Administrating Solr / / Surendra Mohan |
Autore | Mohan Surendra |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
Descrizione fisica | 1 online resource (120 p.) |
Disciplina | 004.56 |
Soggetto topico |
Search engines - Programming
Web search engines |
ISBN | 1-78328-326-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Administrating Solr -- Table of Contents -- Administrating Solr -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe? -- Free Access for Packt account holders -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Downloading the example code -- Errata -- Piracy -- Questions -- 1. Searching Data -- Installation -- Request/response handling -- Querying -- Querying based on a particular field value -- Searching for a phrase -- Boosting phrases over words -- Prioritizing your document in search results -- Query nesting -- Faceted search -- Search based on the same value range -- Filter your facet results -- Autosuggest feature using faceting -- Geospatial search -- Storing geographical points in the index -- Sort results by a distance from a point -- Distributed search -- Summary -- 2. Monitoring Solr -- Monitoring metrics -- Stats.jsp -- JMX MBeans -- Solr with JMX -- Using password-based authentication -- Singler-user environment -- Multiuser environment -- Agent-less health checks -- Ping status -- Agent-based health checks -- Monitoring tools -- Opsview -- Solr-specific plugin -- Service check set up -- Host configuration -- Viewing output -- New Relic for PHP -- Features -- System requirement -- SPM -- What are SPM monitors? -- Features -- Summary -- 3. Managing Solr -- Basic Solr scripts -- User scripts.conf -- Init script -- Backup your Solr -- Using the Solr replication handler -- Backup scripts from earlier Solr releases -- Configuring logging -- Temporary logging settings -- Permanent logging settings -- Tomcat logging settings -- Jetty logging settings -- Collection distribution scripts -- Scripts configuration -- Rsyncd set up -- Summary.
4. Optimizing Solr Tools and Scripts -- Business rules -- Drools -- Drools language features -- Drools rule format -- Drools rule language (DRL) -- Domain-specific language -- Guided rule editor -- Other Drools features -- XML rule language -- Why rules? -- The rule engine workflow -- Benefits of using rules -- Language Detection -- Configuring language detection -- Tika language detection -- LangDetect language detection -- OpenNLP (Natural Language Processing) -- Sentence detection and splitting -- Tokenization -- Part-Of-Speech tagging -- Named entity recognition -- Case study - Apache Solr with Drupal 7 -- Autocomplete -- Faceted search -- Facet slider -- Boosting search relevancy -- Prioritizing search results -- Customizing the search result display -- Summary -- A. Solr Resources -- Index. |
Record Nr. | UNINA-9910810814803321 |
Mohan Surendra | ||
Birmingham : , : Packt Publishing, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CD-ROM applications and markets = edited by Judith Paris Roth |
Pubbl/distr/stampa | Westport : Meckler, c1988 |
Descrizione fisica | XIV, 147 p. : ill. ; 23 cm |
Disciplina | 004.56 |
Collana | Supplements to optical infromation systems |
Soggetto topico | CD-ROM |
ISBN | 0-88736-332-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990000480950203316 |
Westport : Meckler, c1988 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
The CD-ROM book / Steve Bosak, Jeffrey Sloman |
Autore | Bosak, Steve |
Edizione | [2nd ed. /] |
Pubbl/distr/stampa | Indianapolis, Ind. : Que, c1994 |
Descrizione fisica | XVIII, 347 p. : ill. ; 23 cm. |
Disciplina | 004.56 |
Altri autori (Persone) |
Sloman, Jeffreyauthor
Gibbons, Dave |
Soggetto topico | Elaboratori elettronici - Interfacciamento - CD-ROM |
ISBN | 1565299574 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISALENTO-991000938899707536 |
Bosak, Steve | ||
Indianapolis, Ind. : Que, c1994 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. del Salento | ||
|
CD-ROMs in print, 1988-1989 : an international guide / compiled by Jean-Paul Emard |
Pubbl/distr/stampa | Westport : Meckler, c1988 |
Descrizione fisica | X, 164 p. ; 28 cm |
Disciplina | 004.56 |
Soggetto topico | CD-ROM - Cataloghi |
ISBN | 0-88736-274-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-990000481010203316 |
Westport : Meckler, c1988 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cybersecurity : managing systems, conducting testing, and investigating intrusions / / Thomas J. Mowbray |
Autore | Mowbray Thomas J |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , [2014] |
Descrizione fisica | 1 online resource (362 p.) |
Disciplina | 004.56 |
Soggetto topico |
Computer networks - Security measures
Internet - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-118-84965-5
1-118-69704-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; About the Author; Acknowledgments; Contents; Introduction; Part I: Cyber Network; Chapter 1: Executive Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware Detection versus Polymorphic Threats; Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection; Antipattern: Document-Driven Certification and Accreditation; Antipattern: Proliferating IA Standards with No Proven Benefits; Antipattern: Policy-Driven Security Certifications Do Not Address the Threat; Refactored Solution: Security Training Roadmap; Summary
AssignmentsChapter 2: The Problems: Cyber Antipatterns; Antipatterns Concept; Forces in Cyber Antipatterns; Cyber Antipattern Templates; Cybersecurity Antipattern Catalog; Summary; Assignments; Chapter 3: Enterprise Security Using the Zachman Framework; What Is Architecture? Why Do We Need It?; Enterprises Are Complex and Changing; The Zachman Framework for Enterprise Architecture; Primitive Models versus Composite Models; How Does the Zachman Framework Help with Cybersecurity?; Everyone Has Their Own Specifications; The Goldmine Is in Row 2; Frameworks for Row 3 Architectural Problem Solving PatternsSummary; Assignments; Part II: Cyber Network Security Hands-On; Chapter 4: Network Administration for Security Professionals; Managing Administrator and Root Accounts; Installing Hardware; Re-Imaging Operating Systems; Burning and Copying CDs and DVDs; Installing System Protection / Anti-Malware; Setting Up Networks; Installing Applications and Archiving; Customizing System Management Controls and Settings; Managing Remote Login; Managing User Administration; Managing Services; Mounting Disks; Moving Data Between Systems on Networks Converting Text Files Between OSesMaking Backup Disks; Formatting Disks; Configuring Firewalls; Converting and Migrating VMs; Additional Network Administration Knowledge; Summary; Assignments; Chapter 5: Customizing BackTrack; Creating and Running BackTrack Images; Customizing BackTrack with VM; Updating and Upgrading BackTrack and Pen Test Tools; Adding Windows to BackTrack with VMware; Licensing Challenges for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking Theory and Practice; Frequently Encountered Network Protocols; Network Programming: Bash Network Programming: Windows Command-Line Interface (CLI)Python Programming: Accelerated Network Scanning; Summary; Assignments; Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing; Types of Cybersecurity Evaluations; Understanding the Cybersecurity Testing Methodology; Summary; Assignments; Chapter 8: Penetration Testing; Forms of Cyber Attacks; Network Penetration; Commercial Pen Testing Tools; Using Netcat to Create Connections and Move Data and Binaries; Using Netcat to Create Relays and Pivots Using SQL Injection and Cross-Site Techniques to Perform Web Application and Database Attacks |
Record Nr. | UNINA-9910453344503321 |
Mowbray Thomas J | ||
Hoboken, New Jersey : , : Wiley, , [2014] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity : managing systems, conducting testing, and investigating intrusions / / Thomas J. Mowbray |
Autore | Mowbray Thomas J |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , [2014] |
Descrizione fisica | 1 online resource (362 p.) |
Disciplina | 004.56 |
Soggetto topico |
Computer networks - Security measures
Internet - Security measures |
ISBN |
1-118-84965-5
1-118-69704-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; About the Author; Acknowledgments; Contents; Introduction; Part I: Cyber Network; Chapter 1: Executive Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware Detection versus Polymorphic Threats; Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection; Antipattern: Document-Driven Certification and Accreditation; Antipattern: Proliferating IA Standards with No Proven Benefits; Antipattern: Policy-Driven Security Certifications Do Not Address the Threat; Refactored Solution: Security Training Roadmap; Summary
AssignmentsChapter 2: The Problems: Cyber Antipatterns; Antipatterns Concept; Forces in Cyber Antipatterns; Cyber Antipattern Templates; Cybersecurity Antipattern Catalog; Summary; Assignments; Chapter 3: Enterprise Security Using the Zachman Framework; What Is Architecture? Why Do We Need It?; Enterprises Are Complex and Changing; The Zachman Framework for Enterprise Architecture; Primitive Models versus Composite Models; How Does the Zachman Framework Help with Cybersecurity?; Everyone Has Their Own Specifications; The Goldmine Is in Row 2; Frameworks for Row 3 Architectural Problem Solving PatternsSummary; Assignments; Part II: Cyber Network Security Hands-On; Chapter 4: Network Administration for Security Professionals; Managing Administrator and Root Accounts; Installing Hardware; Re-Imaging Operating Systems; Burning and Copying CDs and DVDs; Installing System Protection / Anti-Malware; Setting Up Networks; Installing Applications and Archiving; Customizing System Management Controls and Settings; Managing Remote Login; Managing User Administration; Managing Services; Mounting Disks; Moving Data Between Systems on Networks Converting Text Files Between OSesMaking Backup Disks; Formatting Disks; Configuring Firewalls; Converting and Migrating VMs; Additional Network Administration Knowledge; Summary; Assignments; Chapter 5: Customizing BackTrack; Creating and Running BackTrack Images; Customizing BackTrack with VM; Updating and Upgrading BackTrack and Pen Test Tools; Adding Windows to BackTrack with VMware; Licensing Challenges for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking Theory and Practice; Frequently Encountered Network Protocols; Network Programming: Bash Network Programming: Windows Command-Line Interface (CLI)Python Programming: Accelerated Network Scanning; Summary; Assignments; Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing; Types of Cybersecurity Evaluations; Understanding the Cybersecurity Testing Methodology; Summary; Assignments; Chapter 8: Penetration Testing; Forms of Cyber Attacks; Network Penetration; Commercial Pen Testing Tools; Using Netcat to Create Connections and Move Data and Binaries; Using Netcat to Create Relays and Pivots Using SQL Injection and Cross-Site Techniques to Perform Web Application and Database Attacks |
