top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Administrating Solr / / Surendra Mohan
Administrating Solr / / Surendra Mohan
Autore Mohan Surendra
Edizione [1st ed.]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2013
Descrizione fisica 1 online resource (120 p.)
Disciplina 004.56
Soggetto topico Search engines - Programming
Web search engines
ISBN 1-78328-326-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Administrating Solr -- Table of Contents -- Administrating Solr -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe? -- Free Access for Packt account holders -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Downloading the example code -- Errata -- Piracy -- Questions -- 1. Searching Data -- Installation -- Request/response handling -- Querying -- Querying based on a particular field value -- Searching for a phrase -- Boosting phrases over words -- Prioritizing your document in search results -- Query nesting -- Faceted search -- Search based on the same value range -- Filter your facet results -- Autosuggest feature using faceting -- Geospatial search -- Storing geographical points in the index -- Sort results by a distance from a point -- Distributed search -- Summary -- 2. Monitoring Solr -- Monitoring metrics -- Stats.jsp -- JMX MBeans -- Solr with JMX -- Using password-based authentication -- Singler-user environment -- Multiuser environment -- Agent-less health checks -- Ping status -- Agent-based health checks -- Monitoring tools -- Opsview -- Solr-specific plugin -- Service check set up -- Host configuration -- Viewing output -- New Relic for PHP -- Features -- System requirement -- SPM -- What are SPM monitors? -- Features -- Summary -- 3. Managing Solr -- Basic Solr scripts -- User scripts.conf -- Init script -- Backup your Solr -- Using the Solr replication handler -- Backup scripts from earlier Solr releases -- Configuring logging -- Temporary logging settings -- Permanent logging settings -- Tomcat logging settings -- Jetty logging settings -- Collection distribution scripts -- Scripts configuration -- Rsyncd set up -- Summary.
4. Optimizing Solr Tools and Scripts -- Business rules -- Drools -- Drools language features -- Drools rule format -- Drools rule language (DRL) -- Domain-specific language -- Guided rule editor -- Other Drools features -- XML rule language -- Why rules? -- The rule engine workflow -- Benefits of using rules -- Language Detection -- Configuring language detection -- Tika language detection -- LangDetect language detection -- OpenNLP (Natural Language Processing) -- Sentence detection and splitting -- Tokenization -- Part-Of-Speech tagging -- Named entity recognition -- Case study - Apache Solr with Drupal 7 -- Autocomplete -- Faceted search -- Facet slider -- Boosting search relevancy -- Prioritizing search results -- Customizing the search result display -- Summary -- A. Solr Resources -- Index.
Record Nr. UNINA-9910810814803321
Mohan Surendra  
Birmingham : , : Packt Publishing, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CD-ROM applications and markets = edited by Judith Paris Roth
CD-ROM applications and markets = edited by Judith Paris Roth
Pubbl/distr/stampa Westport : Meckler, c1988
Descrizione fisica XIV, 147 p. : ill. ; 23 cm
Disciplina 004.56
Collana Supplements to optical infromation systems
Soggetto topico CD-ROM
ISBN 0-88736-332-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-990000480950203316
Westport : Meckler, c1988
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
The CD-ROM book / Steve Bosak, Jeffrey Sloman
The CD-ROM book / Steve Bosak, Jeffrey Sloman
Autore Bosak, Steve
Edizione [2nd ed. /]
Pubbl/distr/stampa Indianapolis, Ind. : Que, c1994
Descrizione fisica XVIII, 347 p. : ill. ; 23 cm.
Disciplina 004.56
Altri autori (Persone) Sloman, Jeffreyauthor
Gibbons, Dave
Soggetto topico Elaboratori elettronici - Interfacciamento - CD-ROM
ISBN 1565299574
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISALENTO-991000938899707536
Bosak, Steve  
Indianapolis, Ind. : Que, c1994
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
CD-ROMs in print, 1988-1989 : an international guide / compiled by Jean-Paul Emard
CD-ROMs in print, 1988-1989 : an international guide / compiled by Jean-Paul Emard
Pubbl/distr/stampa Westport : Meckler, c1988
Descrizione fisica X, 164 p. ; 28 cm
Disciplina 004.56
Soggetto topico CD-ROM - Cataloghi
ISBN 0-88736-274-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-990000481010203316
Westport : Meckler, c1988
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cybersecurity : managing systems, conducting testing, and investigating intrusions / / Thomas J. Mowbray
Cybersecurity : managing systems, conducting testing, and investigating intrusions / / Thomas J. Mowbray
Autore Mowbray Thomas J
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , [2014]
Descrizione fisica 1 online resource (362 p.)
Disciplina 004.56
Soggetto topico Computer networks - Security measures
Internet - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-118-84965-5
1-118-69704-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; About the Author; Acknowledgments; Contents; Introduction; Part I: Cyber Network; Chapter 1: Executive Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware Detection versus Polymorphic Threats; Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection; Antipattern: Document-Driven Certification and Accreditation; Antipattern: Proliferating IA Standards with No Proven Benefits; Antipattern: Policy-Driven Security Certifications Do Not Address the Threat; Refactored Solution: Security Training Roadmap; Summary
AssignmentsChapter 2: The Problems: Cyber Antipatterns; Antipatterns Concept; Forces in Cyber Antipatterns; Cyber Antipattern Templates; Cybersecurity Antipattern Catalog; Summary; Assignments; Chapter 3: Enterprise Security Using the Zachman Framework; What Is Architecture? Why Do We Need It?; Enterprises Are Complex and Changing; The Zachman Framework for Enterprise Architecture; Primitive Models versus Composite Models; How Does the Zachman Framework Help with Cybersecurity?; Everyone Has Their Own Specifications; The Goldmine Is in Row 2; Frameworks for Row 3
Architectural Problem Solving PatternsSummary; Assignments; Part II: Cyber Network Security Hands-On; Chapter 4: Network Administration for Security Professionals; Managing Administrator and Root Accounts; Installing Hardware; Re-Imaging Operating Systems; Burning and Copying CDs and DVDs; Installing System Protection / Anti-Malware; Setting Up Networks; Installing Applications and Archiving; Customizing System Management Controls and Settings; Managing Remote Login; Managing User Administration; Managing Services; Mounting Disks; Moving Data Between Systems on Networks
Converting Text Files Between OSesMaking Backup Disks; Formatting Disks; Configuring Firewalls; Converting and Migrating VMs; Additional Network Administration Knowledge; Summary; Assignments; Chapter 5: Customizing BackTrack; Creating and Running BackTrack Images; Customizing BackTrack with VM; Updating and Upgrading BackTrack and Pen Test Tools; Adding Windows to BackTrack with VMware; Licensing Challenges for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking Theory and Practice; Frequently Encountered Network Protocols; Network Programming: Bash
Network Programming: Windows Command-Line Interface (CLI)Python Programming: Accelerated Network Scanning; Summary; Assignments; Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing; Types of Cybersecurity Evaluations; Understanding the Cybersecurity Testing Methodology; Summary; Assignments; Chapter 8: Penetration Testing; Forms of Cyber Attacks; Network Penetration; Commercial Pen Testing Tools; Using Netcat to Create Connections and Move Data and Binaries; Using Netcat to Create Relays and Pivots
Using SQL Injection and Cross-Site Techniques to Perform Web Application and Database Attacks
Record Nr. UNINA-9910453344503321
Mowbray Thomas J  
Hoboken, New Jersey : , : Wiley, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity : managing systems, conducting testing, and investigating intrusions / / Thomas J. Mowbray
Cybersecurity : managing systems, conducting testing, and investigating intrusions / / Thomas J. Mowbray
Autore Mowbray Thomas J
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , [2014]
Descrizione fisica 1 online resource (362 p.)
