Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 231
- Computer Science 199
- Operating systems (Computers) 197
- UNIX (Computer file) 145
- Linux 121
- Computer networks 88
- Sistemas operativos 73
- Unix 62
- Security measures 59
- Mac OS 57
- Development 54
- Application software 45
- Computer security 41
- Database management 40
- Macintosh (Computer) 38
- UNIX Shells 36
- Programming 35
- Examinations 32
- Computer programs 31
- Open source software 31
- Electrical & Computer Engineering 30
- Computer programming 29
- Telecommunications 29
- Certification 28
- Client/server computing 26
- Electronic data processing personnel 25
- Electronic data processing 23
- Informática 22
- Python (Computer program language) 22
- IBM Database 2 21
-
541por Vegh, AaronTabla de Contenidos: “…; Tools You Need; How This Book Is Organized; Part I: Internet Infrastructure; Chapter 1: Bringing Your Business Online; Domain Name System; Registrars; Web Hosting; Setting Up Your Development Environment; Creating Your Own Website; Summary; Chapter 2: Unix Is the Engine; The What and Why of Unix; Choosing a Distribution; Installation and Setup; Users, Groups, and Permissions; Package Management; Summary; Chapter 3: Unix Applications; Using Secure Shell…”
Publicado 2010
Libro electrónico -
542por Farber, RobTabla de Contenidos: “…CUDA and Amdahl's LawData and Task Parallelism; Hybrid Execution: Using Both CPU and GPU Resources; Regression Testing and Accuracy; Silent Errors; Introduction to Debugging; UNIX Debugging; NVIDIA's cuda-gdb Debugger; The CUDA Memory Checker; Use cuda-gdb with the UNIX ddd Interface; Windows Debugging with Parallel Nsight; Summary; 2 CUDA for Machine Learning and Optimization; Modeling and Simulation; Fitting Parameterized Models; Nelder-Mead Method; Levenberg-Marquardt Method; Algorithmic Speedups; Machine Learning and Neural Networks; XOR: An Important Nonlinear Machine-Learning Problem…”
Publicado 2012
Libro electrónico -
543Publicado 2014“…Python hat sich auf den Unix- und Linux-Systemen zu einer echten Alternative zu Perl entwickelt. …”
Libro electrónico -
544Publicado 2012“…Python hat sich auf den Unix- und Linux-Systemen zu einer echten Alternative zu Perl entwickelt. …”
Libro electrónico -
545por Hazel, Philip“…It's the default mail transport agent installed on some Linux systems, runs on many versions of Unix, and is suitable for any TCP/IP network with any combination of hosts and end-user mail software.Exim is growing in popularity because it is open source, scalable, and rich in features such as the following: Compatibility with the calling interfaces and options of Sendmail (for which Exim is…”
Publicado 2001
Libro electrónico -
546Publicado 2014“…Post-mortem-Analyse, geeignete Toolkits, forensische Analyse unter Unix und Windows sowie bei PDAs und Routern.In der 6. …”
Libro electrónico -
547
-
548Publicado 2022“…La administración del sistema operativo aborda el arranque del sistema (en modo tradicional Unix System V o por systemd), la implementación de los diferentes tipos de sistemas de archivos, la gestión de las cuentas de usuario, locales o en un directorio. …”
Acceso con credenciales UPSA.
Libro electrónico -
549Publicado 2021“…Este libro sobre Ansible está dirigido a los administradores de sistemas Unix que quieran descubrir las distintas funcionalidades específicas de esta herramienta DevOps que permiten la configuración centralizada de servidores y de aplicaciones. …”
Acceso con credenciales UPSA.
