Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 231
- Computer Science 199
- Operating systems (Computers) 197
- UNIX (Computer file) 145
- Linux 121
- Computer networks 88
- Sistemas operativos 73
- Unix 62
- Security measures 59
- Mac OS 57
- Development 54
- Application software 45
- Computer security 41
- Database management 40
- Macintosh (Computer) 38
- UNIX Shells 36
- Programming 35
- Examinations 32
- Computer programs 31
- Open source software 31
- Electrical & Computer Engineering 30
- Computer programming 29
- Telecommunications 29
- Certification 28
- Client/server computing 26
- Electronic data processing personnel 25
- Electronic data processing 23
- Informática 22
- Python (Computer program language) 22
- IBM Database 2 21
-
941Publicado 2021Tabla de Contenidos: “…. -- Getting information about Linux- and Unix-specific header files -- Getting ready -- How to do it... -- How it works... -- There's more... -- Defining feature test macros -- Getting ready -- How to do it... -- How it works... -- There's more... -- Looking at the four stages of compilation -- Getting ready -- How to do it... -- How it works... -- Compiling with Make -- Getting ready -- How to do it... -- How it works... -- Writing a generic Makefile with GCC options -- Getting ready -- How to do it... -- How it works... -- There's more... -- Writing a simple Makefile -- Getting ready -- How to do it... -- How it works... -- Writing a more advanced Makefile -- Getting ready -- How to do it... -- How it works... -- Chapter 4: Handling Errors in Your Programs -- Technical requirements -- Why error handling is important in system programming -- Getting ready -- How to do it... -- How it works... -- Handling some common errors -- Getting ready -- How to do it... -- How it works... -- Error handling and errno -- Getting ready -- How to do it... -- How it works... -- Handling more errno macros -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using errno with strerror() -- Getting ready -- How to do it... -- There's more... -- Using errno with perror() -- Getting ready -- How to do it... -- There's more... -- Returning an error value -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 5: Working with File I/O and Filesystem Operations -- Technical requirements…”
Libro electrónico -
942Publicado 2018Tabla de Contenidos: “…Zone transfers happen over TCP -- EDNS and large responses -- The anatomy of a DNS query - how nameserver selection actually works -- Summary -- References -- Chapter 7: Types and Uses of Common Resource Records -- Format of an RR -- Constructing a zone -- Start of Authority (SOA) -- MNAME (Originating Nameserver) -- RNAME (Point of Contact) -- Serial -- Date-based -- Unix timestamp -- Raw count -- When the format of the Serial actually matters -- The Refresh interval -- The Retry interval -- The Expire interval -- Minimum -- Can't You Just Set Your TTL To 0? …”
Libro electrónico -
