Mostrando 21 - 40 Resultados de 39,699 Para Buscar 'v.2. nº1.', tiempo de consulta: 0.94s Limitar resultados
  1. 21
    Publicado 1990
    Libro
  2. 22
    Publicado 2024
    Video
  3. 23
    Publicado 2013
    Video
  4. 24
    Publicado 2004
    Tabla de Contenidos: “…Mainframe Web application implementation -- 5.1 Scenario overview -- 5.2 Preparing for the implementation -- 5.2.1 Preparing HFS files -- 5.2.2 Preparing DB2 -- 5.2.3 Graphic package -- 5.2.4 Preparing WebSphere Application Server -- 5.3 Web application implementation -- 5.3.1 Installation procedure overview -- 5.3.2 Verification -- 5.4 Start and stop procedures -- 5.4.1 Start up the Web application -- 5.4.2 Shut down the Web application -- 5.5 Backup and recovery -- 5.5.1 Backup and restore of file systems -- 5.5.2 Backup and restore of DB2 database -- Chapter 6. …”
    Libro electrónico
  5. 25
    Publicado 2020
    “…Explore capture-the-flag exercises that will strengthen your ethical hacking skills About This Video Get to grips with recon, enumeration, gaining access, and post-exploitation Delve into the virtual install of Kali Linux using VirtualBox Learn the concepts of Toppo, Lampiao, DC-1 and SickOS 1.1 In Detail Ethical Hacking - Capture the Flag Walkthroughs v2 picks up where v1 left off using all-new capture-the-flag exercises, step-by-step video tutorials, and more. …”
    Video
  6. 26
  7. 27
    Publicado 2015
    “…This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced into the Operations areas with IBM z/OS® V2R2. This book includes the following chapters: - Chapter 1, “SMFLIMxx parmlib member” on page 1 describes how to set up job cancel decisions and region and MEMLIMIT values, based on the job and its environment. - Chapter 2, “REGIONX” on page 5 describes the new REGIONX JCL keyword that supports two storage specifications and with which the user can specify values for their below-the-line storage and above-the-line storage needs. - Chapter 3, “Two million open data sets” on page 9 describes the ability to have open up to 2,000,000 data sets at a time by address spaces while reducing the allocation time for data sets. - Chapter 4, “Dynamic APF SMF Record” on page 11 describes the new SMF record that is used to track dynamic APF changes. - Chapter 5, “Initial program load device number and volume” on page 13 describes the new message that is used to identify the initial program load (IPL) device and volume. - Chapter 6, “Infoprint enhancements” on page 15 describes the enhancements that were made to Infoprint in z/OS V2R2. - Chapter 7, “GRS EQDQ Monitor” on page 19 describes the monitor capture diagnostics for problem determination while minimizing the effect to system performance. - Chapter 8, “BCPii System Management Facilities recording” on page 23 describes the record changes to hardware. - Chapter 9, “Provisioning based on CPU consumption” on page 25 describes the provisioning that is dynamically based on CPU consumption. - Chapter 10, “System REXX enhancements” on page 31 describes the new functions and interfaces of System Rexx. …”
    Libro electrónico
  8. 28
    Publicado 2015
    “…This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced to the security areas with IBM z/OS® V2R2. The following chapters are included: - Chapter 1, “RACF updates” on page 1: In this chapter, we describe the read-only auditor attribute, password security enhancements, RACDCERT (granular certificate administration), UNIX search authority, and RACF Remote sharing facility (RRSF). - Chapter 2, “LDAP updates” on page 13: In this chapter, we describe the activity log enhancements, compatibility level upgrade without LDAP outage, dynamic group performance enhancements, and replication of password policy attributes from a read-only replica. - Chapter 3, “PKI updates” on page 21: In this chapter, we describe the Network Authentication Service (KERBEROS) PKINIT, PKI nxm authorization, PKI OCSP enhancement, and RACDCERT (granular certificate administration) - Chapter 4, “z/OS UNIX search and file execution authority” on page 27: z/OS UNIX search authority, z/OS UNIX file execution, Examples for exploiting the new functions This book is one of a series of IBM Redbooks that take a modular approach to providing information about the updates that are included with z/OS V2R2. …”
    Libro electrónico
  9. 29
    Publicado 2016
    “…This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced into the Serverpac area with IBM z/OS® V2R2. This publication includes the following chapters: - Chapter 1, “ServerPac” on page 1: Provides a summary of the z/OS V2R2 enhancements. - Chapter 2, “Order receive” on page 5: Describes the use of HTTPS to receive your order. - Chapter 3, “Creating a configuration” on page 9: Describes the affect of the SDSF zone change. - Chapter 4, “Variable Panel updates” on page 13: Describes setting up z/OSMF and the SMF option. - Chapter 5, “Modify System Layout option” on page 17: Describes large file system default allocation, enhanced support for file system merge, enhanced support for SMS managed data sets, and new data set view options. - Chapter 6, “Installation job changes” on page 29: Describes changes that were made to the create and submit installation jobs functions, which includes z/OSMF configuration, PFA configuration, KC4z configuration, and SMF logstream setup. …”
    Libro electrónico
  10. 30
    Publicado 2015
    “…This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced into the JES2 JES3, and SDSF areas with IBM z/OS® V2R2. This book includes the following chapters: - Chapter 1, “JES2” on page 1: This chapter describes the JES2 updates that are related to z/OS V2R2. - Chapter 2, “JES3” on page 29: This chapter describes the enhancements that are provided in JES3 by z/OS V2R. - Chapter 3, “System Display and Search Facility” on page 39: This chapter describes the changes in SDSF in z/OS V2R2. …”
    Libro electrónico
  11. 31
  12. 32
    por Geary, David M. 1957-
    Publicado 2015
    Libro electrónico
  13. 33
    Publicado 2014
    Libro electrónico
  14. 34
    Publicado 2014
    “…This IBM Redbooks® publication provides a summary of the functions and enhancements integrated into z/OS V2.1 DFSMS. It provides you with the information that you need to understand and evaluate the content of this DFSMS release, along with practical implementation hints and tips. …”
    Libro electrónico
  15. 35
    Publicado 2023
    Libro electrónico
  16. 36
    por Tuttle, Steven
    Publicado 2003
    Tabla de Contenidos: “…4.4 Common problems and solutions -- 4.4.1 Enabling PAM debug -- Chapter 5. Restricting users -- 5.1 Restricted shells -- 5.1.1 Recommended reading -- 5.1.2 Configuring the system and creating a restricted shell user -- 5.2 User limits for a system resource -- 5.2.1 Architecture -- 5.2.2 Security -- 5.2.3 Resources -- 5.2.4 Administration -- 5.3 User login controls -- 5.3.1 Setting up login controls -- 5.3.2 Changing the welcome message on the login display -- 5.3.3 Changing the login display for the CDE -- 5.3.4 Securing unattended terminals -- 5.3.5 Enforcing automatic logoff -- 5.4 Preventing denial-of-service attacks -- Appendix A. …”
    Libro electrónico
  17. 37
    por Lee, Dick
    Publicado 2000
    Libro
  18. 38
    Publicado 2021
    Libro electrónico
  19. 39
    Publicado 1905
    Libro electrónico
  20. 40
    Publicado 2023
    Libro electrónico