 |
|
 Programming with POSIX® Threads
This book is about "threads" and how to use them. Thread" is just a name for
a basic software "thing" that can do work on a computer. A thread is smaller,
faster, and more maneuverable than a traditional process. In fact, once threads
have been added to an operating system, a "process" becomes just... |  |  Configuring and Tuning Databases on the Solaris Platform
Modern corporations demand a high level of service from their IT environ-
ments. Today's successful datacenter architectures consist of multiple tiers
that use well-tuned and high-performance servers at every level.
Sun refers to this as the "end-to-end architecture." Typical tiers include
powerful database... |  |  Operating Systems In Depth: Design and Programming
The goal of this book is to bring together and explain current practice in operating systems.
This includes much of what is traditionally covered in operating-system textbooks: concurrency,
scheduling, linking and loading, storage management (both real and virtual), fi le systems,
and security. However, I also cover issues that come up... |
|
|
 A Guide to Kernel Exploitation: Attacking the Core
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop... |  |  Mac OS X for Unix Geeks (Leopard)
Once upon a time, Unix came with only a few standard utilities. If you were lucky, it included a C compiler. When setting up a new Unix system, you’d have to crawl the Net looking for important software: Perl, gcc, bison, flex, less, Emacs, and other utilities and languages. That was a lot of software to download through a 28.8-Kbps... |  |  Zabbix 1.8 Network Monitoring
Imagine you're celebrating the start of the weekend with Friday-night drinks with a few friends. And then suddenly your phone rings -- one of the servers you administer has gone down, and it needs to be back up before tomorrow morning. So you drag yourself back to the office, only to discover that some log files have been growing more... |
|
 IT Disaster Recovery Planning For Dummies (Computer/Tech)Create a safety net while you work out your major plan
Identify critical IT systems, develop a long-range strategy, and train your people
Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back... |  |  The Craft of System Security"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how... |  |  Unix UnleashedUnix Unleashed, Third Edition is written with the power user and system administrator in mind. This book will help the reader understand the nuances of the major Unix variants including SVR4, HP-UX, Solaris, AIX, BSD, IRIX, SunOS, and Linux. It will help the reader decide which Unix shell works best for their particular situation. Other topics such... |
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |