Mostrando 521 - 540 Resultados de 1,100 Para Buscar '"UNIX"', tiempo de consulta: 0.07s Limitar resultados
  1. 521
    Publicado 2007
    Tabla de Contenidos:
    Libro electrónico
  2. 522
    por Shvets, Andrew T. author
    Publicado 2020
    Tabla de Contenidos: “…Libraries -- Appendix A: Installing GNAT in Linux and Unix -- Appendix B: Installing GNAT in Windows -- Appendix C: Reserved Keywords -- Appendix D: Debugging Ada Applications…”
    Libro electrónico
  3. 523
    Publicado 2019
    Tabla de Contenidos: “…Chapter 1: Go and the Operating System -- Chapter 2: Understanding Go Internals -- Chapter 3: Working with Basic Go Data Types -- Chapter 4: The Uses of Composite Types -- Chapter 5: How to Enhance Go Code with Data Structures -- Chapter 6: What You Might Not Know About Go Packages and Functions -- Chapter 7: Reflection and Interfaces for All Seasons -- Chapter 8: Telling a UNIX System What to Do -- Chapter 9: Concurrency in Go – Goroutines, Channels, and Pipelines -- Chapter 10: Concurrency in Go – Advanced Topics -- Chapter 11: Code Testing, Optimization, and Profiling -- Chapter 12: The Foundations of Network Programming in Go -- Chapter 13: Network Programming – Building Your Own Servers and Clients -- Chapter 14: Machine Learning in Go…”
    Libro electrónico
  4. 524
    Publicado 1999
    Tabla de Contenidos: “…Introduction to Linux -- Preparing to Install Linux -- Installation and Initial Configuration -- Basic Unix Commands and Concepts -- Essential System Management -- Managing Filesystems, Swap, and Devices -- Upgrading Software and the Kernel -- Other Administrative Tasks -- Editors, Text Tools, Graphics, and Printing -- Installing the X Window System -- Customizing Your X Environment -- Windows Compatibility and Samba -- Programming Languages -- Tools for Programmers -- TCP/IP and PPP -- The World Wide Web and Electronic Mail --…”
    Libro electrónico
  5. 525
    Publicado 2007
    Tabla de Contenidos: “…Oracle database 10g new features (DBA and Developer) -- Basic Index Principles (Beginner Developer and beginner DBA) -- Disk implementation Methodology and ASM (DBA) -- Tuning the database with initialization parameters (DBA) -- Enterprise manager and grid control (DBA and Developer) -- Using explain and stored outlines (Developer and DBA) -- Basic hint syntax (Developer and DBA) -- Query tuning and beginner DBA -- Table joins and other advanced tuning (Advanced DBA and Developer) -- Using PL/SQL to enhance performance (Developer and DBA) -- Tuning RAC and using parallel features -- The V$ views (Developer and DBA) -- The X$ tables (Advanced DBA) -- Using STATSPACK and the AWR report to tune waits and latches -- Performing a quick system review (DBA) -- Monitor the system using Unix utitlities (DBA)…”
    Libro electrónico
  6. 526
    por Bourne, Kelly C.
    Publicado 2014
    Tabla de Contenidos: “…responsibility for an application -- Change control -- Installing software -- Support software -- Updates and patches -- Supporting your application -- Disaster recover -- Handling problems with the application -- Repetitive activities -- Security -- The server -- Tuning -- The network -- Your organization -- The user's viewpoint -- The vendor -- The government gets involved -- System tools - common -- System tools - microsoft -- System tools - unix -- Tools you can or should develop -- Third party tools -- Troubleshooting tips -- Things to do in advance that pay off -- Things that will happen that you don't want to think about -- The end of days - decommissioning an application -- What every application administrator should know -- Education -- Parting advice, perhaps unsolicited…”
    Libro electrónico
  7. 527
    Publicado 2014
    Tabla de Contenidos: “…Front Cover; Contents; Preface; About the Author; Chapter 1 - What You Need to Know First; Chapter 2 - Attack from Christmas Island; Chapter 3 - Indirect Target Information Acquisition (ITIA); Chapter 4 - Direct Target Information Acquisition (DTIA); Chapter 5 - Nmap; Chapter 6 - MATLAB, SimuLink, and R; Chapter 7 - Metasploit Pro; Chapter 8 - China, Syria, and the American Intelligence Community; Chapter 9 - Building a Penetration Testing Lab; Chapter 10 - Vendor Default Passwords and Default Unix Ports; Chapter 11 - Oldies but Goodies If You Have Physical Access…”
    Libro electrónico
  8. 528
    por Blank-Edelman, David N.
    Publicado 2000
    Tabla de Contenidos: “…System Administration Is a Craft How Perl Can Help This Book Will Show You How What You Need Locating and Installing Modules It's Not Easy Being Omnipotent Filesystems Perl to the Rescue Filesystem Differences Walking or Traversing the Filesystem Walking the Filesystem Using the File::Find Module Manipulating Disk Quotas Querying Filesystem Usage Module Information for This Chapter User Accounts Unix User Identity Windows NT/2000 User Identity Building an Account System to Manage Users Module Information for This Chapter User Activity MacOS Process Control NT/2000 Process Control Unix Process Control Tracking File and Network Operations Module Information for This Chapter TCP/IP Name Services Host Files…”
    Libro electrónico
  9. 529
    Publicado 2024
    Tabla de Contenidos: “…-- Pipes in Golang -- The mechanics of anonymous pipes -- Navigating named pipes (Mkfifo()) -- Best practices - guidelines for using pipes -- Efficient data handling -- Error handling and resource management -- Security considerations -- Performance optimization -- Developing a log processing tool -- Summary -- Chapter 7: Unix Sockets -- Introduction to Unix sockets -- Creating a Unix socket -- Going a little deeper into socket creation -- Creating the client -- Inspecting the socket with lsof -- Building a chat server -- The complete chat client -- Serving HTTP under UNIX domain sockets -- Client -- HTTP request line -- HTTP request header -- Empty line signifying end of headers -- The textproto package -- Performance -- Other common use cases -- Summary -- Part 3: Performance -- Chapter 8: Memory Management -- Technical requirements -- Garbage collection -- Stack and heap allocation -- The GC algorithm -- GOGC -- GC pacer -- GODEBUG -- Memory ballast -- GOMEMLIMIT -- Memory arenas -- Using memory arenas -- Summary -- Chapter 9: Analyzing Performance -- Escape analysis -- Stack and pointers -- Pointers -- Stack -- Heap -- How can we analyze? …”
    Libro electrónico
  10. 530
    por McCarthy, Martin
    Publicado 2002
    “…With almost all linux distributions including procmail as a standard package Unix like systems and procmail are finding their way into more office and homes leaving more people wondering how to do 'the clever bits'. …”
    Libro electrónico
  11. 531
    Publicado 2009
    “…grep kurz & gut das erste Buch speziell zu grep, dem mächtigen Unix-Hilfsprogramm zur Suche und Filterung definierter Zeichenketten in Dateien. …”
    Libro electrónico
  12. 532
    Publicado 2014
    “…Die Bash-Shell ist die Standard-Shell sowohl auf den meisten Linux-Systemen als auch unter Mac OS X und wurde auf fast alle Unix-Systeme portiert. Auch für Windows existieren zwei populäre Portierungen. …”
    Libro electrónico
  13. 533
    Electrónico
  14. 534
    por Peters, Ron
    Publicado 2009
    “…Automating small to medium system management tasks Analyzing system data and editing configuration files Scripting Linux, Unix, and OS X applications using bash, ksh, et al…”
    Libro electrónico
  15. 535
    por Viega, John
    Publicado 2003
    Tabla de Contenidos: “…Synchronizing Resource Access Across Processes on Unix; 2.9.2. Solution; 2.9.3. Discussion; 2.9.4. …”
    Libro electrónico
  16. 536
    por Henry, Kevin M.
    Publicado 2012
    Tabla de Contenidos: “…Port scanningCountermeasures to active reconnaissance; Key learning points; Questions; Chapter 5: Vulnerability Assessments; The attack vectors; References and sources of vulnerabilities; Using vulnerability assessment tools; PCI DSS requirements; Malicious code; Reporting on the vulnerability assessment; Key learning points; Questions; Chapter 6: Hacking Windows® and Unix; Having fun; Common hacking initiatives; Defeating data theft; Protecting against unauthorized access; Access controls; Actions of the attacker; Focus on UNIX/Linux; Advanced attacks; Source code review…”
    Libro electrónico
  17. 537
    por Dalheimer, Matthias Kalle
    Publicado 2005
    Tabla de Contenidos: “…Introduction to Linux -- Preinstallation and installation -- Desktop environments -- Basic Unix commands and concepts -- Web browsers and instant messaging -- Electronic mail clients -- Games -- Office suites and personal productivity -- Multimedia -- Part 2. …”
    Libro electrónico
  18. 538
    por Lester, Andy
    Publicado 2006
    Tabla de Contenidos: “…Table of Contents; Preface; Audience for This Book; How This Book Is Organized; Conventions Used in This Book; Comments and Questions; Acknowledgments; Acknowledgments for Andy Lester; Safari® Enabled; Part I; Commands and Shells; Introduction; What You'll Find; Beginner's Guide; Communication; Comparisons; File Management; Printing; Programming; Searching; Shell Programming; Storage; System Status; Text Processing; Miscellaneous; Unix Command Reference; Alphabetical Summary of Commands; ac; appleping; appletalk; appletviewer; apply; apropos; asr; at; at_cho_prn; atlookup; atprint; atq; atrm…”
    Libro electrónico
  19. 539
    por Beale, Jay
    Publicado 2008
    Tabla de Contenidos: “…/configureNessus 3 Install Guide; Mac OS X Install Process; UNIX Install Process; Fresh Installation; Red Hat and SUSE; Debian; Solaris; FreeBSD; Upgrading from Nessus 2; Configuring Nessus for UNIX; Creating a User Account; Windows Install Process; Final Steps; Installing a Client; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: Running Your First Scan; Introduction; Preparing for Your First Scan; Authorization; Risk vs. …”
    Libro electrónico
  20. 540
    Publicado 2009
    Tabla de Contenidos: “…Enforcing Security PoliciesGRC; SAP GRC Access Control; SAP GRC Process Control; Authorization Concept; Authorization Level; Task; Roles; Objects; SAP GRC Risk Management; Backend: Unix/Oracle; Security for UNIX; Installing Latest Security-Related Patches; Restricting Operating System Access; Protecting Operating System Files; Protecting Operating System Resources; Restricting Physical Server Access; Protecting Network Access; Securing an Oracle Database; Installing the Latest Oracle Security Patches; Protecting Standard Database Users; Protecting Database-Related Files…”
    Libro electrónico