Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 185
- Historia 161
- Management 84
- Development 82
- Operating systems (Computers) 75
- Filosofía 74
- Social aspects 64
- Computer networks 63
- Application software 62
- Engineering & Applied Sciences 61
- Philosophy 60
- Linux 58
- RELIGION 54
- Security measures 54
- Data processing 50
- Leadership 49
- Computer security 47
- Computer Science 43
- Computer software 40
- Politics and government 40
- Política y gobierno 39
- Mathematics 37
- Computer programming 36
- Crítica e interpretación 35
- Cloud computing 34
- History and criticism 34
- Psychological aspects 34
- Research & information: general 34
- Business & Economics 31
- Computer programs 31
-
2961Publicado 2021Tabla de Contenidos: “…-- Working with a DHCP Server -- Installing a Windows Server 2019 DHCP server -- Configuring a new scope -- How to Configure a Windows DHCP Client -- Automatic private IP addressing -- Renewing and releasing leases -- Chapter 6 DNS -- Understanding DNS Names -- Domains and domain names -- Fully qualified domain names -- Top-Level Domains -- Generic domains -- Geographic domains -- The Hosts File -- Understanding DNS Servers and Zones -- Zones -- Primary and secondary servers -- Root servers -- Caching -- Understanding DNS Queries -- A real-life DNS example -- Zone Files and Resource Records -- SOA records -- NS records -- A records -- CNAME records -- PTR records -- MX records -- Reverse Lookup Zones -- Working with the Windows DNS Server -- Creating a new zone -- Creating a new host record -- How to Configure a Windows DNS Client -- Chapter 7 TCP/IP Tools and Commands -- Using the arp Command -- Using the hostname Command -- Using the ipconfig Command -- Displaying basic IP configuration -- Displaying detailed configuration information -- Renewing an IP lease -- Releasing an IP lease…”
Libro electrónico -
2962Publicado 2022Tabla de Contenidos: “…-- Summary -- Chapter 3: Setting Up TDE -- Creating the Keys and Certificate -- Creating the Database Master Key (DMK) -- Creating the Certificate -- Creating the Database Encryption Key (DEK) -- Encrypting the Database -- Securing the Root Keys -- Encrypting Existing Data with TDE -- Benchmarking TDE Performance on Your Server -- Monitoring for Problems -- What If You Run into Any Performance Problems During the Scan? …”
Libro electrónico -
2963por Parker, David J.Tabla de Contenidos: “…Reviewing the Type property -- Reviewing the Validation object -- Examining the Master object -- Reviewing the BaseID property -- Reviewing the Hidden property -- Reviewing the ID, Index, and IndexInStencil properties -- Reviewing the Name and NameU properties -- Reviewing the PageSheet object -- Reviewing the Type property -- Examining the Page object -- Reviewing the Connects collection -- Reviewing the ID and Index properties -- Reviewing the Layers collection -- Reviewing the PageSheet object -- Reviewing the Comments and ShapeComments property -- Reviewing the Shapes collection -- Reviewing the Type property -- Examining the Shape object -- Reviewing the Characters and Text properties -- Reviewing the Connects and FromConnects collections -- Reviewing the Hyperlinks collection -- Reviewing the ID, Index, NameID, Name, and NameU properties -- Reviewing the IsCallout and IsDataGraphicCallout properties -- Reviewing the LayerCount property -- Reviewing the Master, MasterShape, and RootShape objects -- Reviewing the OneD property -- Reviewing the Parent object -- Reviewing the Type property -- Examining the Section object -- Examining the Row object -- Examining the Cell object -- Reviewing the Column property -- Reviewing the Error property -- Reviewing the Formula and FormulaU properties -- Reviewing the Name and LocalName properties -- Reviewing the Result properties -- Reviewing the Units property -- Iterating through cells -- Delving into the Connectivity API -- Understanding the Shape.ConnectedShapes method -- Understanding the Shape.GluedShapes method -- Understanding the Shape.MemberOfContainers property -- Understanding the Shape.CalloutsAssociated property -- Listing the steps in a process flow -- Summary -- Chapter 3: Understanding the ShapeSheetTM -- Finding the ShapeSheet -- Understanding sections, rows, and cells…”
Publicado 2013
Libro electrónico -
2964por Russinovich, Mark E.Tabla de Contenidos: “…User Mode -- Terminal Services and Multiple Sessions -- Objects and Handles -- Security -- Registry -- Unicode -- Digging into Windows Internals -- Reliability and Performance Monitor -- Kernel Debugging -- Windows Software Development Kit -- Windows Driver Kit -- Sysinternals Tools -- Conclusion -- System Architecture -- Requirements and Design Goals -- Operating System Model -- Architecture Overview -- Portability -- Symmetric Multiprocessing -- Scalability -- Differences Between Client and Server Versions -- Checked Build -- Key System Components -- Environment Subsystems and Subsystem DLLs -- Ntdll.dll -- Executive -- Kernel -- Hardware Abstraction Layer -- Device Drivers -- System Processes -- Conclusion -- System Mechanisms -- Trap Dispatching -- Interrupt Dispatching -- Exception Dispatching -- System Service Dispatching -- Object Manager -- Executive Objects -- Object Structure -- Synchronization -- High-IRQL Synchronization -- Low-IRQL Synchronization -- System Worker Threads -- Windows Global Flags -- Advanced Local Procedure Calls (ALPCs) -- Kernel Event Tracing -- Wow64 -- Wow64 Process Address Space Layout -- System Calls -- Exception Dispatching -- User Callbacks -- File System Redirection -- Registry Redirection and Reflection -- I/O Control Requests -- 16-Bit Installer Applications -- Printing -- Restrictions -- User-Mode Debugging -- Kernel Support -- Native Support -- Windows Subsystem Support -- Image Loader -- Early Process Initialization -- Loaded Module Database -- Import Parsing -- Post Import Process Initialization -- Hypervisor (Hyper-V) -- Partitions -- Root Partition…”
Publicado 2009
Libro electrónico -
2965Publicado 2017Tabla de Contenidos: “…Culling Mode in the Animator component -- Root motion -- Inverse Kinematic -- Animator component information box -- Legacy animation -- Get animated!! …”
Libro electrónico -
2966Publicado 2017Tabla de Contenidos: “…. -- There's more... -- Finding root accounts with an empty password in MySQL servers -- How to do it... -- How it works... -- There's more... -- Detecting insecure configurations in MySQL servers -- How to do it... -- How it works... -- There's more... -- Brute forcing Oracle passwords -- How to do it... -- How it works…”
Libro electrónico -
2967Publicado 2018Tabla de Contenidos: “…-- The public cloud landscape -- Amazon Web Services -- Microsoft Azure -- Google Cloud Platform -- Standing on the shoulders of giants -- A world-class global presence -- Choosing your own adventure -- Leading the way for big data -- The Open Cloud and innovation -- Dedication to customer success -- Bottom-up security -- In good company -- Summary -- Chapter 2: The Google Cloud Console -- Getting started - Google Cloud projects -- Architectural role of Google Cloud projects -- Creating a project -- Free trials on GCP -- The Google Cloud Console -- Understanding the Cloud Console dashboard -- The Google Cloud Shell -- Launching the Cloud Shell -- Supporting multiple sessions -- Features and integrations -- File management -- Web Preview -- The Cloud Shell Code Editor -- Opening in Cloud Shell -- Trying it out -- Installing additional tools -- Boost mode -- Repairing the Cloud Shell -- Other tools -- Mobile apps -- Developer tool integrations -- Summary -- Chapter 3: APIs, CLIs, IAM, and Billing -- Google Cloud APIs -- Managing APIs -- Google APIs Explorer -- Trying out the APIs Explorer -- The Google Cloud SDK -- Installing the Google Cloud SDK -- The gcloud command-line tool -- The basics of gcloud -- Command groups -- Root commands -- Global flags -- Initializing the Google Cloud SDK -- Authentication -- Managing your Google Cloud SDK -- Updating and rollbacks -- Alpha and beta channels -- Configurations in the Google Cloud SDK -- Modifying configuration properties -- Multiple configurations -- Other command-line tools -- bq -- gsutil -- kubectl -- Automating tasks with gcloud -- Modifying output and behavior -- Formatting attributes -- Formatting projections -- Filtering -- Google Cloud IAM -- How IAM works…”
