Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 231
- Computer Science 199
- Operating systems (Computers) 197
- UNIX (Computer file) 145
- Linux 121
- Computer networks 88
- Sistemas operativos 73
- Unix 62
- Security measures 59
- Mac OS 57
- Development 54
- Application software 45
- Computer security 41
- Database management 40
- Macintosh (Computer) 38
- UNIX Shells 36
- Programming 35
- Examinations 32
- Computer programs 31
- Open source software 31
- Electrical & Computer Engineering 30
- Computer programming 29
- Telecommunications 29
- Certification 28
- Client/server computing 26
- Electronic data processing personnel 25
- Electronic data processing 23
- Informática 22
- Python (Computer program language) 22
- IBM Database 2 21
-
921Publicado 2006Tabla de Contenidos: “…Running rpm; 5. GNU and Unix Commands (Topic 1.103); 5.1.1.2. Entering commands at the command prompt…”
Libro electrónico -
922Publicado 2018Tabla de Contenidos: “…Front Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Preface -- Notation -- About the Authors -- Chapter 1 Overview -- 1.1 Computer Security Concepts -- 1.2 Threats, Attacks, and Assets -- 1.3 Security Functional Requirements -- 1.4 Fundamental Security Design Principles -- 1.5 Attack Surfaces and Attack Trees -- 1.6 Computer Security Strategy -- 1.7 Standards -- 1.8 Key Terms, Review Questions, and Problems -- Part One Computer Security Technology and Principles -- Chapter 2 Cryptographic Tools -- 2.1 Confidentiality with Symmetric Encryption -- 2.2 Message Authentication and Hash Functions -- 2.3 Public-Key Encryption -- 2.4 Digital Signatures and Key Management -- 2.5 Random and Pseudorandom Numbers -- 2.6 Practical Application: Encryption of Stored Data -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 User Authentication -- 3.1 Digital User Authentication Principles -- 3.2 Password-Based Authentication -- 3.3 Token-Based Authentication -- 3.4 Biometric Authentication -- 3.5 Remote User Authentication -- 3.6 Security Issues for User Authentication -- 3.7 Practical Application: An Iris Biometric System -- 3.8 Case Study: Security Problems for ATM Systems -- 3.9 Key Terms, Review Questions, and Problems -- Chapter 4 Access Control -- 4.1 Access Control Principles -- 4.2 Subjects, Objects, and Access Rights -- 4.3 Discretionary Access Control -- 4.4 Example: UNIX File Access Control -- 4.5 Role-Based Access Control -- 4.6 Attribute-Based Access Control -- 4.7 Identity, Credential, and Access Management -- 4.8 Trust Frameworks -- 4.9 Case Study: RBAC System for a Bank -- 4.10 Key Terms, Review Questions, and Problems -- Chapter 5 Database and Data Center Security -- 5.1 The Need for Database Security -- 5.2 Database Management Systems -- 5.3 Relational Databases -- 5.4 SQL Injection Attacks…”
Libro electrónico -
923Publicado 2018Tabla de Contenidos: “…Summary -- Chapter 15: Interacting with the OpenStack API -- Understanding RESTful web services -- Setting up the environment -- Installing rdo-OpenStack package -- On RHEL 7.4 -- On CentOS 7.4 -- Generating answer file -- Editing answer file -- Run the packstack -- Access the OpenStack GUI -- Sending requests to the OpenStack keystone -- Creating instances from Python -- Creating the image -- Assigning a flavor -- Creating the network and subnet -- Launching the instance -- Managing OpenStack instances from Ansible -- Shade and Ansible installation -- Building the Ansible playbook -- Running the playbook -- Summary -- Chapter 16: Automating AWS with Boto3 -- AWS Python modules -- Boto3 installation -- Managing AWS instances -- Instance termination -- Automating AWS S3 services -- Creating buckets -- Uploading a file to a bucket -- Deleting a bucket -- Summary -- Chapter 17: Using