Home | Amazing | Today | Tags | Publishers | Years | Search 
The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series)
The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series)

An Under-the-Hood Guide to the Power of Xen Hypervisor Internals


The Definitive Guide to the Xen Hypervisor is a comprehensive...

Java Security (2nd Edition)
Java Security (2nd Edition)
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is...
Unix Unleashed
Unix Unleashed
Unix Unleashed, Third Edition is written with the power user and system administrator in mind. This book will help the reader understand the nuances of the major Unix variants including SVR4, HP-UX, Solaris, AIX, BSD, IRIX, SunOS, and Linux. It will help the reader decide which Unix shell works best for their particular situation. Other topics such...
Linux Performance Tuning and Capacity Planning (Kaleidoscope)
Linux Performance Tuning and Capacity Planning (Kaleidoscope)

Covering topics from analysis tools to kernel tuning, to capacity management, this book offers a single point of reference for what you need to know. Anyone who has ever had to speed existing operations or project usage patterns for future loads, knows that tracking down the relevant information can be a difficult task. That's why this book has...

Remote Sensing Image Analysis: Including the Spatial Domain (Remote Sensing and Digital Image Processing)
Remote Sensing Image Analysis: Including the Spatial Domain (Remote Sensing and Digital Image Processing)
Remote Sensing image analysis is mostly done using only spectral information on a pixel by pixel basis. Information captured in neighbouring cells, or information about patterns surrounding the pixel of interest often provides useful supplementary information. This book presents a wide range of innovative and advanced image processing methods for...
Mastering Red Hat Linux 7
Mastering Red Hat Linux 7
Join the Red Hat Revolution!
Newly revised and updated, Mastering Red Hat Linux is the essential guide to the world's leading Linux distribution. Inside, you'll find everything you need to know to install, configure, use, and optimize Red Hat Linux. You'll even find the operating system itself-the Publisher's Edition of Red Hat Linux 7.1,
...
Beginning Ubuntu Server Administration: From Novice to Professional (Expert's Voice)
Beginning Ubuntu Server Administration: From Novice to Professional (Expert's Voice)
You love it as the world’s most popular desktop Linux distribution, and now Ubuntu is available at a server near you. Embracing the very same features desktop users have grown to love, system administrators are rapidly adopting Ubuntu due to their ability to configure, deploy, and manage network services more effectively than ever....
Dojo: The Definitive Guide
Dojo: The Definitive Guide
Of all the Ajax-specific frameworks that have popped up in recent years, one clearly stands out as the industrial strength solution. Dojo is not just another JavaScript toolkit -- it's the JavaScript toolkit -- and Dojo: The Definitive Guide demonstrates how to tame Dojo's extensive library of utilities so that you can build rich and responsive web...
Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
Installing and Administering Linux, Second Edition
Installing and Administering Linux, Second Edition
An indispensable working resource for IT professionals moving to Linux-based network systems

More and more companies are now using Linux as their server operating system of choice. That’s because the costs are lower, there’s a greater amount of flexibility, and the code is much more reliable. As a result, there is a bigger demand...

OpenVMS Alpha Internals and Data Structures: Memory Management (HP Technologies)
OpenVMS Alpha Internals and Data Structures: Memory Management (HP Technologies)
OpenVMS Alpha Internals and Data Structures: Memory Management is an update
to selected parts of the book OpenVMS AXP Internals and Data Structures Version 1.5 (Digital Press, 1994). This book covers the extensions to the memory management subsystem of OpenVMS Alpha to allow the operating system and applications to access 64 bits of address
...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy