![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
This book contains 36 chapters and is structured to facilitate readers to grasp concepts, understand implementation procedures, learn command syntax, configuration files and daemons involved, and understand basic troubleshooting. The 36 chapters are divided into three key areas: UNIX Fundamentals, HP-UX System Administration and HP-UX Network Administration. These chapters cover topics that are on HP s recommended certification courses UNIX Fundamentals, System and Network Administration I, System and Network Administration II, and HP-UX for Experienced UNIX System Administrators as well as on official exam objectives list. 1.UNIX Fundamentals (chapters 1 to 6, and 22) covers the basics of UNIX and HP-UX. Most information is not specific to a particular UNIX flavor, rather, includes general UNIX concepts, file manipulation and security techniques, vi editor, shell and awk programming, basic commands and other essential topics. Unlike many other similar books, a chapter on shell scripting is presented after covering HP-UX System Administration area. This is done purposely to provide readers with practical examples based on the knowledge they gain from UNIX Fundamentals and HP-UX System Administration chapters. 2.HP-UX System Administration (chapters 7 to 21) covers the HP-UX-specific system administration concepts and topics including server hardware information and mass storage stack; virtualization technologies and HP-UX installation; software and patch management; user and group administration; LVM and file system administration; EVFS and swap management; system shutdown and startup procedures; kernel configuration and management techniques; backup and restore functions; printer and print request management, job automation and process control; and system logging and performance monitoring. 3.HP-UX Network Administration (chapters 23 to 36) covers HP-UX network and security administration concepts and topics such as OSI and TCP/IP reference models; network hardware overview and LAN interface administration; IP subnetting and routing techniques; basic network testing and troubleshooting; internet services and sendmail; time synchronization (NTP) and resource sharing (NFS, AutoFS and CIFS) services; naming (DNS, NIS and LDAP) services and automated installation techniques; and high-availability concepts and system security tools and practices. Throughout the book figures, tables, screen shots and examples are given for explanation purposes. The book includes 863 exam review questions with answers.
This practical introduction to OpenLDAP for Application Developers emphasizes how to get things done, going into Lightweight Directory Access Protocol (LDAP) theory only to answer practical questions. It demystifies OpenLDAP, providing a solid understanding of how to use its directory and covering building directory services, integrating directory services, and developing directory-enabled PHP or Python applications. Readers need only basic Linux system administration experience, not LDAP experience. Open-source OpenLDAP directory server is included in all major Linux distributions; many open-source and proprietary applications can use OpenLDAP's services. Client applications use LDAP to connect to OpenLDAP, search the directory, and (if authorized) modify and manipulate records. Most often used to provide network-based authentication services for users, LDAP servers have many other uses: address book, DNS database, organizational tool, even network object store for applications.
This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users. IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most important is that it sets this all up for you in a highly automated and simplified way. This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and networking and why they're important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, VPN and using it for bandwidth management. While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples. Chapter 1 briefly introduces some firewall and networking concepts. The chapter introduces the roles of several common networking devices and explains how firewalls fit into this. Chapter 2 introduces the IPCop package itself, discussing how IPCop's red/orange/blue/green interfaces fit into a network topology. It then covers the configuration of IPCop in other common roles, such as those of a web proxy, DHCP, DNS, time, and VPN server. Chapter 3 covers three sample scenarios where we learn how to deploy IPCop, how IPCop interfaces connect to each other and to the network as a whole. Chapter 4 covers installing IPCop. It outlines the system configuration required to run IPCop, and explains the configuration required to get IPCop up and running. In Chapter 5, we will learn how to employ the various tools IPCop provides us with to administrate, operate, troubleshoot, and monitor our IPCop firewall Chapter 6 starts off with explaining the need for an IDS in our system and then goes on to explain how to use the SNORT IDS with IPCop. Chapter 7 introduces the VPN concept and explains how to set up an IPSec VPN configuration for a system. Special focus is laid on configuring the blue zone - a secured wireless network augmenting the security of a wireless segment, even one already using WEP or WPA. Chapter 8 demonstrates how to manage bandwidth using IPCop making use of traffic shaping techniques and cache management. The chapter also covers the configuration of the Squid web proxy and caching system. Chapter 9 focuses on the vast range of add-ons available to configure IPCop to suit our needs. We see how to install add-ons and then learn more about common add-ons like SquidGuard, Enhanced Filtering, Blue Access, LogSend, and CopFilter. Chapter 10 covers IPCop security risks, patch management and some security and auditing tools and tests. Chapter 11 outlines the support IPCop users have in the form of mailing lists and IRC. The book is suitable for anyone interested in securing their networks with IPCop - from those new to networking and firewalls, to networking and IT Professionals with previous experience of IPCop. No knowledge of Linux or IPCop is required.
