![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
This book contains 36 chapters and is structured to facilitate readers to grasp concepts, understand implementation procedures, learn command syntax, configuration files and daemons involved, and understand basic troubleshooting. The 36 chapters are divided into three key areas: UNIX Fundamentals, HP-UX System Administration and HP-UX Network Administration. These chapters cover topics that are on HP s recommended certification courses UNIX Fundamentals, System and Network Administration I, System and Network Administration II, and HP-UX for Experienced UNIX System Administrators as well as on official exam objectives list. 1.UNIX Fundamentals (chapters 1 to 6, and 22) covers the basics of UNIX and HP-UX. Most information is not specific to a particular UNIX flavor, rather, includes general UNIX concepts, file manipulation and security techniques, vi editor, shell and awk programming, basic commands and other essential topics. Unlike many other similar books, a chapter on shell scripting is presented after covering HP-UX System Administration area. This is done purposely to provide readers with practical examples based on the knowledge they gain from UNIX Fundamentals and HP-UX System Administration chapters. 2.HP-UX System Administration (chapters 7 to 21) covers the HP-UX-specific system administration concepts and topics including server hardware information and mass storage stack; virtualization technologies and HP-UX installation; software and patch management; user and group administration; LVM and file system administration; EVFS and swap management; system shutdown and startup procedures; kernel configuration and management techniques; backup and restore functions; printer and print request management, job automation and process control; and system logging and performance monitoring. 3.HP-UX Network Administration (chapters 23 to 36) covers HP-UX network and security administration concepts and topics such as OSI and TCP/IP reference models; network hardware overview and LAN interface administration; IP subnetting and routing techniques; basic network testing and troubleshooting; internet services and sendmail; time synchronization (NTP) and resource sharing (NFS, AutoFS and CIFS) services; naming (DNS, NIS and LDAP) services and automated installation techniques; and high-availability concepts and system security tools and practices. Throughout the book figures, tables, screen shots and examples are given for explanation purposes. The book includes 863 exam review questions with answers.
Like the first edition of this book, the second edition also covers three main objectives to provide a comprehensive resource to individuals, including novice, IT/Non-HP-UX administrators, and HP-UX administrators who intend to take the new HP Certified Systems Administrator exam HP0-095 and pass it; to provide a quick and valuable on-the-job resource to HP-UX administrators, administrators of other UNIX operating systems, IT managers, programmers, and DBAs working in the HP-UX environment; and to provide an easy-to-understand guide to novice and IT/non-HP-UX administrators who intend to learn HP-UX from the beginning. This book contains 38 chapters and is structured to facilitate readers to grasp concepts, understand implementation procedures, understand basic troubleshooting, learn command syntax, configuration files, and daemons involved. The 38 chapters are divided into three key areas: UNIX Fundamentals, HP-UX System Administration, and HP-UX Network Administration. 1. UNIX Fundamentals (chapters 1 to 6 and 23) covers the basics of UNIX. Most information is not specific to a particular UNIX flavor, rather includes general UNIX concepts, file manipulation and security techniques, vi editor, shell and awk programming, basic commands, and other essential topics. Unlike many other similar books, a chapter on shell scripting is presented after covering HP-UX System Administration area. This is done purposely to supply readers with practical examples based on the knowledge they gain from UNIX Fundamentals and HP-UX System Administration chapters. 2. HP-UX System Administration (chapters 7 to 22) covers the HP-UX-specific system administration concepts and topics, including system partitioning and HP-UX installation; software and patch management; user and group administration; LVM and VxVM management; file system and swap administration; system shutdown and startup procedures; kernel configuration and reconfiguration techniques; backup and restore functions; printer and print request management, job automation and process control; and system logging and performance monitoring. 3. HP-UX Network Administration (chapters 24 to 38) covers HP-UX network administration concepts and topics, such as OSI and TCP/IP reference models; network hardware overview and LAN card administration; IP subnetting and routing techniques; basic network testing and troubleshooting; internet services and sendmail; time synchronization (NTP) and resource sharing (NFS, AutoFS, and CIFS) services; naming (DNS, NIS, and LDAP) and boot services; automated installation techniques and high-availability concepts; and system security and hardening. Each chapter begins with a list of major topics to be covered in the chapter and ends with a summary. Throughout the book, tables, figures, screen shots, and examples are given for explanation purposes. The output generated because of running commands and shell scripts is highlighted in light grey background to differentiate from surrounding text. The book includes several appendices, one of which contains 672 practice exam questions. Answers to practice exam questions and tables of commands, important files, and service daemons are included in appendix area as well.
