Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 231
- Computer Science 199
- Operating systems (Computers) 197
- UNIX (Computer file) 145
- Linux 121
- Computer networks 88
- Sistemas operativos 73
- Unix 62
- Security measures 59
- Mac OS 57
- Development 54
- Application software 45
- Computer security 41
- Database management 40
- Macintosh (Computer) 38
- UNIX Shells 36
- Programming 35
- Examinations 32
- Computer programs 31
- Open source software 31
- Electrical & Computer Engineering 30
- Computer programming 29
- Telecommunications 29
- Certification 28
- Client/server computing 26
- Electronic data processing personnel 25
- Electronic data processing 23
- Informática 22
- Python (Computer program language) 22
- IBM Database 2 21
-
741Publicado 2006“…The tools allow users to quickly identify and resolve problems that occur in batch, IMS, DB2, CICS, and UNIX System Services applications. For each tool, this book provides step-by-step instructions for installation and customization, a detailed discussion of the features and capabilities, and guidance for using the tool in your environment…”
Libro electrónico -
742Publicado 2021“…You will: Customize the terminal to make it perfect for your needs Develop web applications using basic coding skills in the terminal Install HomeBrew and by extension Linux and Unix applications…”
Libro electrónico -
743por Van der Linden, Peter“…Covering both the IBM PC and UNIX systems, it is an entertaining and educational romp through C showing how experts really use it. …”
Publicado 1994
Libro electrónico -
744Publicado 2015Tabla de Contenidos: “…""Copyright""; ""Table of Contents""; ""Ruby Pocket Reference""; ""Introduction""; ""Conventions Used in This Book""; ""Using Code Examples""; ""Safari® Books Online""; ""How to Contact Us""; ""Acknowledgments""; ""Running Ruby""; ""Running the Ruby Interpreter""; ""Interactive Ruby (irb)""; ""Using a Shebang Comment on Unix/Linux""; ""Associating File Types on Windows""; ""Ruby's Keywords""; ""Ruby's Operators""; ""Comments""; ""Numbers""; ""Variables""; ""Local Variables""; ""Instance Variables""; ""Class Variables""; ""Global Variables""; ""Constants""; ""Parallel Variable Assignment""…”
Libro electrónico -
745por Fitzgerald, Michael, 1957-Tabla de Contenidos: “…Contents; Ruby Pocket Reference; Conventions Used in This Book; Comments and Questions; Acknowledgments; Running Ruby; Running the Ruby Interpreter; Using a Shebang Line on Unix/Linux; Associating File Types on Windows; Reserved Words; Operators; Comments; Numbers; Variables; Local Variables; Instance Variables; Class Variables; Global Variables; Constants; Parallel Assignment of Variables; Symbols; Predefined Variables; Pseudovariables; Global Constants; Ranges; Methods; Parentheses; Return Values; Method Name Conventions; Default Arguments; Variable Arguments; Aliasing Methods; Blocks…”
Publicado 2009
Libro electrónico -
746Publicado 2010Tabla de Contenidos: “…Windows Server 2008 R2 technology primer -- Planning, prototyping, migrating, and deploying Windows Server 2008 R2 best practices -- Installing Windows Server 2008 R2 and Server Core -- Active Directory Domain Services primer -- Designing a Windows Server 2008 R2 Active Directory -- Designing organization unit and group structure -- Active Directory infrastructure -- Creating federated forests and lightweight directories -- Integrating Active Directory in a UNIX environment -- Domain name system and IPv6 -- DHCP/WINS/domain controllers -- Internet information services -- Server-level security -- Transport-level security -- Security policies, network policy server, and network access protection -- Migrating from Windows Server 2003/2008 to Windows Server 2008 R2 -- Compatibility testing -- Windows Server 2008 R2 administration -- Windows Server 2008 R2 group policies and policy management -- Windows Server 2008 R2 management and maintenance practices -- Automating tasks using PowerShell scripting -- Documenting a Windows Server 2008 R2 environment -- Integrating System Center Operations Manager 2007 R2 with Windows Server 2008 R2 -- Server-to-client Remote Access and DirectAccess -- Remote desktop services -- Windows Server 2008 R2 administration tools for desktops -- Group policy management for network clients -- File system management and fault tolerance -- System-level fault tolerance (clustering/network load balancing) -- Backing up the Windows Server 2008 R2 environment -- Recovering from a disaster -- Optimizing Windows Server 2008 R2 for branch office communications -- Logging and debugging -- Capacity analysis and performance optimization -- Windows SharePoint services -- Windows media services -- Deploying and using Windows virtualization…”
