Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 231
- Computer Science 199
- Operating systems (Computers) 197
- UNIX (Computer file) 145
- Linux 121
- Computer networks 88
- Sistemas operativos 73
- Unix 62
- Security measures 59
- Mac OS 57
- Development 54
- Application software 45
- Computer security 41
- Database management 40
- Macintosh (Computer) 38
- UNIX Shells 36
- Programming 35
- Examinations 32
- Computer programs 31
- Open source software 31
- Electrical & Computer Engineering 30
- Computer programming 29
- Telecommunications 29
- Certification 28
- Client/server computing 26
- Electronic data processing personnel 25
- Electronic data processing 23
- Informática 22
- Python (Computer program language) 22
- IBM Database 2 21
-
521
-
522por Shvets, Andrew T. authorTabla de Contenidos: “…Libraries -- Appendix A: Installing GNAT in Linux and Unix -- Appendix B: Installing GNAT in Windows -- Appendix C: Reserved Keywords -- Appendix D: Debugging Ada Applications…”
Publicado 2020
Libro electrónico -
523Publicado 2019Tabla de Contenidos: “…Chapter 1: Go and the Operating System -- Chapter 2: Understanding Go Internals -- Chapter 3: Working with Basic Go Data Types -- Chapter 4: The Uses of Composite Types -- Chapter 5: How to Enhance Go Code with Data Structures -- Chapter 6: What You Might Not Know About Go Packages and Functions -- Chapter 7: Reflection and Interfaces for All Seasons -- Chapter 8: Telling a UNIX System What to Do -- Chapter 9: Concurrency in Go – Goroutines, Channels, and Pipelines -- Chapter 10: Concurrency in Go – Advanced Topics -- Chapter 11: Code Testing, Optimization, and Profiling -- Chapter 12: The Foundations of Network Programming in Go -- Chapter 13: Network Programming – Building Your Own Servers and Clients -- Chapter 14: Machine Learning in Go…”
Libro electrónico -
524Publicado 1999Tabla de Contenidos: “…Introduction to Linux -- Preparing to Install Linux -- Installation and Initial Configuration -- Basic Unix Commands and Concepts -- Essential System Management -- Managing Filesystems, Swap, and Devices -- Upgrading Software and the Kernel -- Other Administrative Tasks -- Editors, Text Tools, Graphics, and Printing -- Installing the X Window System -- Customizing Your X Environment -- Windows Compatibility and Samba -- Programming Languages -- Tools for Programmers -- TCP/IP and PPP -- The World Wide Web and Electronic Mail --…”
Libro electrónico -
525Publicado 2007Tabla de Contenidos: “…Oracle database 10g new features (DBA and Developer) -- Basic Index Principles (Beginner Developer and beginner DBA) -- Disk implementation Methodology and ASM (DBA) -- Tuning the database with initialization parameters (DBA) -- Enterprise manager and grid control (DBA and Developer) -- Using explain and stored outlines (Developer and DBA) -- Basic hint syntax (Developer and DBA) -- Query tuning and beginner DBA -- Table joins and other advanced tuning (Advanced DBA and Developer) -- Using PL/SQL to enhance performance (Developer and DBA) -- Tuning RAC and using parallel features -- The V$ views (Developer and DBA) -- The X$ tables (Advanced DBA) -- Using STATSPACK and the AWR report to tune waits and latches -- Performing a quick system review (DBA) -- Monitor the system using Unix utitlities (DBA)…”
Libro electrónico -
526por Bourne, Kelly C.Tabla de Contenidos: “…responsibility for an application -- Change control -- Installing software -- Support software -- Updates and patches -- Supporting your application -- Disaster recover -- Handling problems with the application -- Repetitive activities -- Security -- The server -- Tuning -- The network -- Your organization -- The user's viewpoint -- The vendor -- The government gets involved -- System tools - common -- System tools - microsoft -- System tools - unix -- Tools you can or should develop -- Third party tools -- Troubleshooting tips -- Things to do in advance that pay off -- Things that will happen that you don't want to think about -- The end of days - decommissioning an application -- What every application administrator should know -- Education -- Parting advice, perhaps unsolicited…”
Publicado 2014
Libro electrónico -
527Publicado 2014Tabla de Contenidos: “…Front Cover; Contents; Preface; About the Author; Chapter 1 - What You Need to Know First; Chapter 2 - Attack from Christmas Island; Chapter 3 - Indirect Target Information Acquisition (ITIA); Chapter 4 - Direct Target Information Acquisition (DTIA); Chapter 5 - Nmap; Chapter 6 - MATLAB, SimuLink, and R; Chapter 7 - Metasploit Pro; Chapter 8 - China, Syria, and the American Intelligence Community; Chapter 9 - Building a Penetration Testing Lab; Chapter 10 - Vendor Default Passwords and Default Unix Ports; Chapter 11 - Oldies but Goodies If You Have Physical Access…”
Libro electrónico -
528por Blank-Edelman, David N.Tabla de Contenidos: “…System Administration Is a Craft How Perl Can Help This Book Will Show You How What You Need Locating and Installing Modules It's Not Easy Being Omnipotent Filesystems Perl to the Rescue Filesystem Differences Walking or Traversing the Filesystem Walking the Filesystem Using the File::Find Module Manipulating Disk Quotas Querying Filesystem Usage Module Information for This Chapter User Accounts Unix User Identity Windows NT/2000 User Identity Building an Account System to Manage Users Module Information for This Chapter User Activity MacOS Process Control NT/2000 Process Control Unix Process Control Tracking File and Network Operations Module Information for This Chapter TCP/IP Name Services Host Files…”
Publicado 2000
Libro electrónico -
529Publicado 2024Tabla de Contenidos: “…-- Pipes in Golang -- The mechanics of anonymous pipes -- Navigating named pipes (Mkfifo()) -- Best practices - guidelines for using pipes -- Efficient data handling -- Error handling and resource management -- Security considerations -- Performance optimization -- Developing a log processing tool -- Summary -- Chapter 7: Unix Sockets -- Introduction to Unix sockets -- Creating a Unix socket -- Going a little deeper into socket creation -- Creating the client -- Inspecting the socket with lsof -- Building a chat server -- The complete chat client -- Serving HTTP under UNIX domain sockets -- Client -- HTTP request line -- HTTP request header -- Empty line signifying end of headers -- The textproto package -- Performance -- Other common use cases -- Summary -- Part 3: Performance -- Chapter 8: Memory Management -- Technical requirements -- Garbage collection -- Stack and heap allocation -- The GC algorithm -- GOGC -- GC pacer -- GODEBUG -- Memory ballast -- GOMEMLIMIT -- Memory arenas -- Using memory arenas -- Summary -- Chapter 9: Analyzing Performance -- Escape analysis -- Stack and pointers -- Pointers -- Stack -- Heap -- How can we analyze? …”
Libro electrónico -
530por McCarthy, Martin“…With almost all linux distributions including procmail as a standard package Unix like systems and procmail are finding their way into more office and homes leaving more people wondering how to do 'the clever bits'. …”
Publicado 2002
Libro electrónico -
531Publicado 2009“…grep kurz & gut das erste Buch speziell zu grep, dem mächtigen Unix-Hilfsprogramm zur Suche und Filterung definierter Zeichenketten in Dateien. …”
Libro electrónico -
532Publicado 2014“…Die Bash-Shell ist die Standard-Shell sowohl auf den meisten Linux-Systemen als auch unter Mac OS X und wurde auf fast alle Unix-Systeme portiert. Auch für Windows existieren zwei populäre Portierungen. …”
Libro electrónico -
533
-
534por Peters, Ron“…Automating small to medium system management tasks Analyzing system data and editing configuration files Scripting Linux, Unix, and OS X applications using bash, ksh, et al…”
Publicado 2009
Libro electrónico -
535por Viega, JohnTabla de Contenidos: “…Synchronizing Resource Access Across Processes on Unix; 2.9.2. Solution; 2.9.3. Discussion; 2.9.4. …”
Publicado 2003
Libro electrónico -
536por Henry, Kevin M.Tabla de Contenidos: “…Port scanningCountermeasures to active reconnaissance; Key learning points; Questions; Chapter 5: Vulnerability Assessments; The attack vectors; References and sources of vulnerabilities; Using vulnerability assessment tools; PCI DSS requirements; Malicious code; Reporting on the vulnerability assessment; Key learning points; Questions; Chapter 6: Hacking Windows® and Unix; Having fun; Common hacking initiatives; Defeating data theft; Protecting against unauthorized access; Access controls; Actions of the attacker; Focus on UNIX/Linux; Advanced attacks; Source code review…”
Publicado 2012
Libro electrónico -
537por Dalheimer, Matthias KalleTabla de Contenidos: “…Introduction to Linux -- Preinstallation and installation -- Desktop environments -- Basic Unix commands and concepts -- Web browsers and instant messaging -- Electronic mail clients -- Games -- Office suites and personal productivity -- Multimedia -- Part 2. …”
Publicado 2005
Libro electrónico -
538por Lester, AndyTabla de Contenidos: “…Table of Contents; Preface; Audience for This Book; How This Book Is Organized; Conventions Used in This Book; Comments and Questions; Acknowledgments; Acknowledgments for Andy Lester; Safari® Enabled; Part I; Commands and Shells; Introduction; What You'll Find; Beginner's Guide; Communication; Comparisons; File Management; Printing; Programming; Searching; Shell Programming; Storage; System Status; Text Processing; Miscellaneous; Unix Command Reference; Alphabetical Summary of Commands; ac; appleping; appletalk; appletviewer; apply; apropos; asr; at; at_cho_prn; atlookup; atprint; atq; atrm…”
Publicado 2006
Libro electrónico -
539por Beale, JayTabla de Contenidos: “…/configureNessus 3 Install Guide; Mac OS X Install Process; UNIX Install Process; Fresh Installation; Red Hat and SUSE; Debian; Solaris; FreeBSD; Upgrading from Nessus 2; Configuring Nessus for UNIX; Creating a User Account; Windows Install Process; Final Steps; Installing a Client; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: Running Your First Scan; Introduction; Preparing for Your First Scan; Authorization; Risk vs. …”
Publicado 2008
Libro electrónico -
540Publicado 2009Tabla de Contenidos: “…Enforcing Security PoliciesGRC; SAP GRC Access Control; SAP GRC Process Control; Authorization Concept; Authorization Level; Task; Roles; Objects; SAP GRC Risk Management; Backend: Unix/Oracle; Security for UNIX; Installing Latest Security-Related Patches; Restricting Operating System Access; Protecting Operating System Files; Protecting Operating System Resources; Restricting Physical Server Access; Protecting Network Access; Securing an Oracle Database; Installing the Latest Oracle Security Patches; Protecting Standard Database Users; Protecting Database-Related Files…”
Libro electrónico