Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sams Teach Yourself Shell Programming in 24 Hours
Sams Teach Yourself Shell Programming in 24 Hours
The vast majority of users utilize the Korn Shell or some variant of the Bourne Shell, such as bash. Sams Teach Yourself Shell Programming in 24 Hours covers these shells. It begins with a generalized tutorial of Unix and tools and then moves into detailed coverage of shell programming. Sams Teach Yourself Shell Programming in 24...
Samba Installation, Configuration, and Sizing Guide
Samba Installation, Configuration, and Sizing Guide
Samba is the very popular freeware that turns your AIX machine into a resources server for your PC clients. This book explains how to install and set up a Samba server, how to declare file and printer shares, and how to choose the best security model that fits your needs.

But it won’t cover all the features of Samba in detail. Many
...
System Performance Tuning, 2nd Edition (System Administration)
System Performance Tuning, 2nd Edition (System Administration)
System Performance Tuning answers one of the most fundamental questions you can ask about your computer: How can I get it to do more work without buying more hardware? In the current economic downturn, performance tuning takes on a new importance. It allows system administrators to make the best use of existing systems and minimize the purchase of...
IBM WebSphere Application Server V5.0 System Management and Configuration: WebSphere Handbook Series
IBM WebSphere Application Server V5.0 System Management and Configuration: WebSphere Handbook Series
This IBM Redbook provides the knowledge needed to implement WebSphere Application Server V5.0, Network Deployment runtime environment, to package and deploy Web applications, and to perform ongoing management of the WebSphere environment.

It is one in a series of handbooks, designed to give you in-depth information on the entire range of...

Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
Aix and Linux Interoperabilty
Aix and Linux Interoperabilty
This IBMR Redbook discusses interoperability in terms of UNIX to UNIX cross platform data sharing and user/system management. This redbook also demonstrates the similarities and differences between the AIXR and Linux operating systems.

This redbook is intended to help IT specialists who have AIX systems and Linux systems in their
...
Customizing and Upgrading Linux
Customizing and Upgrading Linux
A fast-paced guide to customizing and performing upgrades to Linux on a network

In order to fulfill Linux’s promise of delivering speed, efficiency, and reliability to a network, you must be able to properly customize and perform upgrades on this operating system. Updated to reflect all the recent changes to the core Linux kernel up...

UNIX: The Complete Reference, Second Edition
UNIX: The Complete Reference, Second Edition

Get cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second...

Mastering Unix Shell Scripting: Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus
Mastering Unix Shell Scripting: Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus

In UNIX there are many ways to accomplish the same task. Given a problem to solve, we may be able to get to a solution in any number of ways. Of course, some techniques will be more efficient, use fewer system resources, and may or may not give the user feedback on what is going on or give more accurate details and more precision to the...

Red Hat Linux Administration: A Beginner's Guide
Red Hat Linux Administration: A Beginner's Guide

Essential Skills--Made Easy!

Authors Michael Turner and Steve Shah deliver sound instruction and valuable information in this structured learning tool. Valuable to systems and network administrators migrating from Windows to Linux, it is also perfect for novice users. Coverage includes all areas of administering the open-source operating...

France For Dummies
France For Dummies

The French have mastered the art of living well. With this guide, you’ll master the art of vacationing well—seeing what you want to see, doing what you want to do, and enjoying every mile and every minute. In France, there are so many sights to see and so much fabulous food and wine to savor that you may have to pick and choose....

Unix Unleashed
Unix Unleashed
Unix Unleashed, Third Edition is written with the power user and system administrator in mind. This book will help the reader understand the nuances of the major Unix variants including SVR4, HP-UX, Solaris, AIX, BSD, IRIX, SunOS, and Linux. It will help the reader decide which Unix shell works best for their particular situation. Other topics such...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy