Mostrando 4,121 - 4,140 Resultados de 5,617 Para Buscar '"hardware"', tiempo de consulta: 0.12s Limitar resultados
  1. 4121
    Publicado 2022
    Tabla de Contenidos: “…6 Design of the Testbed (Saurian) and Physical Experiments -- 6.1 Mechanism design -- 6.2 Sensors, actuators, and control hardware -- 6.3 Walking experiments -- 6.4 Discussion of experiments -- 7 Concluding Remarks -- 7.1 Summary -- 7.1.1 Robust multivariable GPI controller for hybrid dynamical systems -- 7.1.2 Asymptotic periodic orbits in HZDU -- 7.1.3 Model-based ADRC for hybrid dynamical systems -- 7.1.4 Asymptotic periodic orbits in EHZD -- 7.1.5 Disturbance rejection in trajectory generation -- 7.1.6 Reset control law to reject disturbances at the support-leg exchange -- 7.1.7 Numerical simulations -- 7.1.8 Experiments -- 7.2 Perspectives for future studies -- References -- Appendix A Lagrange Formulation…”
    Libro electrónico
  2. 4122
    Publicado 2020
    Tabla de Contenidos: “…Multivariate Time Series as Images: Imputation Using Convolutional Denoising Autoencoder -- Dual Sequential Variational Autoencoders for Fraud Detection -- A Principled Approach to Analyze Expressiveness and Accuracy of Graph Neural Networks -- Efficient Batch-Incremental Classification Using UMAP for Evolving Data Streams -- GraphMDL: Graph Pattern Selection Based on Minimum Description Length -- Towards Content Sensitivity Analysis -- Gibbs Sampling Subjectively Interesting Tiles -- Even Faster Exact k-Means Clustering -- Ising-Based Consensus Clustering on Special Purpose Hardware -- Transfer Learning by Learning Projections from Target to Source -- Computing Vertex-Vertex Dissimilarities Using Random Trees: Application to Clustering in Graphs -- Towards Evaluation of CNN Performance in Semantically Meaningful Latent Spaces -- Vouw: Geometric Pattern Mining Using the MDL Principle -- A Consensus Approach to Improve NMF Document Clustering -- Discriminative Bias for Learning Probabilistic Sentential Decision Diagrams -- Widening for MDL-Based Retail Signature Discovery -- Addressing the Resolution Limit and the Field of View Limit in Community Mining -- Estimating Uncertainty in Deep Learning for Reporting Confidence: An Application on Cell Type Prediction in Testes Based on Proteomics -- Adversarial Attacks Hidden in Plain Sight -- Enriched Weisfeiler-Lehman Kernel for Improved Graph Clustering of Source Code -- Overlapping Hierarchical Clustering (OHC) -- Digital Footprints of International Migration on Twitter -- Percolation-Based Detection of Anomalous Subgraphs in Complex Networks -- A Late-Fusion Approach to Community Detection in Attributed Networks -- Reconciling Predictions in the Regression Setting: an Application to Bus Travel Time Prediction -- A Distribution Dependent and Independent Complexity Analysis of Manifold Regularization -- Actionable Subgroup Discovery and Urban Farm Optimization -- AVATAR - Machine Learning Pipeline Evaluation Using Surrogate Model -- Detection of Derivative Discontinuities in Observational Data -- Improving Prediction with Causal Probabilistic Variables -- DO-U-Net for Segmentation and Counting -- Enhanced Word Embeddings for Anorexia Nervosa Detection on Social Media -- Event Recognition Based