943Publicado 2017Tabla de Contenidos: “…. -- net sockets are streams -- Unix sockets -- UDP sockets -- See also -- Chapter 4: Using Streams -- Introduction -- Processing Big Data -- Getting ready -- How to do it... -- How it works... -- There's more... -- Types of stream -- Processing infinite amounts of data -- Flow mode versus pull-based streaming -- Understanding stream events -- See also -- Using the pipe method -- Getting ready -- How to do it... -- How it works... -- There's more... -- Keeping piped streams alive -- See also -- Piping streams in production -- Getting ready -- How to do it... -- How it works... -- There's more... -- Use pumpify to expose pipelines -- See also -- Creating transform streams -- Getting ready -- How to do it... -- How it works... -- There's more... -- Transform streams with Node's core stream module -- Creating object mode transform streams -- See also -- Creating readable and writable streams -- Getting ready -- How to do it... -- How it works…”
Libro electrónico -
944Publicado 2003“…This book will help you install, tailor and configure the new switch on IBM’s premier UNIX operating system, Advanced Interactive eXecutive (AIX) 5.2, and shows the differences from earlier generations of similar technology previously known collectively as the Scalable POWERparallel (SP) Switch. …”
Libro electrónico -
945Publicado 2017Tabla de Contenidos: “…. -- shared_buffers -- temp_buffers -- work_mem -- maintenance_work_mem -- wal_buffers -- max_stack_depth -- effective_cache_size -- How it works... -- Handling Linux/Unix memory parameters -- Getting ready -- How to do it... -- kernel.shmmax -- kernel.shmall -- kernel.shmmni -- vm.swappiness -- vm.overcommit_memory -- vm.overcommit_ratio -- vm.dirty_background_ratio -- vm.dirty_ratio -- How it works... -- CPU scheduling parameters -- Getting ready -- How to do it... -- kernel.sched_autogroup_enabled -- kernel.sched_min_granularity_ns -- kernel.sched_latency_ns -- kernel.sched_wakeup_granularity_ns -- kernel.sched_migration_cost_ns -- How it works... -- Disk tuning parameters -- Getting ready -- How to do it... -- CFQ -- noop -- Deadline -- How it works... -- Identifying checkpoint overhead -- Getting ready -- How to do it... -- How it works... -- Analyzing buffer cache contents -- Getting ready -- How to do it... -- How it works... -- 4. …”
Libro electrónico -
946por Sobell, Mark G.Tabla de Contenidos: “…-- The Heritage of Linux: UNIX -- What Is So Good About Linux? -- Why Linux Is Popular with Hardware Companies and Developers -- Linux Is Portable -- Standards -- The C Programming Language -- Overview of Linux -- Linux Has a Kernel Programming Interface -- Linux Can Support Many Users -- Linux Can Run Many Tasks -- Linux Provides a Secure Hierarchical Filesystem -- The Shell: Command Interpreter and Programming Language -- A Large Collection of Useful Utilities -- Interprocess Communication -- System Administration -- Additional Features of Linux -- GUIs: Graphical User Interfaces -- (Inter)networking Utilities -- Software Development -- Chapter Summary -- Exercises -- PART I: THE LINUX OPERATING SYSTEM -- CHAPTER 2: GETTING STARTED -- Conventions Used in This Book -- Logging In -- Working with the Shell -- Curbing Your Power: Superuser Access -- Getting the Facts: Where to Find Documentation -- More About Logging In -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 3: COMMAND LINE UTILITIES -- Special Characters -- Basic Utilities -- Working with Files -- | (Pipe): Communicates Between Processes -- Four More Utilities -- Compressing and Archiving Files -- Locating Commands -- Obtaining User and System Information -- Communicating with Other Users -- Email -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 4: THE LINUX FILESYSTEM -- The Hierarchical Filesystem -- Directory and Ordinary Files -- Working with Directories -- Access Permissions -- Links -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 5: THE SHELL -- The Command Line -- Standard Input and Standard Output -- Running a Program in the Background -- Filename Generation/Pathname Expansion…”
