Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 55
- Biblia 42
- Engineering & Applied Sciences 28
- Nutrición 28
- Història 20
- Bíblia 19
- Computer Science 19
- History 19
- Computer networks 18
- Crítica e interpretación 17
- Niños 17
- Operating systems (Computers) 17
- Sociedad Nestlé 17
- Derecho Laboral y Seguridad Social 16
- Management 16
- Universidad Pontificia de Salamanca (España) 16
- Derecho Civil 12
- Linux 12
- Historia y crítica 11
- Development 10
- Informática 10
- Literatura griega 10
- Certification 9
- Internet 9
- Trabajo 9
- Computer security 8
- Derecho penitenciario 8
- Design 8
- Electrical & Computer Engineering 8
- History and criticism 8
-
1361Publicado 2014Tabla de Contenidos: “…El epistolario de la madre Isabel de Santo Domingo (Convento de San José de carmelitas descalzas de Zaragoza) / La textualización de la conciencia: sobre los papeles de sor Ángela de San Buenaventura (Pérez de Montalbán) / Buscando autenticidad y autonomía: el epistolario de Francisca de San Ambrosio (1604-1608), monja en el monasterio de la Encarnación de Madrid / "Un grande, y arcano misterio está aquí escondido": religiosas entre las rejas del texto / Escritura intramuros -- "Metidas nesta Arca de Noé": o Diálogo como estratégia na historiografi a monástica feminina da Idade Moderna / La producción poética de sor Francisca de Santa Teresa (1654-1709): entre la cotidianeidad y la espiritualidad / El convento como espacio escénico y la monja como actriz: montajes teatrales en tres conventos de Valladolid, Madrid y Lisboa / DIMENSIONES TRANSNACIONALES -- Monjas españolas en Filipinas: la formación de lectura y escritura de sor Ana de Cristo / Iluminatrix plurimorum per exempla lucidissima vitae suaei: el conocimiento de la vida y la obra de sor María de Ágreda. …”
Libro electrónico -
1362Publicado 2016Tabla de Contenidos: “…Prerequisites for .NET 5 -- Installing DNVM, DNU and DNX -- Installing DNX -- Running the MVC website -- MVC and nginx -- Other .NET applications -- Installing PHP -- Installing a database -- Installing MySQL -- Installing phpMyAdmin -- Installing SQLite -- Summary -- Chapter 5: Setting Up the Raspberry Pi as a File Server -- Connecting the external storage -- Preparing the storage medium -- Listing the available drives -- Formatting a drive -- Creating a EXT4 partition -- Mounting the drives -- Remounting a disk after reboot -- Accessing files -- The FTP service -- Connecting with FileZilla -- Connecting with WinSCP -- The Samba service -- Installing and configuring Samba -- Network shares -- AFP for Macintosh -- Installing and configuring Netatalk -- Shares and Time Machine -- BitTorrent Sync -- Installing BTSync 2 -- The hardware RAID -- Configuration -- Massive storage -- Redundant storage -- Summary -- Chapter 6: Setting Up Game Servers -- Updating to Jessie -- Selective settings -- Game servers -- OpenTTD -- Installing OpenTTD -- Configuring OpenTTD -- Playing OpenTTD -- Freeciv -- Installing Freeciv -- Configuring Freeciv -- Playing Freeciv -- OpenArena -- Installing OpenArena -- Configuring OpenArena -- Playing OpenArena -- Minecraft -- Installing the Java Hard-Float -- Installing the Minecraft server -- Configuring Minecraft -- Playing Minecraft -- Summary -- Chapter 7: Streaming Live HD Video -- Installing UV4L -- Configuring the UV4L-RaspiCAM -- Installing WebRTC -- WebRTC streaming -- Real time HTTP streaming -- Web conferencing -- Streaming the X desktop -- Text overlay -- Object detection and tracking -- Removing the overlay watermark -- The HUD sample -- Using the overlay binary -- Inline variables -- Compiling the overlay code yourself -- Summary -- Chapter 8: Setting Up the Pi as a Media Center Server -- Slideshows -- Using fbi…”
Libro electrónico -
