Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 868
- Operating systems (Computers) 676
- Computer Science 672
- Microsoft Windows (Computer file) 602
- Application software 563
- Development 555
- Computer networks 365
- Computer programs 333
- Microsoft .NET Framework 315
- Examinations 265
- Programming 250
- Cloud computing 241
- Microsoft Windows server 234
- Certification 230
- Security measures 229
- Computer security 226
- Database management 207
- Electronic data processing personnel 206
- Client/server computing 198
- Windows Azure 196
- Management 195
- Data processing 185
- Microsoft software 184
- Electrical & Computer Engineering 178
- Linux 173
- Historia 170
- Computer programming 163
- Design 162
- Web site development 159
- Telecommunications 154
-
6321Publicado 2024Tabla de Contenidos: “…-- Debugging projects in VS -- Understanding the technical aspects of debugging -- Differentiating between debug mode and release mode -- Project debugging initialization options -- Exploring breakpoints in VS -- Navigating between breakpoints -- Different types of breakpoints -- Breakpoint groups -- Quickly debugging with Run to click and Force to click -- Inspection tools for debugging -- The Watch window -- The Autos and Locals windows -- Measuring app performance with profiling tools…”
Libro electrónico -
6322Publicado 2018Tabla de Contenidos: “…-- How to Use This Book -- Contact Me -- Chapter 1: The Basics of Networking -- Network Architecture and Protocols -- The Internet Protocol Suite -- Data Encapsulation -- Headers, Footers, and Addresses -- Data Transmission -- Network Routing -- My Model for Network Protocol Analysis -- Final Words -- Chapter 2: Capturing Application Traffic -- Passive Network Traffic Capture -- Quick Primer for Wireshark -- Alternative Passive Capture Techniques -- System Call Tracing -- The strace Utility on Linux -- Monitoring Network Connections with DTrace -- Process Monitor on Windows -- Advantages and Disadvantages of Passive Capture -- Active Network Traffic Capture -- Network Proxies -- Port-Forwarding Proxy -- SOCKS Proxy -- HTTP Proxies -- Forwarding an HTTP Proxy -- Reverse HTTP Proxy -- Final Words -- Chapter 3: Network Protocol Structures -- Binary Protocol Structures -- Numeric Data -- Booleans -- Bit Flags -- Binary Endian -- Text and Human-Readable Data -- Variable Binary Length Data -- Dates and Times -- POSIX/Unix Time -- Windows FILETIME -- Tag, Length, Value Pattern -- Multiplexing and Fragmentation -- Network Address Information -- Structured Binary Formats -- Text Protocol Structures -- Numeric Data -- Text Booleans -- Dates and Times -- Variable-Length Data -- Structured Text Formats -- Encoding Binary Data -- Hex Encoding -- Base64 -- Final Words -- Chapter 4: Advanced Application Traffic Capture -- Rerouting Traffic -- Using Traceroute -- Routing Tables -- Configuring a Router -- Enabling Routing on Windows -- Enabling Routing on *nix -- Network Address Translation -- Enabling SNAT…”
Libro electrónico -
6323Publicado 2018Tabla de Contenidos: “…Question 11.9: I have a spec limits table with columns holding limits for -- Question 11.10: How can I get consistent legend colors when using a local -- Chapter 12: Reports and Journals -- Question 12.1: At the top of my report, there is a text string that begins -- Question 12.2: How can I use a variable in a Where statement so that the -- Question 12.3: How can I arrange my report so that I have two graphs per -- Question 12.4: How can I get a handle to the journal window so that I can save -- Question 12.5: How can I change the name of the journal window? …”
Libro electrónico -
