Mostrando 681 - 700 Resultados de 1,100 Para Buscar '"UNIX"', tiempo de consulta: 0.07s Limitar resultados
  1. 681
    Publicado 1999
    “…Yet most of these new users draw from Microsoft Windows as their primary computing experience; for them an operating system from the UNIX family is an unfamiliar experience. In Learning Red Hat Linux , Bill McCarty has written a book aimed specifically at this new audience. …”
    Libro electrónico
  2. 682
    por Meyers, Michael, 1961-
    Publicado 2009
    “…Covers all exam topics, including how to: Build a network with the OSI seven-layer model Configure network hardware, topologies, and cabling Connect multiple Ethernet components Configure wireless networks Work with network protocols, including TCP/IP, DNS, SIP, and IMAP Configure IPv4 and IPv6 routing protocols Share and access network resources Interconnect network operating systems-Windows, Mac OS, UNIX/Linux Set up clients and servers for remote access Monitor and troubleshoot networks Secure networks with firewalls, packet filtering, encryption, authentication, and other methods The CD-ROM features Hundreds of practice questions Video introduction to CompTIA Network+ A collection of Mike's favorite shareware and freeware networking tools and utilities Complete electronic book…”
    Libro electrónico
  3. 683
    por Roland, John F.
    Publicado 2004
    “…Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. …”
    Libro electrónico
  4. 684
    por Plew, Ronald R.
    Publicado 2000
    “…Both are Oracle Certified Professionals, having specialized in Oracle and UNIX for more than 10 years each…”
    Libro electrónico
  5. 685
    por Fitzgerald, Michael
    Publicado 2012
    “…Regular expressions are an essential part of a programmer’s toolkit, available in various Unix utlilities as well as programming languages such as Perl, Java, JavaScript, and C#. …”
    Libro electrónico
  6. 686
    Publicado 2001
    “…Perl wird bei praktisch jeder Unix-Variante (einschließlich Linux) als Standardkomponente mitgeliefert, ist aber auch unter Microsoft Windows verbreitet und für nahezu jedes andere Betriebssystem verfügbar, darunter Amiga, BeOS, VMS, MVS und MacOS. …”
    Libro electrónico
  7. 687
    Publicado 2002
    “…Der Zeichenstrom-Editor sed und die Programmiersprache awk sind zwei klassische Unix-Tools zur Bearbeitung von Textdateien. Ihre Fähigkeiten zur Mustererkennung mit regulären Ausdrücken ermöglichen es Programmierern und Systemadministratoren, Editieraufgaben für eine oder mehrere Dateien zu automatisieren. …”
    Libro electrónico
  8. 688
    Publicado 2020
    “…Key exam topics include system architecture, Linux installation and package management, GNU and UNIX commands, user interfaces and desktops, essential system services, network and server security, and many more. …”
    Libro electrónico
  9. 689
    Publicado 2016
    “…Written in Java for the Java community, Tomcat is a free production grade web server that is open source, cross-platform (runs on Unix, Linux, Mac OSX, Windows), and very easy to install with no real need for configuration other than for security purposes. …”
    Video
  10. 690
    Publicado 2012
    “…This IBM Redbooks® publication addresses the DB2 pureScale feature that is available in IBM DB2 10.1 for Linux, UNIX, and Windows operating systems. It can help you build skills and deploy the DB2 pureScale feature. …”
    Libro electrónico
  11. 691
    Publicado 2012
    “…Si Mac OS X, désormais proche de l'iPad, brille par son confort d'utilisation, l'intuitivité de son interface et ses nombreux effets graphiques, il n'en demeure pas moins un système d'exploitation de la famille Unix, puissant et complet, dont on veillera à bien connaître les mécanismes pour en optimiser l'utilisation quotidienne. …”
    Libro electrónico
  12. 692
    Publicado 2011
    “…Aux développeurs concernés par les aspects système de la programmation sous Linux et Unix ; Aux administrateurs système en charge de la gestion d'un parc Linux et/ou Unix ; Aux étudiants en informatique (1er et 2e cycles universitaires, écoles d'ingénieurs, etc.). …”
    Libro electrónico
  13. 693
    Publicado 2003
    “…Now, in DB2 Version 8: The Official Guide, a team of IBM DB2 experts shows experienced DB2 professionals exactly how to make the most of DB2 Version 8 in any environment—Linux®, UNIX®, or Windows®. The authors draw on extensive personal experience helping customers implement state-of-the-art DB2 solutions, and unparalleled access to the IBM DB2 development team. …”
    Libro electrónico
  14. 694
    Publicado 2005
    “…Mac OS X Tiger Unleashed is the most comprehensive guide to unlocking the full power of Mac OS X Tiger that you can find. Written by Unix/BSD experts and Mac users, John Ray and William C. …”
    Libro electrónico
  15. 695
    por Whitaker, Andrew
    Publicado 2005
    “…The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. …”
    Libro electrónico
  16. 696
    Publicado 2022
    “…Three of the core tools needed for modern software development are the Unix command line, a text editor, and version control with Git. …”
    Libro electrónico
  17. 697
    Publicado 2001
    Tabla de Contenidos: “…Intro -- Table of Contents -- Preface -- The Audience for This Book -- Organization of the Material -- Level of Description -- Overview of the Book -- Background Information -- Conventions in This Book -- How to Contact Us -- Safari® Enabled -- Acknowledgments -- Introduction -- Linux Versus Other Unix-Like Kernels -- Hardware Dependency -- Linux Versions -- Basic Operating System Concepts -- Multiuser Systems -- Users and Groups -- Processes -- Kernel Architecture -- An Overview of the Unix Filesystem -- Files -- Hard and Soft Links -- File Types -- File Descriptor and Inode -- Access Rights and File Mode -- File-Handling System Calls -- Opening a file -- Accessing an opened file -- Closing a file -- Renaming and deleting a file -- An Overview of Unix Kernels -- The Process/Kernel Model -- Process Implementation -- Reentrant Kernels -- Process Address Space -- Synchronization and Critical Regions -- Kernel preemption disabling -- Interrupt disabling -- Semaphores -- Spin locks -- Avoiding deadlocks -- Signals and Interprocess Communication -- Process Management -- Zombie processes -- Process groups and login sessions -- Memory Management -- Virtual memory -- Random access memory usage -- Kernel Memory Allocator -- Process virtual address space handling -- Caching -- Device Drivers -- Memory Addressing -- Memory Addresses -- Segmentation in Hardware -- Segment Selectors and Segmentation Registers -- Segment Descriptors -- Fast Access to Segment Descriptors -- Segmentation Unit -- Segmentation in Linux -- The Linux GDT -- The Linux LDTs -- Paging in Hardware -- Regular Paging -- Extended Paging -- Hardware Protection Scheme -- An Example of Regular Paging -- The Physical Address Extension (PAE) Paging Mechanism -- Paging for 64-bit Architectures -- Hardware Cache -- Translation Lookaside Buffers (TLB) -- Paging in Linux…”
    Libro electrónico
  18. 698
    por Spivey, Dwight
    Publicado 2009
    Tabla de Contenidos: “…Part IV: The Multimedia MacChapter 13: Mastering Digital Images; Chapter 14: iMovie Magic; Chapter 15: Musical Mac; Part V: The Surfing Mac; Chapter 16: Staying Connected Through E-Mail; Chapter 17: Cruising the Internet with Web Browsers; Chapter 18: Chatting Across the Miles; Part VI: The Advanced Mac; Chapter 19: UNIX; Chapter 20: Alternative Operating Systems; Chapter 21: Doctor Your Ailing Mac; Chapter 22: Backing Up Your Mac; Part VII: Appendixes; Appendix A: Popular Third-Party Applications and Utilities; Appendix B: Gaming on the Mac; Appendix C: Resources…”
    Libro electrónico
  19. 699
    por Smart, John Ferguson
    Publicado 2008
    Tabla de Contenidos: “…Setting Up a Project Using Maven 2; 2.1 Maven and the Development Build Process; 2.2 Maven and Ant; 2.3 Installing Maven; Installing Maven on a Unix Machine; Installing Maven on a Windows Machine; 2.4 Declarative Builds and the Maven Project Object Model; An Introduction to Declarative Build Management; Project Context and Artifacts; A Human-Readable Project Description…”
    Libro electrónico
  20. 700
    por Raggi, Emilio
    Publicado 2011
    Tabla de Contenidos: “…; Ubuntu Linux and Its Strengths; Summary; CHAPTER 2 GNU "slash" Linux; UNIX; The Rise of the IBM PC... and of Microsoft; RMS on Free Software; Copyleft; The Quest for a UNIX-like Operating System; Linus Torvalds and His Little Project; GNU "slash" Linux; The Linux Diaspora; Open Source; The South African Factor; An Operating System for the Future; Summary; CHAPTER 3 Pre-installation Steps; Understanding Partitioning; Freeing Up Space; Reclaiming Space; Removing Windows; Using Another Hard Disk; Backing Up Your Data…”
    Libro electrónico