on Classification of Generated Image Captions -- Human-to-AI Coach: Improving Human Inputs to AI Systems -- Aleatoric and Epistemic Uncertainty with Random Forests -- Master your Metrics with Calibration -- Supervised Phrase-Boundary Embeddings -- Predicting Remaining Useful Life with Similarity-Based Priors -- Orometric Methods in Bounded Metric Data -- Interpretable Neuron Structuring with Graph Spectral Regularization -- Comparing the Preservation of Network Properties by Graph Embeddings -- Making Learners (More) Monotone -- Combining Machine Learning and Simulation to a Hybrid Modelling Approach -- LiBRe: Label-Wise Selection of Base Learners in Binary Relevance for Multi-Label Classification -- Angle-Based Crowding Degree Estimation for Many-Objective Optimization…”
    Libro electrónico
  3. 4123
    Publicado 2015
    “…With this anthology, you’ll learn how: Analysts can now get results from their data queries in near real time Indie manufacturers are blurring the lines between hardware and software Companies try to balance their desire for rapid innovation with the need to tighten data security Advanced analytics and low-cost sensors are transforming equipment maintenance from a cost center to a profit center CIOs have gradually evolved from order takers to business innovators New analytics tools let businesses go beyond data analysis and straight to decision-making Mike Barlow is an award-winning journalist, author, and communications strategy consultant. …”
    Libro electrónico
  4. 4124
    Publicado 2020
    “…Combined factors include the hardware, clinical handling as well as patient characteristics that, even if each one of these factors only produce subliminal trauma, when acting together they may result in loss of marginal bone. …”
    Libro electrónico
  5. 4125
    Publicado 2016
    “…Dieses Buch vermittelt Ihnen anhand vieler anschaulicher Beispiele genau die Java-Kenntnisse, die auf die Hardware des Raspberry Pi und das Linux-Betriebssystem Raspbian zugeschnitten sind. …”
    Libro electrónico
  6. 4126
    Publicado 2016
    Tabla de Contenidos: “…Internet of Things -- Consistent User Experience Across Devices -- Cloud Computing -- Big Data Analytics -- Artificial Intelligence -- Business Benefits and Risks -- New Security Capabilities -- Baseline Security -- Protected Environments -- Encryption -- Hardware Acceleration -- Enhanced Recovery -- AI-Based Security and Automation -- Context-Aware Security -- Cloud Security and Context Awareness -- Security Analytics and Data Protection -- Conclusion -- Chapter 9: Corporate Social Responsibility: The Ethics of Managing Information Risk -- The Expanding Scope of Corporate Social Responsibility -- The Evolution of Technology and Its Impact -- Maintaining Society's Trust -- The Ethics of Managing Information Risk -- Conclusion -- Chapter 10: The 21st Century CISO -- Chief Trust Officer -- The Z-Shaped Individual -- Foundational Skills -- Becoming a Storyteller -- Fear Is Junk Food -- Accentuating the Positive -- Demonstrating the Reality of Risk -- The CISO's Sixth Sense -- Taking Action at the Speed of Trust -- The CISO as a Leader -- Learning from Other Business Leaders -- Voicing Our Values -- Discussing Information Risk at Board Level -- Conclusion -- Chapter 11: Performance Coaching -- How to Use the Tables -- Independence and Initiative -- Efficiency and Effectiveness -- Commitment -- Professionalism -- Discipline -- Teamwork -- Problem-Solving -- Communication -- Listening -- Style -- Clarity -- Goal-Setting -- Conclusion -- Appendix A -- Index…”
    Libro electrónico
  7. 4127
    Publicado 2016
    Tabla de Contenidos: “…-- From Your Perspective -- FORENSIC ANALYSIS OF THE ONION ROUTER -- TRACKING CRIMINALS USING TOR -- USED IN COMBINATION OF OTHER TOOLS AND METHODS -- TAILS -- RELATED TOR TOOLS AND APPLICATIONS -- Hidden Services -- SUMMARY -- REFERENCES -- 3 - Triaging Mobile Evidence -- LOGICAL DATA -- PHYSICAL DATA -- EXAMPLES OF LOGICAL AND PHYSICAL DATA -- WIRELESS CARRIERS -- MOBILE NETWORK OPERATORS -- MOBILE VIRTUAL NETWORK OPERATOR -- DETERMINING TARGET NUMBER -- FONEFINDER.NET -- NUMBER PORTABILITY ADMINISTRATION CENTER -- SEARCH.ORG -- SUBSCRIBER IDENTITY MODULE -- INTERNAL HARDWARE OF A SIM -- THE SIM FILE SYSTEM -- SIM SIZES AND EVOLUTION -- TYPICAL EVIDENCE -- SIM SECURITY-PIN AND PUK -- TRIAGING DEVICES -- DEVICES POWERED "ON" -- DEVICES LOCATED "OFF" -- MANUAL EXAMS -- TOOLS AVAILABLE -- Cellebrite USB Camera -- Fernico ZRT -- Project-A-Phone -- Eclipse Kit 3 -- SOFTWARE SOLUTIONS -- ScreenHunter -- Snagit -- Other Options -- CHAPTER SUMMARY POINTS -- REFERENCES FOR MANUAL TOOLS…”
    Libro electrónico
  8. 4128
    Publicado 2023
    Tabla de Contenidos: “…Fail Securely -- Separation of Duties (SoD) -- Keep It Simple -- Trust, but Verify -- Zero Trust -- Security Models -- Reading Down and Writing Up -- State Machine Model -- Bell-LaPadula Model -- Simple Security Property -- *Security Property (Star Security Property) -- Strong and Weak Tranquility Property -- Lattice-Based Access Controls -- Integrity Models -- Biba Model -- Simple Integrity Axiom -- * Integrity Axiom -- Clark-Wilson -- Well Formed Transactions -- Certification, Enforcement, and Separation of Duties -- Information Flow Model -- Chinese Wall Model -- Non-interference -- Take-Grant -- Access Control Matrix -- Zachman Framework for Enterprise Architecture -- Graham-Denning Model -- Harrison-Ruzzo-Ullman Model -- Evaluation Methods, Certification, and Accreditation -- The International Common Criteria -- Common Criteria Terms -- Levels of Evaluation -- Secure System Design Concepts -- Layering -- Abstraction -- Security Domains -- The Ring Model -- Open and Closed Systems -- Secure Hardware Architecture -- The System Unit and Motherboard -- The Computer Bus -- Northbridge and Southbridge -- The CPU -- Arithmetic Logic Unit and Control Unit -- Fetch and Execute -- Pipelining -- Interrupts -- Processes and Threads -- Multitasking and Multiprocessing -- Watchdog Timers -- CISC and RISC -- Memory Addressing -- Memory Protection -- Process Isolation -- Hardware Segmentation -- Virtual Memory -- Swapping and Paging -- BIOS -- WORM Storage -- Trusted Platform Module -- Data Execution Prevention and Address Space Layout Randomization -- Secure Operating System and Software Architecture -- The Kernel -- Reference Monitor -- Users and File Permissions -- Linux and UNIX permissions -- Microsoft NTFS Permissions -- Privileged Programs -- Virtualization, Cloud, and Distributed Computing -- Virtualization -- Hypervisor -- Virtualization Benefits…”