Record Nr. | UNINA-9910790622803321 |
Mowbray Thomas J | ||
Hoboken, New Jersey : , : Wiley, , [2014] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity : managing systems, conducting testing, and investigating intrusions / / Thomas J. Mowbray |
Autore | Mowbray Thomas J |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , [2014] |
Descrizione fisica | 1 online resource (362 p.) |
Disciplina | 004.56 |
Soggetto topico |
Computer networks - Security measures
Internet - Security measures |
ISBN |
1-118-84965-5
1-118-69704-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; About the Author; Acknowledgments; Contents; Introduction; Part I: Cyber Network; Chapter 1: Executive Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware Detection versus Polymorphic Threats; Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection; Antipattern: Document-Driven Certification and Accreditation; Antipattern: Proliferating IA Standards with No Proven Benefits; Antipattern: Policy-Driven Security Certifications Do Not Address the Threat; Refactored Solution: Security Training Roadmap; Summary
AssignmentsChapter 2: The Problems: Cyber Antipatterns; Antipatterns Concept; Forces in Cyber Antipatterns; Cyber Antipattern Templates; Cybersecurity Antipattern Catalog; Summary; Assignments; Chapter 3: Enterprise Security Using the Zachman Framework; What Is Architecture? Why Do We Need It?; Enterprises Are Complex and Changing; The Zachman Framework for Enterprise Architecture; Primitive Models versus Composite Models; How Does the Zachman Framework Help with Cybersecurity?; Everyone Has Their Own Specifications; The Goldmine Is in Row 2; Frameworks for Row 3 Architectural Problem Solving PatternsSummary; Assignments; Part II: Cyber Network Security Hands-On; Chapter 4: Network Administration for Security Professionals; Managing Administrator and Root Accounts; Installing Hardware; Re-Imaging Operating Systems; Burning and Copying CDs and DVDs; Installing System Protection / Anti-Malware; Setting Up Networks; Installing Applications and Archiving; Customizing System Management Controls and Settings; Managing Remote Login; Managing User Administration; Managing Services; Mounting Disks; Moving Data Between Systems on Networks Converting Text Files Between OSesMaking Backup Disks; Formatting Disks; Configuring Firewalls; Converting and Migrating VMs; Additional Network Administration Knowledge; Summary; Assignments; Chapter 5: Customizing BackTrack; Creating and Running BackTrack Images; Customizing BackTrack with VM; Updating and Upgrading BackTrack and Pen Test Tools; Adding Windows to BackTrack with VMware; Licensing Challenges for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking Theory and Practice; Frequently Encountered Network Protocols; Network Programming: Bash Network Programming: Windows Command-Line Interface (CLI)Python Programming: Accelerated Network Scanning; Summary; Assignments; Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing; Types of Cybersecurity Evaluations; Understanding the Cybersecurity Testing Methodology; Summary; Assignments; Chapter 8: Penetration Testing; Forms of Cyber Attacks; Network Penetration; Commercial Pen Testing Tools; Using Netcat to Create Connections and Move Data and Binaries; Using Netcat to Create Relays and Pivots Using SQL Injection and Cross-Site Techniques to Perform Web Application and Database Attacks |
Record Nr. | UNINA-9910810319203321 |
Mowbray Thomas J | ||
Hoboken, New Jersey : , : Wiley, , [2014] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Diventare multimediali : come utilizzare i Cd-Rom e i nuovi supporti elettronici nella comunicazione d'impresa, nell'editoria, nella didattica e nella formazione / a cura di Roberto Liscia |
Edizione | [1. ed] |
Descrizione fisica | XLII, 271 p. : ill. ; 22 cm. |
Disciplina | 004.56 |
ISBN | 88-7187-731-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNICAMPANIA-SUN0008407 |
Materiale a stampa | ||
Lo trovi qui: Univ. Vanvitelli | ||
|
Diventare multimediali : come utilizzare i Cd-Rom e i nuovi supporti elettronici nella comunicazione d'impresa, nell'editoria, nella didattica e nella formazione / a cura di Roberto Liscia |
Edizione | [1. ed] |
Descrizione fisica | XLII, 271 p. : ill. ; 22 cm. |
Disciplina | 004.56 |
ISBN | 88-7187-731-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNICAMPANIA-VAN0008407 |
Materiale a stampa | ||
Lo trovi qui: Univ. Vanvitelli | ||
|
Diventare multimediali : come utilizzare i Cd-Rom e i nuovi supporti elettronici nella comunicazione d'impresa, nell'editoria, nella didattica e nella formazione / a cura di Roberto Liscia |
Edizione | [1. ed] |
Pubbl/distr/stampa | Milano, : Il sole 24 ore, 1996 |
Descrizione fisica | XLII, 271 p. : ill. ; 22 cm. |
Disciplina | 004.56 |
ISBN | 88-7187-731-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNICAMPANIA-VAN00008407 |
Milano, : Il sole 24 ore, 1996 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Vanvitelli | ||
|