Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 231
- Computer Science 199
- Operating systems (Computers) 197
- UNIX (Computer file) 145
- Linux 121
- Computer networks 88
- Sistemas operativos 73
- Unix 62
- Security measures 59
- Mac OS 57
- Development 54
- Application software 45
- Computer security 41
- Database management 40
- Macintosh (Computer) 38
- UNIX Shells 36
- Programming 35
- Examinations 32
- Computer programs 31
- Open source software 31
- Electrical & Computer Engineering 30
- Computer programming 29
- Telecommunications 29
- Certification 28
- Client/server computing 26
- Electronic data processing personnel 25
- Electronic data processing 23
- Informática 22
- Python (Computer program language) 22
- IBM Database 2 21
-
961Publicado 2017Tabla de Contenidos: “…. -- Exploiting vulnerable services (Unix) -- Getting ready -- How to do it…”
Libro electrónico -
962Publicado 2023Tabla de Contenidos: “…Fail Securely -- Separation of Duties (SoD) -- Keep It Simple -- Trust, but Verify -- Zero Trust -- Security Models -- Reading Down and Writing Up -- State Machine Model -- Bell-LaPadula Model -- Simple Security Property -- *Security Property (Star Security Property) -- Strong and Weak Tranquility Property -- Lattice-Based Access Controls -- Integrity Models -- Biba Model -- Simple Integrity Axiom -- * Integrity Axiom -- Clark-Wilson -- Well Formed Transactions -- Certification, Enforcement, and Separation of Duties -- Information Flow Model -- Chinese Wall Model -- Non-interference -- Take-Grant -- Access Control Matrix -- Zachman Framework for Enterprise Architecture -- Graham-Denning Model -- Harrison-Ruzzo-Ullman Model -- Evaluation Methods, Certification, and Accreditation -- The International Common Criteria -- Common Criteria Terms -- Levels of Evaluation -- Secure System Design Concepts -- Layering -- Abstraction -- Security Domains -- The Ring Model -- Open and Closed Systems -- Secure Hardware Architecture -- The System Unit and Motherboard -- The Computer Bus -- Northbridge and Southbridge -- The CPU -- Arithmetic Logic Unit and Control Unit -- Fetch and Execute -- Pipelining -- Interrupts -- Processes and Threads -- Multitasking and Multiprocessing -- Watchdog Timers -- CISC and RISC -- Memory Addressing -- Memory Protection -- Process Isolation -- Hardware Segmentation -- Virtual Memory -- Swapping and Paging -- BIOS -- WORM Storage -- Trusted Platform Module -- Data Execution Prevention and Address Space Layout Randomization -- Secure Operating System and Software Architecture -- The Kernel -- Reference Monitor -- Users and File Permissions -- Linux and UNIX permissions -- Microsoft NTFS Permissions -- Privileged Programs -- Virtualization, Cloud, and Distributed Computing -- Virtualization -- Hypervisor -- Virtualization Benefits…”
Libro electrónico -
963Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Working with Unix pipes -- Getting ready -- How to do it... -- How it works... -- Catching and handling signals -- Getting ready -- How to do it... -- How it works... -- An ANSI coloring application -- Getting ready -- How to do it... -- How it works... -- Chapter 3: Data Conversion and Composition -- Introduction -- Converting data types and interface casting -- Getting ready -- How to do it... -- How it works... -- Working with numeric data types using math and math/big -- Getting ready -- How to do it... -- How it works... -- Currency conversions and float64 considerations -- Getting ready -- How to do it... -- How it works... -- Using pointers and SQL NullTypes for encoding and decoding…”