    Libro electrónico
  9. 4129
    Publicado 2007
    Tabla de Contenidos: “…13.2 Measuring Application Performance -- 13.3 Configuring for Multiple Page Sizes -- PART FIVE: File Systems -- Chapter 14 File System Framework -- 14.1 File System Framework -- 14.2 Process-Level File Abstractions -- 14.3 Solaris File System Framework -- 14.4 File System Modules -- 14.5 The Virtual File System (vfs) Interface -- 14.6 The Vnode -- 14.7 File System I/O -- 14.8 File Systems and Memory Allocation -- 14.9 Path-Name Management -- 14.10 The Directory Name Lookup Cache -- 14.11 The File System Flush Daemon -- 14.12 File System Conversion to Solaris 10 -- 14.13 MDB Reference -- Chapter 15 The UFS File System -- 15.1 UFS Development History -- 15.2 UFS On-Disk Format -- 15.3 The UFS Inode -- 15.4 Access Control in UFS -- 15.5 Extended Attributes in UFS -- 15.6 Locking in UFS -- 15.7 Logging -- 15.8 MDB Reference -- PART SIX: Platform Specifics -- Chapter 16 Support for NUMA and CMT Hardware -- 16.1 Memory Hierarchy Designs -- 16.2 Memory Placement Optimization Framework -- 16.3 Initial Thread Placement -- 16.4 Scheduling -- 16.5 Memory Allocation -- 16.6 Lgroup Implementation -- 16.7 MPO APIs -- 16.8 Locality Group Hierarchy -- 16.9 MPO Statistics -- 16.10 MDB Reference -- Chapter 17 Locking and Synchronization -- 17.1 Synchronization -- 17.2 Parallel Systems Architectures -- 17.3 Hardware Considerations for Locks and Synchronization -- 17.4 Introduction to Synchronization Objects -- 17.5 Mutex Locks -- 17.6 Reader/Writer Locks -- 17.7 Turnstiles and Priority Inheritance -- 17.8 Kernel Semaphores -- 17.9 DTrace Lockstat Provider -- PART SEVEN: Networking -- Chapter 18 The Solaris Network Stack -- 18.1 STREAMS and the Network Stack -- 18.2 Solaris 10 Stack: Design Goals -- 18.3 Solaris 10 Network Stack Framework -- 18.4 TCP as an Implementation of the New Framework -- 18.5 UDP -- 18.6 Synchronous STREAMS -- 18.7 IP…”
    Libro electrónico
  10. 4130
    por Gavilán, Ignacio G. R.
    Publicado 2019
    Tabla de Contenidos: “…-- Codificación -- Almacenamiento -- Presentación y captura -- Comunicación -- Tratamiento -- En resumen -- 1.2.La dualidad hardware/software y por qué es tan importante -- La naturaleza de lo lógico -- Hardware y software -- 1.3.Las raíces de la disrupción digital -- Uniformidad -- Ductilidad -- Incorporeidad -- Replicabilidad -- Gratuidad -- Exponencialidad -- 1.4.Técnica de carrera: lo que tienes que interiorizar -- Capítulo 2 Realidades digitales -- 2.1.El mundo ya es digital -- 2.2.Comunicaciones -- Redes de telecomunicaciones -- Redes de área local -- Tecnologías para distancias cortas -- 2.3.Sistemas de información -- Cliente/servidor -- ERP y CRM -- 2.4.Bases de datos -- Bases de datos relacionales -- Datawarehouse y business intelligence -- 2.5.Integración de sistemas. …”
    Libro electrónico
  11. 4131
    Publicado 2017
    Tabla de Contenidos: “…SECURITY IS NOT ABOUT HARDWARE AND SOFTWARE -- The Bad Guys Are Very Sophisticated -- Management Sees Security as a Drain on the Bottom Line -- 5. …”
    Libro electrónico
  12. 4132
    por Russinovich, Mark E.
    Publicado 2009
    Tabla de Contenidos: “…User Mode -- Terminal Services and Multiple Sessions -- Objects and Handles -- Security -- Registry -- Unicode -- Digging into Windows Internals -- Reliability and Performance Monitor -- Kernel Debugging -- Windows Software Development Kit -- Windows Driver Kit -- Sysinternals Tools -- Conclusion -- System Architecture -- Requirements and Design Goals -- Operating System Model -- Architecture Overview -- Portability -- Symmetric Multiprocessing -- Scalability -- Differences Between Client and Server Versions -- Checked Build -- Key System Components -- Environment Subsystems and Subsystem DLLs -- Ntdll.dll -- Executive -- Kernel -- Hardware Abstraction Layer -- Device Drivers -- System Processes -- Conclusion -- System Mechanisms -- Trap Dispatching -- Interrupt Dispatching -- Exception Dispatching -- System Service Dispatching -- Object Manager -- Executive Objects -- Object Structure -- Synchronization -- High-IRQL Synchronization -- Low-IRQL Synchronization -- System Worker Threads -- Windows Global Flags -- Advanced Local Procedure Calls (ALPCs) -- Kernel Event Tracing -- Wow64 -- Wow64 Process Address Space Layout -- System Calls -- Exception Dispatching -- User Callbacks -- File System Redirection -- Registry Redirection and Reflection -- I/O Control Requests -- 16-Bit Installer Applications -- Printing -- Restrictions -- User-Mode Debugging -- Kernel Support -- Native Support -- Windows Subsystem Support -- Image Loader -- Early Process Initialization -- Loaded Module Database -- Import Parsing -- Post Import Process Initialization -- Hypervisor (Hyper-V) -- Partitions -- Root Partition…”
    Libro electrónico
  13. 4133
    “…how do I make the most of the available hardware? how can I improve performance? In the modern world, users expect more and more from their applications and devices, and multi-core hardware has the potential to provide it. …”
    Libro electrónico
  14. 4134
    Publicado 2017
    Tabla de Contenidos: “…8.2.3 - Manufacturing Information Monitor Technology -- 8.3 - Overall architecture of real-time information-driven production scheduling system -- 8.4 - Equipment agent -- 8.5 - Capability evaluation agent model -- 8.6 - Real-time scheduling agent model -- 8.7 - Production execution monitor agent model -- 8.8 - GA-based production scheduling algorithm -- References -- Chapter 9 - IoT-MS Prototype System -- 9.1 - Configuration of a smart shop floor -- 9.1.1 - Formation of the Production Task -- 9.1.2 - Layout of the Shop Floor -- 9.1.3 - Deployment of Hardware Devices -- 9.2 - The framework of the prototype system -- 9.2.1 - System Architecture -- 9.2.2 - Information Model -- 9.3 - The logical flow of the prototype system -- 9.4 - Task driven manufacturing resource configuration module -- 9.4.1 - Phase 1: MC Optimal Configuration -- 9.4.2 - Phase 2: CMS Optimal Configuration -- 9.5 - Production scheduling/rescheduling module -- 9.5.1 - Quantifying the Tasks -- 9.5.2 - The Scheduling and the Rescheduling Method -- 9.6 - IoT-enabled smart material handling module -- 9.6.1 - Task Description -- 9.6.2 - Calculations for the Moving Tasks -- 9.6.3 - User Interfaces of the Prototype System -- 9.7 - IoT-enabled smart station -- 9.7.1 - The Case Scenario -- 9.7.2 - Operation Guidance From the System -- 9.7.3 - Real-Time Queuing Under Exceptions -- 9.8 - Real-time manufacturing information track and trace -- 9.9 - Real-time key production performances monitor module -- 9.9.1 - Details of the Case -- 9.9.2 - The Hierarchy Timed Color Petri Net Model -- References -- Chapter 10 - Conclusions and Future Works -- 10.1 - Conclusions -- 10.2 - Future works -- Index -- Back cover…”
    Libro electrónico
  15. 4135
    Publicado 2023