Publicado 2005
Libro electrónico -
947Publicado 2011Tabla de Contenidos: “…Selecting a Password -- Components of a Good Password -- Password Aging -- Operating System and Network Operating System Hardening -- Hardening Microsoft Operating Systems -- Hardening UNIX- or Linux-Based Operating Systems -- Network Hardening -- Software Updates -- Device Configuration -- Ports and Services -- Traffic Filtering -- Securing Management Interfaces -- VLAN Management -- IPv4 vsIPv6 -- Application Hardening -- Application Configuration Baseline -- Application Patches -- Patch Management -- Web Servers -- Mail Servers -- FTP Servers -- DNS Servers -- File and Print Services -- Active Directory -- Host Software Baselining -- Group Policies -- Security Templates -- Chapter Review -- Questions -- Answers -- Chapter 13 Types of Attacks and Malicious Software -- Avenues of Attack -- The Steps in an Attack -- Minimizing Possible Avenues of Attack -- Attacking Computer Systems and Networks -- Denial-of-Service Attacks -- Backdoors and Trapdoors -- Null Sessions -- Sniffing -- Spoofing -- Man-in-the-Middle Attacks -- Replay Attacks -- TCP/IP Hijacking -- Attacks on Encryption -- Address System Attacks -- Password Guessing -- Software Exploitation -- Client-Side Attacks -- Malicious Code -- Secure Software Development Lifecycle -- War-Dialing and War-Driving -- Social Engineering -- Auditing -- Chapter Review -- Questions -- Answers -- Chapter 14 E-Mail and Instant Messaging -- Security of E-Mail -- Malicious Code -- Hoax E-Mails -- Unsolicited Commercial E-Mail (Spam) -- Mail Encryption -- Instant Messaging -- Chapter Review -- Questions -- Answers -- Chapter 15 Web Components -- Current Web Components and Concerns -- Protocols -- Encryption (SSL and TLS) -- The Web (HTTP and HTTPS) -- Directory Services (DAP and LDAP) -- File Transfer (FTP and SFTP) -- Vulnerabilities -- Code-Based Vulnerabilities -- Buffer Overflows -- Java and JavaScript…”
Libro electrónico -
948Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Understanding the Node Environment -- Introduction - JavaScript as a systems language -- The Unix design philosophy -- POSIX -- Events for everything -- Standard libraries -- Extending JavaScript -- Events -- Modularity -- The network -- V8, JavaScript, and optimizations -- Flags -- Optimizing your code -- Numbers and tracing optimization/de-optimization -- Objects and arrays -- Functions -- Optimized JavaScript -- Help with variables -- Arrow functions -- String manipulation -- The process object -- The REPL -- Summary -- Chapter 2: Understanding Asynchronous Event-Driven Programming -- Node's unique design -- Collaboration -- Queueing -- Understanding the event loop -- Event loop ordering, phases, and priorities -- Listening for events -- Signals -- Child processes -- File events -- Deferred execution -- process.nextTick -- setImmediate -- Timers -- setTimeout -- setInterval -- unref and ref -- Concurrency and errors -- Managing concurrency -- Callbacks -- Promises -- async/await -- Generators and Iterators -- Errors and exceptions -- Considerations -- Building a Twitter feed using file events -- Summary -- Chapter 3: Streaming Data Across Nodes and Clients -- Why use streams? …”