Libro electrónico -
550Publicado 2007“…Whether you use Linux, Unix, or Windows, this newly revised edition describes the essential practices previously handed down only from mentor to protégé. …”
Libro electrónico -
551Publicado 2011“…The first guide to DTrace: the breakthrough debugging tool for Mac OS X, Unix, Solaris, and OpenSolaris operating systems and applications Complete coverage: architecture, implementation, components, usage, and much more Covers integrating DTrace into open source code, and integrating probes into application software Includes full chapter of advanced tips and techniques For users of DTrace on all platforms Foreword by Bryan Cantril, creator of DTrace DTrace represents a revolution in debugging. …”
Libro electrónico -
552por Feldman, Jonathan“…It does not get into the specifics of protocols or specific applications, but provides short, concise overviews of topics like wireless networking, Unix, Windows 2000, Novell Netware, routers, and firewalls…”
Publicado 2003
Libro electrónico -
553Publicado 2009“…grep Pocket Reference is the first guide devoted to grep, the powerful Unix content-location utility. This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it -- for everything from mail filtering and system log management to malware analysis. …”
Libro electrónico -
554Publicado 2022“…Overview Learn Enough Developer Tools to Be Dangerous teaches you three essential tools for modern software development: the Unix command line, a text editor, and version control with Git. …”
Video -
555por Wootton, CliffTabla de Contenidos: “…Chapter 30 Adding Intelligence and MetricsChapter 31 Lateral Thinking; Chapter 32 The Bottom Line; Part 2 Tutorials; Tutorial 1 Calling Shell Commands from AppleScript; Tutorial 2 Calling AppleScript from Shells; Tutorial 3 Calling Visual Basic from AppleScript; Tutorial 4 Calling Visual Basic from UNIX; Tutorial 5 Calling UNIX Shell Commands from C; Tutorial 6 Calling Java from C Language; Tutorial 7 Calling C from Java; Tutorial 8 What Your Web Server Log Can Tell You; Tutorial 9 Monitoring Your Operating System Logs; Tutorial 10 Measuring and Monitoring Disk Usage…”
Publicado 2007
Libro electrónico -
556Publicado 2017Tabla de Contenidos: “…9 Introduction to iAS for the OAS administrator10 Viewing performance data with OAS; 11 Top DBA scripts for web developers; 12 Web-based testing and capacity planning; 13 HTTP listeners; 14 Introduction to UTL_HTTP; 15 Portal 3.0: Moving folders across content areas with its API; 16 Not webDB 3.3, Not iPortal, but Oracle Portal; Part III Java and Oracle; 17 The fast track to Java with Oracle; 18 Building a Java Applet for monitoring Oracle; Part IV Oracle and Unix; 19 UNIX scripts for Oracle administration; 20 UNIX tips and tricks for the Oracle DBA…”
Libro electrónico -
557por Pogue, David, 1963-Tabla de Contenidos: “…The Mac OS X Desktop -- Folders and windows -- Organizing your stuff -- Spotlight -- Dock, desktop, and toolbar -- Applications in Mac OS X -- Documents, programs, and dashboard -- Mac OS 9 programs-and windows programs -- Moving data -- Automator and AppleScript -- The components of Mac OS X -- System preferences -- The free programs -- CDs, DVDs, and iTunes -- The technologies of Mac OS X --Accounts, firewalls, and security -- Networking -- Graphics, fonts, printing, and faxing -- Sound, movies, speech, and handwriting -- Terminal: doorway to Unix -- Fun with terminal -- Hacking Mac OS X -- Internet setup, .Mac, and iSync -- Mail and address book -- Safari, iChat and Sherlock -- SSH, FTP, VPN, and web sharing -- Appendix A: Installing Mac OS X 10.4 -- Appendix B: Troubleshooting -- Appendix C: The "Where'd it go?" …”
Publicado 2005
Libro electrónico -
558Publicado 2004Tabla de Contenidos: “…-- 1.2 IBM Eserver BladeCenter and xSeries commitment to Linux -- 1.3 VERITAS commitment to Linux -- 1.4 VERITAS solutions -- 1.4.1 VERITAS Storage Foundation for Linux -- 1.4.2 VERITAS NetBackup for Linux -- 1.4.3 VERITAS Volume Replicator for Linux -- 1.4.4 VERITAS Cluster Server for Linux -- 1.4.5 VERITAS Opforce for Linux -- 1.4.6 VERITAS i3 for Linux -- 1.5 A world-class community of enterprise Linux partners -- Chapter 2. UNIX to Linux migration considerations -- 2.1 Complexity of migrations -- 2.2 Migration challenges -- 2.2.1 Operating system dependence -- 2.2.2 File management dependence -- 2.2.3 Endianess -- 2.2.4 Different techniques of migrating data -- Chapter 3. …”
Libro electrónico -
559por Garman, JasonTabla de Contenidos: “…Security; Kerberos Attacks; Other Attacks; Protocol Security Issues; Dictionary and Brute-Force Attacks; Replay Attacks; Man-in-the-Middle Attacks; Security Solutions; Requiring Pre-Authentication; MIT; Heimdal; Windows domain controllers; Enforcing Secure Passwords; Heimdal; MIT; Windows domain controllers; Enforcing Password Lifetimes and History; MIT; Heimdal; Windows domain controllers; Protecting Your KDC; Protecting a Unix KDC…”
Publicado 2003
Libro electrónico -
560por Matthew, NeilTabla de Contenidos: “…; What's Covered in the Book; What You Need to Use This Book; Source Code; Conventions; Errata; p2p.wrox.com; Chapter 1: Getting Started; An Introduction to UNIX, Linux, and GNU; Programming Linux; Getting Help; Summary; Chapter 2: Shell Programming; Why Program with a Shell?…”
Publicado 2008
Libro electrónico