Libro electrónico -
964por Bruni, PaoloTabla de Contenidos: “…DB2 synergy with zSeries and z/OS -- 3.1 The zSeries, z/OS, and DB2 partnership -- 3.1.1 z/OS highlights -- 3.1.2 zSeries architecture highlights -- 3.1.3 DB2 UDB for z/OS -- 3.2 Parallel Sysplex and data sharing -- 3.2.1 Shared nothing -- 3.2.2 Shared disk -- 3.2.3 Shared data -- 3.2.4 Advantages of data sharing -- 3.2.5 Cost benefit -- 3.2.6 Summary -- 3.3 Compression -- 3.4 Security -- 3.4.1 zSeries security features -- 3.4.2 DB2 controls -- 3.4.3 DB2 and multilevel security -- 3.4.4 Summary -- 3.5 Encryption -- 3.5.1 DB2 column level encryption -- 3.5.2 IBM Data Encryption for IMS and DB2 Databases -- 3.5.3 Summary -- 3.6 Sort -- 3.7 z/OS Unicode Conversion Services -- 3.8 UNIX System Services -- 3.9 WorkLoad Manager, Intelligent Resource Director, and VIPA -- 3.9.1 WorkLoad Manager…”
Publicado 2005
Libro electrónico -
965por Nunes, Fabio MazanattiTabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Overview of WebLogic Server 12c and Related Technologies -- Introducing Oracle WebLogic Server 12c -- WebLogic Server @ Oracle -- Most relevant features -- Overview of JDK 7 -- The Project Coin -- The diamond operator -- The try-with-resources statement -- Strings in switch statements -- Manipulating binary integral literals -- Exception handling with multicatch statements -- Delving into Java EE 6 -- Other technologies in the book -- Oracle Enterprise Pack for Eclipse -- Oracle Coherence -- PrimeFaces -- MySQL -- The Cloud Application Foundation (CAF) -- Oracle Traffic Director -- Oracle Tuxedo -- Oracle Virtual Assembly Builder -- Oracle Exalogic and WebLogic 12c -- Web resources -- Java and Java EE 6 -- WebLogic 12c -- Coherence -- Other tools -- Summary -- Chapter 2: Setting Up the Environment -- About the directory structure -- Installing JDK 1.7 -- Installing Oracle WebLogic Server -- Installing Oracle Enterprise Pack for Eclipse (OEPE) -- Installing MySQL -- Installing on Linux using a package manager -- Downloading and installing manually -- Disabling case sensitivity for tables on Unix/Linux -- Some Windows specifics -- Configuring MySQL databases -- Preparing PrimeFaces -- Downloading the binaries -- Creating a shared library -- Setting up a WebLogic domain -- Configuring Eclipse and OEPE -- Linking WebLogic's runtime environment -- Adding a reference to the PrimeFaces' shared library -- Linking WebLogic Server's instance -- Referencing MySQL databases -- Creating WebLogic data sources -- Adding database connections to Eclipse -- Using OpenLDAP -- Installing OpenLDAP -- Configuring an OpenLDAP server -- Loading sample entries and testing -- Web resources -- Summary…”
Publicado 2013
Libro electrónico -