Libro electrónico -
949por Chen, Whei-JenTabla de Contenidos: “…7.1.5 Health Center/Memory Visualizer/DB2MTRK -- 7.1.6 Design Advisor -- 7.1.7 DB2 UDB problem determination utility -- 7.2 DB2 Performance Expert -- 7.3 Tivoli Monitoring -- 7.4 OS monitoring -- 7.4.1 Monitoring tools on the UNIX platform -- 7.4.2 Monitoring tools on the Windows platform -- Chapter 8. …”
Publicado 2005
Libro electrónico -
950Publicado 2007“…--Marc Strahl, senior UNIX engineer SolarisTM Internals, Second Edition, describes the algorithms and data structures of all the major subsystems in the Solaris 10 and OpenSolaris kernels. …”
Libro electrónico -
951por Jordan, TedTabla de Contenidos: “…Intro -- Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Acknowledgments -- Introduction -- Chapter 1 An Introduction to Linux and a Pre-Assessment Exam -- A Brief History of Linux -- Batch Processing -- MULTICS -- UNIX -- Linux -- Linux Operating System Structure -- Kernel -- Operating System Software -- Application Software -- Linux Distributions -- Distribution Differences -- Linux Derivatives -- Common Linux Implementations -- Linux on the Desktop -- Linux on the Server -- Mobile Linux -- Linux and Virtualization -- Linux and Cloud Computing -- Embedded Linux -- Chapter Review -- Pre-Assessment Test -- Questions -- Quick Answer Key -- In-Depth Answer Explanations -- Analyzing Your Results -- Chapter 2 Using the vi Text Editor -- The Role and Function of the vi Text Editor -- Editing Text Files in vi -- Opening Files in vi -- The vi Modes -- Working in Normal Mode -- Working in Command-Line Mode -- Exercise 2-1: Using the vi Editor -- Editing Text Files in nano -- Command Keys -- Configuration Files -- Chapter Review -- Questions -- Answers -- Chapter 3 Working with the Linux Shell -- What Is a Shell? …”
Publicado 2023
Libro electrónico -
952Publicado 2018Tabla de Contenidos: “…-- How to Use This Book -- Contact Me -- Chapter 1: The Basics of Networking -- Network Architecture and Protocols -- The Internet Protocol Suite -- Data Encapsulation -- Headers, Footers, and Addresses -- Data Transmission -- Network Routing -- My Model for Network Protocol Analysis -- Final Words -- Chapter 2: Capturing Application Traffic -- Passive Network Traffic Capture -- Quick Primer for Wireshark -- Alternative Passive Capture Techniques -- System Call Tracing -- The strace Utility on Linux -- Monitoring Network Connections with DTrace -- Process Monitor on Windows -- Advantages and Disadvantages of Passive Capture -- Active Network Traffic Capture -- Network Proxies -- Port-Forwarding Proxy -- SOCKS Proxy -- HTTP Proxies -- Forwarding an HTTP Proxy -- Reverse HTTP Proxy -- Final Words -- Chapter 3: Network Protocol Structures -- Binary Protocol Structures -- Numeric Data -- Booleans -- Bit Flags -- Binary Endian -- Text and Human-Readable Data -- Variable Binary Length Data -- Dates and Times -- POSIX/Unix Time -- Windows FILETIME -- Tag, Length, Value Pattern -- Multiplexing and Fragmentation -- Network Address Information -- Structured Binary Formats -- Text Protocol Structures -- Numeric Data -- Text Booleans -- Dates and Times -- Variable-Length Data -- Structured Text Formats -- Encoding Binary Data -- Hex Encoding -- Base64 -- Final Words -- Chapter 4: Advanced Application Traffic Capture -- Rerouting Traffic -- Using Traceroute -- Routing Tables -- Configuring a Router -- Enabling Routing on Windows -- Enabling Routing on *nix -- Network Address Translation -- Enabling SNAT…”
Libro electrónico -
953Publicado 2017Tabla de Contenidos: “…-- Common security threats in RESTful web services -- Use of HTTPS -- Securing an API key/token -- Not passing an access token in the URL -- Access token expiration -- Limited scope access token -- Public and private endpoints -- Public API endpoints -- Insecure direct object reference -- Restricting allowable verbs -- Input validation -- Available reusable code -- Summary -- Chapter 5: Load and Resolve with Composer, an Evolutionary -- Introduction to Composer -- Installation -- Installation on Windows -- Installation on Linux/Unix/OS X -- Global Installation -- Usage of Composer -- Composer as a dependency manager -- Installing packages -- Installing using composer.json -- The composer.json in detail -- The require object -- The require-dev object -- The autoload and autoload-dev -- The scripts -- The composer.lock -- Composer as an auto-loader -- Example -- Composer for creating a project -- Example -- Summary…”
Libro electrónico -
954Publicado 2016Tabla de Contenidos: “…7.6 Router verbinden diese (Netzwerk-)Welt -- 7.7 Virtuelle Netzwerkkomponenten -- 7.8 Fragen zu diesem Kapitel -- Kapitel 8: Der TCP/IP-Stack -- 8.1 Das Modell und die Praxis -- 8.1.1 Vergleich OSI-Modell mit dem DOD-4-Modell -- 8.1.2 Der Aufbau der Adressierung -- 8.2 Die Grundlagen der IP-Adressierung -- 8.2.1 CIDR statt Adressklassen -- 8.2.2 Private Netzwerke unter IPv4 -- 8.2.3 Ausnahmen und besondere Adressen -- 8.2.4 Der IPv4-Header -- 8.3 IPv6 -- 8.3.1 Der Header von IPv6 -- 8.3.2 Spezielle Adressen unter IPv6 -- 8.4 Subnettierung von Netzen -- 8.5 Von NAT bis uPnP -- 8.5.1 NAT und PAT -- 8.5.2 Universal Plug and Play -- 8.6 Weitere Protokolle auf dem IP-Layer -- 8.6.1 ICMP und IGMP -- 8.6.2 ARP -- 8.7 TCP und UDP -- 8.8 Die Geschichte mit den Ports -- 8.9 Fragen zu diesem Kapitel -- Kapitel 9: Serverrollen -- 9.1 Dienste und Rollen -- 9.2 Datei- und Druckdienste -- 9.2.1 Dateidienste verwaltet der Fileserver -- 9.2.2 Printserver verwalten Drucker und ihre Aufträge -- 9.3 Internetdienste -- 9.3.1 Webserver -- 9.3.2 FTP-Server -- 9.4 Netzwerkdienste -- 9.4.1 DNS-Server -- 9.4.2 DHCP-Server -- 9.4.3 Zeitsynchronisations-Server -- 9.4.4 Überwachungsserver -- 9.4.5 Server mit Fernzugriff (RAS-Server) -- 9.4.6 VPN unter Linux -- 9.5 Messaging-Server (Mailserver) -- 9.5.1 Posteingangsdienste (Postfachzugriff) -- 9.5.2 Postausgangsdienst -- 9.5.3 Unix- und Linux-Mailserver -- 9.5.4 Die kommerziellen Server -- 9.5.5 Webmail -- 9.5.6 Cloud-Systeme -- 9.6 Sicherheits- und Authentifizierungsdienste -- 9.6.1 Domänen-Controller -- 9.6.2 Certificate Authorities (CA) -- 9.6.3 Rights-Management-Server -- 9.7 Anwendungsserver -- 9.7.1 Datenbankserver -- 9.7.2 Anwendungsserver -- 9.7.3 Anwendungsarchitekturen -- 9.8 Internet, Intranet und Extranet -- 9.9 Fragen zu diesem Kapitel -- Kapitel 10: Übersicht zu Netzwerkbetriebssystemen…”
Libro electrónico -
