Xem 1-19 trên 19 kết quả Linux expert
  • The Linux command line allows you to type specific Linux commands directly to the system so that you can easily manipulate files and query system resources, thereby permitting you to automate commonly used functions and even schedule those programs to run automatically. This new edition is packed with new and revised content, reflecting the many changes to new Linux versions, including coverage of alternative shells to the default bash shell. For this edition, the author has teamed up with another Linux expert ? with their shared expertise...

    pdf723p caucaphung 04-02-2013 46 15   Download

  • To be truly productive with Linux, you need to thoroughly master shells and the command line. Until now, you had to buy two books to gain that mastery: a tutorial on fundamental Linux concepts and techniques, plus a separate reference. Now, there’s a far better solution. Renowned Linux expert Mark Sobell has brought together comprehensive, insightful guidance on the tools system administrators, developers, and power users need most, and an outstanding day-to-day reference, both in the same book.

    pdf503p ken333 07-06-2012 90 34   Download

  • Linux users can now control their homes remotely! Are you a Linux user who has ever wanted to turn on the lights in your house, or open and close the curtains, while away on holiday? Want to be able to play the same music in every room, controlled from your laptop or mobile phone? Do you want to do these things without an expensive off-the-shelf kit? In Smart Home Automation with Linux, Steven Goodwin will show you how a house can be fully controlled by its occupants, all using open source software. From appliances to kettles to curtains, control your home...

    pdf313p ken333 07-06-2012 94 10   Download

  • You can rely on the fully updated second edition of Linux System Administration for answers to all your questions about installing, configuring, and administering Linux. Written by two Linux experts, this book teaches you, step-by-step, all the standard and advanced techniques you need to know to set up and maintain a secure, effective Linux environment. Scores of clear, consistent examples illustrate these techniques in detail--so you stay on track and accomplish all your goals. Coverage includes: * Installing a Linux server...

    pdf297p caucaphung 02-02-2013 34 7   Download

  • Tham khảo sách 'smart home automation with linux', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf313p hoa_can 28-01-2013 34 5   Download

  • In this handy, compact guide, you’ll explore a ton of powerful Ubuntu Linux commands while you learn to use Ubuntu Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

    pdf363p ken333 14-06-2012 103 26   Download

  • This book was written for anyone using Linux, from new users to experts who want to explore this wonderful operating system. The tips and tricks in this book were discovered by myself over years of experience using Linux, and learning about it. Some are very basic tips to make your computing life easier, others are advanced tricks that can save you days of work.

    pdf116p newbievnx 18-03-2011 60 18   Download

  • This paper describes how database benchmarks demonstrate the performance of Red Hat Enterprise Linux AS and Oracle9i Database running on HP ProLiant hardware. Combined with the compelling Total Cost of Ownership model presented by this software and hardware combination, the paper shows why solutions such as this are rapidly replacing proprietary RISC/Unix and Microsoft Windows solutions.

    pdf20p minhtuan 06-08-2009 71 13   Download

  • In recent years, Linux has been validated as an enterprise-worthy operating system, capable of managing the robust components of major production environments. IT professionals acknowledging the cost savings, scalability, and stability of Linux are deploying open source technologies at every opportunity. Most IT professionals are familiar with the Red Hat Linux retail product line and have been using Linux systems in business environments for some time.

    pdf31p minhtuan 06-08-2009 66 9   Download

  • This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks....

    pdf649p shop_123 29-04-2013 38 6   Download

  • This whitepaper describes the features and benefits of the Red Hat Enterprise Linux product family. It briefly outlines factors that need to be considered when planning a migration from a consumer Red Hat Linux release, such as 8.0 or 7.1, to an Red Hat Enterprise Linux family product. It also discusses some of the issues associated with migrating applications from proprietary Unix, Microsoft Windows, and other Red Hat operating system environments.

    pdf15p minhtuan 06-08-2009 53 5   Download

  • "This welcome addition to the Linux bookshelf provides real insight into the black-art of debugging. All too often debugging books concentrate solely on the tools but this book avoids that pitfall by concentrating on examples. The authors dissect and discuss each example in detail; in so doing they give invaluable insight into the Linux environment." —Richard J Moore, IBM Advanced Linux Response Team-Linux Technology Centre "A plethora of Linux books exist but this guide offers a definitive overview of practical hints and tips for Linux users.

    pdf456p ringphone 07-05-2013 17 5   Download

  • Even as recently as five years ago, many computer industry experts would never have guessed how pervasive and “business critical” electronic messaging would eventually become. The degree to which some information technology professionals are surprised by the pervasive nature of today’s electronic mails systems is merely amusing to those of us that have had an e-mail address for more than 20 years.

    pdf67p batoan 07-08-2009 122 34   Download

  • Developer’s Library books are designed to provide practicing programmers with unique, high-quality references and tutorials on the programming languages and technologies they use in their daily work. All books in the Developer’s Library are written by expert technology practitioners who are especially skilled at organizing and presenting information in a way that’s useful for other programmers.

    pdf468p nguyen_anh_dung 21-08-2012 63 17   Download

  • "Network and system security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.

    pdf405p vtva001 24-09-2010 227 73   Download

  • Developer’s Library Series Visit developers-library.com for a complete list of available products The Developer’s Library Series from Addison-Wesley provides practicing programmers with unique, high-quality references and tutorials on the latest programming languages and technologies they use in their daily work. All books in the Developer’s Library are written by expert technology practitioners who are exceptionally skilled at organizing and presenting information in a way that’s useful for other programmers.

    pdf1343p caucaphung 01-02-2013 26 12   Download

  • What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. Designed to be browsed, Security Power Tools offers.

    pdf858p titatu_123 01-03-2013 32 6   Download

  • Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases)...

    pdf744p hoa_can 05-02-2013 27 5   Download

  • Get cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second Edition provides step-by-step instructions on how to use UNIX and take advantage of its powerful tools and utilities.

    pdf1249p samsung_12 07-05-2013 26 4   Download

Đồng bộ tài khoản