Operating systems Books
McGraw-Hill Education CompTIA A Certification AllinOne Exam Guide
Book SynopsisThis bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectivesThis fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. Youâll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference.Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices Connect to the IntTable of ContentsCH 1 Safety and ProfessionalismCH 2 The Visible ComputerCH 3 CPUsCH 4 RAMCH 5 FirmwareCH 6 MotherboardsCH 7 Power SuppliesCH 8 Mass Storage TechnologiesCH 9 Implementing Mass StorageCH 10 Essential PeripheralsCH 11 Installing and Upgrading Operating SystemsCH 12 Operating System OperationsCH 13 Users, Groups, and PermissionsCH 14 Maintaining and Optimizing Operating SystemsCH 15 Command Line InterfaceCH 16 Troubleshooting Operating SystemsCH 17 Display TechnologiesCH 18 Networking EssentialsCH 19 Local Area NetworkingCH 20 Wireless NetworkingCH 21 The InternetCH 22 VirtualizationCH 23 Portable ComputingCH 24 Mobile DevicesCH 25 Securing Mobile DevicesCH 26 Printers and Multifunction DevicesCH 27 Securing ComputersCH 28 Operational ProceduresApp A Mapping to the CompTIA A+ ObjectivesApp B About the Online ContentGL Glossary
£33.74
Pearson Education (US) Systems Performance
Book SynopsisTable of ContentsPreface xxixAcknowledgments xxxvAbout the Author xxxvii Chapter 1: Introduction 1 1.1 Systems Performance 1 1.2 Roles 2 1.3 Activities 3 1.4 Perspectives 4 1.5 Performance Is Challenging 5 1.6 Latency 6 1.7 Observability 7 1.8 Experimentation 13 1.9 Cloud Computing 14 1.10 Methodologies 15 1.11 Case Studies 16 1.12 References 19 Chapter 2: Methodologies 21 2.1 Terminology 22 2.2 Models 23 2.3 Concepts 24 2.4 Perspectives 37 2.5 Methodology 40 2.6 Modeling 62 2.7 Capacity Planning 69 2.8 Statistics 73 2.9 Monitoring 77 2.10 Visualizations 79 2.11 Exercises 85 2.12 References 86 Chapter 3: Operating Systems 89 3.1 Terminology 90 3.2 Background 91 3.3 Kernels 111 3.4 Linux 114 3.5 Other Topics 122 3.6 Kernel Comparisons 124 3.7 Exercises 124 3.8 References 125 Chapter 4: Observability Tools 129 4.1 Tool Coverage 130 4.2 Tool Types 133 4.3 Observability Sources 138 4.4 sar 160 4.5 Tracing Tools 166 4.6 Observing Observability 167 4.7 Exercises 168 4.8 References 168 Chapter 5: Applications 171 5.1 Application Basics 172 5.2 Application Performance Techniques 176 5.3 Programming Languages 182 5.4 Methodology 186 5.5 Observability Tools 199 5.6 Gotchas 213 5.7 Exercises 216 5.8 References 217 Chapter 6: CPUs 219 6.1 Terminology 220 6.2 Models 221 6.3 Concepts 223 6.4 Architecture 229 6.5 Methodology 244 6.6 Observability Tools 254 6.7 Visualizations 288 6.8 Experimentation 293 6.9 Tuning 294 6.10 Exercises 299 6.11 References 300 Chapter 7: Memory 303 7.1 Terminology 304 7.2 Concepts 305 7.3 Architecture 311 7.4 Methodology 323 7.5 Observability Tools 328 7.6 Tuning 350 7.7 Exercises 354 7.8 References 355 Chapter 8: File Systems 359 8.1 Terminology 360 8.2 Models 361 8.3 Concepts 362 8.4 Architecture 372 8.5 Methodology 383 8.6 Observability Tools 391 8.7 Experimentation 411 8.8 Tuning 414 8.9 Exercises 419 8.10 References 420 Chapter 9: Disks 423 9.1 Terminology 424 9.2 Models 425 9.3 Concepts 427 9.4 Architecture 435 9.5 Methodology 449 9.6 Observability Tools 458 9.7 Visualizations 487 9.8 Experimentation 490 9.9 Tuning 493 9.10 Exercises 495 9.11 References 496 Chapter 10: Network 499 10.1 Terminology 500 10.2 Models 501 10.3 Concepts 503 10.4 Architecture 509 10.5 Methodology 524 10.6 Observability Tools 533 10.7 Experimentation 562 10.8 Tuning 567 10.9 Exercises 574 10.10 References 575 Chapter 11: Cloud Computing 579 11.1 Background 580 11.2 Hardware Virtualization 587 11.3 OS Virtualization 605 11.4 Lightweight Virtualization 630 11.5 Other Types 634 11.6 Comparisons 634 11.7 Exercises 636 11.8 References 637 Chapter 12: Benchmarking 641 12.1 Background 642 12.2 Benchmarking Types 651 12.3 Methodology 656 12.4 Benchmark Questions 667 12.5 Exercises 668 12.6 References 669 Chapter 13: perf 671 13.1 Subcommands Overview 672 13.2 One-Liners 674 13.3 perf Events 679 13.4 Hardware Events 681 13.5 Software Events 683 13.6 Tracepoint Events 684 13.7 Probe Events 685 13.8 perf stat 691 13.9 perf record 694 13.10 perf report 696 13.11 perf script 698 13.12 perf trace 701 13.13 Other Commands 702 13.14 perf Documentation 703 13.15 References 703 Chapter 14: Ftrace 705 14.1 Capabilities Overview 706 14.2 tracefs (/sys) 708 14.3 Ftrace Function Profiler 711 14.4 Ftrace Function Tracing 713 14.5 Tracepoints 717 14.6 kprobes 719 14.7 uprobes 722 14.8 Ftrace function_graph 724 14.9 Ftrace hwlat 726 14.10 Ftrace Hist Triggers 727 14.11 trace-cmd 734 14.12 perf ftrace 741 14.13 perf-tools 741 14.14 Ftrace Documentation 748 14.15 References 749 Chapter 15: BPF 751 15.1 BCC 753 15.2 bpftrace 761 15.3 References 782 Chapter 16: Case Study 783 16.1 An Unexplained Win 783 16.2 Additional Information 792 16.3 References 793 Appendix A: USE Method: Linux 795Appendix B: sar Summary 801Appendix C: bpftrace One-Liners 803Appendix D: Solutions to Selected Exercises 809Appendix E: Systems Performance Who's Who 811 Glossary 815Index 825
£43.19
Simon & Schuster In the Plex
Book SynopsisDelivers the inside story behind Google, the most successful and admired technology company of our time, now updated with a new Afterword.
£14.24
Pearson Education Limited Modern Operating Systems Global Edition
Book SynopsisAbout our authors Andrew S. Tanenbaum has an S.B. degree from M.I.T. and a Ph.D. from the University of California at Berkeley. He is currently a Professor Emeritus of Computer Science at the Vrije Universiteit in Amsterdam, The Netherlands. He was formerly Dean of the Advanced School for Computing and Imaging, an interuniversity graduate school doing research on advanced parallel, distributed, and imaging systems. He was also an Academy Professor of the Royal Netherlands Academy of Arts and Sciences, which has saved him from turning into a bureaucrat. He also won a prestigious European Research Council Advanced Grant. In the past, he has done research on compilers, operating systems, networking, local-area distributed systems and distributed systems. This research has led to over 200 refereed publications in journals and conferences. Prof. Tanenbaum has also authored or co-authored 5 books, which have been translated into over 20 languages, ranging Table of Contents Introduction Processes and Threads Memory Management File Systems Input/Ouput Deadlocks Virtualization and the Cloud Multiple Processor Systems Security Case Study 1: Unix, Linux, and Android Case Study 2: Windows 11 Operating System Design Reading List and Bibliography
£77.89
Pearson Education (US) The AWK Programming Language
Book SynopsisAlfred V. Aho is Lawrence Gussman Professor Emeritus of Computer Science at Columbia University, and former department chair. Well known for his work on algorithms, data structures, programming languages, compilers, and the foundations of computer science, he has received the ACM A. M. Turing Award and the IEEE John von Neumann Medal. Brian W. Kernighan was a member of the Computing Science Research Center at Bell Labs and is currently a professor in the Computer Science department at Princeton. He is the co-creator of several programming languages and the co-author of numerous books, including the computing classic, The C Programming Language. Peter J. Weinberger, currently at Google, has served as chief technology officer at Renaissance Technologies and as leader of computer science research at Bell Labs. He is a Fellow of the AAAS.Table of ContentsPreface ix Chapter 1: An Awk Tutorial 11.1 Getting Started 11.2 Simple Output 41.3 Formatted Output 71.4 Selection 81.5 Computing with Awk 101.6 Control-Flow Statements 131.7 Arrays 161.8 Useful One-liners 171.9 What Next? 19 Chapter 2: Awk in Action 212.1 Personal Computation 212.2 Selection 232.3 Transformation 252.4 Summarization 272.5 Personal Databases 282.6 A Personal Library 312.7 Summary 34 Chapter 3: Exploratory Data Analysis 353.1 The Sinking of the Titanic 363.2 Beer Ratings 413.3 Grouping Data 433.4 Unicode Data 453.5 Basic Graphs and Charts 473.6 Summary 49 Chapter 4: Data Processing 514.1 Data Transformation and Reduction 514.2 Data Validation 574.3 Bundle and Unbundle 594.4 Multiline Records 604.5 Summary 66 Chapter 5: Reports and Databases 675.1 Generating Reports 675.2 Packaged Queries and Reports 735.3 A Relational Database System 755.4 Summary 83 Chapter 6: Processing Words 856.1 Random Text Generation 856.2 Interactive Text-Manipulation 906.3 Text Processing 926.4 Making an Index 996.5 Summary 105 Chapter 7: Little Languages 1077.1 An Assembler and Interpreter 1087.2 A Language for Drawing Graphs 1117.3 A Sort Generator 1137.4 A Reverse-Polish Calculator 1157.5 A Different Approach 1177.6 A Recursive-Descent Parser for Arithmetic Expressions 1197.7 A Recursive-Descent Parser for a Subset of Awk 1227.8 Summary 126 Chapter 8: Experiments with Algorithms 1298.1 Sorting 1298.2 Profiling 1428.3 Topological Sorting 1448.4 Make: A File Updating Program 1488.5 Summary 153 Chapter 9: Epilogue 1559.1 Awk as a Language 1559.2 Performance 1579.3 Conclusion 160 Appendix A: Awk Reference Manual 163A.1 Patterns 165A.2 Actions 176A.3 User-Defined Functions 196A.4 Output 197A.5 Input 202A.6 Interaction with Other Programs 207A.7 Summary 208 Index 209
£28.79
O'Reilly Media Managing Projects with GNU Make 3e
Book Synopsis'Managing Projects with GNU Make', 3rd edition provides guidelines on meeting the needs of large, modern projects. This edition focuses on the GNU version of make, which has deservedly become the industry standard. GNU's powerful extensions are explored in this book, including a number of interesting advanced topics.Table of ContentsForeword Preface Part I. Basic Concepts 1. How to Write a Simple Makefile Targets and Prerequisites Dependency Checking; Minimizing Rebuilds Invoking make Basic Makefile Syntax; 2. Rules Explicit Rules Variables Finding Files with VPATH and vpath Pattern Rules The Implicit Rules Database Special Targets Automatic Dependency Generation Managing Libraries; 3. Variables and Macros What Variables Are Used For Variable Types Macros When Variables Are Expanded Target- and Pattern-Specific Variables Where Variables Come From Conditional and include Processing Standard make Variables 4. Functions; User-Defined Functions Built-in Functions Advanced User-Defined Functions 5. Commands Parsing Commands Which Shell to Use; Empty Commands Command Environment Evaluating Commands; Command-Line Limits Part II. Advanced and Specialized Topics; 6. Managing Large Projects Recursive make Nonrecursive make; Components of Large Systems Filesystem Layout Automating Builds and Testing 7. Portable Makefiles Portability Issues; Cygwin Managing Programs and Files Working with Nonportable Tools Automake 8. C and C++ Separating Source and Binary; Read-Only Source Dependency Generation Supporting Multiple Binary Trees Partial Source Trees Reference Builds, Libraries, and Installers 9. Java Alternatives to make A Generic Java Makefile Compiling Java Managing Jars Reference Trees and Third-Party Jars Enterprise JavaBeans 10. Improving the Performance of make Benchmarking Identifying and Handling Bottlenecks Parallel make Distributed make 11. Example Makefiles The Book Makefile The Linux Kernel Makefile; 12. Debugging Makefiles Debugging Features of make Writing Code for Debugging Common Error Messages Part III. Appendixes; A. Running make B. The Outer Limits C. GNU Free Documentation License-GNU Project-Free Software Foundation (FSF) Index;
£26.99
Pearson Education (US) Red Hat RHCE 8 EX294 Cert Guide
Book Synopsis
£30.59
Penguin Putnam Inc UNIX and Linux System Administration Handbook
Book SynopsisEvi Nemeth pioneered the discipline of UNIX system administration. She taught and mentored computer science students at the University of Colorado Boulder, was visiting faculty member at Dartmouth College and UC San Diego, and helped bring Internet technology to the developing world through her work with the Internet Society and the United Nations. Garth Snyder has worked at NeXT and Sun and holds a BS in Engineering from Swarthmore College and an MD and an MBA from the University of Rochester. Trent R. Hein (@trenthein) is a serial entrepreneur who is passionate about practical cybersecurity and automation. Outside of technology, he loves hiking, skiing, fly fishing, camping, bluegrass, dogs, and the Oxford comma. Trent holds a BS in Computer Science from the University of Colorado. Ben Whaley is the founder of WhaleTech, an independent consultancy. He was honored by Amazon as one of the first
£51.29
O'Reilly Media The Site Reliability Workbook
Book SynopsisGoogle’s Site Reliability Engineering book ignited an industry discussion on what it means to run production services today. Now, Google engineers who worked on that bestseller introduce The Site Reliability Workbook, a hands-on companion that uses concrete examples to show you how to put SRE principles and practices to work in your environment.