1363Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: The All New PHP -- Scalar type hints -- Return type hints -- Anonymous classes -- Generator delegation -- Generator return expressions -- The null coalesce operator -- The spaceship operator -- Constant arrays -- Uniform variable syntax -- Throwables -- Group use declarations -- Catching multiple exceptions types -- Class constant visibility modifiers -- Iterable pseudo-type -- Nullable types -- Void return types -- Summary -- Chapter 2: Embracing Standards -- PSR-1 - basic coding standard -- PSR-2 - coding style guide -- PSR-3 - logger interface -- PSR-4 - autoloading standard -- PSR-6 - caching interface -- PSR-7 - HTTP message interface -- PSR-13 - hypermedia links -- Summary -- Chapter 3: Error Handling and Logging -- Error handling -- Error -- ArithmeticError -- DivisionByZeroError -- AssertionError -- ParseError -- TypeError -- Uncaught error handler -- Triggering errors -- Exception -- Creating a custom exception handler -- Rethrowing exceptions -- Uncaught Exception handler -- Logging -- Native logging -- Logging with Monolog -- Summary -- Chapter 4: Magic Behind Magic Methods -- Using __construct() -- Using __destruct() -- Using __call() -- Using __callStatic() -- Using __set() -- Using __get() -- Using __isset() -- Using __unset() -- Using __sleep() -- Using __wakeup() -- Using __toString() -- Using __invoke() -- Using __set_state() -- Using __clone() -- Using __debugInfo() -- Usage statistics across popular platforms -- Summary -- Chapter 5: The Realm of CLI -- Understanding PHP CLI -- The Console component -- Setting up the Console component -- Creating a console command -- Dealing with inputs -- Using Console component helpers -- Input/output streams -- Process control…”
Libro electrónico -
1364
-
1365Publicado 2017Tabla de Contenidos: “…. -- Integrating with Citrix NetScaler -- Getting ready -- How to do it... -- There's more... -- Chapter 4: Routing in ACI -- Introduction -- Creating a DHCP relay -- How to do it... -- Creating a DHCP relay using the Common tenant -- Creating a global DHCP relay -- How it works... -- There's more... -- Utilizing DNS -- How to do it... -- How it works... -- There's more... -- Routing with BGP -- How to do it... -- Configuring a layer-3 outside interface for tenant networks -- How to do it... -- Creating routed interfaces -- Configuring an external SVI -- Configuring routed sub-interfaces -- Associating a bridge domain with an external network -- How to do it... -- Using route reflectors -- How to do it... -- How it works... -- Routing with OSPF -- How to do it... -- Routing with EIGRP -- How to do it... -- Using IPv6 within ACI -- How to do it... -- How it works... -- Setting up multicast for ACI tenants -- How to do it... -- How it works... -- Configuring multicast on the bridge domain and interfaces -- How it works... -- How it works... -- There's more... -- ACI transit routing and route peering…”
Libro electrónico -
1366Publicado 2022Tabla de Contenidos: “…Software Tools -- WiFi Analyzer -- Protocol Analyzer/Packet Capture -- Bandwidth Speed Tester -- Port Scanner -- iperf -- NetFlow Analyzers -- Trivial File Transfer Protocol (TFTP) Server -- Terminal Emulator -- IP Scanner -- Command Line Tool -- ping -- ipconfig/ifconfig/ip -- 00-FMindd 25 22/04/22 11:12 AM -- xxvi Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- nslookup/dig -- traceroute/tracert -- arp -- netstat -- hostname -- route -- telnet -- tcpdump -- nmap -- Basic Network Platform Commands -- show interface -- show config -- show route -- REVIEW -- 53 QUESTIONS -- 53 ANSWERS -- Objective 54 Given a scenario, troubleshoot common wireless -- connectivity issues -- Specifications and Limitations -- Throughput -- Speed -- Distance -- Received Signal Strength Indication (RSSI) Signal Strength -- Effective Isotropic Radiated Power (EIRP)/Power Settings -- Considerations -- Antennas -- Channel Utilization -- AP Association Time -- Site Survey -- Common Issues -- Interference -- Antenna Cable Attenuation/Signal Loss -- RF Attenuation/Signal Loss -- Wrong SSID -- Incorrect Passphrase -- Encryption Protocol Mismatch -- Insufficient