Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 231
- Computer Science 199
- Operating systems (Computers) 197
- UNIX (Computer file) 145
- Linux 121
- Computer networks 88
- Sistemas operativos 73
- Unix 62
- Security measures 59
- Mac OS 57
- Development 54
- Application software 45
- Computer security 41
- Database management 40
- Macintosh (Computer) 38
- UNIX Shells 36
- Programming 35
- Examinations 32
- Computer programs 31
- Open source software 31
- Electrical & Computer Engineering 30
- Computer programming 29
- Telecommunications 29
- Certification 28
- Client/server computing 26
- Electronic data processing personnel 25
- Electronic data processing 23
- Informática 22
- Python (Computer program language) 22
- IBM Database 2 21
-
681Publicado 1999“…Yet most of these new users draw from Microsoft Windows as their primary computing experience; for them an operating system from the UNIX family is an unfamiliar experience. In Learning Red Hat Linux , Bill McCarty has written a book aimed specifically at this new audience. …”
Libro electrónico -
682por Meyers, Michael, 1961-“…Covers all exam topics, including how to: Build a network with the OSI seven-layer model Configure network hardware, topologies, and cabling Connect multiple Ethernet components Configure wireless networks Work with network protocols, including TCP/IP, DNS, SIP, and IMAP Configure IPv4 and IPv6 routing protocols Share and access network resources Interconnect network operating systems-Windows, Mac OS, UNIX/Linux Set up clients and servers for remote access Monitor and troubleshoot networks Secure networks with firewalls, packet filtering, encryption, authentication, and other methods The CD-ROM features Hundreds of practice questions Video introduction to CompTIA Network+ A collection of Mike's favorite shareware and freeware networking tools and utilities Complete electronic book…”
Publicado 2009
Libro electrónico -
683por Roland, John F.“…Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. …”
Publicado 2004
Libro electrónico -
684por Plew, Ronald R.“…Both are Oracle Certified Professionals, having specialized in Oracle and UNIX for more than 10 years each…”
Publicado 2000
Libro electrónico -
685por Fitzgerald, Michael“…Regular expressions are an essential part of a programmer’s toolkit, available in various Unix utlilities as well as programming languages such as Perl, Java, JavaScript, and C#. …”
Publicado 2012
Libro electrónico -
686Publicado 2001“…Perl wird bei praktisch jeder Unix-Variante (einschließlich Linux) als Standardkomponente mitgeliefert, ist aber auch unter Microsoft Windows verbreitet und für nahezu jedes andere Betriebssystem verfügbar, darunter Amiga, BeOS, VMS, MVS und MacOS. …”
Libro electrónico -
687Publicado 2002“…Der Zeichenstrom-Editor sed und die Programmiersprache awk sind zwei klassische Unix-Tools zur Bearbeitung von Textdateien. Ihre Fähigkeiten zur Mustererkennung mit regulären Ausdrücken ermöglichen es Programmierern und Systemadministratoren, Editieraufgaben für eine oder mehrere Dateien zu automatisieren. …”
Libro electrónico -
688Publicado 2020“…Key exam topics include system architecture, Linux installation and package management, GNU and UNIX commands, user interfaces and desktops, essential system services, network and server security, and many more. …”
Libro electrónico -
689Publicado 2016“…Written in Java for the Java community, Tomcat is a free production grade web server that is open source, cross-platform (runs on Unix, Linux, Mac OSX, Windows), and very easy to install with no real need for configuration other than for security purposes. …”
-
690Publicado 2012“…This IBM Redbooks® publication addresses the DB2 pureScale feature that is available in IBM DB2 10.1 for Linux, UNIX, and Windows operating systems. It can help you build skills and deploy the DB2 pureScale feature. …”
Libro electrónico -
691Publicado 2012“…Si Mac OS X, désormais proche de l'iPad, brille par son confort d'utilisation, l'intuitivité de son interface et ses nombreux effets graphiques, il n'en demeure pas moins un système d'exploitation de la famille Unix, puissant et complet, dont on veillera à bien connaître les mécanismes pour en optimiser l'utilisation quotidienne. …”
Libro electrónico -
692Publicado 2011“…Aux développeurs concernés par les aspects système de la programmation sous Linux et Unix ; Aux administrateurs système en charge de la gestion d'un parc Linux et/ou Unix ; Aux étudiants en informatique (1er et 2e cycles universitaires, écoles d'ingénieurs, etc.). …”
Libro electrónico -
