Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 231
- Computer Science 199
- Operating systems (Computers) 197
- UNIX (Computer file) 145
- Linux 121
- Computer networks 88
- Sistemas operativos 73
- Unix 62
- Security measures 59
- Mac OS 57
- Development 54
- Application software 45
- Computer security 41
- Database management 40
- Macintosh (Computer) 38
- UNIX Shells 36
- Programming 35
- Examinations 32
- Computer programs 31
- Open source software 31
- Electrical & Computer Engineering 30
- Computer programming 29
- Telecommunications 29
- Certification 28
- Client/server computing 26
- Electronic data processing personnel 25
- Electronic data processing 23
- Informática 22
- Python (Computer program language) 22
- IBM Database 2 21
-
1021Publicado 2011“…The contents of the volumes are as follows: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, SMP/E, Language Environment Volume 3: Introduction to DFSMS, data set basics storage management hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and VTAM Volume 5: Base and Parallel Sysplex, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), Geographically Dispersed Parallel Sysplex (GDPS) Volume 6: Introduction to security, RACF, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise identity mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to z/Architecture, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC Volume 11: Capacity planning, performance management, WLM, RMF, and SMF Volume 12: WLM Volume 13: JES3…”
Libro electrónico -
1022Publicado 2012“…The contents of the volumes are as follows: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, SMP/E, Language Environment Volume 3: Introduction to DFSMS, data set basics storage management hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and VTAM Volume 5: Base and Parallel Sysplex, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), Geographically Dispersed Parallel Sysplex (GDPS) Volume 6: Introduction to security, RACF, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise identity mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to z/Architecture, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC Volume 11: Capacity planning, performance management, RMF, and SMF Volume 12: WLM Volume 13: JES3…”
Libro electrónico -
1023Publicado 2019“…Skill Level Beginning to intermediate What You Will Learn Key concepts on the Red Hat Certified Systems Engineer (RHCSA) and Red Hat Certified Engineer (RHCE) exams Who Should Take This Course Primary audience: Anyone wanting to get RHCSA and RHCE certified Secondary audience: Linux engineers interested in learning more about Red Hat Enterprise Linux Junior system administrators that want to deepen their skills Administrators with a profound knowledge and experience working with other Linux distributions, like SUSE Linux Enterprise Server Administrators currently administering UNIX systems and also developers that write software for Linux Course Requirements The ideal target student has some foundational Red Hat knowledge. …”
-
1024Publicado 2021“…Peter Deutsch: Author of Ghostscript, implementer of Smalltalk-80 at Xerox PARC and Lisp 1.5 on PDP-1 Brendan Eich: Inventor of JavaScript, CTO of the Mozilla Corporation Brad Fitzpatrick: Writer of LiveJournal, OpenID, memcached, and Perlbal Dan Ingalls: Smalltalk implementor and designer Simon Peyton Jones: Coinventor of Haskell and lead designer of Glasgow Haskell Compiler Donald Knuth: Author of The Art of Computer Programming and creator of TeX Peter Norvig: Director of Research at Google and author of the standard text on AI Guy Steele: Coinventor of Scheme and part of the Common Lisp Gang of Five, currently working on Fortress Ken Thompson: Inventor of UNIX Jamie Zawinski: Author of XEmacs and early Netscape/Mozilla hacker…”
Grabación no musical -
1025Publicado 2002“…In this second edition, the book has beensignificantly expanded to include: New chapters on Web site architecture, security,reliability, and their impact on performance Detailed discussion of scalability of Java onmulti-processor servers Perl scripts for writing web performance spidersthat handle logins, cookies, SSL, and more Detailed instructions on how to use Perl DBI andthe open source program gnuplot to generate performance graphs onthe fly Coverage of rstat, a Unix-based open source utilityfor gathering performance statistics remotely In addition, the book includes many more examples and graphs ofreal-world performance problems and their solutions, and has beenupdated for Java 2. …”