    Tabla de Contenidos: “…Log out when you're finished -- Use your own computer or phone -- Lock your computer -- Use a separate, dedicated computer for sensitive tasks -- Use a separate, dedicated browser for sensitive web-based tasks -- Secure your access devices -- Keep your devices up to date -- Don't perform sensitive tasks over public Wi-Fi -- Never use public Wi-Fi in high-risk places -- Access your accounts only in safe locations -- Use appropriate devices -- Set appropriate limits -- Use alerts -- Periodically check access device lists -- Check last login info -- Respond appropriately to any fraud alerts -- Never send sensitive information over an unencrypted connection -- Beware of social engineering attacks -- Establish voice login passwords -- Protect your cellphone number -- Don't click on links in emails or text messages -- Securing Data with Parties You've Interacted With -- Securing Data at Parties You Haven't Interacted With -- Securing Data by Not Connecting Hardware with Unknown Pedigrees -- Chapter 5 Passwords -- Passwords: The Primary Form of Authentication -- Avoiding Simplistic Passwords -- Password Considerations -- Easily guessable personal passwords -- Complicated passwords aren't always better -- Different levels of sensitivity -- Your most sensitive passwords may not be the ones you think -- You can reuse passwords - sometimes -- Consider using a password manager -- Creating Memorable, Strong Passwords -- Knowing When to Change Passwords -- Changing Passwords after a Breach -- Providing Passwords to Humans -- Storing Passwords -- Storing passwords for your heirs -- Storing general passwords -- Transmitting Passwords -- Discovering Alternatives to Passwords -- Biometric authentication -- SMS-based authentication -- App-based one-time passwords -- Hardware token authentication -- USB-based authentication…”
    Libro electrónico
  16. 4136
    Publicado 2017
    Tabla de Contenidos: “…. -- See also -- Mitigating the impact of hardware failure -- Getting ready -- How to do it... -- How it works... -- There's more... -- Copying WAL files more easily -- Adding compression -- Secondary delay -- See also -- Applying bonus kernel tweaks -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 3: Pooling Resources -- Introduction -- Determining connection costs and limits -- Getting ready -- How to do it... -- How it works... -- There's more... -- Installing PgBouncer -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Configuring PgBouncer safely -- Getting ready -- How to do it... -- How it works... -- There's more... -- What about pool_mode? …”
    Libro electrónico
  17. 4137
    Publicado 2017
    Tabla de Contenidos: “…. -- Chapter 10: Production Planning and Performance Tuning for Ceph -- Introduction -- The dynamics of capacity, performance, and cost -- Choosing hardware and software components for Ceph -- Processor -- Memory -- Network -- Disk -- Partitioning the Ceph OSD journal -- Partitioning Ceph OSD data -- Operating system -- OSD filesystem -- Ceph recommendations and performance tuning -- Tuning global clusters -- Tuning Monitor -- OSD tuning -- OSD general settings -- OSD journal settings -- OSD filestore settings -- OSD recovery settings -- OSD backfilling settings -- OSD scrubbing settings -- Tuning the client -- Tuning the operating system -- Tuning the network -- Sample tuning profile for OSD nodes -- How to do it... -- Ceph erasure-coding -- Erasure code plugin -- Creating an erasure-coded pool -- How to do it... -- Ceph cache tiering -- Writeback mode -- Read-only mode -- Creating a pool for cache tiering -- How to do it... -- See also -- Creating a cache tier -- How to do it... -- Configuring a cache tier -- How to do it... -- Testing a cache tier -- How to do it... -- Cache tiering - possible dangers in production environments -- Known good workloads -- Known bad workloads -- Chapter 11: The Virtual Storage Manager for Ceph -- Introductionc…”
    Libro electrónico
  18. 4138
    Publicado 1998
