Mostrando 133,601 - 133,620 Resultados de 134,015 Para Buscar 'Minsal~', tiempo de consulta: 1.38s Limitar resultados
  1. 133601
    Publicado 2016
    “…Suitable for the novice and expert alike, each topic provides a fast and easy way to get started with exciting applications, with practical examples in every chapter. What You Will Learn Install and configure the Raspbian Jessie operating system for maximum mischief Detect an intruder with motion detection or a laser trip wire and set off an alarm Listen in to conversations from a distance over Bluetooth Distort your voice in weird and wonderful ways Track the Pi's whereabouts using GPS Connect your Pi to the mobile Internet using a 3G dongle and make yourself anonymous on the net Display secret messages and codes to fellow agents on a LED display In Detail This book is for all mischievous Raspberry Pi owners who'd like to see their computer transform into a neat spy gadget to be used in a series of practical pranks and projects. …”
    Libro electrónico
  2. 133602
    Publicado 2016
    “…You should be familiar with how to set up a Linux server and how to install additional software on them. What You Will Learn Route an IPv6 netblock to your local network Modify your named instance to support setting hostnames for your IPv6 addresses Use SSH for remote console access Configure NGINX with TLS Secure XMPP with TLS Leverage iptables6 to firewall your IPv6 traffic Configure Samba as an Active Directory compatible directory service In Detail Linux can be configured as a networked workstation, a DNS server, a mail server, a firewall, a gateway router, and many other things. …”
    Libro electrónico
  3. 133603
    Publicado 2016
    “…Edit shared Office documents on the Dropbox Web site -- you don't need to have Office installed locally on your computer or subscribe to Office 365. …”
    Libro electrónico
  4. 133604
    Publicado 2015
    “…Module 1: Essential Skills Lesson 1: Performing Basic Tasks from a Shell Environment Lesson 2: Processing and Working with Text Files Lesson 3: Performing Basic File Management Tasks Lesson 4: Managing Processes Module 2: Administration Tasks Lesson 5: Design Hard Disk Layout Lesson 6: Creating Partitions and Filesystems Lesson 7: Common Filesystem Management Tasks Lesson 8: Managing Permissions Lesson 9: Managing Software Module 3: Advanced Management Tasks Lesson 10: System Architecture Lesson 11: Boot the System Lesson 12: Managing the Boot Sequence Lesson 13: Install a Boot Manager Lesson 14: Managing Shared Libraries About the Instructor Sander van Vugt is an independent Linux trainer, author, and consultant living in the Netherlands. …”
    Video
  5. 133605
    Publicado 2015
    “…Major topics include: Part 1: Performing Basic System Management Tasks 1: Installing Red Hat Enterprise Linux Server 2: Using Essential Tools 3: Essential File Management Tools 4: Working with Text Files 5: Connecting to a RHEL Server 6: Managing Users and Groups 7: Connecting to an LDAP Server 8: Managing Permissions 9: Configuring Networking Part 2: Operating Red Hat Enterprise Linux Servers 10: Managing Processes 11: Managing Software 12: Working with Virtual Machines 13: Scheduling Tasks 14: Configuring Logging 15: Managing Partitions 16: Managing LVM Logical Volumes Part 3: Performing Advanced System Administration Tasks 17: Managing the Kernel 18: Using Kickstart 19: Managing and Understanding the Boot Procedure 20: Applying Essential Troubleshooting Skills Part 4: Managing Network Services 21: Managing HTTP Services 22: Managing SELinux 23: Configuring a Firewall 24: Configuring FTP Services 25: Configuring Time Services..…”
    Video
  6. 133606
    Publicado 2016
    “…The video lessons cover the following topics: Module 1: Linux Operating System Security Lesson 1: Keeping Linux up-to-date Lesson 2: Managing file system security properties Lesson 3: Securing server access Lesson 4: Configuring system logging Lesson 5: Managing system auditing Lesson 6: Managing mandatory access control (MAC) Lesson 7: Managing kernel security Module 2: Managing Linux User Security Lesson 8: Managing Linux permissions and attributes Lesson 9: Managing user accounts Lesson 10: Installing central authentication Module 3: Securing Linux Services Lesson 11: Securing services Lesson 12: Securing network file systems Lesson 13: Applying secure remote access solutions Module 4: Securing Linux Infrastructure Lesson 14: Sniffing and port scanning Lesson 15: Configuring analyzing and intrusion detection tools Lesson 16: Managing firewalls Lesson 17: Managing certificates and public key infrastructures Lesson 18: Managing GPG About the Instructor Sander van Vugt is an independent Linux trainer, author, and..…”
    Video
  7. 133607
    Publicado 2022
    “…As you advance, you'll find out how to manage these applications, and control, observe, and connect them using Tanzu Mission Control, Tanzu Observability, and Tanzu Service Mesh. Finally, you'll explore the architecture, capabilities, features, installation, configuration, implementation, and benefits of these services with the help of examples. …”
    Libro electrónico
  8. 133608
    Publicado 2023
    “…You will then explore neural collaborative filtering and learn how to build a project based on the Amazon Product Recommendation System. You will learn to install the required packages, analyze data for products recommendation, prepare data, and model development using a two-tower approach. …”
    Video
  9. 133609
    Publicado 2023
    “…We will explore Natural Language Toolkit (NLTK) and install packages to create a corpus with Python. We will train and test the chatbot. …”
    Video
  10. 133610
    Publicado 2023
    “…Additionally, you will delve into version control using GitHub Actions Workflow and learn about Azure Functions monitoring. Finally, you will have the opportunity to develop a transaction management system application with Azure Functions. …”
    Video
  11. 133611
    por Solórzano Fàbrega, Elisabet
    Publicado 2016
    “…La resiliència o capacitat resilient és cabdal en la infància, especialment en el camp de l'adopció, ja que és fonamental per a la vinculació i adaptació dels infants a les seves famílies adoptives així com per a la prevenció de la salut mental dels infants. En el nostre estudi emfatitzem la necessitat de interrelació entre la investigació i la intervenció professional amb famílies adoptives que emmarquem des d'un model d'intervenció en postadopció, fonamentat en el constructivisme relacional, integrador, interdisciplinari i centrat en la relació (Pacheco, Garcia, Ger, Sallés i Boadas, 2012) i que subratlla la funció reparadora de la parentalitat adoptiva a través, entre d'altres processos, del foment de la resiliència (Cyrulnik, 2002). …”
    Accés lliure
    Tesis
  12. 133612
    Publicado 2024
    “…Unlock Python's hacking potential and discover the art of exploiting vulnerabilities in the world of offensive cybersecurity Key Features Get in-depth knowledge of Python's role in offensive security, from fundamentals through to advanced techniques Discover the realm of cybersecurity with Python and exploit vulnerabilities effectively Automate complex security tasks with Python, using third-party tools and custom solutions Purchase of the print or Kindle book includes a free PDF eBook Book Description Offensive Security Using Python is your go-to manual for mastering the quick-paced field of offensive security. …”
    Libro electrónico
  13. 133613
    Publicado 2023
    “…The course begins with a comprehensive look at mobile and desktop operating systems, delving into Windows, macOS, and Linux, setting you up with a versatile foundation in OS management. You'll explore installation requirements, system utilities, and command-line tools essential for today's IT professionals. …”
    Video
  14. 133614
    Publicado 2023
    “…The course focuses on hands-on server administration, from OS requirements and installations to robust server network configuration. …”
    Video
  15. 133615
    Publicado 2023
    “…Begin by comprehending its architecture and proceeding to installation techniques for different RAC types--administrator-managed, policy-managed, CDB, and RAC One node. …”
    Video
  16. 133616
    Publicado 2023
    “…Ihre Produktionen füllten keine Kinosäle, vielmehr kamen sie im Kontext des "non-theatrical film" außerhalb des kommerziellen Kinos zu unterschiedlichsten Zwecken zur Aufführung. …”
    Libro electrónico
  17. 133617
    Publicado 2021
    “…No obstante, si despertamos y adoptamos una actitud proactiva, podemos construir la civilización del amor a la cual la humanidad está destinada. La esperanza es un mensaje universal. El autor de este libro, desde una cosmovisión humanista avanzada y una espiritualidad cristiana, nos propone despertar a esta nueva realidad. …”
    991009646608706719
  18. 133618
    Publicado 2013
    “…Walden es tanto un experimento literario sin precedentes como un manual para la buena vida: un libro escrito contra toda servidumbre y a favor de la felicidad como única riqueza del ser humano. …”
    Libro
  19. 133619
    Publicado 2007
    “…. • Explore the depths of Mac OS X’s core including the desktop, Finder, Finder windows, the Dock, user accounts, the Dashboard and widgets, Spaces, and much more. • Master OS X by installing and using Mac OS X applications, customizing the system, making your Mac accessible to everyone, automating your Mac with the Automator, using Unix commands, and working with mobile Macs. • Run Windows applications on your Mac for those rare occasions when a Mac application isn’t available. • Exploit Mac OS X’s Internet tools to connect to the Net with or without wires, use email, surf the Web, and take advantage of the many features of .Mac. • Explore some of the great applications included with Mac OS X, such as iTunes, QuickTime, DVD Player, iCal, Address Book, iChat, and on it goes. • Expand your system with input devices (such as keyboards and trackballs), output devices (printers, displays, and such), hard drives, and hubs (Ethernet, USB, and FireWire). • Connect to other computers and devices safely and easily using Mac OS X’s advanced networking tools. …”
    Libro electrónico
  20. 133620
    Publicado 2008
    “…Access your files from any computer in the house or while you’re on the road Set up security--both local (user accounts) and remote (Internet access) Take advantage of the power of the Windows Server 2003 code underlying Windows Home Server Make working with Windows Home Server faster and easier Use real-world examples and network configurations that will help you get the most out of your Home Server set up Use Windows Home Server power tools to put you in complete control over your server and the network Introduction 1 Part I—Unleashing Windows Home Server Setup Chapter 1—Understanding Windows Home Server 7 Chapter 2—Installing Windows Home Server 23 Chapter 3—Setting Up Your Windows Home Server Network 41 Part II—Unleashing Windows Home Server Configuration Chapter 4—Setting Up and Working with User Accounts 73 Chapter 5—Adding Devices to the Windows Home Server Netwo..…”
    Libro electrónico