955por Cattini, RolandTabla de Contenidos: “…6.4.7 Erweiterungskarten -- 6.5 Fragen zu diesem Kapitel -- Kapitel 7: Der TCP/IP-Stack -- 7.1 Das Modell und die Praxis -- 7.1.1 Vergleich OSI-Modell mit dem DOD-4-Modell -- 7.1.2 Der Aufbau der Adressierung -- 7.2 Die Grundlagen der IP-Adressierung -- 7.2.1 CIDR statt Adressklassen -- 7.2.2 Private Netzwerke unter IPv4 -- 7.2.3 Ausnahmen und besondere Adressen -- 7.2.4 Der IPv4-Header -- 7.3 IPv6 -- 7.3.1 Der Header von IPv6 -- 7.3.2 Spezielle Adressen unter IPv6 -- 7.4 Subnettierung von Netzen -- 7.5 Weitere Protokolle auf dem IP-Layer -- 7.5.1 ICMP und IGMP -- 7.5.2 ARP -- 7.6 TCP und UDP -- 7.7 Die Geschichte mit den Ports -- 7.8 Fragen zu diesem Kapitel -- Kapitel 8: Serverrollen -- 8.1 Dienste und Rollen -- 8.2 Datei- und Druckdienste -- 8.2.1 Dateidienste verwaltet der Fileserver -- 8.2.2 Printserver verwalten Drucker und ihre Aufträge -- 8.3 Internetdienste -- 8.3.1 Webserver -- 8.3.2 FTP-Server -- 8.4 Netzwerkdienste -- 8.4.1 DNS-Server -- 8.4.2 DHCP-Server -- 8.4.3 Zeitsynchronisationsserver -- 8.4.4 Überwachungsserver -- 8.4.5 Server mit Fernzugriff (RAS-Server) -- 8.4.6 VPN unter Linux -- 8.5 Messaging-Server (Mailserver) -- 8.5.1 Posteingangsdienste (Postfachzugriff) -- 8.5.2 Postausgangsdienst und Mailtransfer -- 8.5.3 Unix- und Linux-Mailserver -- 8.5.4 Die kommerziellen Server -- 8.5.5 Webmail -- 8.5.6 Cloud-Systeme -- 8.6 Sicherheits- und Authentifizierungsdienste -- 8.6.1 Domänen-Controller -- 8.6.2 Certificate Authorities (CA) -- 8.6.3 Rights-Management-Server -- 8.7 Anwendungsserver -- 8.7.1 Datenbankserver -- 8.7.2 Anwendungsserver -- 8.7.3 Anwendungsarchitekturen -- 8.8 Internet, Intranet und Extranet -- 8.8.1 Internet -- 8.8.2 Intranet -- 8.8.3 Extranet -- 8.9 Fragen zu diesem Kapitel -- Kapitel 9: Installation von Netzwerkbetriebssystemen -- 9.1 Übersicht zu Netzwerkbetriebssystemen…”
Publicado 2022
Libro electrónico -
956por Ortega Candel, José ManuelTabla de Contenidos: “…-- OBJETIVOS DE LA UNIDAD DIDÁCTICA -- 1.1 PROGRAMACIÓN ORIENTADA A OBJETOS -- 1.2 INSTALACIÓN DE PYTHON -- 1.2.1 MULTIPLATAFORMA -- 1.2.2 INSTALACIÓN -- 1.2.3 PYTHON EN WINDOWS -- 1.2.4 PYTHON EN SISTEMA UNIX -- 1.3 TIPOS Y ESTRUCTURAS DE DATOS -- 1.3.1 TIPOS DINÁMICOS -- 1.3.2 LISTAS -- 1.3.3 ITERADORES -- 1.3.4 TUPLAS -- 1.3.5 DICCIONARIOS -- 1.3.6 EXCEPCIONES -- 1.3.7 FUNCIONES -- 1.3.8 FICHEROS -- 1.3.9 MÓDULOS -- 1.3.10 COMANDO HELP -- 1.4 CLASES, HERENCIA, POLIMORFISMO -- 1.4.1 CLASES -- 1.4.2 EL MÉTODO DE INICIALIZACIÓN __INIT__ -- 1.4.3 ENCAPSULACIÓN -- 1.4.4 MÉTODOS Y ATRIBUTOS MÁGICOS -- 1.4.5 HERENCIA -- 1.5 EJERCICIOS PRÁCTICOS -- 1.6 RESUMEN -- 1.7 BIBLIOGRAFÍA -- 1.8 AUTOEVALUACIÓN UNIDAD 1 -- 1.9 LECTURAS RECOMENDADAS -- 1.10 GLOSARIO DE TÉRMINOS -- 2 METODOLOGÍA, HERRAMIENTAS Y ENTORNO DE (...) -- INTRODUCCIÓN -- OBJETIVOS DE LA UNIDAD DIDÁCTICA -- 2.1 METODOLOGÍA OSMTD -- 2.1.1 PASO DE PARÁMETROS EN PYTHON -- 2.1.2 PASO DE PARÁMETROS A UN ESCÁNER DE (...) -- 2.1.3 GESTIONAR DEPENDENCIAS EN UN PROYECTO (...) -- 2.1.4 GESTIONAR ENTORNO DE EJECUCIÓN -- 2.2 MÓDULO STB (SECURITY TOOLS BUILDER) -- 2.3 HERRAMIENTAS DE SEGURIDAD -- 2.3.1 PYDBG -- 2.3.2 IMMUNITY DEBUGGER -- 2.3.3 W3AF -- 2.3.4 SQLMAP -- 2.3.5 SPARTA -- 2.3.6 THE HARVESTER -- 2.3.7 OTRAS HERRAMIENTAS -- 2.4 ENTORNOS DE DESARROLLO -- 2.4.1 INTERACTUANDO CON PYTHON -- 2.4.2 IDES Y SOFTWARE PARA DESARROLLAR (...) -- 2.5 EJERCICIOS PRÁCTICOS -- 2.6 RESUMEN -- 2.7 BIBLIOGRAFÍA -- 2.8 AUTOEVALUACIÓN UNIDAD 2 -- 2.9 LECTURAS RECOMENDADAS -- 2.10 GLOSARIO DE TÉRMINOS -- 3 LIBRERÍAS Y MÓDULOS PARA REALIZAR PETICIONES (...) -- INTRODUCCIÓN -- OBJETIVOS DE LA UNIDAD DIDÁCTICA…”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