Wireless Coverage -- Captive Portal Issues -- Client Disassociation Issues -- REVIEW -- 54 QUESTIONS -- 54 ANSWERS -- 00-FMindd 26 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Objective 55 Given a scenario, troubleshoot general -- networking issues -- Considerations -- Device Configuration Review -- Routing Tables -- Interface Status -- VLAN Assignment -- Network Performance Baselines -- Common Issues -- Collisions -- Broadcast Storm -- Duplicate MAC Address -- Duplicate IP Address -- Multicast Flooding -- Asymmetrical Routing -- Switching Loops -- Routing Loops -- Rogue DHCP Server -- DHCP Scope Exhaustion -- IP Setting Issues -- Missing Route -- Low Optical Link Budget -- Certificate Issues -- Hardware Failure -- Host-Based/Network-Based Firewall Settings -- Blocked Services, Ports, or Addresses -- Incorrect VLAN -- DNS Issues -- NTP Issues -- BYOD Challenges -- Licensed Feature Issues -- Network Performance Issues -- REVIEW -- 55 QUESTIONS -- 55 ANSWERS -- A About the Online Content -- System Requirements -- Your Total Seminars Training Hub Account -- Privacy Notice -- Single User License Terms and Conditions -- 00-FMindd 27 22/04/22 11:12 AM -- xxviii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- TotalTester Online -- Pre-Assessment Test -- Other Book Resources -- TotalSims for Network+ -- Mike's Video Training -- Mike's Cool Tools -- Technical Support -- Index…”
Libro electrónico -
1367Publicado 2021Tabla de Contenidos: “…Isolation Levels -- Managing Isolation -- Performance Considerations -- Summary -- Chapter 6: Statements -- SQL Statements -- R2DBC Statements -- The Basics -- Creating Statements -- Running Statements -- Sneak Peek -- Dynamic Input -- Creating Parameterized Statements -- Binding Parameters -- Batching Statements -- Using Null Values -- Auto-generated Values -- Performance Hints -- Summary -- Chapter 7: Handling Results -- The Fundamentals -- Consuming Results -- Cursors -- Update Count -- Rows and Columns -- Row Anatomy -- Retrieving Values -- Generic Objects -- Specifying Types -- Multiple Columns -- Summary -- Chapter 8: Result Metadata -- Data About Data -- Row Metadata -- Column Metadata -- Required Methods -- Optional Methods -- getJavaType -- getNativeTypeMetadata -- getNullability -- getPrecision -- getScale -- Retrieving Metadata -- Obtaining a RowMetadata Object -- Accessing ColumnMetadata -- Summary -- Chapter 9: Mapping Data Types -- Data Type Differences -- Mapping Simple Data Types -- Character Types -- Boolean Types -- Binary Types -- Numeric Types -- DateTime Types -- Collection Types -- Mapping Advanced Data Types -- BLOBs and CLOBs -- Creating Objects -- Retrieving Objects -- Consuming Objects -- Releasing Objects -- Summary -- Chapter 10: Handling Exceptions -- General Exceptions -- IllegalArgumentException -- IllegalStateException -- UnsupportedOperationException -- R2DBCException -- Categorized Exceptions -- Non-transient Exceptions -- Transient Exceptions -- Summary -- Part III: Getting Started with R2DBC and MariaDB -- Chapter 11: Getting Started with R2DBC -- Database Drivers -- Outline Placeholder -- R2DBC Client Libraries -- Creating a Client -- Use an Existing Client Library -- Looking Ahead -- MariaDB and R2DBC -- Introduction to MariaDB -- Download and Install -- Direct Download -- Docker Hub Download -- Using R2DBC…”
Libro electrónico -
1368Publicado 2001Tabla de Contenidos: “…Time-of-Check, Time-of-Use -- Broken passwd -- Avoiding TOCTOU Problems -- Secure File Access -- Temporary Files -- File Locking -- Other Race Conditions -- Conclusion -- 10 Randomness and Determinism -- Pseudo-random Number Generators -- Examples of PRNGs -- The Blum-Blum-Shub PRNG -- The Tiny PRNG -- Attacks Against PRNGs -- How to Cheat in On-line Gambling -- Statistical Tests on PRNGs -- Entropy Gathering and Estimation -- Hardware Solutions -- Software Solutions -- Poor Entropy Collection: How to Read "Secret" Netscape Messages -- Handling Entropy -- Practical Sources of Randomness -- Tiny -- Random Numbers for Windows -- Random Numbers for Linux -- Random Numbers in Java -- Conclusion -- 11 Applying Cryptography -- General Recommendations -- Developers Are Not Cryptographers -- Data Integrity -- Export Laws -- Common Cryptographic Libraries -- Cryptlib -- OpenSSL -- Crypto++ -- BSAFE -- Cryptix -- Programming with Cryptography -- Encryption -- Hashing -- Public Key Encryption -- Threading -- Cookie Encryption -- More Uses for Cryptographic Hashes -- SSL and TLS (Transport Layer Security) -- Stunnel -- One-Time Pads -- Conclusion -- 12 Trust Management and Input Validation -- A Few Words on Trust -- Examples of Misplaced Trust -- Trust Is Transitive -- Protection from Hostile Callers -- Invoking Other Programs Safely -- Problems from the Web -- Client-side Security -- Perl Problems -- Format String Attacks -- Automatically Detecting Input Problems -- Conclusion -- 13 Password Authentication -- Password Storage -- Adding Users to a Password Database -- Password Authentication -- Password Selection -- More Advice -- Throwing Dice -- Passphrases -- Application-Selected Passwords -- One-Time Passwords -- Conclusion -- 14 Database Security -- The Basics -- Access Control -- Using Views for Access Control -- Field Protection…”
Libro electrónico -
1369Publicado 2008Tabla de Contenidos: “…Interpreting the show interface Command -- Clearing Interface Counters -- Using CDP to Troubleshoot -- The traceroute Command -- The show controllers Command -- debug Commands -- Using Time Stamps -- Operating System IP Verification Commands -- The ip http server Command -- The netstat Command -- Part VIII: Managing IP Services -- Chapter 23 Network Address Translation -- Private IP Addresses: RFC 1918 -- Configuring Dynamic NAT: One Private to One Public Address Translation -- Configuring PAT: Many Private to One Public Address Translation -- Configuring Static NAT: One Private to One Permanent Public Address Translation -- Verifying NAT and PAT Configurations -- Troubleshooting NAT and PAT Configurations -- Configuration Example: PAT -- Chapter 24 DHCP -- Configuring DHCP -- Verifying and Troubleshooting DHCP Configuration -- Configuring a DHCP Helper Address -- DHCP Client on a Cisco IOS Software Ethernet Interface -- Configuration Example: DHCP -- Chapter 25 IPv6 -- Assigning IPv6 Addresses to Interfaces -- IPv6 and RIPng -- Configuration Example: IPv6 RIP -- IPv6 Tunnels: Manual Overlay Tunnel -- Static Routes in IPv6 -- Floating Static Routes in IPv6 -- Verifying and Troubleshooting IPv6 -- IPv6 Ping -- Part IX: WANs -- Chapter 26 HDLC and PPP -- Configuring HDLC Encapsulation on a Serial Line -- Configuring PPP on a Serial Line (Mandatory Commands) -- Configuring PPP on a Serial Line (Optional Commands): Compression -- Configuring PPP on a Serial Line (Optional Commands): Link Quality -- Configuring PPP on a Serial Line (Optional Commands): Multilink -- Configuring PPP on a Serial Line (Optional Commands): Authentication -- Verifying or Troubleshooting a Serial Link/PPP Encapsulation -- Configuration Example: PPP -- Chapter 27 Frame Relay -- Configuring Frame Relay -- Verifying Frame Relay -- Troubleshooting Frame Relay…”
Libro electrónico -
1370Publicado 2019Tabla de Contenidos: “….* -- /etc/mail -- /etc/mail.rc -- /etc/mail/mailer.conf -- /etc/make.conf -- /etc/master.passwd -- /etc/motd -- /etc/mtree -- /etc/netconfig -- /etc/netstart -- /etc/network.subr -- /etc/newsyslog.conf -- /etc/nscd.conf -- /etc/nsmb.conf -- /etc/nsswitch.conf -- /etc/ntp/, /etc/ntp.conf -- /etc/opie* -- /etc/pam.d/* -- /etc/passwd -- /etc/pccard_ether -- /etc/periodic.conf and /etc/defaults/periodic.conf -- /etc/pf.conf, /etc/pf.os -- /etc/phones -- /etc/portsnap.conf -- /etc/ppp/ -- /etc/printcap -- /etc/profile -- /etc/protocols -- /etc/pwd.db -- /etc/rc* -- /et/regdomain.xml -- /etc/remote -- /etc/resolv.conf -- /etc/rpc -- /etc/security/ -- /etc/services -- /etc/shells -- /etc/skel/ -- /etc/snmpd.config -- /etc/spwd.db -- /etc/src.conf -- /etc/ssh/ -- /etc/ssl/ -- /etc/sysctl.conf -- /etc/syslog.conf, /etc/syslog.conf.d/ -- /etc/termcap, /etc/termcap.small -- /etc/ttys -- /etc/unbound/ -- /etc/wall_cmos_clock -- /etc/zfs/ -- 15 MAKING YOUR SYSTEM USEFUL -- Ports and Packages -- Packages -- Package Repositories -- Package Branches -- Upgrading Packages -- 16 CUSTOMIZING SOFTWARE WITH PORTS -- Making Software -- Source Code and Software -- The Ports Collection -- The Ports Index -- What's In a Port? …”
Libro electrónico -
1371por Lucas, Michael, 1967-Tabla de Contenidos: “…Booting a Different Kernel File -- Booting from an Alternate Hard Disk -- Finding the Disk -- Finding the Partition -- Booting the Kernel -- Making Boot Loader Settings Permanent -- Serial Consoles -- Other Platform Serial Consoles -- Serial Console Physical Setup -- Serial Console Configuration -- Configuring the Serial Console Client -- Setting Up the Serial Console -- Testing the Serial Configuration -- Changing the Serial Console Speed -- Changing the Client Serial Port -- Serial Logins -- Multiuser Startup -- Startup System Scripts -- The /etc/rc Script -- The /etc/rc.conf Script -- The /etc/rc.conf.local Script -- The /etc/netstart Script -- The /etc/rc.securelevel Script -- The /etc/rc.local Script -- The /etc/rc.shutdown Script -- The /etc/rc.firsttime Script -- The /etc/fastboot Script -- The /etc/rc.d Directory -- Software Startup Scripts -- Third-Party rc.d Scripts -- Force-Starting Software -- 6. …”
Publicado 2013
Libro electrónico -
1372Publicado 2015Tabla de Contenidos: “…Isabel Calderón López -- "Metidas nesta Arca de Noé" : o Diálogo como estratégia na historiografia monástica feminina da Idalde Moderna / Isabel Morujào -- La producción poética de sor Francisca de Santa Teresa (1654-1709) : entre la cotidianeidad y la espiritualidad / M. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
1373Publicado 2018Tabla de Contenidos: “…Why you should never invoke compaction manually -- Adjusting compaction throughput due to available resources -- Summary -- Chapter 7: Monitoring -- JMX interface -- MBean packages exposed by Cassandra -- JConsole (GUI) -- Connection and overview -- Viewing metrics -- Performing an operation -- JMXTerm (CLI) -- Connection and domains -- Getting a metric -- Performing an operation -- The nodetool utility -- Monitoring using nodetool -- describecluster -- gcstats -- getcompactionthreshold -- getcompactionthroughput -- getconcurrentcompactors -- getendpoints -- getlogginglevels -- getstreamthroughput -- gettimeout -- gossipinfo -- info -- netstats -- proxyhistograms -- status -- tablestats -- tpstats -- verify -- Administering using nodetool -- cleanup -- drain -- flush -- resetlocalschema -- stopdaemon -- truncatehints -- upgradeSSTable -- Metric stack -- Telegraf -- Installation -- Configuration -- JMXTrans -- Installation -- Configuration -- InfluxDB -- Installation -- Configuration -- InfluxDB CLI -- Grafana -- Installation -- Configuration -- Visualization -- Alerting -- Custom setup -- Log stack -- The system/debug/gc logs -- Filebeat -- Installation -- Configuration -- Elasticsearch -- Installation -- Configuration -- Kibana -- Installation -- Configuration -- Troubleshooting -- High CPU usage -- Different garbage-collection patterns -- Hotspots -- Disk performance -- Node flakiness -- All-in-one Docker -- Creating a database and other monitoring components locally -- Web links -- Summary -- Chapter 8: Application Development -- Getting started -- The path to failure -- Is Cassandra the right database? …”
Libro electrónico -
1374Publicado 2020Tabla de Contenidos: “…Comentario al art. 139 LRJS / Elena García Testal, Celia Fernández Prats -- El Proceso especial en materia de prestaciones de seguridad social. …”
>Texto completo en Biblioteca Virtual Tirant
Libro electrónico -