£35.99
Pearson Education Limited Operating Systems Internals and Design Principles
Book SynopsisTable of ContentsOnline Chapters and Appendices VideoNotes Preface About the Author I. Background 1. Computer System Overview 1.1. Basic Elements 1.2. Evolution of the Microprocessor 1.3. Instruction Execution 1.4. Interrupts 1.5. The Memory Hierarchy 1.6. Cache Memory 1.7. Direct Memory Access 1.8. Multiprocessor and Multicore Organization 1.9. Key Terms, Review Questions, and Problems 1A. Performance Characteristics of Two-Level Memories 2. Operating System Overview 2.1. Operating System Objectives and Functions 2.2. The Evolution of Operating Systems 2.3. Major Achievements 2.4. Developments Leading to Modern Operating Systems 2.5. Fault Tolerance 2.6. Os Design Considerations for Multiprocessor and Multicore 2.7. Microsoft Windows Overview 2.8. Traditional Unix Systems 2.9. Modern Unix Systems 2.10. Linux 2.11. Android 2.12. Key Terms, Review Questions, and Problems II. Processes 3. Process Description and Control 3.1. What is a Process? 3.2. Process States 3.3. Process Description 3.4. Process Control 3.5. Execution of the Operating System 3.6. Unix Svr4 Process Management 3.7. Summary 3.8. Key Terms, Review Questions, and Problems 4. Threads 4.1. Processes and Threads 4.2. Types of Threads 4.3. Multicore and Multithreading 4.4. Windows Process and Thread Management 4.5. Solaris Thread and Smp Management 4.6. Linux Process and Thread Management 4.7. Android Process and Thread Management 4.8. Mac OS X Grand Central Dispatch 4.9. Summary 4.10. Key Terms, Review Questions, and Problems 5. Concurrency: Mutual Exclusion and Synchronization 5.1. Mutual Exclusion: Software Approaches 5.2. Principles of Concurrency 5.3. Mutual Exclusion: Hardware Support 5.4. Semaphores 5.5. Monitors 5.6. Message Passing 5.7. Readers/Writers Problem 5.8. Summary 5.9. Key Terms, Review Questions, and Problems 6. Concurrency: Deadlock and Starvation 6.1. Principles of Deadlock 6.2. Deadlock Prevention 6.3. Deadlock Avoidance 6.4. Deadlock Detection 6.5. An Integrated Deadlock Strategy 6.6. Dining Philosophers Problem 6.7. Unix Concurrency Mechanisms 6.8. Linux Kernel Concurrency Mechanisms 6.9. Solaris Thread Synchronization Primitives 6.10. Windows Concurrency Mechanisms 6.11. Android Interprocess Communication 6.12. Summary 6.13. Key Terms, Review Questions, and Problems III. Memory 7. Memory Management 7.1. Memory Management Requirements 7.2. Memory Partitioning 7.3. Paging 7.4. Segmentation 7.5. Summary 7.6. Key Terms, Review Questions, and Problems 7A. Loading and Linking 8. Virtual Memory 8.1. Hardware and Control Structures 8.2. Operating System Software 8.3. Unix and Solaris Memory Management 8.4. Linux Memory Management 8.5. Windows Memory Management 8.6. Android Memory Management 8.7. Summary 8.8. Key Terms, Review Questions, and Problems IV. Scheduling 9. Uniprocessor Scheduling 9.1. Types of Processor Scheduling 9.2. Scheduling Algorithms 9.3. Traditional Unix Scheduling 9.4. Summary 9.5. Key Terms, Review Questions, and Problems <
£72.09
O'Reilly Media Certified Kubernetes Administrator CKA Study
Book SynopsisThis study guide walks you through all the topics covered to fully prepare you for the Certified Kubernetes Administrator (CKA) certification exam.
£39.74
McGraw-Hill Education - Europe Mike Meyers CompTIA A Guide to 802 Managing and
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Bestselling CompTIA A+ author Mike Meyers provides hands-on, step-by-step labsâupdated for the 2012 release of Exam 220-802âso you can practice the IT skills essential for your successMike Meyersâ CompTIA A+ Guide to Managing and Troubleshooting Operating Systems Lab Manual, Fourth Edition contains more than 80 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to certification exam objectives, ensuring direct correspondence to Mike Meyersâ CompTIA A+ Guide to Managing and Troubleshooting Operating Systems, Fourth Edition. Lab solutionsTable of ContentsChapter 1: Path of the PC TechChapter 2: Visible WindowsChapter 3: Troubleshooting Essential HardwareChapter 4: Implementing Hard DrivesChapter 5: Installing and Upgrading WindowsChapter 6: Windows Under the HoodChapter 7: NTFS, Users, and GroupsChapter 8: Maintaining and Optimizing WindowsChapter 9: Working with the Command-Line InterfaceChapter 10: Troubleshooting WindowsChapter 11: Implementing and Troubleshooting VideoChapter 12: Ethernet and TCP/IPChapter 13: Implementing and Troubleshooting Wireless NetworksChapter 14: Implementing and Troubleshooting NetworksChapter 15: Portable Computing Chapter 16: Mobile DevicesChapter 17: Troubleshooting PrintersChapter 18: Securing ComputersChapter 19: VirtualizationChapter 20: The Complete PC TechGlossaryAppendicesAppendix A: Mapping to the CompTIA A+ ObjectivesAppendix B: About the CD
£40.47
Elsevier Science Windows Registry Forensics
Book SynopsisTable of Contents1. Registry Analysis 2. Processes and Tools 3. Case Studies: The System 4. Case Studies: Tracking User Activity 5. RegRipper
£49.49
Syngress Media,U.S. Deploying Secure Containers for Training and
Book SynopsisTable of ContentsIntroduction Chapter 1- Containers Chapter 2- Using containers in Training Chapter 3- Experimentation
£26.59
Elsevier Science & Technology FaultTolerant Systems
Book SynopsisTable of Contents1. Preliminaries 2. Hardware Fault Tolerance 3. Information Redundancy 4. Fault-Tolerant Networks 5. Software Fault Tolerance 6. Checkpointing 7. Fault-Tolerance in Cyber-Physical Systems (CPS) 8. Case Studies 9. Simulation Techniques 10. Defect Tolerance in VLSI Circuits 11. Fault Detection in Cryptographic Systems
£67.49
Pearson Education (US) Practical Guide to Linux Commands Editors and
Book Synopsis Mark G. Sobell has forty years of experience working with UNIX and Linux systems and is the author of many best-selling books, including A Practical Guide to Fedora and Red Hat Enterprise Linux, Seventh Edition, and A Practical Guide to Ubuntu Linux, Fourth Edition. Matthew Helmke got his first computer in 1981, a TRS-80 Color Computer. He started using UNIX in 1987 while studying LISP. He works as a technical writer and has written about Linux and other topics for magazines and a diverse set of companies. He is the author of several books, including Ubuntu Unleashed, The Official Ubuntu Book, and VMware Cookbook. Trade Review Praise for Previous Editions of A Practical Guide to Linux® Commands, Editors, and Shell Programming “This book is a very useful tool for anyone who wants to ‘look under the hood’ so to speak, and really start putting the power of Linux to work. What I find particularly frustrating about man pages is that they never include examples. Sobell, on the other hand, outlines very clearly what the command does and then gives several common, easy-to-understand examples that make it a breeze to start shell programming on one’s own. As with Sobell’s other works, this is simple, straight-forward, and easy to read. It’s a great book and will stay on the shelf at easy arm’s reach for a long time.” –Ray Bartlett, Travel Writer “Overall I found this book to be quite excellent, and it has earned a spot on the very front of my bookshelf. It covers the real ‘guts’ of Linux– the command line and its utilities–and does so very well. Its strongest points are the outstanding use of examples, and the Command Reference section. Highly recommended for Linux users of all skill levels. Well done to Mark Sobell and Prentice Hall for this outstanding book!” –Dan Clough, Electronics Engineer and Slackware Linux User “Totally unlike most Linux books, this book avoids discussing everything via GUI and jumps right into making the power of the command line your friend.” –Bjorn Tipling, Software Engineer, ask.com “This book is the best distro-agnostic, foundational Linux reference I’ve ever seen, out of dozens of Linux-related books I’ve read. Finding this book was a real stroke of luck. If you want to really understand how to get things done at the command line, where the power and flexibility of free UNIX-like OSes really live, this book is among the best tools you’ll find toward that end.” –Chad Perrin, Writer, TechRepublic “I moved to Linux from Windows XP a couple of years ago, and after some distro hopping settled on Linux Mint. At age 69 I thought I might be biting off more than I could chew, but thanks to much reading and the help of a local LUG I am now quite at home with Linux at the GUI level. “Now I want to learn more about the CLI and a few months ago bought your book: A Practical Guide to Linux® Commands, Editors, and Shell Programming, Second Edition. “For me, this book is proving to be the foundation upon which my understanding of the CLI is being built. As a comparative ‘newbie’ to the Linux world, I find your book a wonderful, easy-to-follow guide that I highly recommend to other Linux users.” –John Nawell, CQLUG (Central Queensland Linux User Group) “I have the second edition of A Practical Guide to Linux® Commands, Editors, and Shell Programming and am a big fan. I used it while working as a Cisco support engineer. I plan to get the third edition as soon as it is released. We will be doing a ton of command-line work on literally 1000 boxes (IMS core nodes). I feel you have already given me a lot of tools with the second edition. I want to get your new book as soon as possible. The way you write works very well for my style of learning.” –Robert Lingenfelter, Support Engineer, VoIP/IMS Praise for Other Books by Mark G. Sobell “Since I’m in an educational environment, I found the content of Sobell’s book to be right on target and very helpful for anyone managing Linux in the enterprise. His style of writing is very clear. He builds up to the chapter exercises, which I find to be relevant to real-world scenarios a user or admin would encounter. An IT/IS student would find this book a valuable complement to their education. The vast amount of information is extremely well balanced and Sobell manages to present the content without complicated asides and meandering prose. This is a ‘must have’ for anyone managing Linux systems in a networked environment