6324Publicado 2017Tabla de Contenidos: “…-- Python applications -- Versions -- Implementations of Python -- Installation -- Installation on Windows platform -- Installation on Linux platform -- Installation on Mac OS -- Notepad++ installation -- Python file formats -- Python interactive shell -- System or environment variables -- Setting environment variables in Windows -- Setting environment variables in Linux -- Setting environment variables in Mac OS (OS 10.9) -- Writing a simple Hello World! …”
Libro electrónico -
6325Publicado 2015Tabla de Contenidos: “…Menus and the Icon BarThe Home Page; The Insights Tab; Working with Windows; Chapter 3: Setting Up a Chart of Accounts; Acquiring a Chart of Accounts; Planning the Chart of Accounts; Creating Accounts and Subaccounts; Working with Accounts; Chapter 4: Setting Up Customers, Jobs, and Vendors; Working with the Customer Center; Creating Customers in QuickBooks; Creating Jobs in QuickBooks; Working with the Vendor Center; Creating Vendors in QuickBooks; Working with Customers, Jobs, and Vendors; Managing Leads; Chapter 5: Setting Up Items; What Items Do; When You Don't Need Items…”
Libro electrónico -
6326Publicado 2016Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- Acknowledgments -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Deploying Ubuntu Server -- Setting up our lab -- Determining your server's role -- Obtaining Ubuntu Server -- Deciding between 32-bit and 64-bit installations -- Creating a bootable Ubuntu Server flash drive (Windows) -- Creating a bootable Ubuntu Server flash drive (Linux) -- Creating a bootable Ubuntu Server flash drive (Mac) -- Planning the partition layout -- Installing Ubuntu Server -- Installing Ubuntu Server (Raspberry Pi) -- Summary -- Chapter 2: Managing Users -- Understanding when to use root -- Creating and removing users -- Understanding the /etc/passwd and /etc/shadow files -- Distributing default configuration files with /etc/skel -- Switching between users -- Managing groups -- Managing passwords and password policies -- Configuring administrator access with sudo -- Setting permissions on files and directories -- Summary -- Chapter 3: Managing Storage Volumes -- Viewing disk usage -- Adding additional storage volumes -- Partitioning and formatting volumes -- Mounting and unmounting storage volumes -- Understanding the /etc/fstab file -- Managing swap -- Utilizing LVM volumes -- Using symbolic and hard links -- Summary -- Chapter 4: Connecting to Networks -- Setting the hostname -- Managing network interfaces -- Assigning static IP addresses -- Understanding Linux name resolution -- Understanding Network Manager -- Getting started with OpenSSH -- Getting started with SSH key management -- Simplifying SSH connections with a ~/.ssh/config file -- Summary -- Chapter 5: Managing Software Packages -- Understanding Linux package management -- Installing and removing software -- Searching for packages -- Managing software repositories -- Keeping your server up to date…”
Libro electrónico -
6327Publicado 2023Tabla de Contenidos:Libro electrónico
-
6328por Pyles, James“… For any organization that wants to use Windows SharePoint Services to share and collaborate on Microsoft Office documents, this book shows administrators of all levels how to get up and running with this powerful and popular set of collaboration tools. …”
Publicado 2007
Libro electrónico -
6329por Webb, Jeff, 1961-“…--either among themselves or with partners and customers. And if you have Windows 2003 Server, then you alr…”
Publicado 2005
Libro electrónico -
6330
-
6331por Glenn, WalterTabla de Contenidos: “…Message Routing to Foreign E-Mail SystemsRouting Group Topologies; Link State Information; Link State Algorithm; Link State Concepts; How Link State Information Works; Summary; Chapter 4: Understanding Windows Server 2003 Integration; Brief Overview of Active Directory; Directory Structure in Active Directory; Logical Structure of Active Directory; Groups; Other Active Directory Components; Naming Partitions; Sites; Location Service Providers; Global Catalog Servers; Client Authentication; Active Directory Names; Distinguished Name; Relative Distinguished Name; User Principal Name…”
Publicado 2003
Libro electrónico -
6332Publicado 2008Tabla de Contenidos: “…; Core Technologies of Mac OS X; Installation Considerations for Mac OS X; Running Software Update; Summary; Chapter 2: Exploring the GUI and Personalizing Your Workspace; Starting Up and Logging In; Meeting Your Environment; Recognizing the Desktop; Saving the Screen; Peeking into Windows; Working with Windows; Worshiping Icons; Finding Out About the Finder…”
Libro electrónico -
6333por Rizzo, JohnTabla de Contenidos: “…Standard POSIX PermissionsPropagating POSIX Permissions; Access Control Lists; Rules of Precedence; Controlling Access to Services with SACLs; Chapter 9: Setting Up File Sharing; File Sharing in Lion Server; Protocol Soup: AFP, SMB, and Other File-Sharing Methods; Configuring File Sharing; Controlling User Access to Share Points; Setting SACL Permissions for Limiting Access to Protocols; A Note on Windows Client Support; Chapter 10: Sharing Printers Over a Network; Printer Sharing Features in Lion Server; Print Sharing Technology and Terminology; Lion's Print Management Software…”
Publicado 2011
Libro electrónico -
6334Publicado 2010Tabla de Contenidos: “…Why You Should Use Generics -- Using Generic Methods -- Creating Generic Classes -- Combining Generics and Arrays -- Working with Tuples -- Q&A -- Workshop -- HOUR 12 Understanding Query Expressions -- Introducing LINQ -- Standard Query Operator Methods -- Lambdas -- Deferred Execution -- Q&A -- Workshop -- Part III: Working with Data -- HOUR 13 Using Files and Streams -- Files and Directories -- Reading and Writing Data -- Q&A -- Workshop -- HOUR 14 Working with XML -- Understanding the XML DOM -- Using LINQ to XML -- Selecting and Querying XML -- Modifying XML -- Q&A -- Workshop -- HOUR 15 Working with Databases -- Understanding ADO.NET -- Understanding LINQ to ADO.NET -- Q&A -- Workshop -- Part IV: Building an Application Using Visual Studio -- HOUR 16 Debugging in Visual Studio -- Commenting Your Code -- Compiler and Runtime Errors -- Debugging in Visual Studio -- Visualizing Data -- Q&A -- Workshop -- HOUR 17 Building a Windows Application -- Understanding WPF -- Creating a WPF Application -- Styling the Layout -- Q&A -- Workshop -- HOUR 18 Using Data Binding and Validation -- Understanding Data Binding -- Converting Data -- Binding to Collections -- Working with Data Templates -- Validating Data -- Q&A -- Workshop -- HOUR 19 Building a Web Application -- Understanding Web Application Architecture -- Working with ASP.NET -- Creating a Web Application -- Understanding Data Validation -- Q&A -- Workshop -- Part V: Diving Deeper -- HOUR 20 Programming with Attributes -- Understanding Attributes -- Working with the Common Attributes -- Using Custom Attributes -- Accessing Attributes at Runtime -- Q&A -- Workshop -- HOUR 21 Dynamic Types and Language Interoperability -- Using Dynamic Types -- Understanding the DLR -- Interoperating with COM -- Reflection Interoperability -- Q&A -- Workshop -- HOUR 22 Memory Organization and Garbage Collection…”
CDROM -
6335Publicado 2010Tabla de Contenidos: “…Problems -- Multiple-choice questions -- Further reading -- Mobile Handheld Devices -- Characteristics of PDAs -- The ARM processor -- Network connectivity -- Palm handhelds -- The Palm OS operating system -- Memory management -- Communication and networking -- HP handhelds -- Windows CE -- Memory architecture -- Memory management -- Processes and threads -- Scheduling -- Real-time performance -- The Windows Mobile operating system -- Nokia handhelds -- Specifications of Nokia 9210 -- Features -- Symbian operating system -- Design -- Symbian structure -- Summary -- Problems -- Multiple-choice questions -- Further reading -- The Mobile Internet and Wireless Web -- The Web programming model -- The WAP programming model -- WAP protocol stack -- Information-mode -- WAP 2.0 -- WAP gateway -- Push operation -- Push message format -- Pull operation -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Logical Mobility II-Mobile Agents -- Mobile agents -- Characteristics of mobile agents -- Architecture -- Mobile code and agents -- Mobile agents and process migration -- Client/server and mobile agent architectures -- Requirements for mobile agent systems -- Portability -- Ubiquity -- Network communication -- Server security -- Agent security -- Resource accounting -- Mobile agent platforms -- Aglets -- Agent Tcl -- Agent Tcl applications -- PMADE -- Agent submitter -- Agent host -- Communication managers -- State managers -- Persistence manager -- Security manager -- Java and mobile agents -- Advantages of Java -- Shortcomings of Java -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Security Issuesin Mobile Computing -- Security threats to wireless networks -- IEEE 802.11 security through WEP -- WEP security features of 802.11 wireless LANs -- Authentication -- Confidentiality -- Integrity -- Bluetooth security…”
Libro electrónico -
6336por Alur, NagrajTabla de Contenidos: “…Four-node AIX configuration -- 2.1 Business requirement -- 2.2 Environment configuration -- 2.3 Step-by-step setup -- 2.3.1 Step 1: Collect topology and configuration information -- 2.3.2 Step 2: Install WebSphere Information Integrator OmniFind Edition -- 2.3.3 Step 3: Configure the environment -- 2.3.4 Step 4: Configure administrative and collection-level security -- 2.3.5 Step 5: Sample queries -- Chapter 3. Single-node Windows 2000 configuration -- 3.1 Business requirement -- 3.2 Environment configuration -- 3.3 Step-by-step setup -- 3.3.1 Step 1: Collect topology and configuration information -- 3.3.2 Step 2: Install WebSphere Information Integrator -- 3.3.3 Step 3: Configure the WebSphere II OmniFind environment -- 3.3.4 Step 4: Configure administrative and collection-level security -- 3.3.5 Step 5: Sample queries…”
Publicado 2005
Libro electrónico -
6337Publicado 2022Tabla de Contenidos: “…-- Chapter 7: Becoming an Ansible Jinja -- Chapter 8: Handling Change -- Chapter 9: Roles: Ansible's Packing Cubes -- Chapter 10: Building a Load Balancer: Controlling Flow -- Chapter 11: Running a Blog -- Chapter 12: Locking Away Your Secrets: Vaults -- Chapter 13: Worlds of Possibility -- Summary -- Chapter 1: Getting Setup and Running -- What We Will Cover -- What You'll Be Using -- An Internet Connection -- Virtual Machine Manager: VirtualBox -- Vagrant -- Ansible -- Getting Setup -- Downloading VirtualBox -- Windows and Mac -- Linux -- Installing Vagrant -- Windows and Mac -- Linux -- Setting Up Ansible -- Troubleshooting VirtualBox Errors -- Using the Vagrant Environment -- Status -- Logging In -- Suspending the Virtual Environment -- Using Your Own Environment -- Chapter 2: Your First Steps with Ansible -- Climbing into the Driving Seat -- Declare Your Intent -- It Uses SSH -- Harnessing This Power -- What Changed? …”
Libro electrónico -
6338Publicado 2022Tabla de Contenidos: “…Mesh Maze -- External Add-ons -- Archipack -- Sverchok -- Sorcar -- Modeling and Importing Furniture -- Asset Libraries in Blender -- Character Modeling for Architecture -- Modeling a Character with Make Human -- Exercises: Creating an Environment -- Exercise 3: Modeling a Living Room -- Creating the Walls -- Creating the Windows -- Creating Windows -- Creating French Windows -- Importing Furniture -- Exercise 4: Populating Our Environment -- Exercise 5: Modeling a Chair -- Modeling the Chair Structure -- Modeling of the Chair Feet -- Modeling the Pillow -- Summary -- Chapter 4: Understanding Materials, Lighting, and World Settings -- Learning Nodes and Material Nodes -- PBR Materials -- The Light Ray Model -- Diffusion and Reflection -- Fresnel -- Microsurface -- PBR Textures -- Standard Textures -- PBR Textures -- Metal/Roughness vs. …”