957Publicado 2002Tabla de Contenidos: “…1.16 Interpolating Variables in a String -- Problem -- Solution -- Discussion -- See Also -- 1.17 Interpolating Variables in a String in Python 2.4 -- Problem -- Solution -- Discussion -- See Also -- 1.18 Replacing Multiple Patterns in a Single Pass -- Problem -- Solution -- Discussion -- See Also -- 1.19 Checking a String for Any of Multiple Endings -- Problem -- Solution -- Discussion -- See Also -- 1.20 Handling International Text with Unicode -- Problem -- Solution -- Discussion -- See Also -- 1.21 Converting Between Unicode and Plain Strings -- Problem -- Solution -- Discussion -- See Also -- 1.22 Printing Unicode Characters to Standard Output -- Problem -- Solution -- Discussion -- See Also -- 1.23 Encoding Unicode Data for XML and HTML -- Problem -- Solution -- Discussion -- See Also -- 1.24 Making Some Strings Case-Insensitive -- Problem -- Solution -- Discussion -- See Also -- 1.25 Converting HTML Documents to Text on a Unix Terminal -- Problem -- Solution -- Discussion -- See Also -- Files -- 2.0 Introduction -- File Basics -- Portability and Flexibility -- 2.1 Reading from a File -- Problem -- Solution -- Discussion -- See Also -- 2.2 Writing to a File -- Problem -- Solution -- Discussion -- See Also -- 2.3 Searching and Replacing Text in a File -- Problem -- Solution -- Discussion -- See Also -- 2.4 Reading a Specific Line from a File -- Problem -- Solution -- Discussion -- See Also -- 2.5 Counting Lines in a File -- Problem -- Solution -- Discussion -- See Also -- 2.6 Processing Every Word in a File -- Problem -- Solution -- Discussion -- See Also -- 2.7 Using Random-Access Input/Output -- Problem -- Solution -- Discussion -- See Also -- 2.8 Updating a Random-Access File -- Problem -- Solution -- Discussion -- See Also -- 2.9 Reading Data from zip Files -- Problem -- Solution -- Discussion -- See Also…”
Libro electrónico -
958Publicado 2009Tabla de Contenidos: “…LESSON 24: Embedding SQL in Application Programming -- A Quick Trip Through Some Application Development Tools -- Creating the Database -- Using Java and SQL -- Using .NET and SQL -- PART VII: SQL in Various Database Implementations -- LESSON 25: Using Oracle SQL*Plus to Satisfy Reporting Needs -- An Introduction to SQL*Plus -- The SQL*Plus Buffer -- Viewing Table Structure with the DESCRIBE Command -- Displaying Settings with the SHOW Command -- Manipulating Files with File Commands -- Customizing the Work Environment with SET Commands -- Removing Settings with the CLEAR Command -- Formatting Your Output -- Creating Report and Group Summaries -- Using Variables in SQL*Plus -- Using the DUAL Table -- Exploring the DECODE Function -- DATE Conversions -- Running a Series of SQL Files -- Adding Comments to Your SQL Script -- Creating Advanced Reports -- LESSON 26: An Introduction to Oracle PL/SQL -- Introducing PL/SQL -- The Structure of a PL/SQL Block -- Transactional Control in PL/SQL -- Putting Everything Together -- Using Stored Procedures, Packages, and Triggers -- LESSON 27: An Introduction to Transact-SQL -- An Overview of Transact-SQL -- Extensions to ANSI QL -- Data Types -- Accessing the Database with Transact-SQL -- Establishing Flow Control -- Using Transact-SQL Wildcard Operators -- Date Conversions -- SQL Server Diagnostic Tools-SET Commands -- LESSON 28: Using MySQL on a UNIX-based System -- MySQL Administration -- The MySQL Terminal Monitor -- MySQL Utilities -- PART VIII: Appendices -- APPENDIX A: Answers -- APPENDIX B: Code Examples to Create Tables -- APPENDIX C: Code Examples to Populate Tables -- APPENDIX D: Using MySQL for Exercises -- Index -- Online Appendixes -- APPENDIX E: Glossary of Common SQL Commands…”
