Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 231
- Computer Science 199
- Operating systems (Computers) 197
- UNIX (Computer file) 145
- Linux 121
- Computer networks 88
- Sistemas operativos 73
- Unix 62
- Security measures 59
- Mac OS 57
- Development 54
- Application software 45
- Computer security 41
- Database management 40
- Macintosh (Computer) 38
- UNIX Shells 36
- Programming 35
- Examinations 32
- Computer programs 31
- Open source software 31
- Electrical & Computer Engineering 30
- Computer programming 29
- Telecommunications 29
- Certification 28
- Client/server computing 26
- Electronic data processing personnel 25
- Electronic data processing 23
- Informática 22
- Python (Computer program language) 22
- IBM Database 2 21
-
981Publicado 2005Tabla de Contenidos: “…Installation of WebSphere InterChange Server 4.3 -- 6.1 Overview -- 6.2 Pre-installation considerations -- 6.2.1 Hard disks and file systems -- 6.2.2 Installation packages -- 6.2.3 Cannot be installed in the same location as old versions -- 6.3 Installation on Windows -- 6.4 Installation on UNIX (AIX) -- Chapter 7. Project environment setup…”
Libro electrónico -
982por Gavin, LeeTabla de Contenidos: “…Local versus remote deployment -- 10.1 Overview of adapter deployment -- 10.2 Local deployment -- 10.2.1 Configuring startup in the Windows environment -- 10.2.2 Configuring startup in a UNIX environment -- 10.3 Remote deployment…”
Publicado 2005
Libro electrónico -
983por Ganegedara, ThushanTabla de Contenidos: “…13.1.3 Residuals and normalization -- 13.2 Using pretrained BERT for spam classification -- 13.2.1 Understanding BERT -- 13.2.2 Classifying spam with BERT in TensorFlow -- 13.3 Question answering with Hugging Face's Transformers -- 13.3.1 Understanding the data -- 13.3.2 Processing data -- 13.3.3 Defining the DistilBERT model -- 13.3.4 Training the model -- 13.3.5 Ask BERT a question -- Summary -- Answers to exercises -- 14 TensorBoard: Big brother of TensorFlow -- 14.1 Visualize data with TensorBoard -- 14.2 Tracking and monitoring models with TensorBoard -- 14.3 Using tf.summary to write custom metrics during model training -- 14.4 Profiling models to detect performance bottlenecks -- 14.4.1 Optimizing the input pipeline -- 14.4.2 Mixed precision training -- 14.5 Visualizing word vectors with the TensorBoard -- Summary -- Answers to exercises -- 15 TFX: MLOps and deploying models with TensorFlow -- 15.1 Writing a data pipeline with TFX -- 15.1.1 Loading data from CSV files -- 15.1.2 Generating basic statistics from the data -- 15.1.3 Inferring the schema from data -- 15.1.4 Converting data to features -- 15.2 Training a simple regression neural network: TFX Trainer API -- 15.2.1 Defining a Keras model -- 15.2.2 Defining the model training -- 15.2.3 SignatureDefs: Defining how models are used outside TensorFlow -- 15.2.4 Training the Keras model with TFX Trainer -- 15.3 Setting up Docker to serve a trained model -- 15.4 Deploying the model and serving it through an API -- 15.4.1 Validating the infrastructure -- 15.4.2 Resolving the correct model -- 15.4.3 Evaluating the model -- 15.4.4 Pushing the final model -- 15.4.5 Predicting with the TensorFlow serving API -- Summary -- Answers to exercises -- appendix A Setting up the environment -- A.1 In a Unix-based environment…”
Publicado 2022
Libro electrónico -
984Publicado 2003Tabla de Contenidos: “…IBM Tivoli Storage Resource Manager installation -- 4.1 Supported operating system platforms -- 4.2 Supported databases for repository -- 4.3 Tivoli Storage Resource Manager Server install -- 4.3.1 Lab environment -- 4.3.2 Database creation for repository -- 4.3.3 Installation of the Server code -- 4.3.4 Microsoft SQL-Server as repository -- 4.3.5 Installing Cloudscape as a test database -- 4.3.6 Configuration for Web access -- 4.3.7 Installation of the GUI code -- 4.3.8 Installing the Server code on UNIX -- 4.4 Installing the Agent code -- 4.5 Applying maintenance to Tivoli Storage Resource Manager -- 4.5.1 Planned upgrade installation for Agents -- 4.6 Basic administrative tasks -- 4.6.1 Security -- 4.6.2 Administration -- 4.6.3 Administration: Navigation -- 4.6.4 Administrative Services: Services -- 4.6.5 Administrative Services: Agents -- 4.6.6 Administrative Services: Configuration -- 4.7 Microsoft Cluster installation -- 4.7.1 Microsoft Cluster initial setup…”
Libro electrónico -
985Publicado 2020Tabla de Contenidos: “…Post-exploitation and privilege escalation -- 8 Windows post-exploitation -- 8.1 Fundamental post-exploitation objectives -- 8.1.1 Maintaining reliable re-entry -- 8.1.2 Harvesting credentials -- 8.1.3 Moving laterally -- 8.2 Maintaining reliable re-entry with Meterpreter -- 8.2.1 Installing a Meterpreter autorun backdoor executable -- 8.3 Harvesting credentials with Mimikatz -- 8.3.1 Using the Meterpreter extension -- 8.4 Harvesting domain cached credentials -- 8.4.1 Using the Meterpreter post module -- 8.4.2 Cracking cached credentials with John the Ripper -- 8.4.3 Using a dictionary file with John the Ripper -- 8.5 Harvesting credentials from the filesystem -- 8.5.1 Locating files with findstr and where -- 8.6 Moving laterally with Pass-the-Hash -- 8.6.1 Using the Metasploit smb_login module -- 8.6.2 Passing-the-hash with CrackMapExec -- Summary -- 9 Linux or UNIX post-exploitation -- 9.1 Maintaining reliable re-entry with cron jobs…”
Libro electrónico -
986por Ballard, ChuckTabla de Contenidos: “…How to deploy an EGL Batch or CUI application -- 14.1 A simple EGL batch application -- 14.1.1 How to create the simple batch application -- 14.1.2 The simple batch application: an overview -- 14.2 How to deploy a stand-alone EGL application -- 14.2.1 The Deployment process: an overview -- 14.2.2 The Target OS preparation phase -- 14.2.3 EGL application deployment: SimpleBatchApp -- 14.2.4 Running the EGL application: SimpleBatchApp -- 14.2.5 EGL application deployment: StoresDemo4GLApp -- 14.3 Special EGL deployment topics -- 14.3.1 Curses support for EGL CUI applications on Linux/UNIX -- 14.3.2 EGL runtime property settings for stand-alone applications -- 14.3.3 User defined message files -- Chapter 15. …”
Publicado 2005
Libro electrónico -
987Publicado 2008“…He works as a consultant with Sun Microsystems and has contributed extensively to the Solaris certification program and simulation technology. He also owns www.unixed.com, a website that provides online UNIX training materials. …”
Libro electrónico -
988Publicado 2009“…He works as a consultant with Sun Microsystems and has contributed extensively to the Solaris certification program and simulation technology. He also owns www.unixed.com, a website that provides online UNIX training materials. …”
Libro electrónico -
989Publicado 2003“…Vorausgesetzt werden Kenntnisse der Programmiersprache C sowie der Funktionsweise von Unix-Betriebssystemen. Alle Beispiele beziehen sich auf Unix-Betriebssysteme. …”
Libro electrónico -
990Publicado 1997“…It is intended for those who are motivated to develop software that offers a more flexible and dynamic response than a standard Web browser.Using this book, you'll learn how to: Automate repetitive queries on the Web Detect broken hyperlinks on your site Write simple "robots" that traverse hyperlinks across a site, and across the Web in general This book will be of interest to: Web administrators who need to automate repetitive tasks or reduce maintenance time UNIX shell programmers who want to interface their scripts to the Web Commercial software developers and consultants who need reference material for technical Web specifications and proof-of-concept examples Most of the examples in this book use Perl, a versatile and portable language that is already familiar to many CGI programmers and UNIX power users. …”
Libro electrónico -
991por Anderson, Fritz“…Coverage includes Understanding Xcode workflow and the Mac OS X application lifecycle Porting established legacy projects into Xcode Using the Model-View-Controller design pattern to build robust graphical applications Building static libraries and working with Xcode's build system Making the most of bundles and package directories Creating applications compatible with older versions of Mac OS X Creating universal binaries to run on both Intel and PowerPC Macintoshes Adding Spotlight searchability to data files Leveraging Xcode's built-in support for unit testing Using Xcode on makefile-based UNIX development projects Step Into Xcode 's breadth, depth, and practical focus make it indispensable to every Mac developer: current Xcode users upgrading to Xcode 2.1, experienced Mac programmers migrating from CodeWarrior, UNIX/Linux programmers moving to Mac OS X, and even novices writing their first programs or scripts…”