    Tabla de Contenidos: “…Preparing the Parallel Port -- Installing an Interrupt Handler -- The /proc Interface -- Autodetecting the IRQ Number -- Kernel-assisted probing -- Do-it-yourself probing -- Fast and Slow Handlers -- The internals of interrupt handling on the x86 -- Implementing a Handler -- Handler Arguments and Return Value -- Enabling and Disabling Interrupts -- Disabling a single interrupt -- Disabling all interrupts -- Top and Bottom Halves -- Tasklets -- Workqueues -- Interrupt Sharing -- Installing a Shared Handler -- Running the Handler -- The /proc Interface and Shared Interrupts -- Interrupt-Driven I/O -- A Write-Buffering Example -- Quick Reference -- Data Types in the Kernel -- Use of Standard C Types -- Assigning an Explicit Size to Data Items -- Interface-Specific Types -- Other Portability Issues -- Time Intervals -- Page Size -- Byte Order -- Data Alignment -- Pointers and Error Values -- Linked Lists -- Quick Reference -- PCI Drivers -- The PCI Interface -- PCI Addressing -- Boot Time -- Configuration Registers and Initialization -- MODULE_DEVICE_TABLE -- Registering a PCI Driver -- Old-Style PCI Probing -- Enabling the PCI Device -- Accessing the Configuration Space -- Accessing the I/O and Memory Spaces -- PCI Interrupts -- Hardware Abstractions -- A Look Back: ISA -- Hardware Resources -- ISA Programming -- The Plug-and-Play Specification -- PC/104 and PC/104+ -- Other PC Buses -- MCA -- EISA -- VLB -- SBus -- NuBus -- External Buses -- Quick Reference -- USB Drivers -- USB Device Basics -- Endpoints -- Interfaces -- Configurations -- USB and Sysfs -- USB Urbs -- struct urb -- Creating and Destroying Urbs -- Interrupt urbs -- Bulk urbs -- Control urbs -- Isochronous urbs -- Submitting Urbs -- Completing Urbs: The Completion Callback Handler -- Canceling Urbs -- Writing a USB Driver -- What Devices Does the Driver Support?…”
    Tesis
  19. 4139
    por McGuire, Sam
    Publicado 2008
    Tabla de Contenidos: “…; 1.2 A sampler survey; 1.2.1 Sample players; 1.2.2 Hardware samplers; 1.2.3 Software samplers; 1.2.4 Tape-based sampling; 1.2.5 Miscellaneous utilities; 1.3 Basic sampler expectations; 1.3.1 Basic editing features; 1.3.2 Editing the audio file length; 1.3.3 Playback direction; 1.3.4 Level control; 1.3.5 Pitch shifting; 1.3.6 Looping; 1.3.7 Capable GUI; 1.3.8 Project manager; 1.4 Other expectations; 1.4.1 Sampler memory…”
    Libro electrónico
  20. 4140
    Publicado 2011
    Tabla de Contenidos: “…-- Why Linux Is Popular with Hardware Companies and Developers -- Linux Is Portable -- The C Programming Language -- Overview of Linux -- Linux Has a Kernel Programming Interface -- Linux Can Support Many Users -- Linux Can Run Many Tasks -- Linux Provides a Secure Hierarchical Filesystem -- The Shell: Command Interpreter and Programming Language -- A Large Collection of Useful Utilities -- Interprocess Communication -- System Administration -- Additional Features of Linux -- GUIs: Graphical User Interfaces -- (Inter)Networking Utilities -- Software Development -- Conventions Used in This Book -- Chapter Summary -- Exercises -- PART I: INSTALLING UBUNTU LINUX -- CHAPTER 2: INSTALLATION OVERVIEW -- The Live/Install Desktop CD and the Live/Install DVD -- More Information -- Planning the Installation -- The Installation Process -- Downloading and Burning a CD/DVD -- Gathering Information About the System -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 3: STEP-BY-STEP INSTALLATION -- Booting from a Live/Install Desktop CD or a Live/Install DVD -- Graphical Partition Editors -- Upgrading to a New Release -- Installing KDE -- Setting Up a Dual-Boot System -- Advanced Installation -- Chapter Summary -- Exercises -- Advanced Exercises -- PART II: GETTING STARTED WITH UBUNTU LINUX -- CHAPTER 4: INTRODUCTION TO UBUNTU LINUX -- Curbing Your Power: root Privileges/sudo -- A Tour of the Ubuntu Desktop -- Getting the Most Out of the Desktop -- Updating, Installing, and Removing Software Packages -- Where to Find Documentation -- More About Logging In…”
    Libro electrónico