1375Publicado 2020Tabla de Contenidos: “…Comentario al art. 139 LRJS / Elena García Testal, Celia Fernández Prats -- El Proceso especial en materia de prestaciones de seguridad social. …”
Libro electrónico -
1376Publicado 2023Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro
-
1377Publicado 2021Tabla de Contenidos: “…Detecting Dynamic Devices -- Working with Dynamic Devices -- The Bottom Line -- Chapter 10 Booting Linux -- Understanding the Boot Process -- Overview of the Boot Process -- Watching the Boot Process -- The Firmware Startup -- The GRUB2 Bootloader -- Configuring the GRUB2 Bootloader -- Exploring the GRUB2 Configuration -- Interacting with GRUB2 -- The systemd Initialization Process -- Exploring Unit Files -- Focusing on Service Unit Files -- Focusing on Target Unit Files -- Changing a Unit Configuration File -- Changing the systemd Configuration File -- Looking at systemctl -- Jumping Targets -- Analyzing with systemd -- The Bottom Line -- Chapter 11 Working with Storage Devices -- Storage Basics -- Drive Connections -- Partitioning Drives -- Automatic Drive Detection -- Partitioning Tools -- Working with fdisk -- Working with gdisk -- The GNU parted Command -- Formatting Filesystems -- Common Filesystem Types -- Creating Filesystems -- Mounting Filesystems -- Manually Mounting Devices -- Automatically Mounting Devices -- Managing Filesystems -- Retrieving Filesystem Stats -- Filesystem Tools -- Storage Alternatives -- Multipath -- Logical Volume Manager -- Using RAID Technology -- The Bottom Line -- Chapter 12 Configuring Network Settings -- Network Settings -- Ubuntu Servers -- Red Hat Servers -- Using Network Command-Line Tools -- NetworkManager Tools -- Other Tools -- Basic Network Troubleshooting -- Sending Test Packets -- Finding Host Information -- Advanced Network Troubleshooting -- The netstat Command -- Examining Sockets -- The Bottom Line -- Chapter 13 Managing Users and Groups -- Understanding Linux Permissions -- Understanding Ownership -- Controlling Access Permissions -- Exploring Special Permissions -- Managing Default Permissions -- Using Access Control Lists -- Managing User Accounts -- Adding Accounts -- Maintaining Accounts…”
Libro electrónico -
1378Publicado 2018Tabla de Contenidos: “…WordPress system user -- NGINX configuration -- PHP and PHP-FPM configuration -- Starting NGINX and PHP-FPM -- MariaDB Configuration -- SELinux configuration -- WordPress installation tasks -- WordPress CLI installation -- Creating the WordPress database -- Downloading, configuring, and installing WordPress -- WordPress plugins and theme installation -- Running the WordPress playbook -- Summary -- Questions -- Further reading -- Chapter 6: Targeting Multiple Distributions -- Technical requirements -- Launching multiple Vagrant boxes -- Multi-operating system considerations -- Adapting the roles -- Operating system family -- The stack-install role -- The stack-config role -- The wordpress role -- Running the playbook -- Summary -- Questions -- Further reading -- Chapter 7: The Core Network Modules -- Technical requirements -- Manufacturer and device support -- The modules -- A10 Networks -- Cisco Application Centric Infrastructure (ACI) -- Cisco AireOS -- Apstra Operating System (AOS) -- Aruba Mobility Controller -- Cisco Adaptive Security Appliance (ASA) -- Avi Networks -- Big Switch Networks -- Citrix Netscaler -- Huawei CloudEngine (CE) -- Arista CloudVision (CV) -- Lenovo CNOS -- Cumulus Linux (CL) -- Dell operating system 10 (DellOS10) -- Ubiquiti EdgeOS -- Lenovo Enterprise Networking Operating System (ENOS) -- Arista EOS -- F5 BIG-IP -- FortiGate FortiManager -- FortiGate FortiOS -- illumos -- Cisco IOS and IOS XR -- Brocade IronWare -- Juniper Junos -- Nokia NetAct -- Pluribus Networks Netvisor OS -- Cisco Network Services Orchestrator (NSO) -- Nokia Nuage Networks Virtualized Services Platform (VSP) -- Cisco NX-OS (NXOS) -- Mellanox ONYX -- Ordnance -- Open vSwitch (OVS) -- Palo Alto Networks PAN-OS -- Radware -- Nokia Networks Service Router Operating System (SROS) -- VyOS -- System -- Interacting with a network device…”