Libro electrónico -
6339Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Started -- Introduction -- Configuring a security lab with VMware Player (Windows) -- Getting ready -- How to do it... -- How it works... -- Configuring a security lab with VMware Fusion (macOS) -- Getting ready -- How to do it... -- How it works... -- Installing Ubuntu Server -- Getting ready -- How to do it... -- How it works... -- Installing Metasploitable2 -- Getting ready -- How to do it... -- How it works... -- Installing Windows Server -- Getting ready -- How to do it... -- How it works... -- Increasing the Windows attack surface -- Getting ready -- How to do it... -- How it works... -- Installing Kali Linux -- Getting ready -- How to do it... -- How it works... -- Using text editors (Vim and GNU nano) -- Getting ready -- How to do it... -- How it works... -- Keeping Kali updated -- Getting ready -- How to do it... -- How it works... -- Managing Kali services -- Getting ready -- How to do it... -- How it works... -- Configuring and using SSH -- Getting ready -- How to do it... -- How it works... -- Installing Nessus on Kali Linux -- Getting ready -- How to do it... -- How it works... -- Chapter 2: Reconnaissance -- Introduction -- Using Google to find subdomains -- Getting ready -- How to do it... -- How it works... -- Finding e-mail addresses using theHarvester -- Getting ready -- How to do it... -- How it works... -- Enumerating DNS using the host command -- Getting ready -- How to do it... -- How it works... -- Enumerating DNS using DNSRecon -- Getting ready -- How to do it... -- Standard DNS enumeration -- Reverse lookups -- Zone transfer -- How it works... -- Enumerating DNS using the dnsenum command -- Getting ready -- How to do it... -- Default settings -- Brute-force -- How it works... -- Chapter 3: Discovery -- Introduction…”
Libro electrónico -
6340Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Dedication -- Table of Contents -- Preface -- Chapter 1: Getting Started with Jenkins -- Introduction -- Installing Jenkins 2 on Windows -- Getting ready -- How to do it... -- Installing Jenkins 2 on CentOS -- Getting ready -- How to do it... -- There's more... -- Installing Jenkins 2 on Azure -- Getting ready -- How to do it... -- How it works... -- Installing Jenkins as a Service in Windows -- Getting ready -- How to do it... -- How it works... -- Installing plugins in Jenkins -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Uploading plugins in Jenkins -- Getting ready -- How to do it... -- How it works... -- Configuring proxy in Jenkins -- Getting ready -- How to do it... -- Configuring global settings in Jenkins -- Getting ready -- How to do it... -- There's more... -- Configuring JENKINS_HOME -- Getting ready -- How to do it... -- How it works... -- There's more... -- Understanding JENKINS_HOME directory -- Getting ready -- How to do it... -- See also -- Using different ports for Jenkins -- Getting ready -- How to do it... -- How it works... -- Configuring JAVA_HOME in Jenkins -- Getting ready -- How to do it... -- How it works... -- Configuring Git in Jenkins -- Getting ready -- How to do it... -- How it works... -- Configuring ANT_HOME in Jenkins -- Getting ready -- How to do it... -- How it works... -- Configuring MAVEN_HOME in Jenkins -- Getting ready -- How to do it... -- How it works... -- Configuring GRADLE_HOME in Jenkins -- Getting ready -- How to do it... -- How it works... -- Creating a Freestyle job for Ant Project -- Getting ready -- How to do it... -- How it works... -- Creating a Maven Job for Maven Project -- Getting ready -- How to do it... -- How it works…”
Libro electrónico