Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 231
- Computer Science 199
- Operating systems (Computers) 197
- UNIX (Computer file) 145
- Linux 121
- Computer networks 88
- Sistemas operativos 73
- Unix 62
- Security measures 59
- Mac OS 57
- Development 54
- Application software 45
- Computer security 41
- Database management 40
- Macintosh (Computer) 38
- UNIX Shells 36
- Programming 35
- Examinations 32
- Computer programs 31
- Open source software 31
- Electrical & Computer Engineering 30
- Computer programming 29
- Telecommunications 29
- Certification 28
- Client/server computing 26
- Electronic data processing personnel 25
- Electronic data processing 23
- Informática 22
- Python (Computer program language) 22
- IBM Database 2 21
-
581Publicado 2003“…Other new components include WebSnap for Web application development, DataSnap for database development, and CLX, which allows cross-platform development for Unix and Linux. The new NetCLX Internet components allow development of cross-platform applications with Apache, Microsoft IIS, and Netscape Web Server applications. …”
Libro electrónico -
582Publicado 2005“…Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. …”
Libro electrónico -
583por Dayley, Brad“…He has been a system administrator and software developer on the Unix, Windows, Linux, and NetWare platforms for the past 14 years. …”
Publicado 2006
Libro electrónico -
584Publicado 2008“…This reference delivers essential information on Active Directory directory service, security issues, disaster planning and recovery, and interoperability with Linux and UNIX. It also includes coverage of Internet Information Services (IIS) 7.0, virtualization, clustering, and performance tuning. …”
Libro electrónico -
585por Geudens, Tom“…Learn how ROC’s new approach combines core ideas from the REST architectural style with the Unix development model. By using NetKernel to create and then string simple services together, you can develop complex systems that scale as easily as the Internet does. …”
Publicado 2012
Libro electrónico -
586por Gregg, Brendan“…Systems Performance: Enterprise and the Cloud focuses on Linux® and Unix® performance, while illuminating performance issues that are relevant to all operating systems. …”
Publicado 2013
Libro electrónico -
587Publicado 2017“…., IP addresses), the command line, and the package manager for their Linux distribution of choice. Access to a standard UNIX account with sudo rights (or the ability to gain access to root privileges) on both the client and server is also required. …”
Video -
588por Hanrigou, Philippe“…This short cut demonstrates how to leverage system tools available on Mac OS X, Linux, Solaris, BSD or any other Unix flavor. You will learn how to leverage the raw power of tools such as lsof, strace or gdb to resolve problems that are difficult to diagnose with the standard Ruby development tools. …”
Publicado 2007
Libro electrónico -
589Publicado 2007“…The tools allow users to quickly identify and resolve problems that occur in batch, IMS, DB2, CICS, and UNIX System Services applications. For each tool, this book provides step-by-step instructions for installation and customization, a detailed discussion of the features and capabilities, and guidance for using the tool in your environment. …”
Libro electrónico -
590Publicado 2024“…The course covers comprehensive file storage and permission management, including UNIX-style permissions, ensuring you can safeguard and manage data efficiently. …”
Vídeo online -
591Publicado 2003Tabla de Contenidos: “…Flowcharts -- Environmental variables -- Push method job stdlist real-time or batch mode -- Push method batch mode netman, TWSmerge, database, and plan -- Push method batch mode -- Pull method monitor -- Pull method event.log and real time -- Pull method convert logs -- Pull method UNIX netman -- Pull method UNIX TWSmerge -- Pull method UNIX database audit -- Pull method UNIX plan audit -- Pull method Windows Netman -- Pull method Windows TWSmerge -- Pull method Windows database audit -- Pull method Windows plan audit -- Appendix C. …”
Libro electrónico -
592por Tisdall, James D.Tabla de Contenidos: “…; Downloading; Binary Versus Source Code; Installation; Unix and Linux; Macintosh; Windows; How to Run Perl Programs; Unix or Linux; Macs; Windows; Text Editors; Finding Help; Chapter 3. …”
Publicado 2001
Libro electrónico -
593Tabla de Contenidos: “…1.14 checkfiles -Check That a Directory Contains Certain FilesHow It Works; Usage; The Script; 1.15 zpad-Pad a Number with Leading Zeroes ; How It Works; Usage; The Script; 1.16 cleanup-Remove Temporary Files and Reset Terminal on Exit ; How It Works; Usage; The Script; The Unix Utilities; cat: Concatenate Files to the Standard Output ; sed: A Text Stream Editor ; awk: Pattern Scanning and Processing Language ; grep: Print Lines Matching a Regular Expression ; date: Show or Set the System Date ; tr: A Character Translation Utility ; wc: Count Characters,Words, and Lines in a File…”
Libro electrónico -
594Publicado 2016Tabla de Contenidos: “…-- ENCODING -- Binary -- Binary to Decimal -- Hexadecimal -- American Standard Code for Information Exchange -- Unicode -- Big and Little Endian -- Nibble Reversed -- Seven-Bit Short Message Service Protocol Description Unit -- EPOCHS -- UNIX -- Unix 48 bit -- UNIX Decimal 10Byte -- GPS -- AOL -- GSM -- Decimal Format -- 64bit -- File Time Formatted -- HTML -- JAVA -- MSDOS -- Binary-Coded Decimal -- ISO 8601 -- Bit Date -- MAC Absolute -- CELLEBRITE PHYSICAL ANALYZER -- Project Tree Example -- Multimedia Message Service -- USER-INSTALLED APPLICATIONS -- USER-ENABLED SECURITY -- BST -- IP-Box and MFC Dongle -- Advanced Nondestructive Exams-Joint Test Action Group -- Destructive Exams -- ADVANCED VALIDATION -- Ultra Compare Professional -- Chapter Summary -- REFERENCES FOR LISTED TOOLS -- 5 - Data Hiding -- INTRODUCTION -- WHAT IS STEGANOGRAPHY -- HIDING DATA BEHIND DATA -- STEGANALYSIS -- Intercepted Steganography Files -- Steganalysis Applications -- How Much Information Can Be Hidden -- STEGANOGRAPHY METHODS -- Investigative Steps -- RELEVANT CASES -- SUMMARY -- REFERENCES -- 6 - Cryptography and Encryption -- INTRODUCTION -- BRIEF HISTORY OF ENCRYPTION AND CRYPTOGRAPHY -- Tell Me What I Need to Know -- BASIC WORKING KNOWLEDGE -- HARDWARE -- Big Boy Encryption Toys -- Here Come the Computers -- Ease of Use Makes It User-Friendly -- PUBLIC AND PRIVATE KEYS -- Breaking Encryption -- THE KEY IS THE KEY -- SO TELL ME SOMETHING I CAN DO ABOUT THIS! …”
Libro electrónico -
595Publicado 2024Tabla de Contenidos: “…(evaluate) -- A quick definition of POSIX -- Basic command-line skills -- Unix filesystem basics -- Absolute vs. relative file paths -- Absolute vs. relative pathname review -- Opening a terminal -- Looking around - command-line navigation -- pwd - print working directory -- ls - list -- Moving around -- cd - change directory -- find - find files -- Reading files -- less - page through a file -- Making changes -- touch - create an empty file, or update modification time for an existing one -- mkdir - create a directory -- rmdir - remove empty directories -- rm - remove files and directories -- mv - move or rename files and directories -- Getting help -- Shell autocompletion -- Conclusion -- Chapter 2: Working with Processes -- Process basics -- What is a Linux process made of? …”
Libro electrónico -
596Publicado 2012Tabla de Contenidos: “…Monitor the System Using Unix Utilities (DBA) Appendix A. Key Initialization Parameters (DBA) Appendix B. …”
Libro electrónico -
597Publicado 2013“…You will also learn about UNIX, Windows, Linux and Mac OS, in order to understand where to look for and recover evidence from. …”
-
598por Pogue, David, 1963-“…Security, networking, build-your-own Services, file sharing with Windows, even Mac OS X's Unix chassis-this one witty, expert guide makes it all crystal clear…”
Publicado 2009
Libro electrónico -
599Publicado 2017“…Whether you use Linux, Unix, or Windows, this new edition describes the essential practices previously handed down only from mentor to protégé. …”
Libro electrónico -
600Publicado 2014“…IBM® DB2® with BLU Acceleration is a revolutionary technology that is delivered in DB2 for Linux, UNIX, and Windows Release 10.5. BLU Acceleration delivers breakthrough performance improvements for analytic queries by using dynamic in-memory columnar technologies. …”
Libro electrónico