Mostrando 541 - 560 Resultados de 1,100 Para Buscar '"UNIX"', tiempo de consulta: 0.14s Limitar resultados
  1. 541
    por Vegh, Aaron
    Publicado 2010
    Tabla de Contenidos: “…; Tools You Need; How This Book Is Organized; Part I: Internet Infrastructure; Chapter 1: Bringing Your Business Online; Domain Name System; Registrars; Web Hosting; Setting Up Your Development Environment; Creating Your Own Website; Summary; Chapter 2: Unix Is the Engine; The What and Why of Unix; Choosing a Distribution; Installation and Setup; Users, Groups, and Permissions; Package Management; Summary; Chapter 3: Unix Applications; Using Secure Shell…”
    Libro electrónico
  2. 542
    por Farber, Rob
    Publicado 2012
    Tabla de Contenidos: “…CUDA and Amdahl's LawData and Task Parallelism; Hybrid Execution: Using Both CPU and GPU Resources; Regression Testing and Accuracy; Silent Errors; Introduction to Debugging; UNIX Debugging; NVIDIA's cuda-gdb Debugger; The CUDA Memory Checker; Use cuda-gdb with the UNIX ddd Interface; Windows Debugging with Parallel Nsight; Summary; 2 CUDA for Machine Learning and Optimization; Modeling and Simulation; Fitting Parameterized Models; Nelder-Mead Method; Levenberg-Marquardt Method; Algorithmic Speedups; Machine Learning and Neural Networks; XOR: An Important Nonlinear Machine-Learning Problem…”
    Libro electrónico
  3. 543
    Publicado 2014
    “…Python hat sich auf den Unix- und Linux-Systemen zu einer echten Alternative zu Perl entwickelt. …”
    Libro electrónico
  4. 544
    Publicado 2012
    “…Python hat sich auf den Unix- und Linux-Systemen zu einer echten Alternative zu Perl entwickelt. …”
    Libro electrónico
  5. 545
    por Hazel, Philip
    Publicado 2001
    “…It's the default mail transport agent installed on some Linux systems, runs on many versions of Unix, and is suitable for any TCP/IP network with any combination of hosts and end-user mail software.Exim is growing in popularity because it is open source, scalable, and rich in features such as the following: Compatibility with the calling interfaces and options of Sendmail (for which Exim is…”
    Libro electrónico
  6. 546
    Publicado 2014
    “…Post-mortem-Analyse, geeignete Toolkits, forensische Analyse unter Unix und Windows sowie bei PDAs und Routern.In der 6. …”
    Libro electrónico
  7. 547
    por Nusse, Helena E.
    Publicado 1998
    Libro
  8. 548
    Publicado 2022
    “…La administración del sistema operativo aborda el arranque del sistema (en modo tradicional Unix System V o por systemd), la implementación de los diferentes tipos de sistemas de archivos, la gestión de las cuentas de usuario, locales o en un directorio. …”
    Acceso con credenciales UPSA.
    Libro electrónico
  9. 549
    Publicado 2021
    “…Este libro sobre Ansible está dirigido a los administradores de sistemas Unix que quieran descubrir las distintas funcionalidades específicas de esta herramienta DevOps que permiten la configuración centralizada de servidores y de aplicaciones. …”
    Acceso con credenciales UPSA.