966por Kammermann, MarkusTabla de Contenidos: “…11.2 Dynamic Host Configuration Protocol -- 11.3 DNS (Domain Name System) -- 11.3.1 hosts -- 11.3.2 Der Windows Internet Naming Service (WINS) -- 11.3.3 Das Domain Name System -- 11.3.4 Der Aufbau von DNS -- 11.3.5 Das Konzept des dynamischen DNS -- 11.4 Web- und Mail-Protokolle -- 11.4.1 HTTP -- 11.4.2 FTP -- 11.4.3 TFTP -- 11.4.4 NNTP -- 11.4.5 SMTP -- 11.4.6 POP3 und IMAP4 -- 11.5 Weitere Dienstprotokolle -- 11.5.1 NTP -- 11.5.2 SSH -- 11.5.3 Telnet -- 11.6 Fragen zu diesem Kapitel -- Kapitel 12: Netzwerke betreiben -- 12.1 Grundlagen der Verwaltung -- 12.1.1 Arbeitsgruppen und Domänen -- 12.1.2 Der Client/Server-Ansatz -- 12.1.3 Client/Server-Bausteine -- 12.1.4 Wichtige Fragen zum Einsatz eines NOS -- 12.2 Verschiedene Systeme kurz vorgestellt -- 12.2.1 Apple -- 12.2.2 Unix -- 12.2.3 Linux -- 12.2.4 Von Windows NT bis Windows 2022 -- 12.2.5 Citrix und VMWare -- 12.2.6 Die Bedeutung von SMB über Betriebssysteme hinweg -- 12.3 Die Virtualisierung -- 12.4 Cloud Computing -- 12.4.1 Servicemodelle in der Cloud -- 12.4.2 Betriebsmodelle -- 12.4.3 Angebote aus der Cloud -- 12.5 Ein Wort zum Thema Speicher -- 12.6 Sicherheitsfragen zu Cloud-Modellen und Rechenzentren -- 12.7 Die Administration des Netzwerks -- 12.8 Ressourcen im Netzwerk teilen -- 12.9 Identifikation und Rechte im Netzwerk -- 12.9.1 Benutzer einrichten -- 12.9.2 Das Erstellen von Gruppen -- 12.9.3 Datei- und Ordnerrechte -- 12.9.4 Drucken im Netzwerk -- 12.10 Fragen zu diesem Kapitel -- Kapitel 13: Sicherheitsverfahren im Netzwerkverkehr -- 13.1 Identifikation und Authentifikation -- 13.1.1 Aller Anfang ist ... das Passwort -- 13.1.2 Das Zero Trust-Konzept -- 13.2 Authentifikationsverfahren -- 13.2.1 Single Sign On und Mehr-Faktor-Authentifizierung -- 13.2.2 PAP und CHAP -- 13.2.3 EAP -- 13.2.4 Kerberos -- 13.2.5 RADIUS -- 13.3 Die Hash-Funktion -- 13.4 Verschlüsselung…”
Publicado 2022
Libro electrónico -
967por Almond, ChrisTabla de Contenidos: “…3.1 General security concepts and terminology -- 3.1.1 Broad security categories -- 3.1.2 Information security components -- 3.1.3 RPC security flavors -- 3.1.4 RPCSEC_GSS protection levels -- 3.1.5 RPCSEC_GSS protection mechanisms -- 3.1.6 Looking ahead to the rest of the chapter -- 3.2 NFS V4 user/group identification -- 3.2.1 User identity management options -- 3.2.2 User/group identities and NFS V4 -- 3.3 NFS V4 user authentication -- 3.3.1 AUTH_SYS user authentication -- 3.3.2 RPCSEC_GSS user authentication using Kerberos -- 3.4 NFS V4 user authorization -- 3.4.1 Standard UNIX file permissions -- 3.4.2 AIXC ACLs -- 3.4.3 NFS V4 ACLs: description -- 3.4.4 NFS V4 ACLs: ACL evaluation -- 3.4.5 NFS V4 ACLs: administration -- 3.4.6 NFS V4 ACLs: permissions scenarios -- 3.4.7 NFS V4 ACLs: NFS V3 clients -- 3.5 NFS V4 host identification -- 3.5.1 Basic host identification -- 3.5.2 Kerberos host identification -- 3.6 NFS V4 host authentication -- 3.7 NFS V4 host authorization -- Part 2 Implementing NFS V4 -- Chapter 4. …”
Publicado 2004
Libro electrónico -
968Publicado 2003Tabla de Contenidos: “…8.3 TotalStorage Expert performance reports and other tools -- 8.3.1 Using the ESS reports under UNIX systems -- 8.3.2 Using the ESS reports under Windows 2000 systems -- 8.3.3 Using the ESS reports in an S/390 environment -- Chapter 9. …”
Libro electrónico -
969Publicado 2017Tabla de Contenidos: “…Basic structure of a Declarative Pipeline -- The node block -- The stage block -- Directives -- Steps -- Jenkins pipeline syntax utility -- Prerequisite -- Installing the Pipeline Maven Integration Plugin -- Creating a Jenkins pipeline using the pipeline syntax utility -- Multibranch pipeline -- Prerequisite -- Adding GitHub credentials inside Jenkins -- Configuring Webhooks on GitHub from Jenkins -- Create a new repository on GitHub -- Using a Jenkinsfile -- Creating a Multibranch pipeline in Jenkins -- Re-register the Webhooks -- Jenkins Multibranch pipeline in action -- Creating a new feature branch to test the multibranch pipeline -- Jenkins Blue Ocean -- Installing the Jenkins Blue Ocean plugin -- View your regular Jenkins pipeline in Blue Ocean -- Creating a pipeline in Blue Ocean -- Summary -- Chapter 4: Configuring Jenkins -- The Jenkins Plugin Manager -- Updating Jenkins plugins -- Installing a new Jenkins plugin -- Uninstalling or downgrading a Jenkins plugin -- Configuring proxy settings in Jenkins -- Manually installing a Jenkins plugin -- Jenkins backup and restore -- Installing the Periodic Backup plugin -- Configuring the Periodic Backup plugin -- Creating a Jenkins backup -- Restoring a Jenkins backup -- Viewing the backup and restore logs -- Upgrading Jenkins -- Upgrading Jenkins running on Tomcat Server -- Upgrading standalone Jenkins running on Windows -- Upgrading standalone Jenkins running on Ubuntu -- Upgrading Jenkins running on a Docker container -- User administration -- Enabling/disabling global security on Jenkins -- Enabling/disabling computers to remember user credentials -- Authentication methods -- Delegating to a servlet container -- Jenkins' own user database -- LDAP -- Unix user/group database -- Creating new users inside Jenkins -- People page -- User information and settings in Jenkins -- Authorization methods…”
Libro electrónico -
970por Vanderburg, Eric A.Tabla de Contenidos: “…Off-Premises Hosting -- Orchestration Platforms -- Multicloud -- Cloud Characteristics and Terms -- Elasticity -- Demand-Driven Service -- Pay-as-You-Grow -- Chargeback -- Ubiquitous Access -- Metering -- Multitenancy -- Cloud Bursting -- Baselines -- Source and Target Hosts -- Existing Systems -- Cloud Elements -- Advanced Cloud Services -- Machine Learning and Artificial Intelligence -- Serverless -- Exercise 1-1: Creating a Basic Serverless Application on AWS Lambda -- Internet of Things -- Chapter Review -- Questions -- Answers -- Chapter 2 Disk Storage Systems -- Disk Types and Configurations -- Rotational Media -- Solid State Drive -- USB Drive -- Tape -- Interface Types -- Access Speed -- Redundant Array of Independent Disks (RAID) -- Write Once, Read Many (WORM) -- Tiering -- Performance Levels of Each Tier -- Policies -- File System Types -- Unix File System -- Extended File System -- File Allocation Table File System -- New Technology File System -- Exercise 2-1: Formatting a Disk with the NTFS Partition in Windows -- Resilient File System -- Virtual Machine File System -- Z File System -- Chapter Review -- Questions -- Answers -- Chapter 3 Storage Networking -- Storage Types and Technologies -- Direct Attached Storage -- Storage Area Network…”
Publicado 2021
Libro electrónico -