Libro electrónico -
2968Publicado 2023Tabla de Contenidos: “…-- When I First Heard of "6 Sigma -- Background on the Normal Distribution -- Process Capability with Normal Data Cpk -- The 1.5 Sigma Shift -- The 3.0 Sigma Shift -- Conclusions and Recommendations -- TQM versus TCWQC -- TQM -- Root Cause Analysis: A3 Strategy -- A3s and Plan-(Control)-Do-Check-Act -- Problem Is Not a Bad Word -- Knowing You Have Problems Is Good -- Problem Statements -- Fishbones and Lean -- Building Rework into the Cell -- Poka Yoke -- Shingo's First Poka Yoke -- Problem -- Shingo Solution -- Poka Yoke PDCA Steps -- Self-Check Inspection -- Successive Check Inspection -- Example of Mistake Proofing (Poka Yoke) -- Corrective Action Request -- Negative Approach…”
Libro electrónico -
2969Publicado 2023Tabla de Contenidos: “…Identifying Risks -- Protecting against Risks -- Perimeter defense -- Firewall/router -- Security software -- Your physical computer(s) and any other endpoints -- Backups -- Detecting -- Responding -- Recovering -- Improving -- Evaluating Your Current Security Measures -- Software -- Hardware -- Insurance -- Education -- Privacy 101 -- Think before you share -- Think before you post -- General privacy tips -- Banking Online Safely -- Safely Using Smart Devices -- Cryptocurrency Security 101 -- Chapter 2 Enhancing Physical Security -- Understanding Why Physical Security Matters -- Taking Inventory -- Stationary devices -- Mobile devices -- Locating Your Vulnerable Data -- Creating and Executing a Physical Security Plan -- Implementing Physical Security -- Security for Mobile Devices -- Realizing That Insiders Pose the Greatest Risks -- Chapter 3 Cybersecurity Considerations When Working from Home -- Network Security Concerns -- Device Security Concerns -- Location Cybersecurity -- Shoulder surfing -- Eavesdropping -- Theft -- Human errors -- Video Conferencing Cybersecurity -- Keep private stuff out of camera view -- Keep video conferences secure from unauthorized visitors -- Social Engineering Issues -- Regulatory Issues -- Chapter 4 Securing Your Accounts -- Realizing You're a Target -- Securing Your External Accounts -- Securing Data Associated with User Accounts -- Conduct business with reputable parties -- Use official apps and websites -- Don't install software from untrusted parties -- Don't root your phone -- Don't provide unnecessary sensitive information -- Use payment services that eliminate the need to share credit card numbers -- Use one-time, virtual credit card numbers when appropriate -- Monitor your accounts -- Report suspicious activity ASAP -- Employ a proper password strategy -- Utilize multifactor authentication…”
Libro electrónico -
2970Publicado 2016Tabla de Contenidos: “…-- What the C-K approach means -- Representing dualistically (polarizing two spaces) and operating Arte (playing the C-K design square) -- Elaborating solid bodies of knowledge (or cognitive processes ever) -- Formulating root concepts (cognition - or plotting the undecidable) -- The story behind the creation of Sunflower iMac: Jobs, Ive and the sunflower in the garden -- A3.4. …”
Libro electrónico -
2971Publicado 2024Tabla de Contenidos: “…-- Appreciating the history of business model innovation -- Recognizing the roots of a movement -- What's changed now? -- Why has this changed? …”