Publicado 2006
Libro electrónico -
992Publicado 1995“…These designs have included VMEbus systems, microcontrollers, IBM PCs, Apple Macintoshes, and both CISC and RISC based multiprocessor systems, while using operating systems as varied as MS-DOS, UNIX, Macintosh OS and real time kernels. An avid user of computer systems, he has written numerous articles and papers for the electronics press, as well as books from Butterworth-Heinemann including VMEbus: A Practical Companion; PowerPC: A Practical Companion; MAC User's Pocket Book; UNIX Pocket Book; Upgrading Your PC Pocket Book; Upgrading Your MAC Pocket Book; and Effective PC Networking…”
Libro electrónico -
993Publicado 2015“…In context, Puppet is a cross-platform tool that is widely used for Unix-like and Microsoft Windows systems declaratively. …”
Libro electrónico -
994Publicado 2023“…He is certified in Linux Systems Management, UNIX Operating Systems, Linux System Administration, System Internals, VMWare Certified Professional, RHCSA, and Windows Server Certified…”
Video -
995Publicado 2023“…He is certified in Linux Systems Management, UNIX Operating Systems, Linux System Administration, System Internals, VMWare Certified Professional, RHCSA, and Windows Server Certified…”
Video -
996Publicado 2017“…About the Instructor Chris Negus has authored or co-authored dozens of books on Linux and UNIX, including the Red Hat Linux Bible (all editions), Linux Troubleshooting Bible , Linux Bible (now in its 9th edition), Linux Toolbox series, Linux Toys , Linux Toys II , and mostly recently, Docker Containers . …”
-
997Publicado 2022“…No external monitor or keyboard, no programming, Unix, or hardware experience is required…”
Video -
998por Olsson, Mikael. author“…You will: Code for some of today's modern and popular firmware and systems How to do embedded programming found in Arduino and related hardware boards Program microcontrollers for robots and boards Handle low-level programming and memory management Leverage operating systems such as Linux and Unix…”
Publicado 2019
Libro electrónico -
999Publicado 2009“…Choose the right network hardware and software and use it to build efficient, reliable networks Implement secure, high-speed Internet connections Provide reliable remote access to your users Administer networks to support users of Microsoft, Linux, and UNIX environments Use low-cost Linux servers to provide file and print services to Windows PCs Protect your networks and data against today’s most dangerous threats Use virtualization to save money and improve business flexibility Utilize RAID technologies to provide flexible storage at lower cost Troubleshoot and fix network problems one step at a time Preview and prepare for the future of networking Introduction 1 Hour 1: An Overview of Networking 3 Hour 2: The Benefits of Networking 19 Hour 3: Getting Data from Here to There: How Networking Works 29 Hour 4: Computer Concepts 49 Hour 5: Network Concepts 71 Hour 6: Extending LANs with Wide Area Networks (WANs) 95 Hour 7: Mobile Wireless Networking 117 Hour 8: Remote Networking 129 Hour 9: Planning for the Network 143 Hour 10: Designing a Network 155 Hour 11: Selecting Network Hardware and Software 179 Hour 12: Assembling a Network 199 Hour 13: Network Applications 211 Hour 14: Connecting to the Internet: Initial Operations 231 Hour 15: Connecting to the Internet: Key Supporting Operations 247 Hour 16: Microsoft Networking 271 Hour 17: UNIX and Linux Networking 289 Hour 18: Putting the Pieces Together 301 Hour 19: Role of the Network Administrator 309 Hour 20: Security 319 Hour 21: Managing a Network ..…”
Libro electrónico -
1000Publicado 2018“…He will explain to you what is shebang line and how it is used on the Unix-based system and on Windows. Happy learning!…”