the Scapy Framework -- Understanding Scapy -- Installing Scapy -- Unix-based systems -- Installing in Debian and Ubuntu -- Installing in Red Hat/CentOS -- Windows and macOS X Support -- Generating packets and network streams using Scapy -- Capturing and replaying packets -- Injecting data inside packets -- Packet sniffing -- Writing the packets to pcap -- Summary -- Chapter 18: Building a Network Scanner Using Python -- Understanding the network scanner -- Building a network scanner with Python -- Enhancing the code -- Scanning the services -- Sharing your code on GitHub -- Creating an account on GitHub -- Creating and pushing your code -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
924por Alur, NagrajTabla de Contenidos: “…Replication Center command processing -- Unix System Services commands via OMVS -- USS commands via batch JCL -- Z/OS system commands -- Appendix H. …”
Publicado 2005
Libro electrónico -
925por Ogden, BillTabla de Contenidos: “…S/390 volume distribution -- 5.1 S/390 processing environment -- 5.2 Linux or UnixWare processing environments -- 5.2.1 Standard dd command -- 5.3 Practical distribution creation -- 5.3.1 Raw devices -- 5.3.2 Standard Linux files -- 5.3.3 Compression -- 5.4 A test -- 5.5 Backup and restore considerations -- 5.5.1 Using ftp for backups -- Chapter 6. …”
Publicado 2003
Libro electrónico -
926Publicado 2017Tabla de Contenidos: “…Getting a property from an object -- Demethodizing - turning methods into functions -- Finding the optimum -- Questions -- Summary -- Chapter 7: Transforming Functions - Currying and Partial Application -- A bit of theory -- Currying -- Dealing with many parameters -- Currying by hand -- Currying with bind() -- Currying with eval() -- Partial application -- Partial application with arrow functions -- Partial application with eval() -- Partial application with closures -- Partial currying -- Partial currying with bind() -- Partial currying with closures -- Final thoughts -- Parameter order -- Being functional -- Questions -- Summary -- Chapter 8: Connecting Functions - Pipelining and Composition -- Pipelining -- Piping in Unix/Linux -- Revisiting an example -- Creating pipelines -- Building pipelines by hand -- Using other constructs -- Debugging pipelines -- Using tee -- Tapping into a flow -- Using a logging wrapper -- Chaining and fluent interfaces -- Pointfree style -- Defining pointfree functions -- Converting to pointfree style -- Composing -- Some examples of composition -- Unary operators -- Counting files -- Finding unique words -- Composing with higher order functions -- Testing composed functions -- Questions -- Summary -- Chapter 9: Designing Functions - Recursion -- Using recursion -- Thinking recursively -- Decrease and Conquer: searching -- Decrease and Conquer: doing powers -- Divide and conquer: The Tower of Hanoi -- Divide and conquer: sorting -- Dynamic programming: making change -- Higher order functions revisited -- Mapping and filtering -- Other higher-order functions -- Searching and backtracking -- The Eight Queens puzzle -- Traversing a tree structure -- Recursion techniques -- Tail call optimization -- Continuation passing style -- Trampolines and thunks -- Recursion elimination -- Questions -- Summary…”
Libro electrónico -
927por Schwartz, Randal L.“…Perl began as a tool for Unix system administrators, used for countless small tasks throughout the workday. …”
Publicado 2001
Libro electrónico -
928Publicado 2003Tabla de Contenidos: “…Web Access configuration parameters -- Updating the configuration file -- Debug option directive -- Data set name directives -- General control directives -- User ID and privilege class directives -- Directives that control the Information Management API -- UNIX System Services path and file reference directives -- Server side include (SSI) directives -- Business logic exit routine directives -- User profile directives -- Record type directives (used for all record types) -- Generic database search directives -- HTML generation directives -- S-words to left-zero pad and create hyperlinks -- Related publications -- IBM Redbooks -- Other resources -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover…”
Libro electrónico -
929por Kroah-Hartman, GregTabla de Contenidos: “…DISCONTIGMEM _MANUAL -- SPARSEMEM_ MANUAL -- SECCOMP -- KEXEC -- HOTPLUG_CPU -- PM -- SOFTWARE_ SUSPEND -- ACPI -- CPU_FREQ -- CPU_FREQ_ DEFAULT_GOV_ PERFORMANCE -- CPU_FREQ_ DEFAULT_GOV_ USERSPACE -- CPU_FREQ_ GOV_ PERFORMANCE -- CPU_FREQ_ GOV_ POWERSAVE -- CPU_FREQ_ GOV_ USERSPACE -- CPU_FREQ_ GOV_ ONDEMAND -- CPU_FREQ_ GOV_ CONSERVATIVE -- PCI -- PCCARD -- PCMCIA -- CARDBUS -- HOTPLUG_PCI -- NET -- UNIX -- INET -- IP_ADVANCED_ ROUTER -- NETFILTER -- NET_SCHED -- IRDA -- IRLAN -- IRNET -- IRCOMM -- IRDA_ULTRA -- BT -- IEEE80211 -- MTD -- PARPORT -- PNP -- ISAPNP -- PNPBIOS -- IDE -- BLK_DEV_IDE -- BLK_DEV_ IDEDISK -- BLK_DEV_ IDECD -- BLK_DEV_ IDEFLOPPY -- SCSI -- BLK_DEV_SD -- CHR_DEV_ST -- BLK_DEV_SR -- CHR_DEV_SG -- CHR_DEV_SCH -- SCSI_MULTI_ LUN -- SCSI_SATA -- MD -- BLK_DEV_MD -- BLK_DEV_DM -- IEEE1394 -- I2O -- NETDEVICES -- NET_ETHERNET -- NET_RADIO -- PPP -- PPPOE -- ISDN -- PHONE -- INPUT -- VT -- VT_CONSOLE -- SERIAL_8250 -- AGP -- DRM -- I2C -- SPI -- HWMON -- VIDEO_DEV -- DVB -- FB -- VGA_CONSOLE -- LOGO -- SOUND -- SND -- SND_USB_ AUDIO -- USB -- USB_EHCI_HCD -- USB_OHCI_HCD -- USB_UHCI_HCD -- USB_STORAGE -- USB_SERIAL -- USB_GADGET -- MMC -- INFINIBAND -- EDAC -- EXT2_FS -- EXT3_FS -- REISERFS_FS -- JFS_FS -- XFS_FS -- OCFS2_FS -- INOTIFY -- QUOTA -- AUTOFS_FS -- FUSE_FS -- SMB_FS -- CIFS -- PROFILING -- OPROFILE -- KPROBES -- PRINTK_TIME -- MAGIC_SYSRQ -- DEBUG_KERNEL -- DEBUG_FS -- SECURITY -- SECURITY_ SELINUX -- IV -- Helpful Utilities -- patch and diff -- New Kernel Versions -- Managing Your Patches with quilt -- git -- ketchup -- Bibliography -- Books -- General Linux Books -- Linux Kernel Books -- Tool Locations -- Index…”
Publicado 2007
Libro electrónico -
930Publicado 2008“…And geeks were fine with dealing with a difficult and finicky interface--they liked this--it was even a sort of badge of honor (e.g. the Unix geeks) But making the interface really intuitive and useful--think about the first Macintosh computers--took computers far far beyond the geek crowd. …”
Libro electrónico -
931por Mecklenburg, Robert William“…The utility simply known as make is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, make still turns up to this day as the central engine in most programming projects; it even builds the Linux kernel. …”
Publicado 2004
Libro electrónico -
932Publicado 2002Tabla de Contenidos: “…Cluster Systems Management security infrastructure -- 3.1 Reliable Scalable Cluster Technology security -- 3.2 Components of Cluster Security Services (CtSec) -- 3.2.1 Mechanism abstract layer (MAL) -- 3.2.2 Mechanism pluggable module (MPM) -- 3.2.3 UNIX mechanism pluggable module -- 3.2.4 Host-based authentication with ctcasd -- 3.2.5 Identity mapping service -- 3.2.6 Resource Monitoring and Control access control list -- 3.3 Communication flow examples -- 3.3.1 Initial cluster setup -- 3.3.2 Adding a new node -- 3.3.3 Requesting access to resources -- Chapter 4. …”
Libro electrónico -