Libro electrónico -
2972Publicado 2011Tabla de Contenidos: “…What to Do If There Is a Break-In -- Conclusion -- Chapter 5 Storage With Esx -- Overview of Storage Technology With Esx -- Fc Versus Scsi Versus Sas Versus Ata Versus Sata, and So On -- Fcoe and Converged Network Adapters (Cnas) -- Iscsi (Scsi Over Ip) -- Nas (Network-Attached Storage) -- Sans (Storage Area Networks) -- Storage Best Practices for Esx -- San/Iscsi Best Practices -- Iscsi/Nfs Best Practices -- Virtual Machine File System -- Vmdk and Vmfs Manipulation -- Vmfs Types -- Structure of Vmfs -- Storage Checklist -- Assessing Storage and Space Requirements -- Lun Sizes -- Example of Lun Sizing -- Storage-Specific Issues -- Increasing the Size of a Vmdk -- Increasing the Size of a Vmfs -- Searching for New Luns -- Vmfs Created on One Esx Host Not Appearing on Another -- How to Unlock a Lun -- Boot From San or Iscsi -- Conclusion -- Chapter 6 Effects On Operations -- Scsi-2 Reservation Issues -- Performance-Gathering and Hardware Agents Within a Vm -- Network Utilization -- Virtual Machine Mobility -- Data Store Performance or Bandwidth Issues -- Other Operational Issues -- Life-Cycle Management -- Conclusion -- Chapter 7 Networking -- Basic Building Blocks -- Details of the Building Blocks -- Vnetwork Functionality -- Network Definitions -- Virtual Environment Management Network -- Out-of-Band Management Network -- Vmotion Network -- Fault Tolerance Logging Network -- Nfs Network -- Iscsi Network -- Vm Network -- Checklist -- Pswitch Settings Checklist -- Vnetworking -- Vnetworks: The Great Vlan Debate -- Vnetworks: Network Splits -- Vnetworks: Simple Network -- Vnetworks: Adding More to the Virtualization Network -- Vnetwork: Dmz -- Pnic Determination -- Conclusion -- Chapter 8 Configuring Esx From A Host Connection -- Configuration Tasks -- Server-Specific Tasks -- Esxi Root Password -- Esxi Management Network -- Create Administrative Users…”
Libro electrónico -
2973Publicado 2023Tabla de Contenidos: “…Resilient File System (ReFS) -- NTFS -- Storage in Windows Server 2022 -- Initializing Disks -- Configuring Basic and Dynamic Disks -- Managing Volumes -- Storage Spaces in Windows Server 2022 -- Redundant Array of Independent Disks -- Mount Points -- Microsoft MPIO -- Configuring iSCSI Target -- Internet Storage Name Service -- Implement Thin Provisioning and Trim -- Fibre Channel -- Network-Attached Storage -- Virtual Disk Service -- Understanding Data Center Bridging -- Using PowerShell -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Understanding IP -- Understanding TCP/IP -- Details of the TCP/IP Model -- How TCP/IP Layers Communicate -- Understanding Port Numbers -- Understanding IP Addressing -- The Hierarchical IP Addressing Scheme -- Understanding Network Classes -- Subnetting a Network -- Understanding the Benefits of Subnetting -- Implementing Subnetting -- An Easier Way to Apply Subnetting -- Applying Subnetting the Traditional Way -- Working with Classless Inter-Domain Routing -- Supernetting -- Understanding IPv6 -- IPv6 History and Need -- New and Improved IPv6 Concepts -- IPv6 Addressing Concepts -- IPv6 Integration/Migration -- Summary -- Exam Essentials -- Review Questions -- Chapter 5 Implementing DNS -- Introducing DNS -- Hosts File -- Understanding Servers, Clients, and Resolvers -- Understanding the DNS Process -- Introducing DNS Database Zones -- Understanding Primary Zones -- Understanding Secondary Zones -- Understanding Active Directory Integrated DNS -- Understanding Stub Zones -- GlobalName Zones -- Zone Transfers and Replication -- Advantages of DNS in Windows Server 2022 -- Background Zone Loading -- Support for IPv6 Addresses -- Support for Read-Only Domain Controllers -- DNS Socket Pools -- DNS Cache Locking -- Response Rate Limiting -- Unknown Record Support -- IPv6 Root Hints -- DNS Security Extensions…”
Libro electrónico -