This slightly revised 4th edition includes two example projects from the earlier editions not found in the third edition but is otherwise unchanged. As before it includes a massive amount of information about the 8051-family of microcontrollers and techniques for programming them in the C language. There is a strong emphasis on interrupt-driven programming and operating systems as well as many algorithms related to typical microcontroller interfacing. There is extensive ground-up coverage of serial interfacing and small-area networks.
"Operating System" is the most essential program of all, without which it becomes cumbersome to work with a computer. It is the interface between the hardware and computer users making the computer a pleasant device to use. "The Operating System: Concepts and Techniques" clearly defines and explains the concepts: process (responsibility, creation, living, and termination), thread (responsibility, creation, living, and termination), multiprogramming, multiprocessing, scheduling, memory management (non-virtual and virtual), interprocess communication/synchronization (busy-wait-based, semaphore-based, and message-based), deadlock, and starvation. Real-life techniques presented are based on UNIX, Linux, and contemporary Windows. The book has briefly discussed agent-based operating systems, macro-kernel, microkernel, extensible kernels, distributed, and real-time operating systems. The book is for everyone who is using a computer but is still not at ease with the way the operating system manages programs and available resources in order to perform requests correctly and speedily. High school and university students will benefit the most, as they are the ones who turn to computers for all sorts of activities, including email, Internet, chat, education, programming, research, playing games etc. It is especially beneficial for university students of Information Technology, Computer Science and Engineering. Compared to other university textbooks on similar subjects, this book is downsized by eliminating lengthy discussions on subjects that only have historical value.
This practical introduction to OpenLDAP for Application Developers emphasizes how to get things done, going into Lightweight Directory Access Protocol (LDAP) theory only to answer practical questions. It demystifies OpenLDAP, providing a solid understanding of how to use its directory and covering building directory services, integrating directory services, and developing directory-enabled PHP or Python applications. Readers need only basic Linux system administration experience, not LDAP experience. Open-source OpenLDAP directory server is included in all major Linux distributions; many open-source and proprietary applications can use OpenLDAP's services. Client applications use LDAP to connect to OpenLDAP, search the directory, and (if authorized) modify and manipulate records. Most often used to provide network-based authentication services for users, LDAP servers have many other uses: address book, DNS database, organizational tool, even network object store for applications.
This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users. IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most important is that it sets this all up for you in a highly automated and simplified way. This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and networking and why they're important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, VPN and using it for bandwidth management. While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples. Chapter 1 briefly introduces some firewall and networking concepts. The chapter introduces the roles of several common networking devices and explains how firewalls fit into this. Chapter 2 introduces the IPCop package itself, discussing how IPCop's red/orange/blue/green interfaces fit into a network topology. It then covers the configuration of IPCop in other common roles, such as those of a web proxy, DHCP, DNS, time, and VPN server. Chapter 3 covers three sample scenarios where we learn how to deploy IPCop, how IPCop interfaces connect to each other and to the network as a whole. Chapter 4 covers installing IPCop. It outlines the system configuration required to run IPCop, and explains the configuration required to get IPCop up and running. In Chapter 5, we will learn how to employ the various tools IPCop provides us with to administrate, operate, troubleshoot, and monitor our IPCop firewall Chapter 6 starts off with explaining the need for an IDS in our system and then goes on to explain how to use the SNORT IDS with IPCop. Chapter 7 introduces the VPN concept and explains how to set up an IPSec VPN configuration for a system. Special focus is laid on configuring the blue zone - a secured wireless network augmenting the security of a wireless segment, even one already using WEP or WPA. Chapter 8 demonstrates how to manage bandwidth using IPCop making use of traffic shaping techniques and cache management. The chapter also covers the configuration of the Squid web proxy and caching system. Chapter 9 focuses on the vast range of add-ons available to configure IPCop to suit our needs. We see how to install add-ons and then learn more about common add-ons like SquidGuard, Enhanced Filtering, Blue Access, LogSend, and CopFilter. Chapter 10 covers IPCop security risks, patch management and some security and auditing tools and tests. Chapter 11 outlines the support IPCop users have in the form of mailing lists and IRC. The book is suitable for anyone interested in securing their networks with IPCop - from those new to networking and firewalls, to networking and IT Professionals with previous experience of IPCop. No knowledge of Linux or IPCop is required.
Penguin in the Pew clears up the confusion about the terms "free" and "open source," addresses the challenges of hardware compatibility, software interoperability, and whether a migration is really more expensive than an upgrade. Readers will learn why and how they should migrate to the GNU/Linux operating system. Additionally, Penguin in the Pew connects readers to the growing community of Christians who use, develop and provide technical support for GNU/Linux and other free and open source applications. The book's author, Don Parris, invites fellow Christians to join in a dialogue where the GNU/Linux "philosophy" and Christian values intersect.
This open access book provides an overview of the work developed within the SODALITE project, which aims at facilitating the deployment and operation of distributed software on top of heterogeneous infrastructures, including cloud, HPC and edge resources. The experts participating in the project describe how SODALITE works and how it can be exploited by end users. While multiple languages and tools are available in the literature to support DevOps teams in the automation of deployment and operation steps, still these activities require specific know-how and skills that cannot be found in average teams. The SODALITE framework tackles this problem by offering modelling and smart editing features to allow those we call Application Ops Experts to work without knowing low level details about the adopted, potentially heterogeneous, infrastructures. The framework offers also mechanisms to verify the quality of the defined models, generate the corresponding executable infrastructural code, automatically wrap application components within proper execution containers, orchestrate all activities concerned with deployment and operation of all system components, and support on-the-fly self-adaptation and refactoring.
"Professional WinFX Beta": covers 'Avalon' Windows Presentation Foundation and 'Indigo' Windows Communication Foundation. Windows development is about to dramatically change! WinFX is an object-oriented API that will allow you to create applications that take advantage of the exciting features in Windows[registered] Vista (previously known as 'Longhorn') while remaining compatible with Windows[registered] XP SP2 and Windows Server 2003. Written by a team of Microsoft experts, this book introduces you to the pillars of this next-generation operating system, guiding you through the Windows Presentation Foundation (previously known as 'Avalon') and the Windows Communication Foundation (previously known as 'Indigo'). You'll first learn how to use the new Windows Presentation Foundation to create effective forms, use the XAML markup language, work with 2D and 3D graphics, and see how XAML interoperates with existing Windows Forms technology. Then you'll discover how to build Web Services and improve communication capabilities with the Windows Communication Foundation and architecture. You'll learn how to migrate existing DCOM and .N ET remoting applications to Windows Communication Foundation or to make them interoperate with Windows Communication Foundation. Finally you'll work with integrating Microsoft ADO.NET and ASP.NET with Windows Presentation Foundation forms and data in the WinFX framework. What you will learn from this book are: techniques for creating and deploying WinFX applications from scratch and upgrading your current Windows .NET applications to incorporate WinFX; how to use XAML to build a variety of forms, from simple to complex implementations; best practices for working with the Windows Presentation Foundation's themes, controls, annotation, and 3D features; to implement secure, reliable messaging and transactions with Windows Communication Foundation and Microsoft Message Queueing; to work with WinFX on any supported platform: Windows XP SP2, Windows Server 2003, or Windows Vista; and, how to develop and implement Web Services using the Windows Communication Foundation. Who this book is for? This book is for the experienced Windows .N ET programmer who wants to learn how to develop complex applications using the innovative features of Microsoft Windows Vista, Microsoft's WinFX beta 1 framework, the Windows Presentation Foundation, and the Windows Communication Foundation. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.
This book will meet the needs of those LINUX users who wish to set
up a desktop LINUX workstations, and integrate them into their
corporate environment.
Learn techniques used for the Linux, Macintosh and Windows operating systems in a quick and easy side-by-side format. Anyone from the beginner to the advanced can benefit by reading "What Was It? " There is something for everyone. Learn the language and structure of computing. Learn how to and what to look for when purchasing computers and peripherals. Learn how to format a hard drive and re-install an operating system. Detailed charts and examples throughout "What Was It? " will compare the similarities, differences and benefits of operating systems, computers and peripherals. Fear not the technology revolution. Gain insight and master the techniques.
An introduction to operating systems, covering processes, states of processes, synchronization, programming methods of synchronization, main memory, secondary storage and file systems. Although the book is short, it covers all the essentials and opens up synchronization by introducing a metaphor: producer--consumer that other authors have employed. The difference is that the concept is presented without the programming normally involved with the concept. The thinking is that using a warehouse, the size of which is the shared variable in synchronization terms, without the programming will aid in understanding to this difficult concept. The book also covers main memory, secondary storage with file systems, and concludes with a brief discussion of the client-server paradigm and the way in which client-server impacts the design of the World-Wide Web.
"The definitive tool to learn what's proper for Microsoft Windows systems. Roberta's excellent guidance will easily help you build secure, resiliant systems." --Steve Riley, Security Business and Technology Unit, Windows Division, Microsoft Corporation Take a proactive approach to network security by hardening your Windows systems against attacks before they occur. Written by security evangelist Roberta Bragg, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Whether you have one Windows server or one hundred, you'll get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan. With coverage of Windows 95/98/NT 4.0/2000/XP and Windows Server 2003, this book is an essential security tool for on-the-job IT professionals. Features a four-part hardening methodology: Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack Take It From The Top--Systematic approach to hardening your enterprise from the top down, focusing on authentication, access controls, borders, logical security boundaries, communications, storage, and administrative authority Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing How to Succeed At Hardening Your Windows Systems--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program Roberta Bragg, CISSP, MCSE: Security, Security+, co-author of Network Security: The Complete Reference, instructor, and consultant, focuses on how to proactively deploy proven security principles to defend Windows systems from possible attack. Roberta is the Security Advisor columnist for MCP magazine, the Security Expert for searchWin2000.com, and writes for the Security Watch newsletter. Roberta is the series editor of McGraw-Hill/Osborne's Hardening security series.
In 2004/5, over half of IT professionals will be looking at open
source, most for the first time. This book provides key tools for
System administrators, Network Administrators, IT project managers,
and consultants who must evaluate and deploy open source software.