933Tabla de Contenidos: “…Tivoli Management Framework basics -- 2.1 Components of the basic Tivoli architecture -- 2.2 Tivoli user interfaces -- 2.2.1 Tivoli Desktop -- 2.2.2 Command line interface -- 2.2.3 Navigating the Tivoli Desktop -- 2.3 Tivoli resources -- 2.4 Authorization roles -- 2.4.1 Scope of authorization roles -- 2.5 Tivoli profiles -- 2.5.1 Profile managers and profile distribution -- 2.6 Multiplexed distribution services -- 2.6.1 MDist and MDist 2 -- 2.6.2 MDist 2 functions -- 2.6.3 MDist2 components -- 2.6.4 wmdist command -- 2.6.5 Using the Distribution Status console -- 2.7 Connecting multiple TMR regions -- 2.7.1 Benefits of connecting TMRs -- 2.7.2 Connection types -- 2.7.3 Name registry -- 2.7.4 Case study: Hub-spoke architecture -- 2.8 Endpoint login sequence -- 2.8.1 Initial login without a select_gateway_policy script -- 2.8.2 Initial login with a select_gateway_policy script -- 2.8.3 Normal login -- 2.8.4 Isolated login -- 2.8.5 Orphan login -- 2.8.6 Implementing policy scripts -- 2.9 Firewall Security Toolbox -- 2.9.1 Tivoli environment with a firewall -- 2.9.2 Tivoli environment with demilitarized zones -- 2.9.3 Sending events across firewalls -- 2.10 Installing Firewall Security Toolbox -- 2.10.1 Installing on UNIX operating systems…”
Libro electrónico -
934Publicado 2016Tabla de Contenidos: “…Identify the Subject Drive -- Query the Subject Disk for Information -- Document Device Identification Details -- Query Disk Capabilities and Features with hdparm -- Extract SMART Data with smartctl -- Enable Access to Hidden Sectors -- Remove a DCO -- Remove an HPA -- Drive Service Area Access -- ATA Password Security and Self-Encrypting Drives -- Identify and Unlock ATA Password-Protected Disks -- Identify and Unlock Opal Self-Encrypting Drives -- Encrypted Flash Thumb Drives -- Attach Removable Media -- Optical Media Drives -- Magnetic Tape Drives -- Memory Cards -- Attach Other Storage -- Apple Target Disk Mode -- NVME SSDs -- Other Devices with Block or Character Access -- Closing Thoughts -- Chapter 6: Forensic Image Acquisition -- Acquire an Image with dd Tools -- Standard Unix dd and GNU dd -- The dcfldd and dc3dd Tools -- Acquire an Image with Forensic Formats -- The ewfacquire Tool -- AccessData ftkimager -- SquashFS Forensic Evidence Container -- Acquire an Image to Multiple Destinations -- Preserve Digital Evidence with Cryptography -- Basic Cryptographic Hashing -- Hash Windows -- Sign an Image with PGP or S/MIME -- RFC-3161 Timestamping -- Manage Drive Failure and Errors -- Forensic Tool Error Handling -- Data Recovery Tools -- SMART and Kernel Errors -- Other Options for Failed Drives -- Damaged Optical Discs -- Image Acquisition over a Network -- Remote Forensic Imaging with rdd -- Secure Remote Imaging with ssh -- Remote Acquisition to a SquashFS Evidence Container -- Acquire a Remote Disk to EnCase or FTK Format -- Live Imaging with Copy-On-Write Snapshots -- Acquire Removable Media -- Memory Cards -- Optical Discs -- Magnetic Tapes -- RAID and Multidisk Systems -- Proprietary RAID Acquisition -- JBOD and RAID-0 Striped Disks -- Microsoft Dynamic Disks -- RAID-1 Mirrored Disks -- Linux RAID-5 -- Closing Thoughts…”
Libro electrónico -
935Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting started -- Obtaining and installing Python 3 -- Windows -- macOS -- Linux -- Starting Python command line REPL -- Leaving the REPL -- Windows -- Unix -- Code structure and significant indentation -- Python culture -- Importing standard library modules -- Getting help() -- Counting fruit with math.factorial() -- Different types of numbers -- Scalar data types: integers, floats, None and bool -- int -- float -- Special floating point values -- Promotion to float -- None -- bool -- Relational operators -- Rich comparison operators -- Control flow: if-statements and while-loops -- Conditional control flow: The if-statement -- if...else -- if...elif...else -- Conditional repetition: the while-loop -- Exiting