Libro electrónico -
747por Krikorian, RaffiTabla de Contenidos: “…Enabling Bash over the Serial Port; 31. Copying Unix Binaries to TiVo; 32. Clean Up and Shut Down; 33. …”
Publicado 2003
Libro electrónico -
748por Saltzer, J. H., 1939-Tabla de Contenidos: “…2.2.1 The Naming Model2.2.2 Default and Explicit Context References; 2.2.3 Path Names, Naming Networks, and Recursive Name Resolution; 2.2.4 Multiple Lookup: Searching through Layered Contexts; 2.2.5 Comparing Names; 2.2.6 Name Discovery; 2.3 Organizing Computer Systems with Names and Layers; 2.3.1 A Hardware Layer: The Bus; 2.3.2 A Software Layer: The File Abstraction; 2.4 Looking Back and Ahead; 2.5 Case Study: UNIX® File System Layering and Naming; 2.5.1 Application Programming Interface for the UNIX File System; 2.5.2 The Block Layer; 2.5.3 The File Layer; 2.5.4 The Inode Number Layer…”
Publicado 2009
Libro electrónico -
749Publicado 2022“…Learn to program with Rust 2021 Edition, in an easy, step-by-step manner on Unix, the Linux shell, macOS, and the Windows command line. …”
Libro electrónico -
750por Deshev, Hristo“…Windows power users have always envied their friends running UNIX machines for the ease of automation that they enjoy. …”
Publicado 2008
Libro electrónico -
751por Loope, James“…This concise introduction shows you how to use Puppet's tools and templates to organize and execute configuration plans on Linux, Unix, and Windows servers. Through code samples and real-world examples, you'll learn how to manage pools of servers and virtual instances, and how to administer access control. …”
Publicado 2012
Libro electrónico -
752Publicado 2012Tabla de Contenidos: “…-- Internet Footprinting -- Summary -- 2 Scanning -- Determining if the System is Alive -- Determining Which Services are Running or Listening -- Detecting the Operating System -- Processing and Storing Scan Data -- Summary -- 3 Enumeration -- Service Fingerprinting -- Vulnerability Scanners -- Basic Banner Grabbing -- Enumerating Common Network Services -- Summary -- Part II: Endpoint and Server Hacking -- Case Study: International Intrigue -- 4 Hacking Windows -- Overview -- Unauthenticated Attacks -- Authenticated Attacks -- Windows Security Features -- Summary -- 5 Hacking UNIX -- The Quest for Root -- Remote Access -- Local Access -- After Hacking Root -- Summary -- 6 Cybercrime and Advanced Persistent Threats -- What is an APT? …”
Libro electrónico -
753Publicado 2004Tabla de Contenidos: “…Overview of Oracle Database 10g -- 1.1 Overview of Oracle Database 10g -- 1.1.1 New features of Oracle 10g -- 1.2 Oracle 8, 8i and 9i - former architecture -- 1.3 Present architecture of Oracle 10g on z/OS -- 1.3.1 Multiple address spaces -- 1.3.2 IBM Language Environment® and Oracle Database 10g -- 1.3.3 z/OS UNIX System Services (USS) and Oracle Database 10g -- 1.3.4 Workload Manager and Oracle Database 10g -- 1.3.5 Oracle Enterprise Manager (OEM) and Oracle Database 10g -- 1.4 Summary -- Chapter 2. …”
Libro electrónico -
754por McFedries, PaulTabla de Contenidos: “…Understanding Mac OS X User Accounts -- Creating and Configuring User Accounts -- Logging Out and Configuring Login Options -- Enabling the Root User Account -- 22 Managing Your Desktop with Exposé and Spaces -- Taking Control of Your Desktop -- Managing Your Running Applications -- Managing Open Windows with Exposé -- Creating, Using, and Managing Spaces -- 23 Managing and Using Fonts -- Understanding the Architecture of Characters -- Installing and Managing Mac OS X Fonts -- Using the Fonts Panel -- Working with the Character Viewer -- 24 Making Your Mac Accessible to Everyone -- Understanding Universal Access -- Configuring and Using Seeing Assistance -- Configuring and Using Hearing Assistance -- Configuring Keyboard Assistance -- Configuring and Using Mouse Assistance -- Configuring and Using Speech Recognition -- 25 Making Your Mac Do the Work for You with Automator -- Getting to Know Automator -- Creating Your Own Workflows -- Learning How to Automate Your Mac by Example -- 26 Working with the Mac OS X Command Line -- Using the Unix Command Line with Mac OS X -- Learning Unix by Example -- Working with Basic Unix Applications -- Unix Resources -- 27 Using the Mac OS X Notebook Features -- Using Mac OS X on a Mobile Computer -- Managing Your Mobile Mac's Power -- Controlling Your Mobile Mac with Function Keys -- Using and Configuring the Trackpad -- Configuring and Using Locations -- Keeping Your Files in Sync -- 28 Working with Dashboard and Widgets -- Using Dashboard and Widgets -- Configuring Widgets -- Configuring Dashboard -- Finding and Installing More Widgets -- 29 Running Windows and Windows Applications -- Choosing How to Run Windows on a Mac -- Using Boot Camp to Run Windows on a Mac -- Using Parallels Desktop for Mac to Run Windows Virtually on a Mac -- Protecting Windows on a Mac from Attack -- V: Working with Devices in Mac OS X.…”
Publicado 2010
Libro electrónico -
755Publicado 2001Tabla de Contenidos: “…-- SNMPv3 Textual Conventions -- USM -- The Basics -- Discovery -- USM Timeliness -- Authentication -- Privacy -- USM User Table -- Localized Keys and Changing Keys -- VACM -- The Basics -- Context Table -- Security to Group Table -- Access Table -- View Tree Family Table -- SNMPv3 in the Real World -- NMS Architectures -- Hardware Considerations -- NMS Architectures -- A Look Ahead -- Configuring Your NMS -- HP's OpenView Network Node Manager -- Running NNM -- The netmon Process -- Configuring Polling Intervals -- A Few Words About NNM Map Colors -- Using OpenView Filters -- Sets -- Filters -- FilterExpressions -- Loading MIBs into OpenView -- Castle Rock's SNMPc Enterprise Edition -- SNMPc's Map -- Discovery and Filters -- Discovery Run-Through -- Configuring SNMPv3 -- Loading MIBs into SNMPc -- Configuring SNMP Agents -- Parameter Settings -- Security Concerns -- Agent Configuration Walkthroughs -- Windows Agents (Net-SNMP) -- HP OpenView Agent for HP-UX and Solaris -- Simple configuration -- Advanced configuration -- Net-SNMP for Unix -- Running the configuration script -- Creating a configuration by hand -- Using snmpusm to manage users -- Concord SystemEDGE Agent for Unix and Windows -- Simple configuration -- Advanced configuration -- Cisco Devices -- Simple configuration -- Advanced configuration -- Configuring SNMPv3 -- APC Symetra -- Polling and Setting -- Retrieving a Single MIB Value -- Using HP OpenView to Retrieve Values -- Using Net-SNMP -- Retrieving Multiple MIB Values -- Walking the MIB Tree with OpenView…”
Libro electrónico -
756Publicado 2021“…El conocimiento de otro lenguaje de programación, un sistema Linux (independientemente de la distribución) y los conceptos básicos de Unix, es una ventaja al leer este libro. Después de algunos capítulos para presentar el entorno de trabajo y recordar los conceptos básicos del lenguaje Python, la primera parte presenta los principios de la Programación orientada a objetos en Python, así como la librería estándar de Python. …”
Acceso con credenciales UPSA.
Libro electrónico -
757Publicado 2018“…What You Will Learn Explore basic and advanced command-line concepts Install Linux, work with VirtualBox, and install CentOS 7 in VirtualBox Work with the command line efficiently and learn how to navigate through the Linux filesystem Create file and user group permissions and edit files Use Sticky bit to secure your Linux filesystem Define and remove ACL from Linux files In Detail Linux is a Unix-like operating system assembled under the model of free and open source software development and distribution. …”
Libro electrónico -
758“…Today’s environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. …”
Libro electrónico -
759por Milanesi, Carlo. author“…Learn to program with Rust in an easy, step-by-step manner on Unix, Linux shell, macOS and the Windows command line. …”
Publicado 2018
Libro electrónico -
760por Mutch, John“…Instead of going through the step-by-step process of implementation, the book points out the implications of allowing users to run with unlimited administrator rights, discusses the technology and supplementation of Microsoft’s Group Policy, and dives into the different environments least privilege affects, such as Unix and Linux servers, and databases. Readers will learn ways to protect virtual environments, how to secure multi-tenancy for the cloud, information about least privilege for applications, and how compliance enters the picture. …”
Publicado 2011
Libro electrónico