Libro electrónico -
959Publicado 2004Tabla de Contenidos: “…DB2 UDB ESE technical overview -- 3.1 The architecture -- 3.2 Functions and components -- 3.2.1 Database objects -- 3.2.2 Concurrency, locking and isolation levels -- 3.2.3 Parallel processing and partitioning -- 3.2.4 Cost-based optimizer -- 3.2.5 Join methods for distributed tables -- 3.2.6 Static and dynamic SQL statements -- 3.2.7 DB2 64-bit -- 3.3 DB2 monitoring and tuning tools -- 3.4 DB2 Version 8: a few highlights -- 3.4.1 Catalog caching -- 3.4.2 RUNSTATS enhancements -- 3.4.3 Multi-dimensional clustering -- 3.4.4 Concurrency features -- 3.4.5 High availability features -- 3.4.6 Connection concentrator -- 3.4.7 Merge statement -- 3.4.8 Multi-FixPak install for UNIX -- Chapter 4. Building SAP BW on DB2 -- 4.1 Value of building SAP BW on DB2 UDB ESE -- 4.1.1 Scalability -- 4.1.2 High performance -- 4.1.3 Ease of administration -- 4.2 Business advantage: the value proposition…”
Libro electrónico -
960Publicado 2022Tabla de Contenidos: “…2.32 Conclusions - predictions about storage systems -- 2.32.1 Resurgence in shared storage, but Fibre-Channel fades -- 3 Disk drive data placement and scheduling -- 3.1 The organization of Hard Disk Drives - HDDs -- 3.2 Internal organization of files in UNIX -- 3.3 Review of disk arm scheduling -- 3.3.1 Implementation of SATF -- 3.3.2 Disk performance studies by Windsor Hsu and Alan Jay Smith at IBM ARC -- 3.3.3 Linux support for disk scheduling -- 3.4 Disk scheduling for mixed workloads -- 3.5 Real time disk scheduling for multimedia -- 3.6 Storage virtualization -- 3.7 File placement on disk -- 3.7.1 Anticipatory disk arm placement -- 3.8 Disks with Shingled Magnetic Recording - SMR -- 3.9 Review of analyses of disk scheduling methods -- 3.10 Analytic studies of disk storage -- 3.11 Analysis of a zoned disk with the FCFS scheduling -- 3.11.1 Disk service time in zoned disks with FCFS scheduling -- 3.12 Performance analysis of the SCAN policy -- 3.13 Analysis of the SATF policy -- 3.13.1 Preliminary investigation of SATF -- 3.13.2 First method for the analysis of SATF -- 3.13.3 Second method for the analysis of SATF -- 3.14 Conclusions -- 4 Mirrored & -- hybrid arrays -- 4.1 Introduction to mirrored and hybrid disk arrays -- 4.2 Mirrored and hybrid disk array organizations -- 4.2.1 Basic Mirroring - BM -- 4.2.2 Group Rotate Declustering - GRD -- 4.2.3 Interleaved Declustering - ID -- 4.2.4 Chained Declustering - CD -- 4.2.5 Dual striping -- 4.2.6 Logical volume and automatic storage management and GPFS -- 4.2.7 LSI Logic RAID -- 4.2.8 Adaptive disk arrays -- 4.2.9 SSPiRAL (Survivable Storage using Parity in Redundant Array Layout) -- 4.2.10 B-code -- 4.2.11 Weaver codes -- 4.2.12 Robust, Efficient, Scalable, Autonomous, Reliable - RESAR -- 4.2.13 Multiway placement -- 4.2.14 Classification of mirrored and hybrid disk arrays…”
Libro electrónico