971Publicado 2021Tabla de Contenidos: “…Removing Accounts -- Maintaining the Environment -- Setting Environment Variables -- Exploring User Entries -- Exploring Global Entries -- Managing Groups -- Adding Groups -- Removing Groups -- The Bottom Line -- Chapter 14 Working with Processes and Jobs -- Looking at Processes -- Monitoring Processes in Real Time -- Managing Processes -- Setting Priorities -- Stopping Processes -- Running Programs in Background Mode -- Running in the Background -- Running Multiple Background Jobs -- Running Programs Without a Console -- Job Control -- Viewing Jobs -- Restarting Stopped Jobs -- Scheduling Jobs -- Scheduling a Job Using the at Command -- Scheduling Recurring Programs -- The Bottom Line -- Chapter 15 Managing Log Files -- The systemd Journaling System -- Configuring systemd-journald -- Looking at Journal Files -- Making the Journal Persistent -- Viewing Journal Entries -- Maintaining the Journal -- Viewing Different Journal Files -- Protecting Journal Files -- Making Journal Entries -- The rsyslog Legacy System -- The syslog Protocol -- Basic Logging Using rsyslogd -- Layering Your Logging -- Making Log Entries -- Finding Event Messages -- The Bottom Line -- Chapter 16 Managing Printers -- The Common Unix Printing System -- Printer Drivers -- Web Interface -- Command-Line Commands -- Printer Sharing -- Printer Classes -- Installing and Configuring CUPS -- Installing CUPS -- Preparing the Server to Use CUPS -- Using CUPS -- Administration Functions -- Managing Printers and Jobs in CUPS -- The Bottom Line -- Part 3 Advanced Admin Functions -- Chapter 17 Exploring Ubuntu Security -- Locking Down Root -- Looking at Linux Account Types -- Gaining Super User Privileges -- Using OpenSSH on Ubuntu -- Exploring Basic SSH Concepts -- Configuring SSH -- Generating SSH Keys -- Authenticating with SSH Keys -- The AppArmor System -- Network Security Using Firewalls…”
Libro electrónico -
972Publicado 2018Tabla de Contenidos: “…Passcodes, Touch ID, and Face ID -- Code Signing -- Sandboxing -- Encryption -- Data protection -- Address Space Layout Randomization -- Privilege separation -- Stack-smashing protection -- Data execution prevention -- Data wipe -- Activation Lock -- The App Store -- Jailbreaking -- Summary -- Chapter 3: Data Acquisition from iOS Devices -- Operating modes of iOS devices -- The normal mode -- The recovery mode -- DFU mode -- Setting up the forensic environment -- Password protection and potential bypasses -- Logical acquisition -- Practical logical acquisition with libimobiledevice -- Practical logical acquisition with Belkasoft Acquisition Tool -- Practical logical acquisition with Magnet ACQUIRE -- Filesystem acquisition -- Practical jailbreaking -- Practical filesystem acquisition with Elcomsoft iOS Forensic Toolkit -- Physical acquisition -- Practical physical acquisition with Elcomsoft iOS Forensic Toolkit -- Summary -- Chapter 4: Data Acquisition from iOS Backups -- iTunes backup -- Creating backups with iTunes -- Understanding the backup structure -- info.plist -- manifest.plist -- status.plist -- manifest.db -- Extracting unencrypted backups -- iBackup Viewer -- iExplorer -- BlackLight -- Encrypted backup -- Elcomsoft Phone Breaker -- Working with iCloud backups -- Extracting iCloud backups -- Summary -- Chapter 5: iOS Data Analysis and Recovery -- Timestamps -- Unix timestamps -- Mac absolute time -- WebKit/Chrome time -- SQLite databases -- Connecting to a database -- SQLite special commands -- Standard SQL queries -- Accessing a database using commercial tools -- Key artifacts - important iOS database files -- Address book contacts -- Address book images -- Call history -- SMS messages -- Calendar events -- Notes -- Safari bookmarks and cache -- Photo metadata -- Consolidated GPS cache -- Voicemail -- Property lists…”