2974Publicado 2023Tabla de Contenidos: “…-- Different types of testing -- Unit tests -- Integration tests -- Acceptance tests -- Commonly used tools and technologies -- Implementing a sample component -- Implementing and running unit and integration tests -- Implementing and running black box tests -- Best practices for setting up a testing environment -- Tips for debugging and troubleshooting issues -- Challenges and considerations when testing applications running in containers -- Case studies -- Summary -- Questions -- Answers -- Chapter 8: Increasing Productivity with Docker Tips and Tricks -- Technical requirements -- Keeping your Docker environment clean -- Using a .dockerignore file -- Executing simple admin tasks in a container -- Running a Perl script -- Running a Python script -- Limiting the resource usage of a container -- Avoiding running a container as root -- Running Docker from within Docker -- Optimizing your build process -- Scanning for vulnerabilities and secrets -- Using Snyk to scan a Docker image -- Using docker scan to scan a Docker image for vulnerabilities -- Running your development environment in a container -- Summary -- Questions -- Answers -- Part 3:Orchestration Fundamentals -- Chapter 9: Learning about Distributed Application Architecture -- What is a distributed application architecture? …”
Libro electrónico -
2975por Arrell, KathrynTabla de Contenidos: “…Installing Oracle 10g single instance -- 3.1 Installing Oracle Database 10g on zSeries with Linux -- 3.2 Preparing the system environment -- 3.2.1 Setting up the fixed buffer option with ECKDTM disks -- 3.3 Setting up an xWindows interface using VNC -- 3.4 Downloading the code -- 3.4.1 Finding the documentation -- 3.4.2 Checking the Linux kernel settings -- 3.5 Running the Universal Installer -- 3.5.1 Starting the OUI -- 3.5.2 Initial OUI panels -- 3.5.3 Inventory directory panel -- 3.5.4 Changing to root screen for oraInstroot script -- 3.5.5 File location panel -- 3.5.6 Installation type -- 3.5.7 Selecting database configuration…”
Publicado 2005
Libro electrónico -
2976Publicado 2003Tabla de Contenidos: “…Considerations -- Application Developer guidelines -- Workspace -- .Workspace structure -- Utility project -- Project structure -- Source code formatting -- Application Developer preferences -- Checkstyle -- Application logging -- Requirements for a logging framework -- Logging implementation -- Automation opportunities -- Using JNDI -- Obtaining an InitialContext -- Local and global JNDI namespaces -- Caching -- Coding for performance -- General performance tips -- Database connection pooling -- Using System.out -- String concatenation -- JSP and servlet performance tips -- Storing objects in HTTP sessions -- Using HTTP sessions in JSPs -- Servlet multi-threading -- EJB performance tips -- Accessing EJBs from client code -- Transaction isolation levels -- Managing application versions -- Specifying the application name -- Partitioning Web applications in the URI namespace -- Partitioning using virtual hosts -- Partitioning using the Web application context root -- Partitioning EJBs in the JNDI namespace -- Partitioning access to database and other resources -- Security -- Application-managed security -- Container-managed security…”
Libro electrónico -
2977Publicado 2013Tabla de Contenidos: “…Reorganizing Tables and Indexes -- Cloud Control Metrics -- Summary -- Part II: Cloud Control for Database, System, Storage, and Middleware Administrators -- Chapter 9: DBAs: Manage Databases with Cloud Control -- Oracle Database Home Screen -- Oracle Database Menu -- Performance -- Oracle Performance Menu -- Availability -- Backup/Recovery Summary -- Data Guard Summary -- Availability Menu -- Schema Tools -- Schema Menu -- Administration Tools -- Administration Menu -- Summary -- Chapter 10: System and Storage Adminstrators: Manage Infrastructure with Cloud Control -- Host Administration -- Host Home Page -- Host Menu -- Storage Administration -- Viewing Storage History -- Summary -- Chapter 11: Middleware Adminstrators: Manage Middleware with Cloud Control -- Managing Middleware with Cloud Control -- Discovering Middleware Targets -- Automatic Discovery of Fusion Middleware Targets -- Discovering Targets Manually -- Using the Command Line to Discover Multiple WebLogic Domains -- Discovering New or Modified Domain Members -- Managing Middleware with Cloud Control -- Managing WebLogic Application Deployment -- Monitoring JEE Applications -- Managing WebLogic Server with Cloud Control -- SOA Home -- Web Services Policy Dashboard -- Managing a WebLogic Server Domain -- Proactive Middleware Monitoring -- Managing Cloud Control Metrics -- System Monitoring and Notifications -- Request Monitoring -- Composite Application Dashboard -- Middleware Diagnostics with Cloud Control -- Using the Middleware Target Home Pages for Diagnostics -- Using the Middleware Performance Summary Pages -- The Middleware Diagnostics Advisor -- Diagnosing Problems Related to WebLogic Middleware Alerts -- Transaction Diagnostics and Root-Cause Analysis -- JVM Diagnostics and Application Dependency and Performance Managers -- JVM Diagnostics…”
Libro electrónico -
2978Publicado 2014Tabla de Contenidos: “…. -- Premature optimization is the root of all evil -- There's more... -- See also -- Profiling your code line-by-line with line_profiler -- Getting ready -- How do to it... -- How it works... -- There's more... -- Tracing the step-by-step execution of a Python program -- See also -- Profiling the memory usage of your code with memory_profiler -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using memory_profiler for standalone Python programs -- Using the %memit magic command in IPython -- Other tools -- See also -- Understanding the internals of NumPy to avoid unnecessary array copying -- Getting ready -- How to do it... -- How it works... -- Why are NumPy arrays efficient? …”
Libro electrónico -
2979por Bryant, RussellTabla de Contenidos: “…. -- E: Unable to lock the administration directory (/var/lib/dpkg/), are you root? -- Upgrading Asterisk -- Conclusion -- Chapter 4. …”
Publicado 2013
Libro electrónico -
2980Publicado 2017Tabla de Contenidos: “…. -- Chapter 4: Give Me a Number - Regression -- Introduction -- Computing the root-mean-square error -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using a convenience function to compute the RMS error -- Building KNN models for regression -- Getting ready -- How to do it... -- How it works... -- There's more... -- Running KNN with cross-validation in place of a validation partition -- Using a convenience function to run KNN -- Using a convenience function to run KNN for multiple k values -- See also -- Performing linear regression -- Getting ready -- How to do it... -- How it works... -- There's more... -- Forcing lm to use a specific factor level as the reference -- Using other options in the formula expression for linear models -- See also -- Performing variable selection in linear regression -- Getting ready -- How to do it... -- How it works... -- See also -- Building regression trees -- Getting ready -- How to do it... -- How it works... -- There's more... -- Generating regression trees for data with categorical predictors -- Generating regression trees using the ensemble method - Bagging and Boosting -- See also -- Building random forest models for regression -- Getting ready -- How to do it... -- How it works... -- There's more... -- Controlling forest generation -- See also -- Using neural networks for regression -- Getting ready -- How to do it... -- How it works... -- See also -- Performing k-fold cross-validation -- Getting ready -- How to do it... -- How it works... -- See also -- Performing leave-one-out cross-validation to limit overfitting -- How to do it…”
Libro electrónico