Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 231
- Computer Science 199
- Operating systems (Computers) 197
- UNIX (Computer file) 145
- Linux 121
- Computer networks 88
- Sistemas operativos 73
- Unix 62
- Security measures 59
- Mac OS 57
- Development 54
- Application software 45
- Computer security 41
- Database management 40
- Macintosh (Computer) 38
- UNIX Shells 36
- Programming 35
- Examinations 32
- Computer programs 31
- Open source software 31
- Electrical & Computer Engineering 30
- Computer programming 29
- Telecommunications 29
- Certification 28
- Client/server computing 26
- Electronic data processing personnel 25
- Electronic data processing 23
- Informática 22
- Python (Computer program language) 22
- IBM Database 2 21
-
901Publicado 2023Tabla de Contenidos: “…Analytics -- Identity in the blockchain -- Introduction to the business landscape -- Analytics -- Redefining the art business with blockchain -- Introduction to the business landscape -- Data extraction -- Floor price and wash trading -- A word on anti-money laundering (AML) practices -- Summary -- Further reading -- Chapter 5: Exploring Analytics on DeFi -- Technical requirements -- Stablecoins and other tokens -- Understanding tokens, native assets, and the ERC-20 data structure -- Hands-on example -- Understanding DEX -- Hands-on example - pools and AMM -- DEX aggregators -- Lending and borrowing services on Web3 -- Flash loans -- A note on protocol bad debt -- Multichain protocols and cross-chain bridges -- Hands-on example - Hop bridge -- Summary -- Further reading -- Part 2 Web3 Machine Learning Cases -- Chapter 6: Preparing and Exploring Our Data -- Technical requirements -- Data preparation -- Hex values -- Checksum -- Decimal treatment -- From Unix timestamps to datetime formats -- Evolution of smart contracts -- Exploratory Data Analysis -- Summarizing data -- Outlier detection -- Summary -- Further reading -- Chapter 7: A Primer on Machine Learning and Deep Learning -- Technical requirements -- Introducing machine learning -- Building a machine learning pipeline -- Model -- Training -- Underfitting and overfitting -- Prediction and evaluation -- Introducing deep learning -- Model preparation -- Model building -- Training and evaluating a model -- Summary -- Further reading -- Chapter 8: Sentiment Analysis - NLP and Crypto News -- Technical requirements -- Example datasets -- Building our pipeline -- Preparation -- Model building -- Training and evaluation -- ChatGPT integration -- Summary -- Further reading -- Chapter 9: Generative Art for NFTs -- Technical requirements -- Creating with colors - colorizing -- Hands-on Style2Paints…”
Libro electrónico -
902por Tretau, RolandTabla de Contenidos: “…Windows systems integration -- 11.1 CIFS concepts -- 11.1.1 Authentication -- 11.2 Creating a CIFS share -- 11.3 User creation on the NAS Gateway 500 -- 11.3.1 User creation -- 11.3.2 Dynamic user creation -- 11.4 Creating file system shares -- 11.5 Advanced CIFS features -- 11.6 Connecting Windows 2000 and 2003 -- 11.6.1 Connecting and mapping a Windows client -- 11.7 Setting up startup scripts for Windows -- 11.8 Disabling auto disconnect -- 11.9 Publishing shares to Active Directory -- Chapter 12. UNIX systems integration -- 12.1 NFS protocol on NAS Gateway 500 -- 12.2 Configuring NFS shares on NAS Gateway 500 -- 12.2.1 Configuring NFS shares through WebSM -- 12.2.2 Configuring NFS shares with SMIT -- 12.3 Access NAS Gateway 500 file service from AIX -- 12.3.1 Mounting an NFS file system on AIX -- 12.3.2 AIX NFS mount problem determination -- 12.3.3 Tuning AIX to improve NAS Gateway 500 NFS performance -- 12.4 Access NAS Gateway 500 file service from HP-UX -- 12.4.1 Mounting a NAS Gateway 500 NFS filesystem on HP-UX -- 12.4.2 HP-UX NFS mount problem determination -- 12.5 Access NAS Gateway 500 file service from Solaris -- 12.5.1 Mounting a NAS Gateway 500 NFS filesystem on Solaris -- 12.5.2 Solaris NFS mount problem determination -- Chapter 13. …”
Publicado 2004
Libro electrónico -
903Publicado 2004Tabla de Contenidos: “…3.10 Cross-system Coupling Facility (XCF) -- 3.10.1 XCF systems, groups, and members -- 3.10.2 XCF signaling paths -- 3.10.3 XCF Transport Classes -- 3.10.4 XCF signal path performance problems -- 3.10.5 XCF message buffer length performance problems -- 3.10.6 XCF message buffer space performance problems -- 3.10.7 XCF Coupling Facility performance problems -- 3.10.8 XCF recommendations -- 3.11 GRS -- 3.11.1 GRS start options -- 3.11.2 Dynamic RNLs -- 3.11.3 GRS Ring Availability considerations - Fully connected complex -- 3.11.4 GRS Ring Availability considerations - Mixed complex -- 3.11.5 GRS Star Availability considerations -- 3.11.6 SYNCHRES option -- 3.11.7 Resource Name Lists (RNLs) -- 3.11.8 RNL design -- 3.11.9 GRS monitor (ISGRUNAU) -- 3.11.10 RNL syntax checking -- 3.11.11 GRS recommendations -- 3.12 Tape sharing -- 3.12.1 IEFAUTOS -- 3.12.2 ATS Star -- 3.12.3 Coexistence between Dedicated, IEFAUTOS, and ATS Star -- 3.12.4 Tape-sharing recommendations -- 3.13 JES2 -- 3.13.1 JES2 SPOOL considerations -- 3.13.2 JES2 Checkpoint considerations -- 3.13.3 JES2 Checkpoint access -- 3.13.4 JES2 Checkpoint performance -- 3.13.5 JES2 Checkpoint management -- 3.13.6 JES2 Health Monitor -- 3.13.7 Scheduling environment -- 3.13.8 WLM-managed initiators -- 3.13.9 JESLOG SPIN data sets -- 3.13.10 JES2 recommendations -- 3.14 WLM -- 3.14.1 Service classes -- 3.14.2 WLM recommendations -- 3.15 UNIX System Services -- 3.15.1 Shared HFS -- 3.15.2 Automove -- 3.15.3 zFS -- 3.15.4 BRLM issues -- 3.15.5 UNIX System Services recommendations -- 3.16 RACF -- 3.16.1 RACF sysplex communication -- 3.16.2 RACF non-data sharing mode -- 3.16.3 RACF data sharing mode -- 3.16.4 RACF read-only mode -- 3.16.5 RACF recovery procedures -- 3.16.6 PKI Services -- 3.16.7 RACF recommendations -- 3.17 DFSMShsm -- 3.17.1 Common Recall Queue…”
Libro electrónico -
904por Lutz, MarkTabla de Contenidos: “…System Command Lines and Files; 3.2.2. Unix Executable Scripts (#!); 3.3. Clicking Windows File Icons; 3.3.2. …”
Publicado 2004
Libro electrónico -
905Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Chapter 3: IPv6, Unix Domain Sockets, and Network Interfaces -- Introduction -- Forwarding a local port to a remote host -- How to do it... -- How it works... -- Pinging hosts on the network with ICMP -- Getting ready -- How to do it... -- How it works... -- Waiting for a remote network service -- How to do it... -- How it works... -- Enumerating interfaces on your machine -- Getting ready -- How to do it... -- How it works... -- Finding the IP address for a specific interface on your machine -- Getting ready -- How to do it... -- How it works... -- Finding whether an interface is up on your machine -- Getting ready -- How to do it... -- How it works... -- Detecting inactive machines on your network -- Getting ready -- How to do it... -- How it works... -- Performing a basic IPC using connected sockets (socketpair) -- Getting ready -- How to do it... -- How it works... -- Performing IPC using Unix domain sockets -- How to do it... -- How it works... -- Finding out if your Python supports IPv6 sockets -- Getting ready -- How to do it... -- How it works... -- Extracting an IPv6 prefix from an IPv6 address -- How to do it... -- How it works... -- Writing an IPv6 echo client/server -- How to do it... -- How it works... -- Chapter 4: Programming with HTTP for the Internet -- Introduction -- Downloading data from an HTTP server -- How to do it... -- How it works... -- Serving HTTP requests from your machine -- How to do it... -- How it works... -- Extracting cookie information after visiting a website -- How to do it... -- How it works... -- Submitting web forms -- Getting ready -- How to do it... -- How it works…”
Libro electrónico -
906Publicado 2002Tabla de Contenidos: “…Comparisons -- 6.1 Comparisons with other UNIX platforms -- 6.1.1 ODM and SMIT integration -- 6.1.2 Disk devices and the VxVM -- 6.1.3 VxVM and LVM co-existence -- 6.1.4 VxVM at system startup and shutdown…”
Libro electrónico -
907Publicado 2004Tabla de Contenidos: “…Setting up ClearCase -- Start now -- Setting up a playground environment -- The playground -- Moving on to a serious test environment -- Minimal test environment -- Setting up your environment -- Network infrastructure -- Setting up ClearCase -- Servers first -- Server connections -- Registry server -- ClearCase registry -- ClearCase region -- Accessing VOBs or views from another region -- ClearCase registry services in a nutshell -- License server -- VOB and view servers -- About sizing of a server -- Prepare for change -- Changing the license server -- Changing the registry server -- Moving a VOB to another server -- Moving a view to another server -- Relocating the release area -- UNIX servers and Windows clients -- SMB (CIFS) on the UNIX server -- NFS in the clients -- NAS or SAN for storage areas -- Use of snapshot views -- Clients -- Client for Samba or TAS specials -- Handling the 04:30am storm -- Backup and recovery -- VOBs -- Views -- Registry -- License and var -- Release area -- Restore -- MultiSite as backup -- Standard maintenance -- Disaster recovery for ClearCase -- Migrating code into ClearCase -- Rollout to users -- Training -- Hands-on -- Staging -- Successful rollout -- Get help -- Part 3 Implementing ClearQuest for UCM -- Chapter 8. …”
Libro electrónico -
908Publicado 2019“…In addition to that practical knowledge, author William Shotts reveals the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix supercomputers of yore. As you make your way through the book's short, easily-digestible chapters, you'll learn how to: •Create and delete files, directories, and symlinks •Administer your system, including networking, package installation, and process management •Use standard input and output, redirection, and pipelines •Edit files with Vi, the world's most popular text editor •Write shell scripts to automate common or boring tasks •Slice and dice text files with cut, paste, grep, patch, and sed Once you overcome your initial ""shell shock,"" you'll find that the command line is a natural and expressive way to communicate with your computer. …”
Libro electrónico -
909por Clarke, John“…Whether you’re an Oracle Database administrator, Unix/Linux administrator, storage administrator, network administrator, or Oracle developer, Oracle Exadata Recipes provides effective and proven solutions to accomplish a wide variety of tasks on the Exadata Database Machine. …”
Publicado 2013
Libro electrónico -
910Publicado 2015“…Build mesmerizing visualizations, analytics, and logs from your data using Elasticsearch, Logstash, and Kibana About This Book Solve all your data analytics problems with the ELK stack Explore the power of Kibana4 search and visualizations built over Elasticsearch queries and learn about the features and plugins of Logstash Develop a complete data pipeline using the ELK stack Who This Book Is For If you are a developer or DevOps engineer interested in building a system that provides amazing insights and business metrics out of data sources, of various formats and types, using the open source technology stack that ELK provides, then this book is for you. Basic knowledge of Unix or any programming language will be helpful to make the most out of this book. …”
Libro electrónico -
911Publicado 2016Tabla de Contenidos: “…Answering Biological Questions with UNIX Shell Scripts -- More Questions Than Answers -- Mythbusting Personalized Genomics -- Myth: Having Your Genome Read Is Like Hex-Dumping the ROM of Your Computer -- Myth: We Know Which Mutations Predict Disease -- Myth: The Reference Genome Is an Accurate Reference -- Patching a Genome -- CRISPRs in Bacteria -- Determining Where to Cut a Gene -- Implications for Engineering Humans -- Hacking Evolution with Gene Drive -- Closing Thoughts -- Chapter 11. selected interviews -- Andrew "bunnie" Huang: Hardware Hacker (CSDN) -- About Open Hardware and the Maker Movement -- About Hardware Hackers -- The Blueprint Talks to Andrew Huang -- epilogue -- index -- Footnotes -- Chapter 1. made in china -- Chapter 2. inside three very different factories -- Part 2: thinking differently: intellectual property in china -- Chapter 4. gongkai innovation -- Chapter 5. fake goods -- Chapter 6. the story of chumby -- Chapter 7. novena: building my own laptop -- Chapter 9. hardware hacking -- Chapter 10. biology and bioinformatics -- Chapter 11. selected interviews…”
Libro electrónico -
912Publicado 2023Tabla de Contenidos: “…Analytics -- Identity in the blockchain -- Introduction to the business landscape -- Analytics -- Redefining the art business with blockchain -- Introduction to the business landscape -- Data extraction -- Floor price and wash trading -- A word on anti-money laundering (AML) practices -- Summary -- Further reading -- Chapter 5: Exploring Analytics on DeFi -- Technical requirements -- Stablecoins and other tokens -- Understanding tokens, native assets, and the ERC-20 data structure -- Hands-on example -- Understanding DEX -- Hands-on example - pools and AMM -- DEX aggregators -- Lending and borrowing services on Web3 -- Flash loans -- A note on protocol bad debt -- Multichain protocols and cross-chain bridges -- Hands-on example - Hop bridge -- Summary -- Further reading -- Part 2 Web3 Machine Learning Cases -- Chapter 6: Preparing and Exploring Our Data -- Technical requirements -- Data preparation -- Hex values -- Checksum -- Decimal treatment -- From Unix timestamps to datetime formats -- Evolution of smart contracts -- Exploratory Data Analysis -- Summarizing data -- Outlier detection -- Summary -- Further reading -- Chapter 7: A Primer on Machine Learning and Deep Learning -- Technical requirements -- Introducing machine learning -- Building a machine learning pipeline -- Model -- Training -- Underfitting and overfitting -- Prediction and evaluation -- Introducing deep learning -- Model preparation -- Model building -- Training and evaluating a model -- Summary -- Further reading -- Chapter 8: Sentiment Analysis - NLP and Crypto News -- Technical requirements -- Example datasets -- Building our pipeline -- Preparation -- Model building -- Training and evaluation -- ChatGPT integration -- Summary -- Further reading -- Chapter 9: Generative Art for NFTs -- Technical requirements -- Creating with colors - colorizing -- Hands-on Style2Paints…”
Libro electrónico -
913por Darmawan, BudiTabla de Contenidos: “…Installing IBM Tivoli Monitoring V5.1.1 -- 4.1 Migrating from Tivoli Distributed Monitoring V4.1 -- 4.2 Installing on an existing Tivoli environment -- 4.3 Configuring IBM Tivoli Monitoring endpoints -- 4.3.1 Java Runtime Environment -- 4.3.2 Windows-based endpoint setup -- 4.4 Installing the Web Health Console -- 4.4.1 Installing on a Windows environment -- 4.4.2 Installing on a UNIX environment -- 4.4.3 Installing the monitoring modules -- 4.5 Installing IBM Tivoli Monitoring Workbench -- Chapter 5. …”
Publicado 2005
Libro electrónico -
914por Frisch, AEleen“… Windows administrators can accomplish many of their routine tasks much more quickly by using the command line (similar to the command line of DOS or Unix-based systems) than by going through the graphical user interface that most users associate with Windows. …”
Publicado 2001
Libro electrónico -
915por Mauerer, Wolfgang, 1978-“…Find an introduction to the relevant structures and functions exported by the kernel to userland, understand the theoretical and conceptual aspects of the Linux kernel and Unix derivatives, and gain a deeper understanding of the kernel. …”
Publicado 2008
Libro electrónico -
916por McFedries, Paul“… Simply the easiest way to learn Mac OS X Snow Leopard Mac OS X Snow Leopard is Apple's newest version of Mac OS X and combines the reliability of UNIX with the ease of use of Macintosh. This introductory guide offers you a basic understanding of the new Mac OS X operating system and some of the most common peripherals associated with it. …”
Publicado 2009
Libro electrónico -
917Publicado 2015Tabla de Contenidos: “…2.10 Special Characters 2.11 Command-Line Editing; 2.12 Text Editors; 2.13 Getting Online Help; 2.14 Shell Input and Output; 2.14.1 Standard Error; 2.14.2 Standard Input Redirection; 2.15 Understanding Error Messages; 2.15.1 Anatomy of a UNIX Error Message; 2.15.2 Common Errors; 2.16 Listing and Manipulating Processes; 2.16.1 Command Options; 2.16.2 Killing Processes; 2.16.3 Job Control; 2.16.4 Background Processes; 2.17 File Modes and Permissions; 2.17.1 Modifying Permissions; 2.17.2 Symbolic Links; 2.17.3 Creating Symbolic Links; 2.18 Archiving and Compressing Files; 2.18.1 gzip; 2.18.2 tar…”
Libro electrónico -
918por Gennick, JonathanTabla de Contenidos: “…TO_DAYS and FROM_DAYS (MySQL); 1.5.9.3. Unix timestamp support (MySQL); 1.5.9.4. Seconds in the day (MySQL); 1.5.9.5. …”
Publicado 2006
Libro electrónico -
919por Yaghmour, KarimTabla de Contenidos: “…Basic Concepts; 2.1.2. Unix Workstation; 2.1.3. Windows (2000, NT, 98, etc.) …”
Publicado 2003
Libro electrónico -
920por Costales, BryaneTabla de Contenidos: “…Table of Contents; Preface; Changes Since the Previous Edition; Why This Book Is Necessary; History; Thoughts from Eric Allman; Organization; Audience and Assumptions; Unix and sendmail Versions; Conventions Used in This Book; Using Code Examples; Additional Sources of Information; Other Books, Other Problems; How to Contact Us; Safari® Books Online; Acknowledgments; Some Basics; 1.1 Email Basics; 1.2 Requests for Comments (RFCs); 1.3 Email and sendmail; 1.3.1 Other MTAs; 1.3.2 Why sendmail Is So Complex; 1.4 Basic Parts of sendmail; 1.4.1 The Configuration File; 1.4.2 The Queue…”
Publicado 2007
Libro electrónico