    Libro electrónico
  10. 550
    Publicado 2007
    “…Whether you use Linux, Unix, or Windows, this newly revised edition describes the essential practices previously handed down only from mentor to protégé. …”
    Libro electrónico
  11. 551
    Publicado 2011
    “…The first guide to DTrace: the breakthrough debugging tool for Mac OS X, Unix, Solaris, and OpenSolaris operating systems and applications Complete coverage: architecture, implementation, components, usage, and much more Covers integrating DTrace into open source code, and integrating probes into application software Includes full chapter of advanced tips and techniques For users of DTrace on all platforms Foreword by Bryan Cantril, creator of DTrace DTrace represents a revolution in debugging. …”
    Libro electrónico
  12. 552
    por Feldman, Jonathan
    Publicado 2003
    “…It does not get into the specifics of protocols or specific applications, but provides short, concise overviews of topics like wireless networking, Unix, Windows 2000, Novell Netware, routers, and firewalls…”
    Libro electrónico
  13. 553
    Publicado 2009
    “…grep Pocket Reference is the first guide devoted to grep, the powerful Unix content-location utility. This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it -- for everything from mail filtering and system log management to malware analysis. …”
    Libro electrónico
  14. 554
    Publicado 2022
    “…Overview Learn Enough Developer Tools to Be Dangerous teaches you three essential tools for modern software development: the Unix command line, a text editor, and version control with Git. …”
    Video
  15. 555
    por Wootton, Cliff
    Publicado 2007
    Tabla de Contenidos: “…Chapter 30 Adding Intelligence and MetricsChapter 31 Lateral Thinking; Chapter 32 The Bottom Line; Part 2 Tutorials; Tutorial 1 Calling Shell Commands from AppleScript; Tutorial 2 Calling AppleScript from Shells; Tutorial 3 Calling Visual Basic from AppleScript; Tutorial 4 Calling Visual Basic from UNIX; Tutorial 5 Calling UNIX Shell Commands from C; Tutorial 6 Calling Java from C Language; Tutorial 7 Calling C from Java; Tutorial 8 What Your Web Server Log Can Tell You; Tutorial 9 Monitoring Your Operating System Logs; Tutorial 10 Measuring and Monitoring Disk Usage…”
    Libro electrónico
  16. 556
    Publicado 2017
    Tabla de Contenidos: “…9 Introduction to iAS for the OAS administrator10 Viewing performance data with OAS; 11 Top DBA scripts for web developers; 12 Web-based testing and capacity planning; 13 HTTP listeners; 14 Introduction to UTL_HTTP; 15 Portal 3.0: Moving folders across content areas with its API; 16 Not webDB 3.3, Not iPortal, but Oracle Portal; Part III Java and Oracle; 17 The fast track to Java with Oracle; 18 Building a Java Applet for monitoring Oracle; Part IV Oracle and Unix; 19 UNIX scripts for Oracle administration; 20 UNIX tips and tricks for the Oracle DBA…”
    Libro electrónico
  17. 557
    por Pogue, David, 1963-
    Publicado 2005
    Tabla de Contenidos: “…The Mac OS X Desktop -- Folders and windows -- Organizing your stuff -- Spotlight -- Dock, desktop, and toolbar -- Applications in Mac OS X -- Documents, programs, and dashboard -- Mac OS 9 programs-and windows programs -- Moving data -- Automator and AppleScript -- The components of Mac OS X -- System preferences -- The free programs -- CDs, DVDs, and iTunes -- The technologies of Mac OS X --Accounts, firewalls, and security -- Networking -- Graphics, fonts, printing, and faxing -- Sound, movies, speech, and handwriting -- Terminal: doorway to Unix -- Fun with terminal -- Hacking Mac OS X -- Internet setup, .Mac, and iSync -- Mail and address book -- Safari, iChat and Sherlock -- SSH, FTP, VPN, and web sharing -- Appendix A: Installing Mac OS X 10.4 -- Appendix B: Troubleshooting -- Appendix C: The "Where'd it go?" …”
    Libro electrónico
  18. 558
    Publicado 2004
    Tabla de Contenidos: “…-- 1.2 IBM Eserver BladeCenter and xSeries commitment to Linux -- 1.3 VERITAS commitment to Linux -- 1.4 VERITAS solutions -- 1.4.1 VERITAS Storage Foundation for Linux -- 1.4.2 VERITAS NetBackup for Linux -- 1.4.3 VERITAS Volume Replicator for Linux -- 1.4.4 VERITAS Cluster Server for Linux -- 1.4.5 VERITAS Opforce for Linux -- 1.4.6 VERITAS i3 for Linux -- 1.5 A world-class community of enterprise Linux partners -- Chapter 2. UNIX to Linux migration considerations -- 2.1 Complexity of migrations -- 2.2 Migration challenges -- 2.2.1 Operating system dependence -- 2.2.2 File management dependence -- 2.2.3 Endianess -- 2.2.4 Different techniques of migrating data -- Chapter 3. …”
    Libro electrónico
  19. 559
    por Garman, Jason
    Publicado 2003
    Tabla de Contenidos: “…Security; Kerberos Attacks; Other Attacks; Protocol Security Issues; Dictionary and Brute-Force Attacks; Replay Attacks; Man-in-the-Middle Attacks; Security Solutions; Requiring Pre-Authentication; MIT; Heimdal; Windows domain controllers; Enforcing Secure Passwords; Heimdal; MIT; Windows domain controllers; Enforcing Password Lifetimes and History; MIT; Heimdal; Windows domain controllers; Protecting Your KDC; Protecting a Unix KDC…”
    Libro electrónico
  20. 560
    por Matthew, Neil
    Publicado 2008
    Tabla de Contenidos: “…; What's Covered in the Book; What You Need to Use This Book; Source Code; Conventions; Errata; p2p.wrox.com; Chapter 1: Getting Started; An Introduction to UNIX, Linux, and GNU; Programming Linux; Getting Help; Summary; Chapter 2: Shell Programming; Why Program with a Shell?…”
    Libro electrónico