Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 241
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
5141
-
5142
-
5143
-
5144
-
5145
-
5146
-
5147
-
5148Publicado 2016Tabla de Contenidos: “…Event generation and system monitoring -- 2. Pattern discovery and summarization -- 3. …”
Libro electrónico -
5149Publicado 2024Tabla de Contenidos: “…Chapter -1: MySQL Installation and Upgrade -- Chapter-2: MySQL Utilities -- Chapter-3: MySQL Server administration -- Chapter-4: MySQL -- Chapter-5: MySQL High Availability, Replication and Scalability -- Chapter-6: MySQL InnoDB Cluster and Cluster Set -- Chapter-7: MySQL NDB Cluster -- Chapter-8: MySQL Logical Backup -- Chapter-9: MySQL Enterprise Backup and Recovery -- Chapter-10: MySQL Security -- Chapter-11: MySQL Performance Tuning -- Chapter-12: MySQL Enterprise Monitor -- Chapter-13: Monitoring MySQL using Oracle Enterprise Monitor Cloud Control 13c -- Chapter 14: MySQL Troubleshooting -- Summary…”
Libro electrónico -
5150por Raynaud, HervéTabla de Contenidos: “…-- Helpful tools for the sensible decision-maker -- An important class of choice functions -- Prudent choice functions -- Often implicit axioms -- Coherent choice functions -- Rationality and independence -- Monotonic choice functions -- Sequentially independent rankings -- Prudent rankings -- Coherent condorcet rankings -- Monotonic rankings…”
Publicado 2011
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
5151Publicado 2023Tabla de Contenidos: “…Table of Contents Cloud Architecture and Navigation Effective Techniques for Preparing to Audit Cloud Environments Identity and Access Management Controls Network, Infrastructure, and Security Controls Financial Resource and Change Management Controls Tips and Techniques for Advanced Auditing Tools for Monitoring and Assessing Walk-Through – Assessing IAM Controls Walk-Through – Assessing Policy Settings and Resource Controls Walk-Through – Assessing Change Management, Logging, and Monitoring Policies…”
Libro electrónico -
5152por Tannir, KhaledTabla de Contenidos: “…The core-site.xml configuration fileHadoop MapReduce metrics; Performance monitoring tools; Using Chukwa to monitor Hadoop; Using Ganglia to monitor Hadoop; Using Nagios to monitor Hadoop; Using Apache Ambari to monitor Hadoop; Summary; Chapter 3: Detecting System Bottlenecks; Performance tuning; Creating a performance baseline; Identifying resource bottlenecks; Identifying RAM bottlenecks; Identifying CPU bottlenecks; Identifying storage bottlenecks; Identifying network bandwidth bottlenecks; Summary; Chapter 4: Identifying Resource Weaknesses; Identifying cluster weakness…”
Publicado 2014
Libro electrónico -
5153Tabla de Contenidos:Libro electrónico
-
5154Publicado 2003Tabla de Contenidos: “…Journal articles: 1914-1920 : expanding the horizons of child guidance, neurosis & psychosis…”
Libro -
5155por Vugt, SanderTabla de Contenidos: “…Performing an Advanced Ubuntu Server Installation -- Using Ubuntu Server for System Imaging -- Performance Monitoring -- Performance Optimization -- Advanced File System Management -- Network Monitoring -- Creating an Open Source SAN -- Configuring OpenLDAP -- Integrating Samba -- Configuring Ubuntu Server As a Mail Server -- Managing Ubuntu Server Security -- Configuring Ubuntu Server As a VPN Server -- Configuring Kerberos and NTP on Ubuntu Server -- Ubuntu Server Troubleshooting…”
Publicado 2009
Libro electrónico -
5156Publicado 2009Tabla de Contenidos: “…Welcome to business activity monitoring! -- Installing and configuring BAM -- Your first BAM project -- Where BAM fits in your business -- The BAM observation model -- The tracking profile editor -- Consuming BAM data and the BAM portal -- Capturing data from WCF -- Capturing data from WF -- The BAM API -- BAM and business intellegence -- Relationship advice -- Managing BAM -- Monitoring BizTalk status using BAM -- Building better BAM…”
Libro electrónico -
5157
-
5158por Darmawan, BudiTabla de Contenidos: “…Business Service Management sample implementation -- 4.1 Sample environment -- 4.2 Constructing the solution -- 4.2.1 Solution structure -- 4.2.2 Solution configuration -- 4.2.3 Monitoring architecture -- 4.2.4 Object class selection -- 4.2.5 Business System View design -- 4.2.6 Data collection design -- 4.2.7 Service Level monitoring -- 4.3 Implementation overview -- 4.4 IBM Tivoli Monitoring profiles -- 4.4.1 Profile Managers and IBM Tivoli Monitoring profiles -- 4.4.2 Detailed profile setting -- 4.5 IBM Tivoli NetView monitoring -- 4.6 Web transaction response time monitoring -- 4.6.1 Quality of Service monitoring -- 4.6.2 Synthetic Transaction Investigator monitoring -- 4.7 Defining TEC rules -- 4.7.1 Adding IBM Tivoli Monitoring rules -- 4.7.2 IBM Tivoli Monitoring for Transaction Performance rules -- 4.7.3 IBM Tivoli NetView rules -- 4.7.4 Assembling a new TEC rule base -- 4.7.5 IBM Tivoli Business Systems Manager customization -- 4.7.6 Defining TBSM object types -- 4.7.7 Setting object hierarchy -- 4.7.8 Defining business systems -- 4.7.9 Defining TBSM operators -- 4.8 Configuring Tivoli Data Warehouse -- 4.8.1 Collecting information from IBM Tivoli Monitoring -- 4.8.2 Collecting information from Web Services Courier -- 4.8.3 Enabling ETL in Tivoli Data Warehouse -- 4.9 Customizing IBM Tivoli Service Level Advisor -- 4.9.1 Defining the operation -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other publications -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover…”
Publicado 2004
Libro electrónico -
5159Publicado 2000Tabla de Contenidos: “…""Appendix A Defining the Decision Framework and the Value of Exposure Information in Military Deployments"" ""Appendix B Harmful Properties of Chemical Agents""; ""Appendix C Harmful Properties of Biological Agents""; ""Appendix D Detecting and Monitoring Chemical Agents""; ""Appendix E Detecting and Monitoring Biological Agents""; ""Appendix F Contributors to This Study""; ""Appendix G Biographical Sketches of Principal Investigator and Members of the Advisory Panel""; ""Appendix H Meetings and Activities""…”
Libro electrónico -
5160