Libro electrónico -
973Publicado 2014Tabla de Contenidos: “…4.4.4 File-System Performance -- 4.4.5 Defragmenting Disks -- 4.5 EXAMPLE FILE SYSTEMS -- 4.5.1 The MS-DOS File System -- 4.5.2 The UNIX V7 File System -- 4.5.3 CD-ROM File Systems -- 4.6 RESEARCH ON FILE SYSTEMS -- 4.7 SUMMARY -- 5 INPUT/OUTPUT -- 5.1 PRINCIPLES OF I/O HARDWARE -- 5.1.1 I/O Devices -- 5.1.2 Device Controllers -- 5.1.3 Memory-Mapped I/O -- 5.1.4 Direct Memory Access -- 5.1.5 Interrupts Revisited -- 5.2 PRINCIPLES OF I/O SOFTWARE -- 5.2.1 Goals of the I/O Software -- 5.2.2 Programmed I/O -- 5.2.3 Interrupt-Driven I/O -- 5.2.4 I/O Using DMA -- 5.3 I/O SOFTWARE LAYERS -- 5.3.1 Interrupt Handlers -- 5.3.2 Device Drivers -- 5.3.3 Device-Independent I/O Software -- 5.3.4 User-Space I/O Software -- 5.4 DISKS -- 5.4.1 Disk Hardware -- 5.4.2 Disk Formatting -- 5.4.3 Disk Arm Scheduling Algorithms -- 5.4.4 Error Handling -- 5.4.5 Stable Storage -- 5.5 CLOCKS -- 5.5.1 Clock Hardware -- 5.5.2 Clock Software -- 5.5.3 Soft Timers -- 5.6 USER INTERFACES: KEYBOARD, MOUSE, MONITOR -- 5.6.1 Input Software -- 5.6.2 Output Software -- 5.7 THIN CLIENTS -- 5.8 POWER MANAGEMENT -- 5.8.1 Hardware Issues -- 5.8.2 Operating System Issues -- 5.8.3 Application Program Issues -- 5.9 RESEARCH ON INPUT/OUTPUT -- 5.10 SUMMARY -- 6 DEADLOCKS -- 6.1 RESOURCES -- 6.1.1 Preemptable and Nonpreemptable Resources -- 6.1.2 Resource Acquisition -- 6.2 INTRODUCTION TO DEADLOCKS -- 6.2.1 Conditions for Resource Deadlocks -- 6.2.2 Deadlock Modeling -- 6.3 THE OSTRICH ALGORITHM -- 6.4 DEADLOCK DETECTION AND RECOVERY -- 6.4.1 Deadlock Detection with One Resource of Each Type -- 6.4.2 Deadlock Detection with Multiple Resources of Each Type -- 6.4.3 Recovery from Deadlock -- 6.5 DEADLOCK AVOIDANCE -- 6.5.1 Resource Trajectories -- 6.5.2 Safe and Unsafe States -- 6.5.3 The Banker's Algorithm for a Single Resource -- 6.5.4 The Banker's Algorithm for Multiple Resources…”
Libro electrónico -
974Publicado 2017Tabla de Contenidos: “…-- Danksagung -- Teil I: Netzwerk-Grundlagen -- Kapitel 1: Einführung in Computernetzwerke -- 1.1 Die Entwicklung von Computernetzwerken -- 1.1.1 Bevor es Netzwerke gab -- 1.1.2 Die Entstehung des Internets -- 1.1.3 UNIX und C -- 1.1.4 Die TCP/IP-Protokollfamilie -- 1.1.5 Ethernet -- 1.1.6 Computernetzwerke heute -- 1.2 Komponenten eines Computernetzwerks -- 1.2.1 LAN, WAN, GAN, MAN -- 1.2.2 Und das Internet? …”
Libro electrónico -