or anyone running a Linux server. I would also highly recommend it to an experienced computer user who is moving to the Linux platform.” –Mary Norbury, IT Director, Barbara Davis Center, University of Colorado at Denver, from a review posted on slashdot.org “I had the chance to use your UNIX books when I when was in college years ago at Cal Poly, San Luis Obispo, CA. I have to say that your books are among the best! They’re quality books that teach the theoretical aspects and applications of the operating system.” –Benton Chan, IS Engineer “The book has more than lived up to my expectations from the many reviews I read, even though it targets FC2. I have found something very rare with your book: It doesn’t read like the standard technical text, it reads more like a story. It’s a pleasure to read and hard to put down. Did I say that?! :-)” –David Hopkins, Business Process Architect “Thanks for your work and for the book you wrote. There are really few books that can help people to become more efficient administrators of different workstations. We hope (in Russia) that you will continue bringing us a new level of understanding of Linux/UNIX systems.” –Anton Petukhov “Mark Sobell has written a book as approachable as it is authoritative.” –Jeffrey Bianchine, Advocate, Author, Journalist “Excellent reference book, well suited for the sysadmin of a Linux cluster, or the owner of a PC contemplating installing a recent stable Linux. Don’t be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs.” –Wes Boudville, Inventor “A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you, Mark Sobell.” –C. Pozrikidis, University of California at San Diego “This book presents the best overview of the Linux operating system that I have found. . . . [It] should be very helpful and understandable no matter what the reader’s background: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready.” –Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group [FRUUG], Boulder, Colorado “Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There’s no other book that discusses so many different topics and in such depth.” –Eugenia Loli-Queru, Editor in Chief, OSNews.com “I currently own one of your books, A Practical Guide to Linux®. I believe this book is one of the most comprehensive and, as the title says, practical guides to Linux I have ever read. I consider myself a novice and I come back to this book over and over again.” –Albert J. Nguyen “Thank you for writing a book to help me get away from Windows XP and to never touch Windows Vista. The book is great; I am learning a lot of new concepts and commands. Linux is definitely getting easier to use.” –James Moritz “I am so impressed by how Mark Sobell can approach a complex topic in such an understandable manner. His command examples are especially useful in providing a novice (or even an advanced) administrator with a cookbook on how to accomplish real-world tasks on Linux. He is truly an inspired technical writer!” –George Vish II, Senior Education Consultant, Hewlett-Packard Company “Overall, I think it’s a great, comprehensive Ubuntu book that’ll be a valuable resource for people of all technical levels.” –John Dong, Ubuntu Forum Council Member, Backports Team Leader “The JumpStart sections really offer a quick way to get things up and running, allowing you to dig into the details of the book later.” –Scott Mann, Aztek Networks “I would so love to be able to use this book to teach a class about not just Ubuntu or Linux but about computers in general. It is thorough and well written with good illustrations that explain important concepts for computer usage.” –Nathan Eckenrode, New York Local Community Team “Ubuntu is gaining popularity at the rate alcohol did during Prohibition, and it’s great to see a well-known author write a book on the latest and greatest version. Not only does it contain Ubuntu-specific information, but it also touches on general computer-related topics, which will help the average computer user to better understand what’s going on in the background. Great work, Mark!” –Daniel R. Arfsten, Pro/ENGINEER Drafter/Designer “I read a lot of Linux technical information every day, but I’m rarely impressed by tech books. I usually prefer online information sources instead. Mark Sobell’s books are a notable exception. They’re clearly written, technically accurate, comprehensive, and actually enjoyable to read.” –Matthew Miller, Senior Systems Analyst/Administrator, BU Linux Project, Boston University Office of Information Technology “This is well-written, clear, comprehensive information for the Linux user of any type, whether trying Ubuntu on for the first time and wanting to know a little about it, or using the book as a very good reference when doing something more complicated like setting up a server. This book’s value goes well beyond its purchase price and it’ll make a great addition to the Linux section of your bookshelf.” –Linc Fessenden, Host of The LinuxLink TechShow, tllts.org “The author has done a very good job at clarifying such a detail-oriented operating system. I have extensive Unix and Windows experience and this text does an excellent job at bridging the gaps between Linux, Windows, and Unix. I highly recommend this book to both ‘newbs’ and experienced users. Great job!” –Mark Polczynski, Information Technology Consultant “Your text, A Practical Guide to Ubuntu Linux®, Third Edition, is a well constructed, informative, superbly written text. You deserve an award for outstanding talent; unfortunately my name is not Pulitzer.” –Harrison Donnelly, Physician “When I first started working with Linux just a short ten years or so ago, it was a little more difficult than now to get going. . . . Now, someone new to the community has a vast array of resources available on the web, or if they are inclined to begin with Ubuntu, they can literally find almost every single thing they will need in the single volume of Mark Sobell’s A Practical Guide to Ubuntu Linux®. “I’m sure this sounds a bit like hyperbole. Everything a person would need to know? Obviously not everything, but this book, weighing in at just under 1200 pages, covers so much so thoroughly that there won’t be much left out. From install to admin, networking, security, shell scripting, package management, and a host of other topics, it is all there. GUI and command-line tools are covered. There is not really any wasted space or fluff, just a huge amount of information. There are screen shots when appropriate but they do not take up an inordinate amount of space. This book is information-dense.” –JR Peck, Editor, GeekBook.org “I have been wanting to make the jump to Linux but did not have the guts to do so–until I saw your familiarly titled A Practical Guide to Red Hat® Linux® at the bookstore. I picked up a copy and am eagerly looking forward to regaining my freedom.” –Carmine Stoffo, Machine and Process Designer to pharmaceutical industry “I am currently reading A Practical Guide to Red Hat® Linux® and am finally understanding the true power of the command line. I am new to Linux and your book is a treasure.” –Juan Gonzalez “Overall, A Practical Guide to Ubuntu Linux® by Mark G. Sobell provides all of the information a beginner to intermediate user of Linux would need to be productive. The inclusion of the Live DVD of the Gutsy Gibbon release of Ubuntu makes it easy for the user to test-drive Linux without affecting his installed OS. I have no doubts that you will consider this book money well spent.” –Ray Lodato, Slashdot contributor, www.slashdot.orgTable of Contents Preface 1: Welcome to Linux and Mac OS X Part I: The Linux and Mac OS X Operating Systems 2: Getting Started 3: The Utilities 4: The Filesystem 5: The Shell Part II: The Editors 6: The vim Editor 7: The emacs Editor Part III: The Shells 8: The Bourne Again Shell (bash) 9: The TC Shell (tcsh) Part IV: Programming Tools 10: Programming the Bourne Again Shell (bash) 11: The Perl Scripting Language 12: The Python Programming Language 13: The MySQL Database Management System 14: The AWK Pattern Processing Language 15: The sed Editor Part V: Secure Network Utilities 16: The rsync Secure Copy Utility 17: The OpenSSH Secure Communication Utilities Part VI: Command Reference Utilities That Display and Manipulate Files Network Utilities Utilities That Display and Alter Status Utilities That Are Programming Tools Miscellaneous Utilities Standard Multiplicative Suffixes Common Options The Sample Utility Part VII: Appendices Appendix A: Regular Expressions Appendix B: Help Appendix C: Keeping the System Up-to-Date Appendix D: Mac OS X Notes Glossary File Tree Index Utility Index Main Index
£40.04
Pearson Education (US) macOS Support Essentials 12 Apple Pro Training
Book SynopsisTable of ContentsInstallation and Configuration Lesson 1 Introduction to macOS Lesson 2 Update, Upgrade, or Reinstall macOS Lesson 3 Set Up and Configure macOS Lesson 4 Use the Command-Line Interface Lesson 5 Use macOS Recovery Lesson 6 Update macOS User Accounts Lesson 7 Manage User Accounts Lesson 8 Manage User Home Folders Lesson 9 Manage Security and Privacy Lesson 10 Manage Password Changes File Systems Lesson 11 Manage File Systems and Storage Lesson 12 Manage FileVault Lesson 13 Manage Permissions and Sharing Lesson 14 Use Hidden Items, Shortcuts, and File Archives Data Management Lesson 15 Manage System Resources Lesson 16 Use Metadata, Siri, and Spotlight Lesson 17 Manage Time Machine Apps and Processes Lesson 18 Install Apps Lesson 19 Manage Files Lesson 20 Manage and Troubleshoot Apps Network Configuration Lesson 21 Manage Basic Network Settings Lesson 22 Manage Advanced Network Settings Lesson 23 Troubleshoot Network Issues Network Services Lesson 24 Manage Network Services Lesson 25 Manage Host Sharing and Personal Firewall System Management Lesson 26 Troubleshoot Peripherals Lesson 27 Manage Printers and Scanners Lesson 28 Troubleshoot Startup and System Issues
£49.39
Pearson Education Limited Brilliant OS X Mountain Lion
Book Synopsis
£15.29
Pearson Education Limited Brilliant Windows 8
Book Synopsis
£16.19
Pearson Education (US) Practice of System and Network Administration The
Book SynopsisThomas A. Limoncelli is an internationally recognized author, speaker, and system administrator with more than twenty years of experience at companies like Google, Bell Labs, and StackOverflow.com. Christina J. Hogan has more than twenty years of experience in system administration and network engineering, from Silicon Valley to Italy and Switzerland. She has a master's degree in computer science, a doctorate in aeronautical engineering, and has been part of a Formula 1 racing team. Strata R. Chalup has more than twenty-five years of experience in Silicon Valley, focusing on IT strategy, best-practices, and scalable infrastructures at firms that include Apple, Sun, Cisco, McAfee, and Palm.Table of ContentsPreface xxxix Acknowledgments xlvii About the Authors li Part I: Game-Changing Strategies 1 Chapter 1: Climbing Out of the Hole 3 1.1 Organizing WIP 5 1.2 Eliminating Time Sinkholes 12 1.3 DevOps 16 1.4 DevOps Without Devs 16 1.5 Bottlenecks 18 1.6 Getting Started 20 1.7 Summary 21 Exercises 22 Chapter 2: The Small Batches Principle 23 2.1 The Carpenter Analogy 23 2.2 Fixing Hell Month 24 2.3 Improving Emergency Failovers 26 2.4 Launching Early and Often 29 2.5 Summary 34 Exercises 34 Chapter 3: Pets and Cattle 37 3.1 The Pets and Cattle Analogy 37 3.2 Scaling 39 3.3 Desktops as Cattle 40 3.4 Server Hardware as Cattle 41 3.5 Pets Store State 43 3.6 Isolating State 44 3.7 Generic Processes 47 3.8 Moving Variations to the End 51 3.9 Automation 53 3.10 Summary 53 Exercises 54 Chapter 4: Infrastructure as Code 55 4.1 Programmable Infrastructure 56 4.2 Tracking Changes 57 4.3 Benefits of Infrastructure as Code 59 4.4 Principles of Infrastructure as Code 62 4.5 Configuration Management Tools 63 4.6 Example Infrastructure as Code Systems 67 4.7 Bringing Infrastructure as Code to Your Organization 71 4.8 Infrastructure as Code for Enhanced Collaboration 72 4.9 Downsides to Infrastructure as Code 73 4.10 Automation Myths 74 4.11 Summary 75 Exercises 76 Part II: Workstation Fleet Management 77 Chapter 5: Workstation Architecture 79 5.1 Fungibility 80 5.2 Hardware 82 5.3 Operating System 82 5.4 Network Configuration 84 5.5 Accounts and Authorization 86 5.6 Data Storage 89 5.7 OS Updates 93 5.8 Security 94 5.9 Logging 97 5.10 Summary 98 Exercises 99 Chapter 6: Workstation Hardware Strategies 101 6.1 Physical Workstations 101 6.2 Virtual Desktop Infrastructure 105 6.3 Bring Your Own Device 110 6.4 Summary 113 Exercises 114 Chapter 7: Workstation Software Life Cycle 117 7.1 Life of a Machine 117 7.2 OS Installation 120 7.3 OS Configuration 120 7.4 Updating the System Software and Applications 123 7.5 Rolling Out Changes . . . Carefully 128 7.6 Disposal 130 7.7 Summary 134 Exercises 135 Chapter 8: OS Installation Strategies 137 8.1 Consistency Is More Important Than Perfection 138 8.2 Installation Strategies 142 8.3 Test-Driven Configuration Development 147 8.4 Automating in Steps 148 8.5 When Not to Automate 152 8.6 Vendor Support of OS Installation 152 8.7 Should You Trust the Vendor's Installation? 154 8.8 Summary 154 Exercises 155 Chapter 9: Workstation Service Definition 157 9.1 Basic Service Definition 157 9.2 Refresh Cycles 161 9.3 Tiered Support Levels 165 9.4 Workstations as a Managed Service 168 9.5 Summary 170 Exercises 171 Chapter 10: Workstation Fleet Logistics 173 10.1 What Employees See 173 10.2 What Employees Don't See 174 10.3 Configuration Management Database 183 10.4 Small-Scale Fleet Logistics 186 10.5 Summary 188 Exercises 188 Chapter 11: Workstation Standardization 191 11.1 Involving Customers Early 192 11.2 Releasing Early and Iterating 193 11.3 Having a Transition Interval (Overlap) 193 11.4 Ratcheting 194 11.5 Setting a Cut-Off Date 195 11.6 Adapting for Your Corporate Culture 195 11.7 Leveraging the Path of Least Resistance 196 11.8 Summary 198 Exercises 199 Chapter 12: Onboarding 201 12.1 Making a Good First Impression 201 12.2 IT Responsibilities 203 12.3 Five Keys to Successful Onboarding 203 12.4 Cadence Changes 212 12.5 Case Studies 212 12.6 Summary 216 Exercises 217 Part III: Servers 219 Chapter 13: Server Hardware Strategies 221 13.1 All Eggs in One Basket 222 13.2 Beautiful Snowflakes 224 13.3 Buy in Bulk, Allocate Fractions 228 13.4 Grid Computing 235 13.5 Blade Servers 237 13.6 Cloud-Based Compute Services 238 13.7 Server Appliances 241 13.8 Hybrid Strategies 242 13.9 Summary 243 Exercises 244 Chapter 14: Server Hardware Features 245 14.1 Workstations Versus Servers 246 14.2 Server Reliability 249 14.3 Remotely Managing Servers 254 14.4 Separate Administrative Networks 257 14.5 Maintenance Contracts and Spare Parts 258 14.6 Selecting Vendors with Server Experience 261 14.7 Summary 263 Exercises 263 Chapter 15: Server Hardware Specifications 265 15.1 Models and Product Lines 266 15.2 Server Hardware Details 266 15.3 Things to Leave Out 278 15.4 Summary 278 Exercises 279 Part IV: Services 281 Chapter 16: Service Requirements 283 16.1 Services Make the Environment 284 16.2 Starting with a Kick-Off Meeting 285 16.3 Gathering Written Requirements 286 16.4 Customer Requirements 288 16.5 Scope, Schedule, and Resources 291 16.6 Operational Requirements 292 16.7 Open Architecture 298 16.8 Summary 302 Exercises 303 Chapter 17: Service Planning and Engineering 305 17.1 General Engineering Basics 306 17.2 Simplicity 307 17.3 Vendor-Certified Designs 308 17.4 Dependency Engineering 309 17.5 Decoupling Hostname from Service Name 313 17.6 Support 315 17.7 Summary 319 Exercises 319 Chapter 18: Service Resiliency and Performance Patterns 321 18.1 Redundancy Design Patterns 322 18.2 Performance and Scaling 326 18.3 Summary 333 Exercises 334 Chapter 19: Service Launch: Fundamentals 335 19.1 Planning for Problems 335 19.2 The Six-Step Launch Process 336 19.3 Launch Readiness Review 345 19.4 Launch Calendar 348 19.5 Common Launch Problems 349 19.6 Summary 351 Exercises 351 Chapter 20: Service Launch: DevOps 353 20.1 Continuous Integration and Deployment 354 20.2 Minimum Viable Product 357 20.3 Rapid Release with Packaged Software 359 20.4 Cloning the Production Environment 362 20.5 Example: DNS/DHCP Infrastructure Software 363 20.6 Launch with Data Migration 366 20.7 Controlling Self-Updating Software 369 20.8 Summary 370 Exercises 371 Chapter 21: Service Conversions 373 21.1 Minimizing Intrusiveness 374 21.2 Layers Versus Pillars 376 21.3 Vendor Support 377 21.4 Communication 378 21.5 Training 379 21.6 Gradual Roll-Outs 379 21.7 Flash-Cuts: Doing It All at Once 380 21.8 Backout Plan 383 21.9 Summary 385 Exercises 385 Chapter 22: Disaster Recovery and Data Integrity 387 22.1 Risk Analysis 388 22.2 Legal Obligations 389 22.3 Damage Limitation 390 22.4 Preparation 391 22.5 Data Integrity 392 22.6 Redundant Sites 393 22.7 Security Disasters 394 22.8 Media Relations 394 22.9 Summary 395 Exercises 395 Part V: Infrastructure 397 Chapter 23: Network Architecture 399 23.1 Physical Versus Logical 399 23.2 The OSI Model 400 23.3 Wired Office Networks 402 23.4 Wireless Office Networks 406 23.5 Datacenter Networks 408 23.6 WAN Strategies 413 23.7 Routing 419 23.8 Internet Access 420 23.9 Corporate Standards 422 23.10 Software-Defined Networks 425 23.11 IPv6 426 23.12 Summary 428 Exercises 429 Chapter 24: Network Operations 431 24.1 Monitoring 431 24.2 Management 432 24.3 Documentation 437 24.4 Support 440 24.5 Summary 446 Exercises 447 Chapter 25: Datacenters Overview 449 25.1 Build, Rent, or Outsource 450 25.2 Requirements 452 25.3 Summary 456 Exercises 457 Chapter 26: Running a Datacenter 459 26.1 Capacity Management 459 26.2 Life-Cycle Management 465 26.3 Patch Cables 468 26.4 Labeling 471 26.5 Console Access 475 26.6 Workbench 476 26.7 Tools and Supplies 477 26.8 Summary 480 Exercises 481 Part VI: Helpdesks and Support 483 Chapter 27: Customer Support 485 27.1 Having a Helpdesk 485 27.2 Offering a Friendly Face 488 27.3 Reflecting Corporate Culture 488 27.4 Having Enough Staff 488 27.5 Defining Scope of Support 490 27.6 Specifying How to Get Help 493 27.7 Defining Processes for Staff 493 27.8 Establishing an Escalation Process 494 27.9 Defining “Emergency” in Writing 495 27.10 Supplying Request-Tracking Software 496 27.11 Statistical Improvements 498 27.12 After-Hours and 24/7 Coverage 499 27.13 Better Advertising for the Helpdesk 500 27.14 Different Helpdesks for Different Needs 501 27.15 Summary 502 Exercises 503 Chapter 28: Handling an Incident Report 505 28.1 Process Overview 506 28.2 Phase A—Step 1: The Greeting 508 28.3 Phase B: Problem Identification 509 28.4 Phase C: Planning and Execution 515 28.5 Phase D: Verification 518 28.6 Perils of Skipping a Step 519 28.7 Optimizing Customer Care 521 28.8 Summary 525 Exercises 527 Chapter 29: Debugging 529 29.1 Understanding the Customer's Problem 529 29.2 Fixing the Cause, Not the Symptom 531 29.3 Being Systematic 532 29.4 Having the Right Tools 533 29.5 End-to-End Understanding of the System 538 29.6 Summary 540 Exercises 540 Chapter 30: Fixing Things Once 541 30.1 Story: The Misconfigured Servers 541 30.2 Avoiding Temporary Fixes 543 30.3 Learn from Carpenters 545 30.4 Automation 547 30.5 Summary 549 Exercises 550 Chapter 31: Documentation 551 31.1 What to Document 552 31.2 A Simple Template for Getting Started 553 31.3 Easy Sources for Documentation 554 31.4 The Power of Checklists 556 31.5 Wiki Systems 557 31.6 Findability 559 31.7 Roll-Out Issues 559 31.8 A Content-Management System 560 31.9 A Culture of Respect 561 31.10 Taxonomy and Structure 561 31.11 Additional Documentation Uses 562 31.12 Off-Site Links 562 31.13 Summary 563 Exercises 564 Part VII: Change Processes 565 Chapter 32: Change Management 567 32.1 Change Review Boards 568 32.2 Process Overview 570 32.3 Change Proposals 570 32.4 Change Classifications 571 32.5 Risk Discovery and Quantification 572 32.6 Technical Planning 573 32.7 Scheduling 574 32.8 Communication 576 32.9 Tiered Change Review Boards 578 32.10 Change Freezes 579 32.11 Team Change Management 581 32.12 Starting with Git 583 32.13 Summary 585 Exercises 585 Chapter 33: Server Upgrades 587 33.1 The Upgrade Process 587 33.2 Step 1: Develop a Service Checklist 588 33.3 Step 2: Verify Software Compatibility 591 33.4 Step 3: Develop Verification Tests 592 33.5 Step 4: Choose an Upgrade Strategy 595 33.6 Step 5: Write a Detailed Implementation Plan 598 33.7 Step 6: Write a Backout Plan 600 33.8 Step 7: Select a Maintenance Window 600 33.9 Step 8: Announce the Upgrade 602 33.10 Step 9: Execute the Tests 603 33.11 Step 10: Lock Out Customers 604 33.12 Step 11: Do the Upgrade with Someone 605 33.13 Step 12: Test Your Work 605 33.14 Step 13: If All Else Fails, Back Out 605 33.15 Step 14: Restore Access to Customers 606 33.16 Step 15: Communicate Completion/Backout 606 33.17 Summary 608 Exercises 610 Chapter 34: Maintenance Windows 611 34.1 Process Overview 612 34.2 Getting Management Buy-In 613 34.3 Scheduling Maintenance Windows 614 34.4 Planning Maintenance Tasks 615 34.5 Selecting a Flight Director 616 34.6 Managing Change Proposals 617 34.7 Developing the Master Plan 620 34.8 Disabling Access 621 34.9 Ensuring Mechanics and Coordination 622 34.10 Change Completion Deadlines 628 34.11 Comprehensive System Testing 628 34.12 Post-maintenance Communication 630 34.13 Reenabling Remote Access 631 34.14 Be Visible the Next Morning 631 34.15 Postmortem 631 34.16 Mentoring a New Flight Director 632 34.17 Trending of Historical Data 632 34.18 Providing Limited Availability 633 34.19 High-Availability Sites 634 34.20 Summary 636 Exercises 637 Chapter 35: Centralization Overview 639 35.1 Rationale for Reorganizing 640 35.2 Approaches and Hybrids 642 35.3 Summary 643 Exercises 644 Chapter 36: Centralization Recommendations 645 36.1 Architecture 645 36.2 Security 645 36.3 Infrastructure 648 36.4 Support 654 36.5 Purchasing 655 36.6 Lab Environments 656 36.7 Summary 656 Exercises 657 Chapter 37: Centralizing a Service 659 37.1 Understand the Current Solution 660 37.2 Make a Detailed Plan 661 37.3 Get Management Support 662 37.4 Fix the Problems 662 37.5 Provide an Excellent Service 663 37.6 Start Slowly 663 37.7 Look for Low-Hanging Fruit 664 37.8 When to Decentralize 665 37.9 Managing Decentralized Services 666 37.10 Summary 667 Exercises 668 Part VIII: Service Recommendations 669 Chapter 38: Service Monitoring 671 38.1 Types of Monitoring 672 38.2 Building a Monitoring System 673 38.3 Historical Monitoring 674 38.4 Real-Time Monitoring 676 38.5 Scaling 684 38.6 Centralization and Accessibility 685 38.7 Pervasive Monitoring 686 38.8 End-to-End Tests 687 38.9 Application Response Time Monitoring 688 38.10 Compliance Monitoring 689 38.11 Meta-monitoring 690 38.12 Summary 690 Exercises 691 Chapter 39: Namespaces 693 39.1 What Is a Namespace? 693 39.2 Basic Rules of Namespaces 694 39.3 Defining Names 694 39.4 Merging Namespaces 698 39.5 Life-Cycle Management 699 39.6 Reuse 700 39.7 Usage 701 39.8 Federated Identity 708 39.9 Summary 709 Exercises 710 Chapter 40: Nameservices 711 40.1 Nameservice Data 711 40.2 Reliability 714 40.3 Access Policy 721 40.4 Change Policies 723 40.5 Change Procedures 724 40.6 Centralized Management 726 40.7 Summary 728 Exercises 728 Chapter 41: Email Service 729 41.1 Privacy Policy 730 41.2 Namespaces 730 41.3 Reliability 731 41.4 Simplicity 733 41.5 Spam and Virus Blocking 735 41.6 Generality 736 41.7 Automation 737 41.8 Monitoring 738 41.9 Redundancy 738 41.10 Scaling 739 41.11 Security Issues 742 41.12 Encryption 743 41.13 Email Retention Policy 743 41.14 Communication 744 41.15 High-Volume List Processing 745 41.16 Summary 746 Exercises 747 Chapter 42: Print Service 749 42.1 Level of Centralization 750 42.2 Print Architecture Policy 751 42.3 Documentation 754 42.4 Monitoring 755 42.5 Environmental Issues 756 42.6 Shredding 757 42.7 Summary 758 Exercises 758 Chapter 43: Data Storage 759 43.1 Terminology 760 43.2 Managing Storage 765 43.3 Storage as a Service 772 43.4 Performance 780 43.5 Evaluating New Storage Solutions 784 43.6 Common Data Storage Problems 787 43.7 Summary 789 Exercises 790 Chapter 44: Backup and Restore 793 44.1 Getting Started 794 44.2 Reasons for Restores 795 44.3 Corporate Guidelines 799 44.4 A Data-Recovery SLA and Policy 800 44.5 The Backup Schedule 801 44.6 Time and Capacity Planning 807 44.7 Consumables Planning 809 44.8 Restore-Process Issues 815 44.9 Backup Automation 816 44.10 Centralization 819 44.11 Technology Changes 820 44.12 Summary 821 Exercises 822 Chapter 45: Software Repositories 825 45.1 Types of Repositories 826 45.2 Benefits of Repositories 827 45.3 Package Management Systems 829 45.4 Anatomy of a Package 829 45.5 Anatomy of a Repository 833 45.6 Managing a Repository 837 45.7 Repository Client 841 45.8 Build Environment 843 45.9 Repository Examples 845 45.10 Summary 848 Exercises 849 Chapter 46: Web Services 851 46.1 Simple Web Servers 852 46.2 Multiple Web Servers on One Host 853 46.3 Service Level Agreements 854 46.4 Monitoring 855 46.5 Scaling for Web Services 855 46.6 Web Service Security 859 46.7 Content Management 866 46.8 Summary 868 Exercises 869 Part IX: Management Practices 871 Chapter 47: Ethics 873 47.1 Informed Consent 873 47.2 Code of Ethics 875 47.3 Customer Usage Guidelines 875 47.4 Privileged-Access Code of Conduct 877 47.5 Copyright Adherence 878 47.6 Working with Law Enforcement 881 47.7 Setting Expectations on Privacy and Monitoring 885 47.8 Being Told to Do Something Illegal/Unethical 887 47.9 Observing Illegal Activity 888 47.10 Summary 889 Exercises 889 Chapter 48: Organizational Structures 891 48.1 Sizing 892 48.2 Funding Models 894 48.3 Management Chain's Influence 897 48.4 Skill Selection 898 48.5 Infrastructure Teams 900 48.6 Customer Support 902 48.7 Helpdesk 904 48.8 Outsourcing 904 48.9 Consultants and Contractors 906 48.10 Sample Organizational Structures 907 48.11 Summary 911 Exercises 911 Chapter 49: Perception and Visibility 913 49.1 Perception 913 49.2 Visibility 925 49.3 Summary 933 Exercises 934 Chapter 50: Time Management 935 50.1 Interruptions 935 50.2 Follow-Through 937 50.3 Basic To-Do List Management 938 50.4 Setting Goals 939 50.5 Handling Email Once 940 50.6 Precompiling Decisions 942
£66.80
Wiley Symbian OS Communications Programming 2 Symbian
Book SynopsisA developera s guide to the Symbian OS (Operating System) Communications Architecture. The Symbian OS Communications Architecture is the cornerstone of Symbian OS -- enabling the combination of voice communications, wireless Internet access and computing functionality.Trade Review"...clear and detailed...the supporting text is lucid and clear..." (www.wirelessdevnet.com, 5 July 2002) "…something useful for everyone…the writing is clear, and the structure makes it easy to learn…" (Forum Nokia, 6 March 12003) "…written in a clear and accessible manner…" (CVu, June 2003)Table of ContentsPreface. Foreword. Section 1: The Basics of Symbian OS Communication. Introduction. Introduction to the Symbian Communication Architecture. Several Introductions to the Architecture Infrastructure. Transport Technologies. Look at Content Technologies. Security and Communication. Section 2: Programming using Symbian OS Communication. Getting Started with Communications Programming. Serial Communications. Communicating via Infrared: Serial Communications. Using Sockets. Communicating via Infrared: Using Sockets. Communicating with TCP/IP. Bluetooth Communications. Telephony. Sending and Receiving Messages. Browsable Content Technologies. Section 3: Miscellaneous Topics. Synchronization: PLP and SyncML. The Communications Database. Looking Ahead. Appendix A Developer Resources and Bibliography. Index.
£27.74
John Wiley & Sons Inc Architecting Enterprise Solutions Patterns for
Book SynopsisBased on real--world problems and systems and illustrated with "war stories," this practical nuts--and--bolts guide to architectural solutions describes step--by--step how to design robustness and flexibility into a system. A running case study illustrates the evolution and iteration of the system as it grows in functionality and capability.Table of ContentsAcknowledgements. An All-Too-Common Story. Introduction. Part 1 Architecture, Patterns and Internet Technology. System Architecture. Internet Technology Systems. Architectural Patterns for Internet Technology Systems. The GlobalTech System. Part 2 The Patterns. Fundamental Patterns. System Performance Patterns. System Control Patterns. System Evolution Patterns. Part 3 Application of the Patterns. GlobalTech Revisited. Appplying the Patterns. Moving on from Here. Appendix Reference Patterns. Bibliography. Glossary.
£23.99
John Wiley & Sons Inc Information Systems 2E wURL A Comprehensive
Book SynopsisHave you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing computer systems--the tools necessary to implement an effective IS audit.Table of ContentsPreface. Acknowledgments. PART ONE: CORE CONCEPTS. Chapter 1. Basics of Computing Systems. Chapter 2. Identifying Computer Systems. PART TWO: STANDARD INFORMATION SYSTEMS AUDIT APPROACH. Chapter 3. Information Systems Audit Program. Chapter 4. Information Systems Security Policies, Standards, and/or Guidelines. Chapter 5. Auditing Service Organization Applications. Chapter 6. Assessing the Financial Stability of Vendor Organizations, Examining Vendor Organization Contracts, and Examining Accounting Treatment of Computer Equipment and Software. Chapter 7. Physical Security. Chapter 8. Logical Security. Chapter 9. Information Systems Operations. PART THREE: CONTEMPORARY INFORMATION SYSTEMS AUDITING CONCEPTS. Chapter 10. Control Self-Assessment and an Application in an Information Systems Environment. Chapter 11. Encryption and Cryptography. Chapter 12. Computer Forensics. Chapter 13. Other Contemporary Information Systems Auditing Challenges. Chapter 14. Humanistic Aspects of Information Systems Auditing. Chapter 15. Information Systems Project Management Audits. Chapter 16. Conclusion. Appendix A: Professional Auditing Associations and Other Organizations Related to Information Systems Auditing and Computer Security. Appendix B: Common Criteria for Information Technology Security Evaluation. Appendix C: The International Organization for Standardization: Seven-Layer Open Systems Interconnection Reference Model. Selected References. Glossary. Index.