loops with break -- Summary -- Chapter 2: Strings and Collections -- str - an immutable sequence of Unicode code points -- String quoting styles -- Moment of zen -- Concatenation of adjacent strings -- Multiline strings and newlines -- Raw strings -- The str constructor -- Strings as sequences -- String methods -- Strings with Unicode -- The bytes type - an immutable sequence of bytes -- Literal bytes -- Converting between bytes and str -- list - a sequence of objects -- The dict type - associating keys with values -- The For-loops - iterating over series of items -- Putting it all together -- Summary -- Chapter 3: Modularity -- Organizing code in a .py file -- Running Python programs from the operating system shell -- Importing modules into the REPL -- Defining functions -- Organizing our module into functions -- The __name__ type and executing modules from the command line -- The Python execution model -- The difference between modules, scripts, and programs…”
Libro electrónico -
936por DuBois, Paul, 1956-Tabla de Contenidos: “…13 Access Control and Security -- 13.1 Internal Security: Preventing Unauthorized Filesystem Access -- 13.2 External Security: Preventing Unauthorized Network Access -- 13.3 Setting Up Secure Connections -- 14 Database Maintenance, Backups, and Replication -- 14.1 Principles of Preventive Maintenance -- 14.2 Performing Database Maintenance with the Server Running -- 14.3 General Preventative Maintenance -- 14.4 Making Database Backups -- 14.5 Copying Databases to Another Server -- 14.6 Checking and Repairing Database Tables -- 14.7 Using Backups for Data Recovery -- 14.8 Setting Up Replication Servers -- IV: Appendixes -- A: Obtaining and Installing Software -- A.1 Obtaining the sampdb Sample Database Distribution -- A.2 Obtaining MySQL and Related Software -- A.3 Choosing a Version of MySQL -- A.4 Installing MySQL on Unix -- A.5 Installing MySQL on Windows -- B: Data Type Reference -- B.1 Numeric Types -- B.2 String Types -- B.3 Date and Time Types -- B.4 Spatial Types -- C: Operator and Function Reference -- C.1 Operators -- C.2 Functions -- D: System, Status, and User Variable Reference -- D.1 System Variables -- D.2 Session-Only System Variables -- D.3 Status Variables -- D.4 User-Defined Variables -- E: SQL Syntax Reference -- E.1 SQL Statement Syntax (Non-Compound Statements) -- E.2 Compound Statement Syntax -- E.3 Comment Syntax -- F: MySQL Program Reference -- F.1 Displaying a Program's Help Message -- F.2 Specifying Program Options -- F.3 myisamchk -- F.4 myisampack -- F.5 mysql -- F.6 mysql.server -- F.7 mysql_config -- F.8 mysql_install_db -- F.9 mysqladmin -- F.10 mysqlbinlog -- F.11 mysqlcheck -- F.12 mysqld -- F.13 mysqld_multi -- F.14 mysqld_safe -- F.15 mysqldump -- F.16 mysqlhotcopy -- F.17 mysqlimport -- F.18 mysqlshow -- F.19 perror -- G: C API Reference -- G.1 Compiling and Linking -- G.2 C API Data Types -- G.3 C API Functions…”
Publicado 2009
Libro electrónico -
937Publicado 2004“…It offers understanding of how the IBM TotalStorage Open Software Family solutions will work in heterogeneous environments including Windows, UNIX/AIX/Linux, OS/400, and z/OS platforms, and with such mission-critical applications as DB/2, Oracle, Lotus Domino, Exchange, mySAP.com, and many more…”
Libro electrónico -
938por Duncan, Andy“… Objective-C is an exciting and dynamic approach to C-based object-oriented programming; it's the approach adopted by Apple as the foundation for programming under Mac OS X, a Unix-based operating system gaining wide acceptance among programmers and other technologists. …”
Publicado 2002
Libro electrónico -