Disciplina 004.56
Soggetto topico Computer networks - Security measures
Internet - Security measures
ISBN 1-118-84965-5
1-118-69704-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; About the Author; Acknowledgments; Contents; Introduction; Part I: Cyber Network; Chapter 1: Executive Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware Detection versus Polymorphic Threats; Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection; Antipattern: Document-Driven Certification and Accreditation; Antipattern: Proliferating IA Standards with No Proven Benefits; Antipattern: Policy-Driven Security Certifications Do Not Address the Threat; Refactored Solution: Security Training Roadmap; Summary
AssignmentsChapter 2: The Problems: Cyber Antipatterns; Antipatterns Concept; Forces in Cyber Antipatterns; Cyber Antipattern Templates; Cybersecurity Antipattern Catalog; Summary; Assignments; Chapter 3: Enterprise Security Using the Zachman Framework; What Is Architecture? Why Do We Need It?; Enterprises Are Complex and Changing; The Zachman Framework for Enterprise Architecture; Primitive Models versus Composite Models; How Does the Zachman Framework Help with Cybersecurity?; Everyone Has Their Own Specifications; The Goldmine Is in Row 2; Frameworks for Row 3
Architectural Problem Solving PatternsSummary; Assignments; Part II: Cyber Network Security Hands-On; Chapter 4: Network Administration for Security Professionals; Managing Administrator and Root Accounts; Installing Hardware; Re-Imaging Operating Systems; Burning and Copying CDs and DVDs; Installing System Protection / Anti-Malware; Setting Up Networks; Installing Applications and Archiving; Customizing System Management Controls and Settings; Managing Remote Login; Managing User Administration; Managing Services; Mounting Disks; Moving Data Between Systems on Networks
Converting Text Files Between OSesMaking Backup Disks; Formatting Disks; Configuring Firewalls; Converting and Migrating VMs; Additional Network Administration Knowledge; Summary; Assignments; Chapter 5: Customizing BackTrack; Creating and Running BackTrack Images; Customizing BackTrack with VM; Updating and Upgrading BackTrack and Pen Test Tools; Adding Windows to BackTrack with VMware; Licensing Challenges for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking Theory and Practice; Frequently Encountered Network Protocols; Network Programming: Bash
Network Programming: Windows Command-Line Interface (CLI)Python Programming: Accelerated Network Scanning; Summary; Assignments; Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing; Types of Cybersecurity Evaluations; Understanding the Cybersecurity Testing Methodology; Summary; Assignments; Chapter 8: Penetration Testing; Forms of Cyber Attacks; Network Penetration; Commercial Pen Testing Tools; Using Netcat to Create Connections and Move Data and Binaries; Using Netcat to Create Relays and Pivots
Using SQL Injection and Cross-Site Techniques to Perform Web Application and Database Attacks
Record Nr. UNINA-9910790622803321
Mowbray Thomas J  
Hoboken, New Jersey : , : Wiley, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity : managing systems, conducting testing, and investigating intrusions / / Thomas J. Mowbray
Cybersecurity : managing systems, conducting testing, and investigating intrusions / / Thomas J. Mowbray
Autore Mowbray Thomas J
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , [2014]
Descrizione fisica 1 online resource (362 p.)
Disciplina 004.56
Soggetto topico Computer networks - Security measures
Internet - Security measures
ISBN 1-118-84965-5
1-118-69704-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; About the Author; Acknowledgments; Contents; Introduction; Part I: Cyber Network; Chapter 1: Executive Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware Detection versus Polymorphic Threats; Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection; Antipattern: Document-Driven Certification and Accreditation; Antipattern: Proliferating IA Standards with No Proven Benefits; Antipattern: Policy-Driven Security Certifications Do Not Address the Threat; Refactored Solution: Security Training Roadmap; Summary
AssignmentsChapter 2: The Problems: Cyber Antipatterns; Antipatterns Concept; Forces in Cyber Antipatterns; Cyber Antipattern Templates; Cybersecurity Antipattern Catalog; Summary; Assignments; Chapter 3: Enterprise Security Using the Zachman Framework; What Is Architecture? Why Do We Need It?; Enterprises Are Complex and Changing; The Zachman Framework for Enterprise Architecture; Primitive Models versus Composite Models; How Does the Zachman Framework Help with Cybersecurity?; Everyone Has Their Own Specifications; The Goldmine Is in Row 2; Frameworks for Row 3
Architectural Problem Solving PatternsSummary; Assignments; Part II: Cyber Network Security Hands-On; Chapter 4: Network Administration for Security Professionals; Managing Administrator and Root Accounts; Installing Hardware; Re-Imaging Operating Systems; Burning and Copying CDs and DVDs; Installing System Protection / Anti-Malware; Setting Up Networks; Installing Applications and Archiving; Customizing System Management Controls and Settings; Managing Remote Login; Managing User Administration; Managing Services; Mounting Disks; Moving Data Between Systems on Networks
Converting Text Files Between OSesMaking Backup Disks; Formatting Disks; Configuring Firewalls; Converting and Migrating VMs; Additional Network Administration Knowledge; Summary; Assignments; Chapter 5: Customizing BackTrack; Creating and Running BackTrack Images; Customizing BackTrack with VM; Updating and Upgrading BackTrack and Pen Test Tools; Adding Windows to BackTrack with VMware; Licensing Challenges for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking Theory and Practice; Frequently Encountered Network Protocols; Network Programming: Bash
Network Programming: Windows Command-Line Interface (CLI)Python Programming: Accelerated Network Scanning; Summary; Assignments; Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing; Types of Cybersecurity Evaluations; Understanding the Cybersecurity Testing Methodology; Summary; Assignments; Chapter 8: Penetration Testing; Forms of Cyber Attacks; Network Penetration; Commercial Pen Testing Tools; Using Netcat to Create Connections and Move Data and Binaries; Using Netcat to Create Relays and Pivots
Using SQL Injection and Cross-Site Techniques to Perform Web Application and Database Attacks
Record Nr. UNINA-9910810319203321
Mowbray Thomas J  
Hoboken, New Jersey : , : Wiley, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Diventare multimediali : come utilizzare i Cd-Rom e i nuovi supporti elettronici nella comunicazione d'impresa, nell'editoria, nella didattica e nella formazione / a cura di Roberto Liscia
Diventare multimediali : come utilizzare i Cd-Rom e i nuovi supporti elettronici nella comunicazione d'impresa, nell'editoria, nella didattica e nella formazione / a cura di Roberto Liscia
Edizione [1. ed]
Descrizione fisica XLII, 271 p. : ill. ; 22 cm.
Disciplina 004.56
ISBN 88-7187-731-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNICAMPANIA-SUN0008407
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui
Diventare multimediali : come utilizzare i Cd-Rom e i nuovi supporti elettronici nella comunicazione d'impresa, nell'editoria, nella didattica e nella formazione / a cura di Roberto Liscia
Diventare multimediali : come utilizzare i Cd-Rom e i nuovi supporti elettronici nella comunicazione d'impresa, nell'editoria, nella didattica e nella formazione / a cura di Roberto Liscia
Edizione [1. ed]
Descrizione fisica XLII, 271 p. : ill. ; 22 cm.
Disciplina 004.56
ISBN 88-7187-731-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNICAMPANIA-VAN0008407
Materiale a stampa
Lo trovi qui: Univ. Vanvitelli
Opac: Controlla la disponibilità qui
E-paper displays / / edited by Bo Ru Yang
E-paper displays / / edited by Bo Ru Yang
Edizione [First edition.]
Pubbl/distr/stampa Hoboken, NJ : , : John Wiley & Sons, Inc., , 2022
Descrizione fisica 1 online resource (318 pages)
Disciplina 004.56
Collana Wiley SID Series in Display Technology
Soggetto topico Electronic paper
ISBN 1-119-74562-4
1-119-74559-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910830805503321
Hoboken, NJ : , : John Wiley & Sons, Inc., , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui