Listing 1 - 10 of 14 | << page >> |
Sort by
|
Choose an application
UNIX for OpenVMS Users, 3E, makes it easy to see what OpenVMS and UNIX have in common, and to transfer your knowledge and experience in OpenVMS over to the world of UNIX. Since most shops rely on more than one operating system, it is critical for system administrators and managers to understand the similarities and differences between platforms, so they can easily work in both environments while taking full advantage of the tools and applications available on each. This book offers OpenVMS professionals a concise source of information, so that they can quickly bring their expertise to
Operating systems (Computers) --- UNIX (Computer file) --- OpenVMS. --- Computer operating systems --- Computers --- Disk operating systems --- Operating systems --- Open VMS --- OpenVMS AXP --- OpenVMS Alpha --- UNIX (Computer operating system) --- Systems software
Choose an application
Unlike so many books that focus on how to use Linux, Linux and the Unix Philosophy explores the ""way of thinking that is Linux"" and why Linux is a superior implementation of this highly capable operating system.This book is a revision and expansion of a computer science classic. Every chapter has been thoroughly updated with Linux coverage.Linux and the Unix Philosophy falls squarely between the ""softer"" texts on iterative software design and project management and the ""how-to"" technical texts. Thus far, no one has come out with a book that addresses this topic, either i
Operating systems (Computers) --- Linux. --- UNIX (Computer file) --- Computer operating systems --- Computers --- Disk operating systems --- Operating systems --- UNIX (Computer operating system) --- Slackware Linux --- SUSE Linux --- Systems software
Choose an application
Written in a cookbook format with practical recipes this book helps you to perform various administrative tasks using Webmin and enables you to perform common jobs more efficiently.This book is perfect for System administrators who want to learn more advanced concepts of Webmin and how it can help to set up a server for development, testing or deployment.
Choose an application
A step-by-step tutorial that will teach you, through real-world examples, how to configure and use Zsh and its various features. If you are a system administrator, developer, or computer professional involved with UNIX who are looking to improve on their daily tasks involving the UNIX shell, ""Learning Shell Scripting with Zsh"" will be great for you. It's assumed that you have some familiarity with an UNIX command-line interface and feel comfortable with editors such as Emacs or vi.
Scripting languages (Computer science) --- Operating systems (Computers) --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Programming languages (Electronic computers) --- Operating systems --- UNIX (Computer file) --- UNIX (Computer operating system)
Choose an application
UNIX Unbounded: A Beginning Approach is ideal for introductory courses in the UNIX operating system. It is also serves as a suitable introduction to UNIX for professionals. Using clear-cut examples, this tutorial introduces readers to the UNIX operating system, including its historical development, major versions, and important features. It covers the topics necessary for users to function independently and handle routine tasks, giving readers a foundation for exploring more advanced UNIX topics.
Operating systems (Computers) --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Operating systems --- UNIX (Computer file) --- UNIX (Computer operating system) --- Computer architecture. Operating systems --- Unix --- OS (operating system)
Choose an application
Uncover the secrets of Linux binary analysis with this handy guide About This Book Grasp the intricacies of the ELF binary format of UNIX and Linux Design tools for reverse engineering and binary forensic analysis Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes Who This Book Is For If you are a software engineer or reverse engineer and want to learn more about Linux binary analysis, this book will provide you with all you need to implement solutions for binary analysis in areas of security, forensics, and antivirus. This book is great for both security enthusiasts and system level engineers. Some experience with the C programming language and the Linux command line is assumed. What You Will Learn Explore the internal workings of the ELF binary format Discover techniques for UNIX Virus infection and analysis Work with binary hardening and software anti-tamper methods Patch executables and process memory Bypass anti-debugging measures used in malware Perform advanced forensic analysis of binaries Design ELF-related tools in the C language Learn to operate on memory with ptrace In Detail Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more. This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them. The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis. This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker. Style and approach The material in this book provides detailed insight into the arcane arts of hacking, coding, reverse engineering Linux executables, and dissecting process memory. In the computer security industry these skills are priceless, and scarce. The tutorials are filled with knowledge gained through first hand experience, and are complemented with fr...
Operating systems (Computers) --- Software engineering. --- Computer software engineering --- Engineering --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Operating systems --- Linux. --- UNIX (Computer file) --- UNIX (Computer operating system) --- Slackware Linux --- SUSE Linux
Choose an application
Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the ""bad guys,"" but what has been done on the inside? This book attacks the problem of the soft, chewy center in internal networks. We use a two-pronged approach-Tactical and Strategic-to give readers a complete guide to internal penetration testing. Content includes the newest vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies to bring it all together. We have scour
Computer networks --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security measures. --- UNIX (Computer file) --- Oracle (Computer file) --- Oracle7.3 --- Oracle 7.3 --- Personal Oracle7 --- Personal Oracle 7 --- UNIX (Computer operating system)
Choose an application
Dealing with system problems-from user login failures to server crashes--is a critical part of a system administrator's job. A down system can cost a business thousands of dollars per minute. But there is little or no information available on how to troubleshoot and correct system problems; in most cases, these skills are learned in an ad-hoc manner, usually in the pressure-cooker environment of a crisis. This is the first book to address this lack of information.The authors (both experienced Tru64 UNIX support engineer for Compaq) systematically present the techniques and tools need
Operating systems (Computers) --- Software maintenance. --- Debugging in computer science. --- UNIX (Computer file) --- Computer programs --- Troubleshooting in computer science --- Computer program maintenance --- Computer software --- Maintenance, Software --- Computer operating systems --- Computers --- Disk operating systems --- Debugging --- Maintenance --- Operating systems --- UNIX (Computer operating system) --- Data editing --- Electronic data processing --- Systems software --- Software revision --- Computer programming --- Software reengineering --- Testing --- Software failures
Choose an application
Discover how to leverage modern Unix even if you’ve never worked with Unix before. This book presents everything in conceptual terms that you can understand, rather than tips to be committed raw to memory. You will learn everyday tasks ranging from basic system administration—partitioning and mounting filesystems, software installation, network configuration, working from the command line) — to Bourne shell scripting, using graphical applications, as well as fanciful things such as emulation layers for Windows and Linux and virtualization with VirtualBox. It’s now 50 years since the creation of Unix but it is still growing. As Unix now moves to everyone's OS (open-source FreeBSD/Linux), it is the perfect time to start your journey with Beginning Modern Unix as your guide. .
Computer science. --- Computer Science. --- Open Source. --- Informatics --- Science --- UNIX (Computer file) --- UNIX (Computer operating system) --- Open source software. --- Computer programming. --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Free software (Open source software) --- Open code software --- Opensource software --- Computer software --- Programming --- Linux.
Choose an application
Competent system administrators know their success hinges upon being able to perform often tedious tasks with rigor and punctuality. Such metrics are often achieved only by instituting a considerable degree of automation, something that has become even more crucial as IT environments continue to scale both in terms of size and complexity. One of the most powerful system administration tools to be released is Puppet, a solution capable of automating nearly every aspect of a system administrator's job, from user management, to software installation, to even configuring server services such as FTP and LDAP. Pulling Strings with Puppet: Configuration Management Made Easy is the first book to introduce the powerful Puppet system administration tool. Author James Turnbull will guide you through Puppet's key features, showing you how to install and configure the software, create automated Puppet tasks, known as recipes, and even create reporting solutions and extend Puppet further to your own needs. A bonus chapter is included covering the Facter library, which makes it a breeze to automate the retrieval of server configuration details such as IP and MAC addresses.
Software configuration management. --- Client/server computing. --- Ruby (Computer program language) --- UNIX (Computer file) --- UNIX (Computer operating system) --- Object-oriented programming languages --- Computing, Client/server --- Electronic data processing --- Computer software configuration management --- Configuration management --- Distributed processing --- Open source software. --- Computer programming. --- Software engineering. --- Open Source. --- Software Engineering/Programming and Operating Systems. --- Computer software engineering --- Engineering --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Free software (Open source software) --- Open code software --- Opensource software --- Computer software --- Programming
Listing 1 - 10 of 14 | << page >> |
Sort by
|