975Publicado 2005Tabla de Contenidos: “…Introduction to DB2 for z/OS and OS/390 -- 1.1 Relational database management systems -- 1.2 The DB2 Universal Database Family -- 1.2.1 DB2 UDB for Linux, UNIX®, and Windows® -- 1.2.2 DB2 UDB for iSeriesTM -- 1.2.3 DB2 Server for VSE and VM -- 1.2.4 More information on the DB2 UDB family, related tools, and products -- 1.3 Components of DB2 UDB for z/OS and OS/390 -- 1.3.1 DB2 UDB for z/OS and OS/390 address spaces -- 1.3.2 DB2 attachment facilities -- 1.4 DB2 data structures -- 1.4.1 Databases -- 1.4.2 Storage groups -- 1.4.3 Data sets -- 1.4.4 Table spaces -- 1.4.5 Tables -- 1.4.6 Indexes -- 1.5 Structured query language (SQL) -- 1.5.1 Static SQL -- 1.5.2 Dynamic SQL -- 1.5.3 Industry standards -- 1.6 DB2 concepts -- 1.6.1 Referential constraints -- 1.6.2 DB2 packages, plans, collections, and package lists -- 1.6.3 Schemas -- 1.7 Accessing DB2 from a Java environment -- 1.7.1 JDBC fundamentals -- 1.7.2 JDBC driver types -- 1.7.3 IBM DB2 Legacy Driver -- 1.8 IBM DB2 Universal Driver for SQLJ and JDBC -- 1.8.1 IBM z/OS Application Connectivity to DB2 for z/OS and OS/390 -- 1.9 Using the DB2 Universal Driver for SQLJ and JDBC -- 1.9.1 Required environment variable settings -- 1.9.2 DB2 Universal Driver stored procedures and metadata -- 1.9.3 Binding DB2 Universal JDBC Driver packages with the DB2Binder utility -- 1.9.4 DB2T4XAIndoubtUtil utility for DB2 UDB for OS/390 and z/OS Version 7 -- 1.9.5 Differences between the DB2 Universal Driver and DB2 Legacy Driver -- 1.9.6 JDBC 3.0 APIs specific to the DB2 Universal Driver -- Chapter 2. …”
Libro electrónico -
976Publicado 2010Tabla de Contenidos: “…Mix and match with old Windows and Macs -- Networking with other operating systems -- Internetworking with Windows Vista, XP, and 2000 -- Internetworking with Windows 95, 98, and Me -- Internetworking with UNIX and Linux -- Internetworking with Macintosh -- Installing optional network components -- The hosts file -- 19. …”
Libro electrónico -
977por Henningsen, PeterTabla de Contenidos: “…Using Debug Tool under UNIX System Services -- 18.1 Common considerations for all languages -- 18.1.1 Specifying the TEST runtime option -- 18.1.2 Special considerations for running DLL applications from the shell -- 18.2 Using C/C++ and Debug Tool under USS -- 18.2.1 Compiling a C/C++ application -- 18.2.2 Debugging a USS application -- Chapter 19. …”
Publicado 2004
Libro electrónico -
978Publicado 2018Tabla de Contenidos: “…Disk throughput in case of sequential read and write -- Bonnie++ -- Bonnie++ 2.0 -- Bonnie++ ZCAV -- sysbench -- pgbench -- Seek rate -- Removing test files -- fsync commit rate -- Complicated disk benchmarks -- Sample disk results -- Disk performance expectations -- Sources of slow disk and array performance -- Summary -- Chapter 4: Disk Setup -- Maximum filesystem sizes -- Filesystem crash recovery -- Journaling filesystems -- Linux filesystems -- ext2 -- ext3 -- ext4 -- XFS -- Benchmarks -- Other Linux filesystems -- Write barriers -- Drive support for barriers -- Filesystem support for barriers -- General Linux filesystem tuning -- Read-ahead -- File access times -- Read caching and swapping -- Write cache sizing -- I/O scheduler elevator -- Solaris and FreeBSD filesystems -- Solaris UFS -- FreeBSD UFS2 -- ZFS -- Windows filesystems -- FAT32 -- NTFS -- Adjusting mounting behavior -- Disk layout for PostgreSQL -- Symbolic links -- Tablespaces -- Database directory tree -- Temporary files -- Disk arrays, RAID, and disk layout -- Disk layout guidelines -- Summary -- Chapter 5: Memory for Database Caching -- Memory units in postgresql.conf -- Increasing Unix shared memory parameters for larger buffer sizes -- Kernel semaphores -- Estimating shared memory allocation -- Inspecting the database cache -- Installing pg_buffercache into a database -- Database disk layout -- Creating a new block in a database -- Writing dirty blocks to disk -- Crash recovery and the buffer cache -- Checkpoint processing basics -- Write-ahead log and recovery processing -- Checkpoint timing -- Checkpoint spikes -- Spread checkpoints -- Database block life cycle -- Dirty block write paths -- Database buffer cache versus operating system cache -- Doubly cached data -- Inspecting the OS cache -- Checkpoint overhead -- Starting size guidelines…”
Libro electrónico -
979por Lázaro Domínguez, FranciscoTabla de Contenidos: “…4.10.1 Cómo visualizar los metadatos de un documento -- 4.10.2 Metadata Assistant -- 4.10.3 FOCA -- 4.10.4 Metadatos EXIF -- 4.11 ANÁLISIS DE PARTICIONES NTFS Y FAT -- 4.11.1 Runtime DiskExplorer -- 4.11.2 Recuperación de archivos borrados -- 4.11.3 Runtime GetDataBack -- 4.11.4 EasyRecovery Professional -- 4.11.5 R-Studio -- 4.12 EL REGISTRO DE WINDOWS -- 4.12.1 Estructura y archivos del Registro -- 4.12.2 Análisis off line con Windows Registry Recovery -- 4.12.3 RegRipper -- 5 ANÁLISIS FORENSE DE SISTEMAS LINUX/UNIX -- 5.1 HERRAMIENTAS DE CÓDIGO LIBRE -- 5.1.1 ¿Qué es exactamente el código libre? …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
980por Press, Posts & TelecomTabla de Contenidos: “…10.8.2 统 信息指标 -- 10.8.3 估 一些比 处理的 域 -- 10.9 其他一些查 划参数 -- 10.9.1 effective_cache_size -- 10.9.2 work_mem -- 10.9.3 constraint_exclusion -- 10.9.4 cursor_tuple_fraction -- 10.10 执 其他的 句类型 -- 10.11 改 查 -- 10.11.1 对完全缓存的数据 优化 -- 10.11.2 查 等价测 -- 10.11.3 禁止优化器功 -- 10.11.4 绕开优化器 -- 10.11.5 免 划使用OFFSET 组 -- 10.11.6 外 故 点 -- 10.12 SQL 制 -- 10.12.1 在SQL 当中对数据 编号 -- 10.12.2 使用窗口函数 编号 -- 10.12.3 使用窗口函数 累 -- 10.13 小结 -- 第11 章数据库活动和统 信息 -- 11.1 统 信息 图 -- 11.2 渐增 图以及实时 图 -- 11.3 统 信息 -- 11.4 索引统 信息 -- 11.5 数据库 围内的总 -- 11.6 接及活动 -- 11.7 -- 11.7.1 拟事务 -- 11.7.2 码 信息 -- 11.7.3 事务 等待 -- 11.7.4 等待 -- 11.7.5 录 定信息 -- 11.8 磁盘使用 -- 11.9 缓冲区、后台写入器以及检查点活动 -- 11.9.1 保存pg_stat_bgwriter 快照信息 -- 11.9.2 使用后台写入器统 信息 整 -- 11.10 小结 -- 第12 章监控与 势 测 -- 12.1 UNIX 监控工具 -- 12.1.1 样例安 -- 12.1.2 vmstat -- 12.1.3 iosta -- 12.1.4 top -- 12.1.5 sysstat 及sar -- 12.2 Windows 监控工具 -- 12.2.1 任务管理器 -- 12.2.2 Windows 系统监 器 -- 12.3 势 测 件 -- 12.3.1 监控以及 势 测 件的类型 -- 12.3.2 Nagios -- 12.3.3 Cacti -- 12.3.4 Munin -- 12.3.5 其他的一些 势 测程序包 -- 12.4 小结 -- 第13 章池化与 缓存 -- 13.1 接池 -- 13.1.1 接池 数 -- 13.1.2 pgpool-II -- 13.1.3 pgBouncer -- 13.2 数据库 缓存 -- 13.2.1 memcached -- 13.2.2 pgmemcache -- 13.3 小结 -- 第14 章扩展复制 -- 14.1 完全热备 Hot Standby -- 14.1.1 术 -- 14.1.2 置WAL 文件传 -- 14.1.3 流复制 -- 14.1.4 完全热备的 整 -- 14.2 复制 列管理器 -- 14.2.1 Slony -- 14.2.2 Londiste -- 14.2.3 从扩展复制 列 件当中 取信息 -- 14.3 特殊的应用程序 求 -- 14.3.1 Bucardo -- 14.3.2 pgpool-II -- 14.4 其他一些有 的与复制有关的开源 目 -- 14.5 小结 -- 第15 章数据分区 -- 15.1 围分区 -- 15.1.1 确定 分区的关 字段 -- 15.1.2 整分区大小 -- 15.1.3 创建分区 -- 15.1.4 定向INSERT 句 分区 -- 15.1.5 空分区的查 划 -- 15.1.6 修改日期的update 发器 -- 15.1.7 实时 移分区 -- 15.1.8 分区查 -- 15.1.9 创建新的分区 -- 15.1.10 分区的优势 -- 15.1.11 分区当中的一些常 -- 15.2 使用 PL/Proxy 水平分区 -- 15.2.1 Hash 生成 -- 15.2.2 使用PL/Proxy 扩展 -- 15.2.3 使用GridSQL 扩展 -- 15.3 小结 -- 第16 章应 免的一些常 -- 16.1 批 -- 16.1.1 方法 -- 16.1.2 批 的 整 -- 16.1.3 略 WAL 加…”
Publicado 2024
Libro electrónico