Mostrando 741 - 760 Resultados de 1,100 Para Buscar '"UNIX"', tiempo de consulta: 0.07s Limitar resultados
  1. 741
    Publicado 2006
    “…The tools allow users to quickly identify and resolve problems that occur in batch, IMS, DB2, CICS, and UNIX System Services applications. For each tool, this book provides step-by-step instructions for installation and customization, a detailed discussion of the features and capabilities, and guidance for using the tool in your environment…”
    Libro electrónico
  2. 742
    Publicado 2021
    “…You will: Customize the terminal to make it perfect for your needs Develop web applications using basic coding skills in the terminal Install HomeBrew and by extension Linux and Unix applications…”
    Libro electrónico
  3. 743
    por Van der Linden, Peter
    Publicado 1994
    “…Covering both the IBM PC and UNIX systems, it is an entertaining and educational romp through C showing how experts really use it. …”
    Libro electrónico
  4. 744
    Publicado 2015
    Tabla de Contenidos: “…""Copyright""; ""Table of Contents""; ""Ruby Pocket Reference""; ""Introduction""; ""Conventions Used in This Book""; ""Using Code Examples""; ""Safari® Books Online""; ""How to Contact Us""; ""Acknowledgments""; ""Running Ruby""; ""Running the Ruby Interpreter""; ""Interactive Ruby (irb)""; ""Using a Shebang Comment on Unix/Linux""; ""Associating File Types on Windows""; ""Ruby's Keywords""; ""Ruby's Operators""; ""Comments""; ""Numbers""; ""Variables""; ""Local Variables""; ""Instance Variables""; ""Class Variables""; ""Global Variables""; ""Constants""; ""Parallel Variable Assignment""…”
    Libro electrónico
  5. 745
    por Fitzgerald, Michael, 1957-
    Publicado 2009
    Tabla de Contenidos: “…Contents; Ruby Pocket Reference; Conventions Used in This Book; Comments and Questions; Acknowledgments; Running Ruby; Running the Ruby Interpreter; Using a Shebang Line on Unix/Linux; Associating File Types on Windows; Reserved Words; Operators; Comments; Numbers; Variables; Local Variables; Instance Variables; Class Variables; Global Variables; Constants; Parallel Assignment of Variables; Symbols; Predefined Variables; Pseudovariables; Global Constants; Ranges; Methods; Parentheses; Return Values; Method Name Conventions; Default Arguments; Variable Arguments; Aliasing Methods; Blocks…”
    Libro electrónico
  6. 746
    Publicado 2010
    Tabla de Contenidos: “…Windows Server 2008 R2 technology primer -- Planning, prototyping, migrating, and deploying Windows Server 2008 R2 best practices -- Installing Windows Server 2008 R2 and Server Core -- Active Directory Domain Services primer -- Designing a Windows Server 2008 R2 Active Directory -- Designing organization unit and group structure -- Active Directory infrastructure -- Creating federated forests and lightweight directories -- Integrating Active Directory in a UNIX environment -- Domain name system and IPv6 -- DHCP/WINS/domain controllers -- Internet information services -- Server-level security -- Transport-level security -- Security policies, network policy server, and network access protection -- Migrating from Windows Server 2003/2008 to Windows Server 2008 R2 -- Compatibility testing -- Windows Server 2008 R2 administration -- Windows Server 2008 R2 group policies and policy management -- Windows Server 2008 R2 management and maintenance practices -- Automating tasks using PowerShell scripting -- Documenting a Windows Server 2008 R2 environment -- Integrating System Center Operations Manager 2007 R2 with Windows Server 2008 R2 -- Server-to-client Remote Access and DirectAccess -- Remote desktop services -- Windows Server 2008 R2 administration tools for desktops -- Group policy management for network clients -- File system management and fault tolerance -- System-level fault tolerance (clustering/network load balancing) -- Backing up the Windows Server 2008 R2 environment -- Recovering from a disaster -- Optimizing Windows Server 2008 R2 for branch office communications -- Logging and debugging -- Capacity analysis and performance optimization -- Windows SharePoint services -- Windows media services -- Deploying and using Windows virtualization…”
    Libro electrónico
  7. 747
    por Krikorian, Raffi
    Publicado 2003