£112.50
John Wiley & Sons Inc Operating Systems In Depth
Book SynopsisThis book is designed for a one-semester operating-systems course for advanced undergraduates and beginning graduate students. Prerequisites for the course generally include an introductory course on computer architecture and an advanced programming course. The goal of this book is to bring together and explain current practice in operating systems. This includes much of what is traditionally covered in operating-system textbooks: concurrency, scheduling, linking and loading, storage management (both real and virtual), file systems, and security. However, the book also covers issues that come up every day in operating-systems design and implementation but are not often taught in undergraduate courses. For example, the text includes: Deferred work, which includes deferred and asynchronous procedure calls in Windows, tasklets in Linux, and interrupt threads in Solaris. The intricacies of thread switching, on both uniprocessor and multiprocessor sysTable of Contents1 Introduction. 1.1 Operating Systems. 1.2 A Brief History of Operating Systems. 1.3 A Simple OS. 1.4 Beyond a Simple OS. 1.5 Conclusions. 1.6 Exercises. 1.7 References. 2 Multithreaded Programming. 2.1 Why Threads? 2.2 Programming with Threads. 2.3 Conclusions. 2.4 Exercises. 2.5 References. 3 Basic Concepts. 3.1 Context Switching. 3.2 Input/Output Architectures. 3.3 Dynamic Storage Allocation. 3.4 Linking and Loading. 3.5 Booting. 3.6 Conclusions. 3.7 Exercises. 3.8 References. 4 Operating-System Design. 4.1 A Simple System. 4.2 Rethinking Operating-System Structure. 4.3 Conclusions. 4.4 Exercises. 4.5 References. 5 Processor Management. 5.1 Threads Implementations. 5.2 Interrupts. 5.3 Scheduling. 5.4 Conclusions. 5.5 Exercises. 5.6 References. 6 File Systems. 6.1 The Basics of File Systems. 6.2 Crash Resiliency. 6.3 Directories and Naming. 6.4 Multiple Disks. 6.5 Flash Memory. 6.6 Case Studies. 6.7 Conclusions. 6.8 Exercises. 6.9 References. 7 Memory Management. 7.1 Memory Management in the Early Days. 7.2 Hardware Support for Virtual Memory. 7.3 Operating-System Issues. 7.4 Conclusions. 7.5 Exercises. 7.6 References. 8 Security. 8.1 Security Goals. 8.2 Security Architectures. 8.3 Conclusions. 8.4 Exercises. 8.5 References. 9 Introduction to Networking. 9.1 Network Basics. 9.2 Remote Procedure Call Protocols. 9.3 Conclusions. 9.4 Exercises. 9.5 References. 10 Distributed File Systems. 10.1 The Basics. 10.2 NFS Version 2. 10.3 Common Internet File System (CIFS). 10.4 DFS. 10.5 NFS Version 4. 10.6 Conclusions. 10.7 Exercises. 10.8 References. Appendix URL Index. Glossary. Index.
£153.85
Cambridge University Press Compiling with Continuations
Book SynopsisThis book shows how continuation-passing style is used as an intermediate representation on which to perform optimisations and program transformations. It will be essential reading for compiler writers in both industry and academe, as well as for students and researchers in programming language theory.Trade Review"I recommend the book to language designers and implementors specializing in the functional paradigm." F.G. Pagan, Computing ReviewsTable of ContentsAcknowledgements; 1. Overview; 2. Continuation-passing style; 3. Semantics of the CPS; 4. ML-specific optimizations; 5. Conversion into CPS; 6. Optimization of the CPS; 7. Beta expansion; 8. Hoisting; 9. Common subexpressions; 10. Closure conversion; 11. Register spilling; 12. Space complexity; 13. The abstract machine; 14. Machine-code generation; 15. Performance evaluation; 16. The runtime system; 17. Parallel programming; 18. Future directions; Appendices; Bibliography; Index.
£75.99
O'Reilly Media Learning the Korn Shell 2e
Book SynopsisThe Korn Shell is an interactive command and scripting language for accessing Unixr and other computer systems. This work shows how to use the Korn Shell as a user interface and as a programing environment.Table of ContentsPreface Chapter 1. Korn Shell Basics What Is a Shell? Scope of This Book History of Unix Shells Getting the 1993 Korn Shell Interactive Shell Use Files Input and Output Background Jobs Special Characters and Quoting Chapter 2. Command-Line Editing Enabling Command-Line Editing The History File Emacs Editing Mode Vi Editing Mode The hist Command Finger Habits Chapter 3. Customizing Your Environment The .profile File Aliases Options Shell Variables Customization and Subprocesses Customization Hints Chapter 4. Basic Shell Programming Shell Scripts and Functions Shell Variables Compound Variables Indirect Variable References (namerefs) String Operators Command Substitution Advanced Examples: pushd and popd Chapter 5. Flow Control if/else for case select while and until Chapter 6. Command-Line Options and Typed Variables Command-Line Options Numeric Variables and Arithmetic Arithmetic for Arrays typeset Chapter 7. Input/Output and Command-Line Processing I/O Redirectors String I/O Command-Line Processing Chapter 8. Process Handling Process IDs and Job Numbers Job Control Signals trap Coroutines Shell Subprocesses and Subshells Chapter 9. Debugging Shell Programs Basic Debugging Aids A Korn Shell Debugger Chapter 10. Korn Shell Administration Installing the Korn Shell as the Standard Shell Environment Customization Customizing the Editing Modes System Security Features Appendix A. Related Shells Appendix B. Reference Information Appendix C. Building ksh from Source Code Appendix D. AT&T ast Source Code License Agreement Index
£23.99
O'Reilly Media System Performance Tuning
Book SynopsisThis work covers two distinct areas: performance tuning, or the art of increasing performance for a specific application, and capacity planning, or deciding what hardware best fulfils a given role. This book focuses on the operating system, the underlying hardware, and their interactions.Table of ContentsPreface 1. An Introduction to Performance Tuning An Introduction to Computer Architecture Principles of Performance Tuning Static Performance Tuning Concluding Thoughts 2. Workflow Management Workflow Characterization Workload Control Benchmarking Concluding Thoughts 3. Processors Microprocessor Architecture Caching Process Scheduling Multiprocessing Peripheral Interconnects Processor Performance Tools Concluding Thoughts 4. Memory Implementations of Physical Memory Virtual Memory Architecture Paging and Swapping Consumers of Memory Tools for Memory Performance Analysis Concluding Thoughts 5. Disks Disk Architecture Interfaces Common Performance Problems Filesystems Tools for Analysis Concluding Thoughts 6. Disk Arrays Terminology RAID Levels Software Versus Hardware A Summary of Disk Array Design Software RAID Implementations RAID Recipes Concluding Thoughts 7. Networks Network Principles Physical Media Network Interfaces Network Protocols NFS CIFS via Unix Concluding Thoughts 8. Code Tuning The Two Critical Approaches Techniques for Code Analysis Optimization Patterns Interacting with Compilers Concluding Thoughts 9. Instant Tuning Top Five Tuning Tips Instant Tuning Recipes
£26.99
O'Reilly Media sed awk Pocket Reference
Book SynopsisThis is a reference guide to the information presented in the larger volumes. It presents a concise summary of regular expressions and pattern matching, and summaries of Sed and Awk.Table of ContentsConventions used in this book; matching text; filenames versus patterns; metacharacters; metacharacters, listed by Unix program; examples of searching; the Sed editor; command-line syntax; syntax of Sed commands; group summary of Sed commands; alphabetical summary of Sed commands; the Awk programming language; command-line syntax; important Gawk options; profiling with PGAwk; patterns and procedures; built-in variables; operators variable and array assignment; octal and hexadecimal constants in GAwk; user-defined functions; group listing of Awk functions and commands; coprocesses and sockets with GAwk; implementation limits; alphabetical summary of Awk functions and commands; internationalization with GAwk; additional resources; source code books.