Libro electrónico -
1379Publicado 2024Tabla de Contenidos: “…Timing out HTTP connections -- Using SetDeadline() -- Setting the timeout period on the client side -- Setting the timeout period on the server side -- Summary -- Exercises -- Additional resources -- Chapter 10: Working with TCP/IP and WebSocket -- TCP/IP -- The nc(1) command line utility -- The net package -- Developing a TCP client -- Developing a TCP client with net.Dial() -- Developing a TCP client that uses net.DialTCP() -- Developing a TCP server -- Developing a TCP server with net.Listen() -- Developing a TCP server that uses net.ListenTCP() -- Developing a UDP client -- Developing a UDP server -- Developing concurrent TCP servers -- Creating a WebSocket server -- The implementation of the server -- Using websocat -- Creating a WebSocket client -- Working with RabbitMQ -- Running RabbitMQ -- Writing to RabbitMQ -- Reading from RabbitMQ -- How to remove a module -- Summary -- Exercises -- Additional resources -- Chapter 11: Working with REST APIs -- An introduction to REST -- Developing RESTful servers and clients -- A RESTful server -- A RESTful client -- Creating a functional RESTful server -- The REST API -- Using gorilla/mux -- The use of subrouters -- The Gin HTTP framework -- Gin versus Gorilla -- Working with the database -- Implementing the RESTful server -- Testing the RESTful server -- Testing GET handlers -- Testing POST handlers -- Testing the PUT handler -- Testing the DELETE handler -- Creating a RESTful client -- Creating the structure of the command line client -- Implementing the RESTful client commands -- Using the RESTful client -- Working with multiple REST API versions -- Summary -- Exercises -- Additional resources -- Chapter 12: Code Testing and Profiling -- Optimizing code -- Rewriting the main() function for better testing -- Profiling code -- Profiling a command line application -- Profiling an HTTP server…”
Libro electrónico -
1380Publicado 2018Tabla de Contenidos: “…Controlling the auditd daemon -- Creating audit rules -- Auditing a file for changes -- Auditing a directory -- Auditing system calls -- Using ausearch and aureport -- Searching for file change alerts -- Searching for directory access rule violations -- Searching for system call rule violations -- Generating authentication reports -- Using predefined rules sets -- Applying OpenSCAP policies with oscap -- Installing OpenSCAP -- Viewing the profile files -- Scanning the system -- Remediating the system -- Using SCAP Workbench -- More about OpenSCAP profiles -- Applying an OpenSCAP profile during system installation -- Summary -- Chapter 9: Vulnerability Scanning and Intrusion Detection -- Looking at Snort and Security Onion -- Obtaining and installing Snort -- Graphical interfaces for Snort -- Getting Snort in prebuilt appliances -- Using Security Onion -- Scanning and hardening with Lynis -- Installing Lynis on Red Hat/CentOS -- Installing Lynis on Ubuntu -- Scanning with Lynis -- Finding vulnerabilities with OpenVAS -- Web server scanning with Nikto -- Nikto in Kali Linux -- Installing and updating Nikto on Linux -- Scanning a web server with Nikto -- Summary -- Chapter 10: Security Tips and Tricks for the Busy Bee -- Auditing system services -- Auditing system services with systemctl -- Auditing network services with netstat -- Auditing network services with Nmap -- Port states -- Scan types -- Password-protecting the GRUB 2 bootloader -- Resetting the password for Red Hat/CentOS -- Resetting the password for Ubuntu -- Preventing kernel parameter edits on Red Hat/CentOS -- Preventing kernel parameter edits on Ubuntu -- Password-protecting boot options -- Disabling the submenu for Ubuntu -- Password-protecting boot option steps for both Ubuntu and Red Hat -- Securely configuring BIOS/UEFI -- Using a security checklist for system setup -- Summary…”
Libro electrónico