Libro electrónico -
1026por Lumbley, Joe“…You'll discover all you need to know to successfully manage Informix-Dynamic Server on Windows NT and UNIX. You'll find exclusive coverage of Informix DBA tools and resources. …”
Publicado 1999
Libro electrónico -
1027por Nicola, Matthias“…Coverage includes pureXML in DB2 9 for z/OS and DB2 9.1, 9.5, and 9.7 for Linux, UNIX, and Windows Best practices for designing XML data, applications, and storage objects Importing, exporting, loading, replicating, and federating XML data Querying XML data, from start to finish: XPath and XQuery data model and languages, SQL/XML, stored procedures, UDFs, and much more Avoiding common errors and inefficient XML queries Converting relational data to XML and vice versa Updating and transforming XML documents Defining and working with XML indexes Monitoring and optimizing the performance of XML queries and other operations Using XML Schemas to constrain and validate XML documents XML application development–including code samples for Java, .NET, C, COBOL,PL/1, PHP, and Perl…”
Publicado 2009
Libro electrónico -
1028por Seibel, Peter“…Peter Deutsch: Author of Ghostscript, implementer of Smalltalk-80 at Xerox PARC and Lisp 1.5 on PDP-1 Brendan Eich: Inventor of JavaScript, CTO of the Mozilla Corporation Brad Fitzpatrick: Writer of LiveJournal, OpenID, memcached, and Perlbal Dan Ingalls: Smalltalk implementor and designer Simon Peyton Jones: Coinventor of Haskell and lead designer of Glasgow Haskell Compiler Donald Knuth: Author of The Art of Computer Programming and creator of TeX Peter Norvig: Director of Research at Google and author of the standard text on AI Guy Steele: Coinventor of Scheme and part of the Common Lisp Gang of Five, currently working on Fortress Ken Thompson: Inventor of UNIX Jamie Zawinski: Author of XEmacs and early Netscape/Mozilla hacker…”
Publicado 2009
Libro electrónico -
1029Publicado 2018“…W tej książce między innymi: Podstawy uruchamiania i przeprojektowywania programu InfoSec Projektowanie reguł, standardów i procedur, wdrażanie systemu bezpieczeństwa Zabezpieczanie systemów Microsoft i Unix oraz infrastruktury sieciowej Praktyki i projekty segmentacyjne Automatyzacja zarządzania lukami w zabezpieczeniach Podstawowe koncepcje związane z testami penetracyjnymi…”
Libro electrónico -
1030Publicado 2016“…Move ahead in your career path to become a certified LPIC-1 Linux administrator Learn everything you need to know to pass part two of the two part LPIC-1 exam Designed for learners who've already prepared for or passed part one of the LPIC-1 exam Covers all of the Linux Professional Institute's LPIC-1 exam 102-400 course objectives Prepares you to manage Linux systems like Red Hat, Debian, SUSA, Kali, and more Ted Jordan has more than 25 years of Linux and Unix programming and training experience working for companies such as General Motors, Silicon Graphics, and Sun Microsystems. …”
-
1031Publicado 2017“…Master everything you need to pass part one of the two-part LPIC-1 certification exam Learn how to run multiple versions of Linux such as Ubuntu, Debian, Red Hat, SUSE, and more Understand how to install software with dependencies and set up logical volumes Learn to configure a Linux system and perform basic penetration testing Build skills useful for other certifications like Certified Ethical Hacker and Security+ Ted Jordan has more than 25 years of Linux and UNIX programming and training experience with General Motors, Silicon Graphics, CAVE Virtual Reality, and Sun Microsystems. …”
-
1032Publicado 2002“…Topics covered include: A comprehensive survey of Open Source technologies Static and dynamic data and embedded HTML on the Web Linux and Unix distributions, installations, and commands Apache Web Server, Perl, and MySQL Web site META language (WML) Common gateway interface (CGI) and mod_perl Server Side Includes (SSI), Embperl, and Mason PHP syntax and functions In addition to the discussions in the book, a companion Web site--www.opensourcewebbook.com--contains supplemental information, including tools, source code, helpful links to additional resources, and errata as needed. …”
Libro electrónico -
1033Publicado 2022“…A professional who wants to shift from a non-IT to an IT background and has not worked on the Unix/Linux platform will also benefit from this course. …”
Video -