Everybody has problems using technology, from heating controls through to video recorders. Move to computers and the problems are even worse; even the simplest computer programs seem to behave in strange ways. This book considers the problems of usability of technology and examines the factors that play a role in the design of such systems. Its goal is to introduce students and those working in related areas to the issues and to support them in analyzing problems and coming up with their own designs. It covers the issues surrounding the design of everyday technology before bringing computers into the picture and looking at how those issues change with the design of the user interface to computer systems. There are plenty of good seminar style exercises with accompanying guidelines. The text uses numerous real-world examples to get its message across and it does so in an 'amusing and authoritative' style. It steers clear of technical issues which means that it is very general in nature, that it retains its relevance as technologies change and that the text does not get bogged down in technical jargon. As well as the exercises, each chapter has an imaginary dialogue between Hemelsworth; a frustrated lord, and his dim-witted butler Barker, who is prone to behaving like your average computer system. First printed and reprinted by Addison Wesley, this timeless title is now available from Bosko Books. It is still relevant and useful, and continues to be used to teach interaction design courses and computing courses relating to the user interface. More information and extracts at www.idhub.com/concepts
"The robust, advanced technologies of Symbian OS are accessible to developers today in millions of phones worldwide through the Series 60 Platform. Inside "Developing Series 60 Applications" there are sixty example applications, focused entirely on native Symbian OS C++ programming, which will help developers take advantage of the rapidly growing opportunities in Symbian OS smartphone software development."-David Levin, CEO, Symbian Ltd. The first official book on Series 60 Platform development-from design to deployment Series 60 smartphone developers are deploying the next wave of mobile services. With more than 60% of all mobile phone manufacturers licensing Series 60 Platform, Series 60 represents the smartphone market with the largest user base for mobile application developers. To help nurture this growing market, Nokia has worked directly with EMCC Software, a leading Symbian and Series 60 Competence Center, to create Developing Series 60 Applications, the definitive guide to Series 60 development for C++ programmers and software designers. Fully reviewed by Nokia's subject matter experts, the authors cover the entire development process-from design, programming, and testing to debugging and deployment-while providing sixty complete projects, each with full C++ source code and installation scripts. "Developing Series 60 Applications" includes coverage of:
Windows Server 2003 Security Infrastructures is a must for anyone
that wants to know the nuts and bolts of Windows Server 2003
security and wants to leverage the operating system's security
infrastructure components to build a more secure I.T.
infrastructure. The primary goal of this book is to provide
insights into the security features and technologies of the Windows
Server 2003 operating system. It also highlights the security
principles an architect should remember when designing an
infrastructure that is rooted on the Windows Server 2003 OS.
OpenVMS System Management Guide, Second Edition, the most complete
book on the topic, details for system administrators the tools,
technologies, and techniques by which they can configure, maintain,
and tune computers running Hewlett-Packard's high-performance
OpenVMS operating system. Revised by a topical authority and a
principal OpenVMS engineer, the book enables system administrators
to perform more efficiently and effectively those everyday tasks
critical to an OpenVMS system. Examples have been updated to
include OpenVMS/VAX 7.3 and OpenVMS/Alpha 7.3-1.
Unlike so many books that focus on how to use Linux, Linux and the
Unix Philosophy explores the "way of thinking that is Linux" and
why Linux is a superior implementation of this highly capable
operating system.
UNIX for OpenVMS Users, 3E, makes it easy to see what OpenVMS and
UNIX have in common, and to transfer your knowledge and experience
in OpenVMS over to the world of UNIX.
Getting Started with OpenVMS System Management gives new VMS system
managers a jumpstart in managing this powerful and reliable
operating system. Dave Miller describes the essentials of what an
OpenVMS System Manager will have to manage. He defines areas of
OpenVMS System Management and describes why each is important and
how it fits into the larger management task. Even though some
OpenVMS management concepts are unique (for instance quotas), many
concepts (such as account creation) have counterparts in UNIX and
Windows NT. So, wherever possible, Miller points out to his readers
the parallel to other systems. |
You may like...
A Glossary of Colloquial Anglo-Indian…
A.C. Burnell, Henry Yule
Hardcover
R5,599
Discovery Miles 55 990
Los castellanos del Peru - historia…
Sandro Sessarego, Luis Andrade Ciudad
Paperback
R1,408
Discovery Miles 14 080
Acoustics of American English Speech - A…
Joseph P. Olive, Alice Greenwood, …
Hardcover
R2,871
Discovery Miles 28 710
Diachrony and Dialects - Grammatical…
Paola Beninca, Adam Ledgeway, …
Hardcover
R4,125
Discovery Miles 41 250
Standardization as Sociolinguistic…
Marie Maegaard, Malene Monka, …
Hardcover
R4,490
Discovery Miles 44 900
The Making of a Language - The Case of…
Tomasz Wicherkiewicz
Hardcover
R4,694
Discovery Miles 46 940
|