693Publicado 2003“…Now, in DB2 Version 8: The Official Guide, a team of IBM DB2 experts shows experienced DB2 professionals exactly how to make the most of DB2 Version 8 in any environment—Linux®, UNIX®, or Windows®. The authors draw on extensive personal experience helping customers implement state-of-the-art DB2 solutions, and unparalleled access to the IBM DB2 development team. …”
Libro electrónico -
694Publicado 2005“…Mac OS X Tiger Unleashed is the most comprehensive guide to unlocking the full power of Mac OS X Tiger that you can find. Written by Unix/BSD experts and Mac users, John Ray and William C. …”
Libro electrónico -
695por Whitaker, Andrew“…The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. …”
Publicado 2005
Libro electrónico -
696Publicado 2022“…Three of the core tools needed for modern software development are the Unix command line, a text editor, and version control with Git. …”
Libro electrónico -
697Publicado 2001Tabla de Contenidos: “…Intro -- Table of Contents -- Preface -- The Audience for This Book -- Organization of the Material -- Level of Description -- Overview of the Book -- Background Information -- Conventions in This Book -- How to Contact Us -- Safari® Enabled -- Acknowledgments -- Introduction -- Linux Versus Other Unix-Like Kernels -- Hardware Dependency -- Linux Versions -- Basic Operating System Concepts -- Multiuser Systems -- Users and Groups -- Processes -- Kernel Architecture -- An Overview of the Unix Filesystem -- Files -- Hard and Soft Links -- File Types -- File Descriptor and Inode -- Access Rights and File Mode -- File-Handling System Calls -- Opening a file -- Accessing an opened file -- Closing a file -- Renaming and deleting a file -- An Overview of Unix Kernels -- The Process/Kernel Model -- Process Implementation -- Reentrant Kernels -- Process Address Space -- Synchronization and Critical Regions -- Kernel preemption disabling -- Interrupt disabling -- Semaphores -- Spin locks -- Avoiding deadlocks -- Signals and Interprocess Communication -- Process Management -- Zombie processes -- Process groups and login sessions -- Memory Management -- Virtual memory -- Random access memory usage -- Kernel Memory Allocator -- Process virtual address space handling -- Caching -- Device Drivers -- Memory Addressing -- Memory Addresses -- Segmentation in Hardware -- Segment Selectors and Segmentation Registers -- Segment Descriptors -- Fast Access to Segment Descriptors -- Segmentation Unit -- Segmentation in Linux -- The Linux GDT -- The Linux LDTs -- Paging in Hardware -- Regular Paging -- Extended Paging -- Hardware Protection Scheme -- An Example of Regular Paging -- The Physical Address Extension (PAE) Paging Mechanism -- Paging for 64-bit Architectures -- Hardware Cache -- Translation Lookaside Buffers (TLB) -- Paging in Linux…”
Libro electrónico -
698por Spivey, DwightTabla de Contenidos: “…Part IV: The Multimedia MacChapter 13: Mastering Digital Images; Chapter 14: iMovie Magic; Chapter 15: Musical Mac; Part V: The Surfing Mac; Chapter 16: Staying Connected Through E-Mail; Chapter 17: Cruising the Internet with Web Browsers; Chapter 18: Chatting Across the Miles; Part VI: The Advanced Mac; Chapter 19: UNIX; Chapter 20: Alternative Operating Systems; Chapter 21: Doctor Your Ailing Mac; Chapter 22: Backing Up Your Mac; Part VII: Appendixes; Appendix A: Popular Third-Party Applications and Utilities; Appendix B: Gaming on the Mac; Appendix C: Resources…”
Publicado 2009
Libro electrónico -
699por Smart, John FergusonTabla de Contenidos: “…Setting Up a Project Using Maven 2; 2.1 Maven and the Development Build Process; 2.2 Maven and Ant; 2.3 Installing Maven; Installing Maven on a Unix Machine; Installing Maven on a Windows Machine; 2.4 Declarative Builds and the Maven Project Object Model; An Introduction to Declarative Build Management; Project Context and Artifacts; A Human-Readable Project Description…”
Publicado 2008
Libro electrónico -
700por Raggi, EmilioTabla de Contenidos: “…; Ubuntu Linux and Its Strengths; Summary; CHAPTER 2 GNU "slash" Linux; UNIX; The Rise of the IBM PC... and of Microsoft; RMS on Free Software; Copyleft; The Quest for a UNIX-like Operating System; Linus Torvalds and His Little Project; GNU "slash" Linux; The Linux Diaspora; Open Source; The South African Factor; An Operating System for the Future; Summary; CHAPTER 3 Pre-installation Steps; Understanding Partitioning; Freeing Up Space; Reclaiming Space; Removing Windows; Using Another Hard Disk; Backing Up Your Data…”
Publicado 2011
Libro electrónico