1034Publicado 2011“…The contents of the volumes are: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, Language Environment®, and SMP/E Volume 3: Introduction to DFSMS, data set basics, storage management hardware and software, VSAM, System-Managed Storage, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP and VTAM® Volume 5: Base and Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, Automatic Restart Management (ARM), Geographically Dispersed Parallel SysplexTM (GPDS), availability in the zSeries® environment Volume 6: Introduction to security, RACF®, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, Enterprise identity mapping (EIM), and firewall technologies Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX® System Services Volume 10: Introduction to z/Architecture®, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC Volume 11: Capacity planning, performance management, RMF, and SMF Volume 12: WLM Volume 13: JES3…”
Libro electrónico -
1035Publicado 1994“…It covers: How to assemble the software you need to build and install TeX on all common platforms: UNIX, DOS, Macintosh, and VMS. How to get TeX and its associated tools from public domain and commercial sources (a complete buyer's guide). …”
Libro electrónico -
1036por Klevinsky, T. J.“…Specific topics covered in this book include: Hacking myths Potential drawbacks of penetration testing Announced versus unannounced testing Application-level holes and defenses Penetration through the Internet, including zone transfer, sniffing, and port scanning War dialing Enumerating NT systems to expose security holes Social engineering methods Unix-specific vulnerabilities, such as RPC and buffer overflow attacks The Windows NT Resource kit Port scanners and discovery tools Sniffers and password crackers Web testing tools Remote control tools Firewalls and intrusion detection systems Numerous DoS attacks and tools 0201719568B01042002…”
Publicado 2002
Libro electrónico -
1037Publicado 2018“…Detailed information on how to: Successfully manage distributed, people-centric, cloud-focused IT environments Optimize ConfigMgr architecture, design, and deployment plans to reflect your environment Smoothly install ConfigMgr Current Branch and migrate from Configuration Manager 2012 Save time and improve efficiency by automating system management Use the console to centralize control over infrastructure, software, users, and devices Discover and manage clients running Windows, macOS, Linux, and UNIX Define, monitor, enforce, remediate, and report on all aspects of configuration compliance Deliver the right software to the right people with ConfigMgr applications and deployment types Reliably manage patches and updates, including Office 365 client updates Integrate Intune to manage on-premise and mobile devices through a single console Secure access to corporate resources from mobile devices Manage Microsoft’s enterprise antimalware platform with System Center Endpoint Protection Using this guide’s proven techniques and comprehensive reference information, you can maximize the value of ConfigMgr in your environment–no matter how complex it is or how quickly it’s changing…”
Libro electrónico -
1038Publicado 2018“…Navy flagship. He has migrated from UNIX world to Storage Area Networking(SAN), Enterprise Virtualization, Cloud Architectures, and now specializing in Blockchain and Cryptocurrency. …”
-
1039Publicado 2018“…The other volumes contain the following content: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, IBM Job Entry Subsystem 2 (JES2) and JES3, link pack area (LPA), LNKLST, authorized libraries, System Modification Program Extended (SMP/E), IBM Language Environment Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart manager (ARM), IBM Geographically Dispersed Parallel SysplexTM (IBM GDPS) Volume 6: Introduction to security, IBM RACF®, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, the IBM Z platform, IBM Z connectivity, LPAR concepts, HCD, and DS Storage Solution. …”
Libro electrónico -
1040por Wandschneider, Marc“…Build Node.js solutions that leverage current JavaScript skills Master Node.js nonblocking IO and async programming Handle more requests and increase an application’s flexibility Use and write modules Perform common JSON/web server tasks Use browsers to generate pages on the fly via Ajax calls and template libraries Simplify development with the Express framework Create database back-ends using popular NoSQL and relational databases Deploy and run Node.js apps on Unix/macOS or Windows servers Deploy apps to Heroku and Microsoft Azure Support virtual hosts and SSL/HTTPS security Test Node.js programs that mix synchronous, async, and RESTful server API functionality…”
Publicado 2017
Libro electrónico