Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 816
- Application software 751
- Computer programs 441
- Engineering & Applied Sciences 367
- Operating systems (Computers) 349
- Cloud computing 330
- Programming 327
- Management 281
- Web site development 271
- Computer networks 262
- Design 244
- Python (Computer program language) 237
- Computer Science 234
- Web sites 226
- Data processing 211
- Computer software 197
- Database management 184
- Open source software 179
- Linux 178
- Computer programming 177
- Security measures 174
- Web applications 168
- Photography 161
- Java (Computer program language) 155
- Digital techniques 148
- Computer graphics 141
- JavaScript (Computer program language) 141
- Microsoft Windows (Computer file) 135
- Electrical & Computer Engineering 126
- Mobile computing 124
-
61Publicado 2016“…The intention is to show you a simplified set-up in which the ITSO labs were created. You can choose a similar set-up for your site in a controlled test environment where you can gain skills and experience in PKI Services on z/OS, and then move on to plan and implement it across your site. …”
Libro electrónico -
62
-
63por Haycox, IanTabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; Table of Contents; Preface; Chapter 1: Linux and E-mail Basics; Why manage your own e-mail server; What you need to host an e-mail server; Sizing the hardware of your e-mail server; Main e-mail protocols-SMTP, POP, and IMAP; Overview; POP protocol; IMAP protocol; The SMTP protocol; E-mail and DNS; DNS record types used by e-mail applications; Backup mail servers; Summary; Chapter 2: Setting up Postfix; Introduction to Postfix; What is Postfix; Postfix architecture: An overview; New message arrival; Scheduling message deliveries…”
Publicado 2009
Libro electrónico -
64
-
65por Vineyard, Jeremy
Publicado 1999Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
66por Henderson, SamTabla de Contenidos: “…Advantages and disadvantages of an SMSFHow much money do you need to set up an SMSF?; Other types of superannuation funds; Super choice: moving from one fund to another; Key points; Chapter 3: Setting up a self managed super fund; How easy is it to set up and run an SMSF?…”
Publicado 2012
Libro electrónico -
67
-
68
-
69
-
70
-
71
-
72
-
73
-
74
-
75Publicado 2014Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Nagios; Understanding the basics of Nagios; The benefits of monitoring resources; Main features; Soft and hard states; What's new in Nagios 4.0; Summary; Chapter 2: Installing Nagios 4; Installation; Upgrading from previous versions; Installing prerequisites; Obtaining Nagios; Setting up users and groups; Compiling and installing Nagios; Compiling and installing Nagios plugins; Setting up Nagios as a system service…”
Libro electrónico -
76
-
77Publicado 2023“…This audiobook will take you through steps to ensure your investment in HubSpot pays off from Day 1. You'll learn how to set up HubSpot correctly and understand how to generate quick wins for your organization. …”
Grabación no musical -
78Publicado 2023Tabla de Contenidos: “…Summary -- Further reading -- Chapter 5: Setting Up Isolated Penetration Testing Lab Environments on Azure -- Technical requirements -- Preparing the necessary components and prerequisites -- Part 1 of 2 - Manually creating a resource group -- Part 2 of 2 - Generating SSH keys to access the attacker VM instance -- Defining the project's structure -- Preparing the isolated network -- Setting up the target resources -- Part 1 of 2 - Preparing the target resources using Terraform -- Part 2 of 2 - Verifying our target VM instance setup -- Manually setting up the attacker VM instance -- Part 1 of 2 - Manually launching and setting up the attacker instance -- Part 2 of 2 - Verifying that our setup is working -- Leveraging Terraform to automatically set up the attacker VM instance -- Part 1 of 3 - Creating the golden image -- Part 2 of 3 - Deleting the manually created resources -- Part 3 of 3 - Preparing the Terraform configuration files -- Simulating penetration testing in the isolated network environment -- Part 1 of 4 - Scanning with Nmap -- Part 2 of 4 - Using the VNC login scanner module of Metasploit -- Part 3 of 4 - Breaking out of the container -- Part 4 of 4 - Locating the flags -- Cleaning up -- Summary -- Further reading -- Chapter 6: Setting Up Isolated Penetration Testing Lab Environments on AWS -- Technical requirements -- Leveraging Terraform to automatically set up the lab environment -- Validating network connectivity and security -- Part 1 of 3 - Authorizing the use of the serial console -- Part 2 of 3 - Manually verifying network connectivity with ping tests -- Part 3 of 3 - Using the Reachability Analyzer to validate network connectivity -- Setting up the attacker VM instance -- Simulating penetration testing in the isolated network environment -- Part 1 of 3 - Obtaining the first flag…”
Libro electrónico -
79
-
80Publicado 2023Tabla de Contenidos: “…Use the checks-effects-interactions pattern -- DoS with block gas limit -- Handling errors in external calls -- Best practices in smart contracts -- Writing upgradable smart contracts -- Economic consideration of smart contract execution -- Types of smart contract -- Putting it all together - rental property leasing -- Summary -- Chapter 7: Web3 API Fundamentals -- Technical requirements -- Introducing Web 3.0 -- Setting up an Ethereum environment -- Installing Geth -- Setting up a private Ethereum network -- Generating and configuring the genesis file -- Initializing the chain instance -- Starting a Geth node -- Connecting to Ethereum networks -- Learning the fundamentals of web3.js - the Ethereum JavaScript API -- web3.js project setup -- web3.js Account -- web3.js ABI -- Web3 providers -- Setting up the Ethereum testnet environment -- The web3.js Transaction API -- Getting started with web3.py -- Prerequisites -- Introducing Web3j - Web3 Java Ethereum DApp API -- Setting up a simple Spring Boot application -- Checking the balances of Ethereum accounts -- solc and the Web3j CLI -- Deploying smart contracts using Web3j -- Transacting with a smart contract -- Querying the state of a smart contract -- Summary -- Chapter 8: Developing Your Own Cryptocurrency -- Technical requirements -- Understanding token standards -- ERC-1155 -- Batch transfers -- Batch balance -- Batch approval -- ERC-1155's TokenReceiver -- Setting up an Ethereum development environment -- Working with Truffle -- Creating an ERC-20 token - MyERC20Token -- Creating basic token information -- Defining and implementing the ERC-20 interface -- Assigning an admin role -- Working with the whitelist function -- Locking and unlocking an account -- The mint and burn tokens -- Creating an ERC-721 token - DigitalArtERC721Token -- Designing the decentralized digital art marketplace…”
Libro electrónico