Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Kernel in a Nutshell
Linux Kernel in a Nutshell

Written by a leading developer and maintainer of the Linux kernel, Linux Kernel in a Nutshell is a comprehensive overview of kernel configuration and building, a critical task for Linux users and administrators.

No distribution can provide a Linux kernel that meets all users' needs. Computers big and small have special...

Linux Appliance Design: A Hands-On Guide to Building Linux Appliances
Linux Appliance Design: A Hands-On Guide to Building Linux Appliances
Linux appliances are computers that serve a single, well-defined purpose. Modern appliances are complex machines, with processors, operating systems, and application software. For example, the Tivo is essentially a Linux-based computer with a single purpose: recording television. While there are books that tell readers how to run Linux on embedded...
Beowulf Cluster Computing with Linux (Scientific and Engineering Computation)
Beowulf Cluster Computing with Linux (Scientific and Engineering Computation)
Beowulf clusters, which exploit mass-market PC hardware and software in conjunction with cost-effective commercial network technology, are becoming the platform for many scientific, engineering, and commercial applications. With growing popularity has come growing complexity. Addressing that complexity, Beowulf Cluster Computing with Linux and...
Linux System Programming: Talking Directly to the Kernel and C Library
Linux System Programming: Talking Directly to the Kernel and C Library
This book is about writing software that makes the most effective use of the system you're running on -- code that interfaces directly with the kernel and core system libraries, including the shell, text editor, compiler, debugger, core utilities, and system daemons. The majority of both Unix and Linux code is still written at the system level, and...
How to Cheat at Configuring VmWare ESX Server
How to Cheat at Configuring VmWare ESX Server
This book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine...
Securing & Optimizing Linux: The Hacking Solution
Securing & Optimizing Linux: The Hacking Solution
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system...
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services

Manage complex systems with ease and equip yourself for a new career. This book builds upon the skills you learned in Volumes 1 and 2 of this course and it depends upon the virtual network and virtual machine you created there. 

However, more experienced Linux users can begin with this volume and download an...

Learning the bash Shell, 3rd Edition
Learning the bash Shell, 3rd Edition
This refreshed edition serves as the most valuable guide yet to the bash shell. It's full of practical examples of shell commands and programs guaranteed to make everyday use of Linux that much easier. Includes information on key bindings, command line editing and processing, integrated programming features, signal handling, and much more!
...
UNIX® Network Programming Volume 1, Third Edition: The Sockets Networking API
UNIX® Network Programming Volume 1, Third Edition: The Sockets Networking API

Everyone will want this book because it provides a great mix of practical experience, historical perspective, and a depth of understanding that only comes from being intimately involved in the field. I've already enjoyed and learned from reading this book, and surely you will too."
-Sam Leffler

...
Unix Shell Programming, Third Edition
Unix Shell Programming, Third Edition

Unix Shell Programming is a tutorial aimed at helping Unix and Linux users get optimal performance out of their operating out of their operating system. It shows them how to take control of their systems and work efficiently by harnessing the power of the shell to solve common problems. The reader learns everything he or she needs to know to...

Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

HP Vertica Essentials
HP Vertica Essentials

Learn how to deploy, administer, and manage HP Vertica, one of the most robust MPP solutions around

About This Book

  • Learn cluster management and techniques to improve performance in Vertica
  • Deploy local segmentation and get to grips with the concept of projections
  • A simple,...
unlimited object storage image
Result Page: 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy