Mostrando 581 - 600 Resultados de 1,100 Para Buscar '"UNIX"', tiempo de consulta: 0.07s Limitar resultados
  1. 581
    Publicado 2003
    “…Other new components include WebSnap for Web application development, DataSnap for database development, and CLX, which allows cross-platform development for Unix and Linux. The new NetCLX Internet components allow development of cross-platform applications with Apache, Microsoft IIS, and Netscape Web Server applications. …”
    Libro electrónico
  2. 582
    Publicado 2005
    “…Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. …”
    Libro electrónico
  3. 583
    por Dayley, Brad
    Publicado 2006
    “…He has been a system administrator and software developer on the Unix, Windows, Linux, and NetWare platforms for the past 14 years. …”
    Libro electrónico
  4. 584
    Publicado 2008
    “…This reference delivers essential information on Active Directory directory service, security issues, disaster planning and recovery, and interoperability with Linux and UNIX. It also includes coverage of Internet Information Services (IIS) 7.0, virtualization, clustering, and performance tuning. …”
    Libro electrónico
  5. 585
    por Geudens, Tom
    Publicado 2012
    “…Learn how ROC’s new approach combines core ideas from the REST architectural style with the Unix development model. By using NetKernel to create and then string simple services together, you can develop complex systems that scale as easily as the Internet does. …”
    Libro electrónico
  6. 586
    por Gregg, Brendan
    Publicado 2013
    “…Systems Performance: Enterprise and the Cloud focuses on Linux® and Unix® performance, while illuminating performance issues that are relevant to all operating systems. …”
    Libro electrónico
  7. 587
    Publicado 2017
    “…., IP addresses), the command line, and the package manager for their Linux distribution of choice. Access to a standard UNIX account with sudo rights (or the ability to gain access to root privileges) on both the client and server is also required. …”
    Video
  8. 588
    por Hanrigou, Philippe
    Publicado 2007
    “…This short cut demonstrates how to leverage system tools available on Mac OS X, Linux, Solaris, BSD or any other Unix flavor. You will learn how to leverage the raw power of tools such as lsof, strace or gdb to resolve problems that are difficult to diagnose with the standard Ruby development tools. …”
    Libro electrónico
  9. 589
    Publicado 2007
    “…The tools allow users to quickly identify and resolve problems that occur in batch, IMS, DB2, CICS, and UNIX System Services applications. For each tool, this book provides step-by-step instructions for installation and customization, a detailed discussion of the features and capabilities, and guidance for using the tool in your environment. …”
    Libro electrónico
  10. 590
    Publicado 2024
    “…The course covers comprehensive file storage and permission management, including UNIX-style permissions, ensuring you can safeguard and manage data efficiently. …”
    Vídeo online
  11. 591
    Publicado 2003
    Tabla de Contenidos: “…Flowcharts -- Environmental variables -- Push method job stdlist real-time or batch mode -- Push method batch mode netman, TWSmerge, database, and plan -- Push method batch mode -- Pull method monitor -- Pull method event.log and real time -- Pull method convert logs -- Pull method UNIX netman -- Pull method UNIX TWSmerge -- Pull method UNIX database audit -- Pull method UNIX plan audit -- Pull method Windows Netman -- Pull method Windows TWSmerge -- Pull method Windows database audit -- Pull method Windows plan audit -- Appendix C. …”
    Libro electrónico
  12. 592
    por Tisdall, James D.
    Publicado 2001
    Tabla de Contenidos: “…; Downloading; Binary Versus Source Code; Installation; Unix and Linux; Macintosh; Windows; How to Run Perl Programs; Unix or Linux; Macs; Windows; Text Editors; Finding Help; Chapter 3. …”
    Libro electrónico
  13. 593
    Tabla de Contenidos: “…1.14 checkfiles -Check That a Directory Contains Certain FilesHow It Works; Usage; The Script; 1.15 zpad-Pad a Number with Leading Zeroes ; How It Works; Usage; The Script; 1.16 cleanup-Remove Temporary Files and Reset Terminal on Exit ; How It Works; Usage; The Script; The Unix Utilities; cat: Concatenate Files to the Standard Output ; sed: A Text Stream Editor ; awk: Pattern Scanning and Processing Language ; grep: Print Lines Matching a Regular Expression ; date: Show or Set the System Date ; tr: A Character Translation Utility ; wc: Count Characters,Words, and Lines in a File…”
    Libro electrónico
  14. 594
    Publicado 2016
    Tabla de Contenidos: “…-- ENCODING -- Binary -- Binary to Decimal -- Hexadecimal -- American Standard Code for Information Exchange -- Unicode -- Big and Little Endian -- Nibble Reversed -- Seven-Bit Short Message Service Protocol Description Unit -- EPOCHS -- UNIX -- Unix 48 bit -- UNIX Decimal 10Byte -- GPS -- AOL -- GSM -- Decimal Format -- 64bit -- File Time Formatted -- HTML -- JAVA -- MSDOS -- Binary-Coded Decimal -- ISO 8601 -- Bit Date -- MAC Absolute -- CELLEBRITE PHYSICAL ANALYZER -- Project Tree Example -- Multimedia Message Service -- USER-INSTALLED APPLICATIONS -- USER-ENABLED SECURITY -- BST -- IP-Box and MFC Dongle -- Advanced Nondestructive Exams-Joint Test Action Group -- Destructive Exams -- ADVANCED VALIDATION -- Ultra Compare Professional -- Chapter Summary -- REFERENCES FOR LISTED TOOLS -- 5 - Data Hiding -- INTRODUCTION -- WHAT IS STEGANOGRAPHY -- HIDING DATA BEHIND DATA -- STEGANALYSIS -- Intercepted Steganography Files -- Steganalysis Applications -- How Much Information Can Be Hidden -- STEGANOGRAPHY METHODS -- Investigative Steps -- RELEVANT CASES -- SUMMARY -- REFERENCES -- 6 - Cryptography and Encryption -- INTRODUCTION -- BRIEF HISTORY OF ENCRYPTION AND CRYPTOGRAPHY -- Tell Me What I Need to Know -- BASIC WORKING KNOWLEDGE -- HARDWARE -- Big Boy Encryption Toys -- Here Come the Computers -- Ease of Use Makes It User-Friendly -- PUBLIC AND PRIVATE KEYS -- Breaking Encryption -- THE KEY IS THE KEY -- SO TELL ME SOMETHING I CAN DO ABOUT THIS! …”
    Libro electrónico
  15. 595
    Publicado 2024
    Tabla de Contenidos: “…(evaluate) -- A quick definition of POSIX -- Basic command-line skills -- Unix filesystem basics -- Absolute vs. relative file paths -- Absolute vs. relative pathname review -- Opening a terminal -- Looking around - command-line navigation -- pwd - print working directory -- ls - list -- Moving around -- cd - change directory -- find - find files -- Reading files -- less - page through a file -- Making changes -- touch - create an empty file, or update modification time for an existing one -- mkdir - create a directory -- rmdir - remove empty directories -- rm - remove files and directories -- mv - move or rename files and directories -- Getting help -- Shell autocompletion -- Conclusion -- Chapter 2: Working with Processes -- Process basics -- What is a Linux process made of? …”
    Libro electrónico
  16. 596
    Publicado 2012
    Tabla de Contenidos: “…Monitor the System Using Unix Utilities (DBA) Appendix A. Key Initialization Parameters (DBA) Appendix B. …”
    Libro electrónico
  17. 597
    Publicado 2013
    “…You will also learn about UNIX, Windows, Linux and Mac OS, in order to understand where to look for and recover evidence from. …”
    Video
  18. 598
    por Pogue, David, 1963-
    Publicado 2009
    “…Security, networking, build-your-own Services, file sharing with Windows, even Mac OS X's Unix chassis-this one witty, expert guide makes it all crystal clear…”
    Libro electrónico
  19. 599
    Publicado 2017
    “…Whether you use Linux, Unix, or Windows, this new edition describes the essential practices previously handed down only from mentor to protégé. …”
    Libro electrónico
  20. 600
    Publicado 2014
    “…IBM® DB2® with BLU Acceleration is a revolutionary technology that is delivered in DB2 for Linux, UNIX, and Windows Release 10.5. BLU Acceleration delivers breakthrough performance improvements for analytic queries by using dynamic in-memory columnar technologies. …”
    Libro electrónico