£14.39
O'Reilly Media DNS Bind Cookbook
Book SynopsisDNS and BIND discusses one of the Internet's fundamental building blocks - the distributed host information database that's responsible for translating names into addresses, routing mail to its proper destination, and many other services.Trade Review"I really tried hard to think of something the book should cover that was not already in between the covers, and other than really esoteric stuff, I failed. This is a book for novice and expert alike, and really does make an essential desktop reference for all those creating, modifying or supporting zone files." Raza Rizvi, news@UK "Verdict - Not quite everything there is to know about running BIND, but pretty close - 9/10" - Chris Denton, Linuxformat, March 2003 The book is slim, handy and so full of excellent advice that within a day of my picking it up I had (using the information in it) upgraded a number of BIND servers from v8 to v9 with almost no outage, implementing the new ?rndc? application in the process. I had also implemented dynamically updating sub-domains for containing SVR records for my employer?s new Windows Server 2003 Active Directory domain. Not a bad advert for an extremely useful book!? ? Steven-Ashley Woltering, Ping Dec/Jan
£23.99
O'Reilly Media Sendmail Cookbook
Book SynopsisEach "recipe" in the "sendmail Cookbook "outlines a configuration problem, presents the configuration code that solves that problem, and then explains the code in detail. The book also provides material on STARTTLS and AUTH and LDAP is covered in recipes throughout the book.Trade Review"If you are looking for a companion to a mission-critical sendmail instal, the 'other' bat book is the one for you. If you want to be able to set up and do a few cool things with your own mailserver, this is all you will need. It's written by Craig Hunt too, so you know it's going to be easy to read and accurate." - Nick Veitch, Linux Format, JulyTable of ContentsPreface; 1. Getting Started; 1.1 Downloading the Latest Release 1.2 Installing Sendmail; 1.3 Compiling Sendmail to Use LDAP 1.4 Adding the regex Map Type to Sendmail; 1.5 Compiling Sendmail with SASL Support; 1.6 Compiling Sendmail with STARTTLS Support 1.7 Compiling in STARTTLS File Paths; 1.8 Building a sendmail Configuration; 1.9 Testing a New Configuration; 1.10 Logging Sendmail; 2. Delivery and Forwarding; 2.1 Accepting Mail for Other Hosts; 2.2 Fixing the Alias0 Missing Map Error; 2.3 Reading Aliases via LDAP; 2.4 Configuring Red Hat 7.3 to Read Aliases from a NIS Server; 2.5 Configuring Solaris 8 to Read Aliases from a NIS Server; 2.6 Forwarding to an External Address 2.7 Creating Mailing Lists; 2.8 Migrating Ex-users to New Addresses; 2.9 Delivering Mail to a Program; 2.10 Using Program Names in Mailing Lists; 2.11 Allowing Non-login Users to Forward to Programs; 2.12 Fixing a .forward Loop; 2.13 Enabling the User Database; 3. Relaying; 3.1 Passing All Mail to a Relay 3.2 Passing Outbound Mail to a Relay; 3.3 Passing Local Mail to a Mail Hub; 3.4 Passing Apparently-Local Mail to a Relay; 3.5 Passing UUCP Mail to a Relay; 3.6 Relaying Mail for All Hosts in a Domain; 3.7 Relaying Mail for Individual Hosts; 3.8 Configuring Relaying on a Mail Exchanger; 3.9 Loading Class R via LDAP 3.10 Relaying Only Outbound Mail; 4. Masquerading 4.1 Adding Domains to All Sender Addresses; 4.2 Masquerading the Sender Hostname; 4.3 Eliminating Masquerading for the Local Mailer 4.4 Forcing Masquerading of Local Mail; 4.5 Masquerading Recipient Addresses; 4.6 Masquerading at the Relay Host; 4.7 Limiting Masquerading; 4.8 Masquerading All Hosts in a Domain; 4.9 Masquerading Most of the Hosts in a Domain; 4.10 Masquerading the Envelope Address; 4.11 Rewriting the From Address with the genericstable; 4.12 Rewriting Sender Addresses for an Entire Domain 4.13 Masquerading with LDAP; 4.14 Reading the genericstable via LDAP; 5. Routing Mail; 5.1 Routing Mail to Special Purpose Mailers; 5.2 Sending Error Messages from the mailertable; 5.3 Disabling MX Processing to Avoid Loops; 5.4 Routing Mail for Local Delivery; 5.5 Reading the mailertable via LDAP; 5.6 Routing Mail for Individual Virtual Hosts; 5.7 Routing Mail for Entire Virtual Domains; 5.8 Reading the virtusertable via LDAP; 5.9 Routing Mail with LDAP; 5.10 Using LDAP Routing with Masquerading 6. Controlling Spam 6.1 Blocking Spam with the access Database 6.2 Preventing Local Users from Replying to Spammers 6.3 Reading the access Database via LDAP; 6.4 Using a DNS Blackhole List Service; 6.5 Building Your Own DNS Blackhole List; 6.6 Whitelisting Blacklisted Sites; 6.7 Filtering Local Mail with procmail; 6.8 Filtering Outbound Mail with procmail; 6.9 Invoking Special Header Processing; 6.10 Using Regular Expressions in Sendmail; 6.11 Identifying Local Problem Users; 6.12 Using MILTER; 6.13 Bypassing spam checks; 6.14 Enabling spam checks on a per-user basis; 7. Authenticating with AUTH; 7.1 Offering AUTH Authentication; 7.2 Authenticating with AUTH; 7.3 Storing AUTH Credentials in the authinfo File; 7.4 Limiting Advertised Authentication Mechanisms; 7.5 Using AUTH to Permit Relaying 7.6 Controlling the AUTH= Parameter; 7.7 Avoiding Double Encryption; 7.8 Requiring Authentication; 7.9 Selectively Requiring Authentication; 8. Securing the Mail Transport 8.1 Building a Private Certificate Authority; 8.2 Creating a Certificate Request; 8.3 Signing a Certificate Request; 8.4 Configuring Sendmail for STARTTLS; 8.5 Relaying Based on the CA 8.6 Relaying Based on the Certificate Subject; 8.7 Requiring Outbound Encryption; 8.8 Requiring Inbound Encryption; 8.9 Requiring a Verified Certificate; 8.10 Requiring TLS For a Recipient; 8.11 Refusing STARTTLS Service; 8.12 Selectively Advertising STARTTLS; 8.13 Requesting Client Certificates; 9. Managing the Queue 9.1 Creating Multiple Queues; 9.2 Using qf, df and xf Subdirectories; 9.3 Defining Queue Groups; 9.4 Assigning Recipients to Specific Queues; 9.5 Using Persistent Queue Runners 9.6 Using a Queue Server; 9.7 Setting Protocol Timers 10. Securing Sendmail; 10.1 Limiting the Number of Sendmail Servers; 10.3 Updating to Close Security Holes; 10.4 Patching to Close Security Holes; 10.5 Disabling Delivery to Programs 10.6 Controlling Delivery to Programs; 10.7 Disabling Delivery to Files; 10.8 Bypassing User .forward Files; 10.9 Controlling Delivery to Files; 10.10 Running Sendmail Non-set-user-ID root 10.11 Setting a Safe Default Userid; 10.12 Defining Trusted Users 10.13 Identifying the Sendmail Administrator; 10.14 Limiting the SMTP Command Set; 10.15 Requiring a Valid HELO; 10.16 Restricting Command-line Options; 10.17 Denying DoS Attacks; Index
£29.99
O'Reilly Media Extreme Programming Pocket Guide
Book SynopsisThis new pocket guide serves as a clear-cut introduction to Extreme Programming by summarizing the goals, rules, and general philosophy of XP in a short, concise manner, allowing programmers to quickly come up to speed on why and how they can use this approach in large-scale corporation.Table of ContentsForeword Preface Part I: Why XP? Who Cares About Process, Anyway? The XP Equation XP Values Communication Feedback Simplicity Courage Assuming Sufficiency Sufficient Time Sufficient Resources Constant Cost of Change Developer Effectiveness Freedom to Experiment Part II: Extreme Programming Practices Coding Practices Coding Practice 1: Code and Design Simply Coding Practice 2: Refactor Mercilessly Coding Practice 3: Develop Coding Standards Coding Practice 4: Develop a Common Vocabulary Developer Practices Developer Practice 1: Adopt Test-Driven Development Developer Practice 2: Practice Pair Programming Developer Practice 3: Adopt Collective Code Ownership Developer Practice 4: Integrate Continually Business Practices Business Practice 1: Add a Customer to the Team Business Practice 2: Play the Planning Game Business Practice 3: Release Regularly Business Practice 4: Work at a Sustainable Pace Part III: XP Events Iteration Planning Stories and Tasks Estimates and Schedules The First Iteration The Iteration Releasing Part IV: Extreme Programming Artifacts Story Cards Task Cards The Bullpen Part V: Roles in Extreme Programming The Customer Customer Rights Customer Responsibilities The Developer Developer Rights Developer Responsibilities Supplementary Roles The Tracker The Coach Part VI: Coding, XP Style Do the Simplest Thing That Could Possibly Work You Aren't Gonna Need It Once and Only Once Part VII: Adopting XP Before You Start Eliminating Fear and Working Together Starting Feedback Including Managers and Customers Now That You're Extreme Part VIII:Further Resources XP Resources Index
£13.59
O'Reilly Media Samba Pocket Reference 2e
Book SynopsisThis text describes all the options for Samba's configuration file in quick-reference format. It also contains command-line options and related information on the use of the Samba daemons (smbd, nmbd, and winbindd)and the utilities in the Samba distribution.Table of ContentsIntroduction Configuration File Options Glossary of Configuration Value Types Configuration File Variables Samba Daemons smbd nmbd winbindd Samba Distribution Programs findsmb make_smbcodepage make_unicodemap net nmblookup pdbedit rpcclient rpcclient commands smbcacls smbclient smbcontrol smbgroupedit smbmnt smbmount smbpasswd smbsh smbspool smbstatus smbtar smbumount testparm testprns wbinfo Example Configuration Files Samba in a Workgroup Samba in a Windows NT Domain Index
£7.59
O'Reilly Media SELinux
Book SynopsisTable of ContentsPreface; 1. Introducing SELinux; Software Threats and the Internet; SELinux Features; Applications of SELinux; SELinux History; Web and FTP Sites; 2. Overview of the SELinux Security Model; Subjects and Objects; Security Contexts; Transient and Persistent Objects; Access Decisions; Transition Decisions SELinux Architecture; 3. Installing and Initially Configuring SELinux; SELinux Versions; Installing SELinux; Linux Distributions Supporting SELinux; Installation Overview; Installing SELinux from Binary or Source Packages; Installing from Source; 4. Using and Administering SELinux; System Modes and SELinux Tuning; Controlling SELinux; Routine SELinux System Use and Administration; Monitoring SELinux; Troubleshooting SELinux 5. SELinux Policy and Policy Language Overview; The SELinux Policy Two Forms of an SELinux Policy; Anatomy of a Simple SELinux Policy Domain; SELinux Policy Structure; 6. Role-Based Access Control The SELinux Role-Based Access Control Model; Railroad Diagrams SELinux Policy Syntax; User Declarations; Role-Based Access Control Declarations; 7. Type Enforcement; The SELinux Type-Enforcement Model; Review of SELinux Policy Syntax; Type-Enforcement Declarations; Examining a Sample Policy; 8. Ancillary Policy Statements; Constraint Declarations; Other Context-Related Declarations; Flask-Related Declarations 9. Customizing SELinux Policies; The SELinux Policy Source Tree On the Topics of Difficulty and Discretion; Using the SELinux Makefile; Creating an SELinux User; Customizing Roles Adding Permissions; Allowing a User Access to an Existing Domain Creating a New Domain; Using Audit2allow; Policy Management Tools; The Road Ahead; A. Security Object Classes; B. SELinux Operations; C. SELinux Macros Defined in src/policy/macros D. SELinux General Types; E. SELinux Type Attributes; Index
£23.99
O'Reilly Media JUNOS Cookbook
Book SynopsisTalks about JUNOS software and provides over 200 techniques including discussions about the processes and alternative ways to perform the same task.
£32.99
O'Reilly Media Knoppix Pocket Reference
Book SynopsisKnoppix is a portable Linux distribution replete with hundreds of valuable programs and utilities - a veritable Swiss Army knife in bootable CD form. It includes Linux software and desktop environments, automatic hardware detection and hundreds of other source programs. This reference provides more information for the Knoppix user.
£7.59
O'Reilly Media ScreenOS Cookbook
Book SynopsisHelps you troubleshoot secure networks that run ScreenOS firewall appliances. This book offers recipes that address a range of security issues; provides solutions; and, includes discussions of why the recipes work, so you can set up and keep ScreenOS systems on track.
