The leading Fedora book–over a quarter of a million copies sold of previous editions!
What better way to learn Fedora 11 than with the leading Fedora book from the best–selling Linux author, Christopher Negus with Eric Foster Johnson? Whether you′re new to Linux or an advanced user, this power–packed guide is loaded with what you need. Install, run, and manage the latest version of Fedora and Red Hat Enterprise Linux–then polish your system administration skills and get up to speed on the very latest in networking, desktop, and server enhancements....
Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues that arise out of the use of Linux in embedded systems, the book facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux....
The authors would like to record their thanks to the many people who helped to make this book possible.
Neil would like to thank his wife, Christine, for her understanding and children Alex and Adrian for not complaining too loudly at Dad spending so long in The Den writing.
Rick would like to thank his wife, Ann, and their children, Jennifer and Andrew, for their very con-siderable patience during the evenings and weekends while Dad was yet again “doing book work.”
Understanding the Linux Kernel helps readers understand how Linux performs best and how
it meets the challenge of different environments. The authors introduce each topic by
explaining its importance, and show how kernel operations relate to the utilities that are
familiar to Unix programmers and users.
The Linux command line allows you to type specific Linux commands directly to the system so that you can easily manipulate files and query system resources, thereby permitting you to automate commonly used functions and even schedule those programs to run automatically. This new edition is packed with new and revised content, reflecting the many changes to new Linux versions, including coverage of alternative shells to the default bash shell. For this edition, the author has teamed up with another Linux expert ? with their shared expertise...
When I began writing this book, the first question I asked myself was how to install Linux on a
server, and be sure that no one from the outside, or inside, could access it without authorization.
Then I wondered if any method similar to the one on windows exists to improve the computer’s
performance. Subsequently, I began a search on the Internet and read several books to get the
most information on security and performance for my server. After many years of research and
studies I had finally found the answer to my questions.
Table of Contents
About the Author/Colophon
Chapter 1: An Introduction to Device Drivers
Chapter 2: Building and Running Modules
Chapter 3: Char Drivers
Chapter 4: Debugging Techniques
Chapter 5: Concurrency and Race Conditions
Chapter 6: Advanced Char Driver Operations
Chapter 7: Time, Delays, and Deferred Work
Chapter 8: Allocating Memory
Chapter 9: Communicating with Hardware
Chapter 10: Interrupt Handling
"This welcome addition to the Linux bookshelf provides real insight into the black-art of debugging. All too often debugging books concentrate solely on the tools but this book avoids that pitfall by concentrating on examples. The authors dissect and discuss each example in detail; in so doing they give invaluable insight into the Linux environment."
—Richard J Moore, IBM Advanced Linux Response Team-Linux Technology Centre
"A plethora of Linux books exist but this guide offers a definitive overview of practical hints and tips for Linux users.
Managing RAID on Linux covers everything system administrators need to know to put together a system that can support RAID. You will learn about the different types of RAID, along with associated technologies and issues, and how to choose the best RAID system for your needs. With a step-by-step, hands-on approach, the author guides you through the installation of either Linux software RAID or a hardware RAID card.
Although every precaution has been taken in the preparation of this work, neither the author(s) nor Apress shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work.
Ubuntu builds on a solid base of Debian Linux to create an award-winning operating system that's light-years ahead of its competitors. Ubuntu consistently tops lists of the most popular Linuxes amongst professionals and enthusiasts; Dell recently embraced Ubuntu in its product lines after a user survey indicated overwhelming public support.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties
with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties,
including without limitation warranties of fitness for a particular purpose. No warranty may be created or
extended by sales or promotional materials.
While I was writing this document a book "Hack Proofing Your Network" was released. I haven't been able to read it (dunno if its in print yet, and besides - everything takes a while to get to South Africa). I did however read the first chapter, as it is available to the public. In this chapter the author writes about different views on IT security - hackers, crackers, script kiddies and everything in between. I had some thoughts about this and decided that it was a good starting point for this document....
Mohammed Kabir is the founder and CEO of Evoknow, Inc. His company specializes
in open-source solutions and customer relationship management software development.
When he is not busy managing software projects or writing books, he enjoys
traveling around the world. Kabir studied computer engineering at California State
University, Sacramento. He is also the author of Red Hat Linux Server and Apache
Server Bible. He can be reached at email@example.com.
Quản lý SSL CA trên OS X
Trong bài này chúng tôi sẽ giới thiệu cho các bạn cách add một chứng chỉ gốc của CA (Certificate Authority) trên hệ thống OS X, cho phép các dịch vụ OS X sử dụng SSL và OS X keychain có thể tin tưởng các chứng chỉ đã được phát hành bởi CA. Truyền thông an toàn trên web là một thứ gì đó mà chúng ta đặc biệt quan tâm trong một số năm trở lại đây. HTTPS hay HTTP trên SSL, là thứ mà chúng ta sử dụng cho việc đăng nhập...
Hệ thống phát hành, sử dụng và hủy ACs là Privilege Management Infrastructure (PMI). Trong PMI, tổ chức chứng nhận thuộc tính Attribute Authority (AA) phát hành ACs. Một AA có thể không giống như một CA.
Động cơ chính cho việc sử dụng ACs là để cấp phép. Vì một người dùng có thể chỉ giữ một vai trò nào đó trong tổ chức trong một thời gian ngắn, nên khác với giấy chứng nhận khóa công cộng, AC chỉ có giá trị trong một vài ngày hoặc ngắn hơn. Hình 10.5.
Thiết lập WebDAV với Apache2 trên Mandriva 2010.1 Spring
Trong bài viết sau, chúng tôi sẽ trình bày những bước cơ bản để thiết lập hệ thống WebDAV với Apache2 trên nền tảng Mandriva 2010.1 Spring server. Khái niệm WebDAV Web-based Distributed Authoring and Versioning, là 1 bộ tổ hợp những chức năng mở rộng của giao thức HTTP, cho phép người sử dụng chỉnh sửa dữ liệu trực tiếp trên Apache server, do vậy bỏ qua bước download/upload qua FTP. ...
Thiết lập WebDAV với Apache2 trên Mandriva 2010.1 Spring
Trong bài viết sau, chúng tôi sẽ trình bày những bước cơ bản để thiết lập hệ thống WebDAV với Apache2 trên nền tảng Mandriva 2010.1 Spring server. Khái niệm WebDAV Web-based Distributed Authoring and Versioning, là 1 bộ tổ hợp những chức năng mở rộng của giao thức HTTP, cho phép người sử dụng chỉnh sửa dữ liệu trực tiếp trên Apache server, do vậy bỏ qua bước download/upload qua FTP....