939por Kereki, FedericoTabla de Contenidos: “…Testing impure functions -- Summary -- Questions -- Chapter 5: Programming Declaratively - A Better Style -- Transformations -- Reducing an array to a value -- Applying an operation - map() -- Dealing with arrays of arrays -- More general looping -- Logical HOFs -- Filtering an array -- Searching an array -- Higher-level predicates - every() and some() -- Checking negatives - none() -- Working with async functions -- Some strange behaviors -- Async-ready looping -- Working with parallel functions -- Unresponsive pages -- A frontend worker -- A backend worker -- Workers, FP style -- Long-living pooled workers -- Summary -- Questions -- Chapter 6: Producing Functions - Higher-Order Functions -- Wrapping functions - keeping behavior -- Logging -- Timing functions -- Memoizing functions -- Altering a function's behavior -- Doing things once, revisited -- Logically negating a function -- Inverting the results -- Arity changing -- Throttling and debouncing -- Changing functions in other ways -- Turning operations into functions -- Turning functions into promises -- Getting a property from an object -- Demethodizing - turning methods into functions -- Methodizing - turning functions into methods -- Finding the optimum -- Summary -- Questions -- Chapter 7: Transforming Functions - Currying and Partial Application -- A bit of theory -- Currying -- Dealing with many parameters -- Currying by hand -- Currying with bind() -- Partial application -- Partial application with arrow functions -- Partial application with closures -- Partial currying -- Partial currying with bind() -- Partial currying with closures -- Final thoughts -- Variable number of parameters -- Parameter order -- Being functional -- Summary -- Questions -- Chapter 8: Connecting Functions - Pipelining, Composition, and More -- Pipelining -- Piping in Unix/Linux -- Revisiting an example…”
Publicado 2023
Libro electrónico -
940Publicado 2018Tabla de Contenidos: “…23.13 Event handling -- 23.14 Object manipulation statements and operators -- 23.15 Exercises -- WINDOWS NT -- 24.1 Introduction -- 24.2 Novell NetWare networking -- 24.3 Servers, workstations and clients -- 24.4 Workgroups and domains -- 24.5 User and group accounts -- 24.6 New user accounts -- 24.7 File systems -- 24.8 Windows NT networking -- 24.9 Setting up TCP/IP networking on Windows NT -- 24.10 Windows sockets -- 24.11 Network dynamic data exchange (Net DDE) -- 24.12 Robust networking -- 24.13 Security model -- 24.14 TCP/IP applications -- 24.15 Windows NT network drives -- 24.16 Exercises -- NETWARE -- 25.1 Novell NetWare networking -- 25.2 NetWare and TCP/IP integration -- 25.3 NetWare architecture -- 25.4 NetWare protocols -- 25.5 IPX -- 25.6 Novell NetWare setup -- 25.7 NetWare 4.1 -- 25.8 Exercises -- UNIX -- 26.1 Introduction -- 26.2 Network setup -- 26.3 TCP/IP protocols -- 26.4 NFS -- 26.5 Network configuration files -- 26.6 Sample startup file -- 26.7 Exercises -- NETWORKING ELEMENTS -- 27.1 LANs, WANs, and MANs -- 27.2 OSI model -- 27.3 Communications standards and the OSI model -- 27.4 Standards agencies -- 27.5 Network cable types -- 27.6 LAN topology -- 27.7 Internetworking connections -- 27.8 Internet routing protocols -- 27.9 Network topologies -- 27.10 Network loading -- 27.11 Exercises -- ETHERNET -- 28.1 Introduction -- 28.2 IEEE standards -- 28.3 Ethernet - media access control (MAC) layer -- 28.4 IEEE 802.2 and Ethernet SNAP -- 28.5 OSI and the IEEE 802.3 standard -- 28.6 Ethernet transceivers -- 28.7 NIC -- 28.8 Standard Ethernet limitations -- 28.9 Ethernet types -- 28.10 Twisted-pair hubs -- 28.11 100 Mbps Ethernet -- 28.12 Ethernet security -- 28.13 Exercises -- TOKEN RING -- 29.1 Introduction -- 29.2 Operation -- 29.3 Token Ring - media access control (MAC) -- 29.4 Token Ring maintenance…”
Libro electrónico