    Tabla de Contenidos: “…Enabling Bash over the Serial Port; 31. Copying Unix Binaries to TiVo; 32. Clean Up and Shut Down; 33. …”
    Libro electrónico
  8. 748
    por Saltzer, J. H., 1939-
    Publicado 2009
    Tabla de Contenidos: “…2.2.1 The Naming Model2.2.2 Default and Explicit Context References; 2.2.3 Path Names, Naming Networks, and Recursive Name Resolution; 2.2.4 Multiple Lookup: Searching through Layered Contexts; 2.2.5 Comparing Names; 2.2.6 Name Discovery; 2.3 Organizing Computer Systems with Names and Layers; 2.3.1 A Hardware Layer: The Bus; 2.3.2 A Software Layer: The File Abstraction; 2.4 Looking Back and Ahead; 2.5 Case Study: UNIX® File System Layering and Naming; 2.5.1 Application Programming Interface for the UNIX File System; 2.5.2 The Block Layer; 2.5.3 The File Layer; 2.5.4 The Inode Number Layer…”
    Libro electrónico
  9. 749
    Publicado 2022
    “…Learn to program with Rust 2021 Edition, in an easy, step-by-step manner on Unix, the Linux shell, macOS, and the Windows command line. …”
    Libro electrónico
  10. 750
    por Deshev, Hristo
    Publicado 2008
    “…Windows power users have always envied their friends running UNIX machines for the ease of automation that they enjoy. …”
    Libro electrónico
  11. 751
    por Loope, James
    Publicado 2012
    “…This concise introduction shows you how to use Puppet's tools and templates to organize and execute configuration plans on Linux, Unix, and Windows servers. Through code samples and real-world examples, you'll learn how to manage pools of servers and virtual instances, and how to administer access control. …”
    Libro electrónico
  12. 752
    Publicado 2012
    Tabla de Contenidos: “…-- Internet Footprinting -- Summary -- 2 Scanning -- Determining if the System is Alive -- Determining Which Services are Running or Listening -- Detecting the Operating System -- Processing and Storing Scan Data -- Summary -- 3 Enumeration -- Service Fingerprinting -- Vulnerability Scanners -- Basic Banner Grabbing -- Enumerating Common Network Services -- Summary -- Part II: Endpoint and Server Hacking -- Case Study: International Intrigue -- 4 Hacking Windows -- Overview -- Unauthenticated Attacks -- Authenticated Attacks -- Windows Security Features -- Summary -- 5 Hacking UNIX -- The Quest for Root -- Remote Access -- Local Access -- After Hacking Root -- Summary -- 6 Cybercrime and Advanced Persistent Threats -- What is an APT? …”
    Libro electrónico
  13. 753
    Publicado 2004
    Tabla de Contenidos: “…Overview of Oracle Database 10g -- 1.1 Overview of Oracle Database 10g -- 1.1.1 New features of Oracle 10g -- 1.2 Oracle 8, 8i and 9i - former architecture -- 1.3 Present architecture of Oracle 10g on z/OS -- 1.3.1 Multiple address spaces -- 1.3.2 IBM Language Environment® and Oracle Database 10g -- 1.3.3 z/OS UNIX System Services (USS) and Oracle Database 10g -- 1.3.4 Workload Manager and Oracle Database 10g -- 1.3.5 Oracle Enterprise Manager (OEM) and Oracle Database 10g -- 1.4 Summary -- Chapter 2. …”
    Libro electrónico
  14. 754
    por McFedries, Paul
    Publicado 2010
    Tabla de Contenidos: “…Understanding Mac OS X User Accounts -- Creating and Configuring User Accounts -- Logging Out and Configuring Login Options -- Enabling the Root User Account -- 22 Managing Your Desktop with Exposé and Spaces -- Taking Control of Your Desktop -- Managing Your Running Applications -- Managing Open Windows with Exposé -- Creating, Using, and Managing Spaces -- 23 Managing and Using Fonts -- Understanding the Architecture of Characters -- Installing and Managing Mac OS X Fonts -- Using the Fonts Panel -- Working with the Character Viewer -- 24 Making Your Mac Accessible to Everyone -- Understanding Universal Access -- Configuring and Using Seeing Assistance -- Configuring and Using Hearing Assistance -- Configuring Keyboard Assistance -- Configuring and Using Mouse Assistance -- Configuring and Using Speech Recognition -- 25 Making Your Mac Do the Work for You with Automator -- Getting to Know Automator -- Creating Your Own Workflows -- Learning How to Automate Your Mac by Example -- 26 Working with the Mac OS X Command Line -- Using the Unix Command Line with Mac OS X -- Learning Unix by Example -- Working with Basic Unix Applications -- Unix Resources -- 27 Using the Mac OS X Notebook Features -- Using Mac OS X on a Mobile Computer -- Managing Your Mobile Mac's Power -- Controlling Your Mobile Mac with Function Keys -- Using and Configuring the Trackpad -- Configuring and Using Locations -- Keeping Your Files in Sync -- 28 Working with Dashboard and Widgets -- Using Dashboard and Widgets -- Configuring Widgets -- Configuring Dashboard -- Finding and Installing More Widgets -- 29 Running Windows and Windows Applications -- Choosing How to Run Windows on a Mac -- Using Boot Camp to Run Windows on a Mac -- Using Parallels Desktop for Mac to Run Windows Virtually on a Mac -- Protecting Windows on a Mac from Attack -- V: Working with Devices in Mac OS X.…”
    Libro electrónico
  15. 755
    Publicado 2001
    Tabla de Contenidos: “…-- SNMPv3 Textual Conventions -- USM -- The Basics -- Discovery -- USM Timeliness -- Authentication -- Privacy -- USM User Table -- Localized Keys and Changing Keys -- VACM -- The Basics -- Context Table -- Security to Group Table -- Access Table -- View Tree Family Table -- SNMPv3 in the Real World -- NMS Architectures -- Hardware Considerations -- NMS Architectures -- A Look Ahead -- Configuring Your NMS -- HP's OpenView Network Node Manager -- Running NNM -- The netmon Process -- Configuring Polling Intervals -- A Few Words About NNM Map Colors -- Using OpenView Filters -- Sets -- Filters -- FilterExpressions -- Loading MIBs into OpenView -- Castle Rock's SNMPc Enterprise Edition -- SNMPc's Map -- Discovery and Filters -- Discovery Run-Through -- Configuring SNMPv3 -- Loading MIBs into SNMPc -- Configuring SNMP Agents -- Parameter Settings -- Security Concerns -- Agent Configuration Walkthroughs -- Windows Agents (Net-SNMP) -- HP OpenView Agent for HP-UX and Solaris -- Simple configuration -- Advanced configuration -- Net-SNMP for Unix -- Running the configuration script -- Creating a configuration by hand -- Using snmpusm to manage users -- Concord SystemEDGE Agent for Unix and Windows -- Simple configuration -- Advanced configuration -- Cisco Devices -- Simple configuration -- Advanced configuration -- Configuring SNMPv3 -- APC Symetra -- Polling and Setting -- Retrieving a Single MIB Value -- Using HP OpenView to Retrieve Values -- Using Net-SNMP -- Retrieving Multiple MIB Values -- Walking the MIB Tree with OpenView…”
    Libro electrónico
  16. 756
    Publicado 2021
    “…El conocimiento de otro lenguaje de programación, un sistema Linux (independientemente de la distribución) y los conceptos básicos de Unix, es una ventaja al leer este libro. Después de algunos capítulos para presentar el entorno de trabajo y recordar los conceptos básicos del lenguaje Python, la primera parte presenta los principios de la Programación orientada a objetos en Python, así como la librería estándar de Python. …”
    Acceso con credenciales UPSA.
    Libro electrónico
  17. 757
    Publicado 2018
    “…What You Will Learn Explore basic and advanced command-line concepts Install Linux, work with VirtualBox, and install CentOS 7 in VirtualBox Work with the command line efficiently and learn how to navigate through the Linux filesystem Create file and user group permissions and edit files Use Sticky bit to secure your Linux filesystem Define and remove ACL from Linux files In Detail Linux is a Unix-like operating system assembled under the model of free and open source software development and distribution. …”
    Libro electrónico
  18. 758
    “…Today’s environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. …”
    Libro electrónico
  19. 759
    por Milanesi, Carlo. author
    Publicado 2018
    “…Learn to program with Rust in an easy, step-by-step manner on Unix, Linux shell, macOS and the Windows command line. …”
    Libro electrónico
  20. 760
    por Mutch, John
    Publicado 2011
    “…Instead of going through the step-by-step process of implementation, the book points out the implications of allowing users to run with unlimited administrator rights, discusses the technology and supplementation of Microsoft’s Group Policy, and dives into the different environments least privilege affects, such as Unix and Linux servers, and databases. Readers will learn ways to protect virtual environments, how to secure multi-tenancy for the cloud, information about least privilege for applications, and how compliance enters the picture. …”
    Libro electrónico