£32.99
O'Reilly Media Rails Cookbook
Book SynopsisProvides solutions to work with Rails, the framework for building the Web 2.0 applications. This book includes basics, like installing Rails and setting up your development environment. It addresses scores of real-world challenges; each one includes a tested solution, as well as a discussion of how and why it works.Table of ContentsForeword Preface 1. Getting Started Introduction Joining the Rails Community Finding Documentation Installing MySQL Installing PostgreSQL Installing Rails Fixing Ruby and Installing Rails on OS X 10.4 Tiger Running Rails in OS X with Locomotive Running Rails in Windows with Instant Rails Updating Rails with RubyGems Getting Your Rails Project into Subversion 2. Rails Development Introduction Creating a Rails Project Jump-Starting Development with Scaffolding Speeding Up Rails Development with Mongrel Enhancing Windows Development with Cygwin Understanding Pluralization Patterns in Rails Developing Rails in OS X with TextMate Cross-Platform Developing with RadRails Installing and Running Edge Rails Setting Up Passwordless Authentication with SSH Generating RDoc for Your Rails Application Creating Full-Featured CRUD Applications with Streamlined 3. Active Record Introduction Setting Up a Relational Database to Use with Rails Programmatically Defining Database Schema Developing Your Database with Migrations Modeling a Database with Active Record Inspecting Model Relationships from the Rails Console Accessing Your Data via Active Record Retrieving Records with find Iterating Over an Active Record Result Set Retrieving Data Efficiently with Eager Loading Updating an Active Record Object Enforcing Data Integrity with Active Record Validations Executing Custom Queries with find_by_sql Protecting Against Race Conditions with Transactions Adding Sort Capabilities to a Model with acts_as_list Performing a Task Whenever a Model Object Is Created Modeling a Threaded Forum with acts_as_nested_set Creating a Directory of Nested Topics with acts_as_tree Avoiding Race Conditions with Optimistic Locking Handling Tables with Legacy Naming Conventions Automating Record Timestamping Factoring Out Common Relationships with Polymorphic Associations Mixing Join Models and Polymorphism for Flexible Data Modeling 4. Action Controller Introduction Accessing Form Data from a Controller Changing an Application's Default Page Clarifying Your Code with Named Routes Configuring Customized Routing Behavior Displaying Alert Messages with Flash Extending the Life of a Flash Message Following Actions with Redirects Generating URLs Dynamically Inspecting Requests with Filters Logging with Filters Rendering Actions Restricting Access to Controller Methods Sending Files or Data Streams to the Browser Storing Session Information in a Database Tracking Information with Sessions Using Filters for Authentication 5. Action View Introduction Simplifying Templates with View Helpers Displaying Large Datasets with Pagination Creating a Sticky Select List Editing Many-to-Many Relationships with Multiselect Lists Factoring Out Common Display Code with Layouts Defining a Default Application Layout Generating XML with Builder Templates Generating RSS Feeds from Active Record Data Reusing Page Elements with Partials Processing Dynamically Created Input Fields Customizing the Behavior of Standard Helpers Creating a Web Form with Form Helpers Formatting Dates, Times, and Currencies Personalizing User Profiles with Gravatars Avoiding Harmful Code in Views with Liquid Templates Globalizing Your Rails Application 6. RESTful Development Introduction Creating Nested Resources Supporting Alternative Data Formats by MIME Type Modeling Relationships RESTfully with Join Models Moving Beyond Simple CRUD with RESTful Resources Consuming Complex Nested REST Resources Developing Your Rails Applications RESTfully 7. Rails Application Testing Introduction Centralizing the Creation of Objects Common to Test Cases Creating Fixtures for Many-to-Many Associations Importing Test Data with CSV Fixtures Including Dynamic Data in Fixtures with ERb Initializing a Test Database Interactively Testing Controllers from the Rails Console Interpreting the Output of Test::Unit Loading Test Data with YAML Fixtures Monitoring Test Coverage with rake stats Running Tests with Rake Speeding Up Tests with Transactional Fixtures Testing Across Controllers with Integration Tests Testing Controllers with Functional Tests Examining the Contents of Cookie Testing Custom and Named Routes Testing HTTP Requests with Response-Related Assertions Testing a Model with Unit Tests Unit Testing Model Validations Verifying DOM Structure with Tag-Related Assertions Writing Custom Assertions Testing File Upload Modifying the Default Behavior of a Class for Testing by Using Mocks Improving Feedback by Running Tests Continuously Analyzing Code Coverage with Rcov8. JavaScript and Ajax Introduction Adding DOM Elements to a Page Creating a Custom Report with Drag and Drop Dynamically Adding Items to a Select List Monitoring the Content Length of a Textarea Updating Page Elements with RJS Templates Inserting JavaScript into Templates Letting a User Reorder a List Autocompleting a Text Field Searching for and Highlighting Text Dynamically Enhancing the User Interface with Visual Effects Implementing a Live Search Editing Fields in Place Creating an Ajax Progress Indicator 9. Action Mailer Introduction Configuring Rails to Send Email Creating a Custom Mailer Class with the Mailer Generator Formatting Email Messages Using Templates Attaching Files to Email Messages Sending Email from a Rails Application Receiving Email with Action Mailer 10. Debugging Rails Applications Introduction Exploring Rails from the Console Fixing Bugs at the Source with Ruby -cw Debugging Your Application in Real Time with the breakpointer Logging with the Built-in Rails Logger Class Writing Debugging Information to a File Emailing Application Exceptions Outputting Environment Information in Views Displaying Object Contents with Exceptions Filtering Development Logs in Real Time Debugging HTTP Communication with Firefox Extensions Debugging Your JavaScript in Real Time with the JavaScript Shell Debugging Your Code Interactively with ruby-debug 11. Security Introduction Hardening Your Systems with Strong Passwords Protecting Queries from SQL Injection Guarding Against Cross-Site Scripting Attacks Restricting Access to Public Methods or Actions Securing Your Server by Closing Unnecessary Ports 12. Performance Introduction Measuring Web Server Performance with Httperf Benchmarking Portions of Your Application Code Improving Performance by Caching Static Pages Expiring Cached Pages Mixing Static and Dynamic Content with Fragment Caching Filtering Cached Pages with Action Caching Speeding Up Data Access Times with memcached Increasing Performance by Caching Post-Processed Content13. Hosting and Deployment Introduction Hosting Rails Using Apache 1.3 and mod_fastcgi Managing Multiple Mongrel Processes with mongrel_cluster Hosting Rails with Apache 2.2, mod_proxy_balancer, and Mongrel Deploying Rails with Pound in Front of Mongrel, Lighttpd, and Apache Customizing Pound's Logging with cronolog Configuring Pound with SSL Support Simple Load Balancing with Pen Deploying Your Rails Project with Capistrano Deploying Your Application to Multiple Environments with Capistrano Deploying with Capistrano When You Can't Access Subversion Deploying with Capistrano and mongrel_cluster Disabling Your Web Site During Maintenance Writing Custom Capistrano Tasks Cleaning Up Residual Session Records 14. Extending Rails with Plug-ins Introduction Finding Third-Party Plug-ins Installing Plug-ins Manipulating Record Versions with acts_as_versioned Building Authentication with acts_as_authenticated Simplifying Folksonomy with the acts_as_taggable Extending Active Record with acts_as Adding View Helpers to Rails as Plug-ins Uploading Files with file_column Uploading Files with acts_as_attachment Disabling Records Instead of Deleting Them with acts_as_paranoid Adding More Elaborate Authentication Using the Login Engine 15. Graphics Introduction Installing RMagick for Image Processing Uploading Images to a Database Serving Images Directly from a Database Creating Resized Thumbnails with RMagick Generating PDF Documents Visually Displaying Data with Gruff Creating Small, Informative Graphs with Sparklines A. Migrating to Rails 1.2 Action Controller Active Record Action View Index
£23.99
John Wiley & Sons Inc DNS for Dummies
Book SynopsisAn entry level guide to Domain Name System (DNS), which translates Internet host names into IP addresses and is used with Internet servers. This book helps beginning systems administrators learn how to install, configure, and troubleshoot DNS on both Windows and UNIX servers.Table of ContentsIntroduction. Part I: How DNS Makes the Internet Go ’Round. Chapter 1: The Basics of DNS. Chapter 2: DNS Namespaces. Chapter 3: The DNS Request Process. Chapter 4: Facilitating Other Applications with DNS. Part II: Working with DNS Clients. Chapter 5: Configuring a DNS Client. Chapter 6: Using the DNS Clients on Your System. Part III: Working with DNS Servers. Chapter 7: Installing a Microsoft DNS Server. Chapter 8: Unix Domain Name Servers. Part IV: The Details: Setting Up Your DNS Zones. Chapter 9: The Basics: Zones and Records. Chapter 10: Using Subdomains. Part V: Security and Advanced DNS Tricks. Chapter 11: An Antidote for a Poisoned Cache: DNS Security. Chapter 12: What Else Can DNS Do? Chapter 13: “It Doesn’t Work!” (Troubleshooting). Part VI: The Part of Tens. Chapter 14: Ten DNS Services and Resources. Chapter 15: Ten Things Even Experienced People Do to Make DNS Break. Chapter 16: The Top Ten Tips for Maintaining a Manageable DNS Server. Chapter 17: The Top Ten DNS Server Design Considerations. Appendix A: Using the DNSCMD Utility. Appendix B: Using Webmin for BIND Administration. Appendix C: Other DNS Server Applications. Index.
£22.39
Pearson Education MCSA 70740 Cert Guide
Book Synopsis
£33.29
CRC Press Computer and Cyber Security
Book SynopsisThis is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.Table of Contents1 Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior. 2 Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port. 3 Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk. 4 Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse. 5 A Systematic Review of Attack Graph Generation and Analysis Techniques. 6 Biometric-Based Authentication in Cloud Computing. 7 Analysis of Various Trust Computation Methods: A Step toward Secure FANETs. 8 Security in Wireless LAN (WLAN) and WiMAX Systems. 9 Botnet Behavior and Detection Techniques: A Review. 10 Overview of Smartphone Security: Attack and Defense Techniques. 11 Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues. 12 Medical Image Enhancement Techniques: A Survey. 13 Extraction of Malware IOCs and TTPs Mapping with CoAs. 14 Implementing a Secure Web-Based Application Using Microsoft SDL 15 Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption. 16 DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms. 17 Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks. 18 Applications of Digital Signatures in Cryptography. 19 Credit Scoring Using Birds Swarm Optimization. 20 A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes. 21 Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures. 22 Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective. 23 A Compendium of Security Issues in Wireless Sensor Networks. 24 Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime.
£142.50
IEEE Computer Society Press,U.S. Additive Cellular Automata
Book Synopsis
£65.66
IEEE Computer Society Press,U.S. Distributed Shared Memory
Book Synopsis
£105.26
Bernard Babani Publishing MSDOS 6 Explained BP S
Book Synopsis
£6.99
Mike Murach & Associates Inc. MVS TSO Concepts and ISPF Pt1
Book Synopsis
£35.19
Wood Islands Prints C and the 8051 4th Edition
£31.50
£51.04
Recursive Books Operating Systems Principles and Practice
£52.25
CRC Press Bootstrap
Book SynopsisIf you want to build websites, understanding Bootstrap will save you a lot of time and effort. Bootstrap is a user-friendly CSS framework that allows developers to create mobile-friendly and responsive websites. Bootstrap is the most widely used framework for creating mobile-first, responsive websites. It fixes a number of issues that we experienced previously, including cross-browser compatibility. Today, webpages are optimized for all browsers (Internet Explorer, Firefox, and Chrome, to name but a few) and screen sizes (desktop, tablets, phablets, and phones). Regardless of project size, Bootstrap provides a solid foundation for any website. It includes Reboot, which is based on Normalize.css and aids with the smoothing out of browser disparities for various page elements. Bootstrap also has fantastic typography. Checkboxes, radio buttons, choose choices, and other basic HTML form elements have been restyled to give them a more modern look.Bootstrap's scope extends b
£46.54