Adressierung -- 7.2 Die Grundlagen der IP-Adressierung -- 7.2.1 CIDR statt Adressklassen -- 7.2.2 Private Netzwerke unter IPv4 -- 7.2.3 Ausnahmen und besondere Adressen -- 7.2.4 Der IPv4-Header -- 7.3 IPv6 -- 7.3.1 Der Header von IPv6 -- 7.3.2 Spezielle Adressen unter IPv6 -- 7.4 Subnettierung von Netzen -- 7.5 Weitere Protokolle auf dem IP-Layer -- 7.5.1 ICMP und IGMP -- 7.5.2 ARP -- 7.6 TCP und UDP -- 7.7 Die Geschichte mit den Ports -- 7.8 Fragen zu diesem Kapitel -- Kapitel 8: Serverrollen -- 8.1 Dienste und Rollen -- 8.2 Datei- und Druckdienste -- 8.2.1 Dateidienste verwaltet der Fileserver -- 8.2.2 Printserver verwalten Drucker und ihre Aufträge -- 8.3 Internetdienste -- 8.3.1 Webserver -- 8.3.2 FTP-Server -- 8.4 Netzwerkdienste -- 8.4.1 DNS-Server -- 8.4.2 DHCP-Server -- 8.4.3 Zeitsynchronisationsserver -- 8.4.4 Überwachungsserver -- 8.4.5 Server mit Fernzugriff (RAS-Server) -- 8.4.6 VPN unter Linux -- 8.5 Messaging-Server (Mailserver) -- 8.5.1 Posteingangsdienste (Postfachzugriff) -- 8.5.2 Postausgangsdienst und Mailtransfer -- 8.5.3 Unix- und Linux-Mailserver -- 8.5.4 Die kommerziellen Server -- 8.5.5 Webmail -- 8.5.6 Cloud-Systeme -- 8.6 Sicherheits- und Authentifizierungsdienste -- 8.6.1 Domänen-Controller -- 8.6.2 Certificate Authorities (CA) -- 8.6.3 Rights-Management-Server -- 8.7 Anwendungsserver -- 8.7.1 Datenbankserver -- 8.7.2 Anwendungsserver -- 8.7.3 Anwendungsarchitekturen -- 8.8 Internet, Intranet und Extranet -- 8.8.1 Internet -- 8.8.2 Intranet -- 8.8.3 Extranet -- 8.9 Fragen zu diesem Kapitel -- Kapitel 9: Installation von Netzwerkbetriebssystemen -- 9.1 Übersicht zu Netzwerkbetriebssystemen…”
Publicado 2022
Libro electrónico -
633por Blyth, AndrewTabla de Contenidos: “…-- Stakeholders -- Ethical, legal, and regulatory requirements -- Managing and executing a penetration test -- Using the cyber kill chain -- Standards in penetration testing -- Report writing -- Summary -- Chapter 2: Programming Principles in PowerShell -- Basic concepts of PowerShell and pipelines in PowerShell -- JSON in PowerShell -- Retrieving JSON data from web APIs -- Parsing JSON data -- JSON manipulation for payloads -- Interacting with JSON from files -- Web scraping and data extraction -- XML in PowerShell -- Reading and parsing XML files -- Extracting information from XML nodes -- Modifying XML data -- Crafting XML payloads -- XML injection testing -- COM, WMI, and .NET in PowerShell -- Using WMI for system information gathering -- Querying WMI for network information -- Interacting with COM objects -- Using .NET for cryptographic operations -- Using .NET for network operations -- Analyzing .NET assemblies for vulnerabilities -- Summary -- Part 2: Identification and Exploitation -- Chapter 3: Network Services and DNS -- Network services -- TCP/IP network services -- The IP addresses -- The TCP/UDP port numbers -- The OSI stack -- DNS and types of DNS queries -- DNS overview -- Types of DNS queries -- DNS and PowerShell -- Summary -- Chapter 4: Network Enumeration and Port Scanning -- Network enumeration using PowerShell -- TCP port scanning using PowerShell -- Single port scanning with Test-NetConnection -- Multiple port scanning with Test-NetConnection -- Enumerating open ports with Test-NetConnection -- Single port scanning with .NET -- Multiple port scanning with .NET…”
Publicado 2024
Libro electrónico -
634Publicado 2003Tabla de Contenidos: “…Customer care -- 10.1 Positioning statement -- 10.1.1 BASE requirements for collaboration -- 10.1.2 Example workflows using customer care -- 10.1.3 Communication process -- 10.1.4 Customer care customization -- 10.2 Implementation -- 10.2.1 Installation steps -- 10.2.2 Prerequisites -- 10.2.3 Enabling customer care -- 10.2.4 Registering users -- 10.2.5 TCP/IP ports used by Lotus Sametime -- Chapter 11. …”
Libro electrónico -
635Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Using TCP/IP to communicate via networks -- Getting ready -- How to do it... -- How it works... -- Using urlopen to read data from websites -- Getting ready -- How to do it... -- How it works... -- Chapter 7: Storing Data in our MySQL Database via our GUI -- Introduction -- Installing and connecting to a MySQL server from Python -- Getting ready -- How to do it... -- How it works... -- Configuring the MySQL database connection -- Getting ready -- How to do it... -- How it works... -- Designing the Python GUI database -- Getting ready -- How to do it... -- How it works... -- Using the SQL INSERT command -- Getting ready -- How to do it... -- How it works... -- Using the SQL UPDATE command -- Getting ready -- How to do it... -- How it works... -- Using the SQL DELETE command -- Getting ready -- How to do it... -- How it works... -- Storing and retrieving data from our MySQL database -- Getting ready -- How to do it...…”
Libro electrónico -
636Publicado 2017Tabla de Contenidos: “…Configuring time synchronization -- Changing the vCSA password -- Licensing -- Roles and permissions -- AD integration -- Configuring a host with AD authentication -- Installing the VMware Enhanced Authentication plugin -- vCSA and PSC -- Repointing the vCSA to another external PSC -- Pointing the vCSA with an embedded PSC to an external PSC -- Resetting the SSO password -- Managing data centers, clusters, and hosts -- Creating a data center -- Adding a host to vCenter Server -- Disconnecting a host from vCenter Server -- Removing a host from vCenter Server -- Creating a cluster -- Removing a host from a cluster -- Managing hosts -- Using tags -- Tasks -- Scheduling tasks -- Managing host profiles -- vCenter Server in Enhanced Linked mode (ELM) -- Automating tasks with scripts -- Automating with PowerCLI -- PowerCLI script examples -- Using vCLI -- Installing vCLI on Windows -- vCenter REST API -- Summary -- Chapter 6: Advanced Network Management -- Basic overview -- OSI model -- Encapsulation and de-encapsulation -- Broadcasting, unicasting, and multicasting -- MAC tables and MAC learning process -- Maximum Transmission Unit (MTU) -- Virtual LAN (VLAN) -- Transmission Control Protocol (TCP) versus User Datagram Protocol (UDP) -- IPv6 -- Virtual networking -- vSS -- vDS -- Managing vSS -- VMkernel adapters -- Physical adapters -- TCP/IP stacks -- Managing vDS -- Properties -- Topology -- Link Aggregation Control Protocol (LACP) -- Private VLAN -- NetFlow -- Port mirroring -- Health check -- Network I/O Control (NIOC) -- Network protocol profiles -- Ports, hosts, VMs, and networks -- Introduction to NSX -- NSX components -- Management plane -- Control plane -- Data plane -- NSX installation -- Network Functions Virtualization (NVF) -- Summary -- Chapter 7: Advanced Storage Management -- Storage basics -- The evolution of the storage world…”
Libro electrónico -
637Publicado 2004Tabla de Contenidos: “…Overview of IBM Tivoli NetView -- 4.1 IBM Tivoli NetView (Integrated TCP/IP Services) -- 4.2 NetView visualization components -- 4.2.1 The NetView EUI -- 4.2.2 NetView maps and submaps -- 4.2.3 The NetView event console -- 4.2.4 The NetView Web console -- 4.2.5 Smartsets -- 4.2.6 How events are processed -- 4.3 Supported platforms and installation notes -- 4.3.1 Supported operating systems -- 4.3.2 Java Runtime Environments -- 4.3.3 AIX installation notes…”
Libro electrónico -
638por Lucas, Michael, 1967-Tabla de Contenidos: “…-- Securelevel Weaknesses -- Keeping Secure -- 11. Overview of TCP/IP -- Network Layers -- The Physical Layer -- The Datalink Layer…”
Publicado 2013
Libro electrónico -
639Publicado 2010Tabla de Contenidos: “…. -- Serialize Objects -- Serialize to an In-Memory Stream -- Store Data when Your App Has Restricted Permissions -- 12 Networking and the Web -- Resolve a Hostname to an IP Address -- Get This Machine's Hostname and IP Address -- Ping a Machine -- Get Network Card Information -- Create a TCP/IP Client and Server -- Send an Email via SMTP -- Download Web Content via HTTP -- Upload a File with FTP -- Strip HTML of Tags -- Embed a Web Browser in Your Application -- Consume an RSS Feed -- Produce an RSS Feed Dynamically in IIS -- Communicate Between Processes on the Same Machine (WCF) -- Communicate Between Two Machines on the Same Network (WCF) -- Communicate over the Internet (WCF) -- Discover Services During Runtime (WCF) -- 13 Databases -- Create a New Database from Visual Studio -- Connect and Retrieve Data -- Insert Data into a Database Table -- Delete Data from a Table -- Run a Stored Procedure -- Use Transactions -- Bind Data to a Control Using a DataSet…”
Libro electrónico -
640Publicado 2022Tabla de Contenidos: “…4.1.1.1 Setup -- 4.1.1.2 Implement the Native Module -- 4.1.1.3 Async Calls -- 4.1.2 Android Native Module -- 4.1.2.1 Setup -- 4.1.2.2 Implement the Native Module -- 4.1.2.3 Register the Native Module -- 4.1.2.4 Async Calls -- 4.1.3 Use the Native Module in JavaScript -- 4.1.4 Key Takeaways -- 4.2 Native Components -- 4.2.1 iOS Native Component -- 4.2.1.1 Setup -- 4.2.1.2 Implement the View Manager -- 4.2.1.3 View Property -- 4.2.2 Android Native Component -- 4.2.2.1 Setup -- 4.2.2.2 Implement the View Manager -- 4.2.2.3 View Property -- 4.2.3 Use the Native Component in JavaScript -- 4.2.3.1 The Easy Way -- 4.2.3.2 The Right Way, Abstraction on the JavaScript Layer -- 4.2.4 Children of a Native Component -- 4.2.5 Key Takeaways -- 4.3 Advanced Techniques -- 4.3.1 Event -- 4.3.1.1 Send Events from iOS -- 4.3.1.2 Send Events from Android -- 4.3.1.3 Receive Events in JavaScript -- 4.3.2 React Tag -- 4.3.2.1 React Refs -- 4.3.2.2 React Tags -- 4.3.2.3 Reconcile React Tag Implementation on JavaScript -- 4.3.3 Direct Manipulation -- 4.3.4 Synchronous Method Call -- 4.3.5 Export Constants -- 4.3.5.1 iOS -- 4.3.5.2 Android -- 4.3.5.3 Access Constants in JavaScript -- 4.3.6 Initial Properties -- 4.3.7 Dependency Injection -- 4.3.8 Key Takeaways -- 4.4 Exception Handling -- 4.5 Case Study - a Video Component -- 4.5.1 iOS Implementation of a Video Component -- 4.5.2 Android Implementation of a Video Component -- 4.5.3 JavaScript Layer -- 4.5.3.1 Native Component Wrapper -- 4.5.3.2 View Manager Wrapper -- 4.5.3.3 Video Feed -- 4.5.3.4 Ref Forwarding -- 4.5.3.5 Video Feed in Moment -- 4.5.4 Reinforced Video Component -- 4.5.4.1 Protect the iOS Component -- 4.5.4.2 Protect the Android Component -- 4.5.4.3 JavaScript Layer -- 4.6 Summary -- Chapter 5: Network Programming -- 5.1 A Very Brief Introduction to TCP/IP -- 5.1.1 TCP…”
Libro electrónico