Like the first edition of this book, the second edition also covers three main objectives to provide a comprehensive resource to individuals, including novice, IT/Non-HP-UX administrators, and HP-UX administrators who intend to take the new HP Certified Systems Administrator exam HP0-095 and pass it; to provide a quick and valuable on-the-job resource to HP-UX administrators, administrators of other UNIX operating systems, IT managers, programmers, and DBAs working in the HP-UX environment; and to provide an easy-to-understand guide to novice and IT/non-HP-UX administrators who intend to learn HP-UX from the beginning. This book contains 38 chapters and is structured to facilitate readers to grasp concepts, understand implementation procedures, understand basic troubleshooting, learn command syntax, configuration files, and daemons involved. The 38 chapters are divided into three key areas: UNIX Fundamentals, HP-UX System Administration, and HP-UX Network Administration. 1. UNIX Fundamentals (chapters 1 to 6 and 23) covers the basics of UNIX. Most information is not specific to a particular UNIX flavor, rather includes general UNIX concepts, file manipulation and security techniques, vi editor, shell and awk programming, basic commands, and other essential topics. Unlike many other similar books, a chapter on shell scripting is presented after covering HP-UX System Administration area. This is done purposely to supply readers with practical examples based on the knowledge they gain from UNIX Fundamentals and HP-UX System Administration chapters. 2. HP-UX System Administration (chapters 7 to 22) covers the HP-UX-specific system administration concepts and topics, including system partitioning and HP-UX installation; software and patch management; user and group administration; LVM and VxVM management; file system and swap administration; system shutdown and startup procedures; kernel configuration and reconfiguration techniques; backup and restore functions; printer and print request management, job automation and process control; and system logging and performance monitoring. 3. HP-UX Network Administration (chapters 24 to 38) covers HP-UX network administration concepts and topics, such as OSI and TCP/IP reference models; network hardware overview and LAN card administration; IP subnetting and routing techniques; basic network testing and troubleshooting; internet services and sendmail; time synchronization (NTP) and resource sharing (NFS, AutoFS, and CIFS) services; naming (DNS, NIS, and LDAP) and boot services; automated installation techniques and high-availability concepts; and system security and hardening. Each chapter begins with a list of major topics to be covered in the chapter and ends with a summary. Throughout the book, tables, figures, screen shots, and examples are given for explanation purposes. The output generated because of running commands and shell scripts is highlighted in light grey background to differentiate from surrounding text. The book includes several appendices, one of which contains 672 practice exam questions. Answers to practice exam questions and tables of commands, important files, and service daemons are included in appendix area as well.
"Operating System" is the most essential program of all, without which it becomes cumbersome to work with a computer. It is the interface between the hardware and computer users making the computer a pleasant device to use. "The Operating System: Concepts and Techniques" clearly defines and explains the concepts: process (responsibility, creation, living, and termination), thread (responsibility, creation, living, and termination), multiprogramming, multiprocessing, scheduling, memory management (non-virtual and virtual), interprocess communication/synchronization (busy-wait-based, semaphore-based, and message-based), deadlock, and starvation. Real-life techniques presented are based on UNIX, Linux, and contemporary Windows. The book has briefly discussed agent-based operating systems, macro-kernel, microkernel, extensible kernels, distributed, and real-time operating systems. The book is for everyone who is using a computer but is still not at ease with the way the operating system manages programs and available resources in order to perform requests correctly and speedily. High school and university students will benefit the most, as they are the ones who turn to computers for all sorts of activities, including email, Internet, chat, education, programming, research, playing games etc. It is especially beneficial for university students of Information Technology, Computer Science and Engineering. Compared to other university textbooks on similar subjects, this book is downsized by eliminating lengthy discussions on subjects that only have historical value.
Penguin in the Pew clears up the confusion about the terms "free" and "open source," addresses the challenges of hardware compatibility, software interoperability, and whether a migration is really more expensive than an upgrade. Readers will learn why and how they should migrate to the GNU/Linux operating system. Additionally, Penguin in the Pew connects readers to the growing community of Christians who use, develop and provide technical support for GNU/Linux and other free and open source applications. The book's author, Don Parris, invites fellow Christians to join in a dialogue where the GNU/Linux "philosophy" and Christian values intersect.
"Professional WinFX Beta": covers 'Avalon' Windows Presentation Foundation and 'Indigo' Windows Communication Foundation. Windows development is about to dramatically change! WinFX is an object-oriented API that will allow you to create applications that take advantage of the exciting features in Windows[registered] Vista (previously known as 'Longhorn') while remaining compatible with Windows[registered] XP SP2 and Windows Server 2003. Written by a team of Microsoft experts, this book introduces you to the pillars of this next-generation operating system, guiding you through the Windows Presentation Foundation (previously known as 'Avalon') and the Windows Communication Foundation (previously known as 'Indigo'). You'll first learn how to use the new Windows Presentation Foundation to create effective forms, use the XAML markup language, work with 2D and 3D graphics, and see how XAML interoperates with existing Windows Forms technology. Then you'll discover how to build Web Services and improve communication capabilities with the Windows Communication Foundation and architecture. You'll learn how to migrate existing DCOM and .N ET remoting applications to Windows Communication Foundation or to make them interoperate with Windows Communication Foundation. Finally you'll work with integrating Microsoft ADO.NET and ASP.NET with Windows Presentation Foundation forms and data in the WinFX framework. What you will learn from this book are: techniques for creating and deploying WinFX applications from scratch and upgrading your current Windows .NET applications to incorporate WinFX; how to use XAML to build a variety of forms, from simple to complex implementations; best practices for working with the Windows Presentation Foundation's themes, controls, annotation, and 3D features; to implement secure, reliable messaging and transactions with Windows Communication Foundation and Microsoft Message Queueing; to work with WinFX on any supported platform: Windows XP SP2, Windows Server 2003, or Windows Vista; and, how to develop and implement Web Services using the Windows Communication Foundation. Who this book is for? This book is for the experienced Windows .N ET programmer who wants to learn how to develop complex applications using the innovative features of Microsoft Windows Vista, Microsoft's WinFX beta 1 framework, the Windows Presentation Foundation, and the Windows Communication Foundation. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.
This open access book provides an overview of the work developed within the SODALITE project, which aims at facilitating the deployment and operation of distributed software on top of heterogeneous infrastructures, including cloud, HPC and edge resources. The experts participating in the project describe how SODALITE works and how it can be exploited by end users. While multiple languages and tools are available in the literature to support DevOps teams in the automation of deployment and operation steps, still these activities require specific know-how and skills that cannot be found in average teams. The SODALITE framework tackles this problem by offering modelling and smart editing features to allow those we call Application Ops Experts to work without knowing low level details about the adopted, potentially heterogeneous, infrastructures. The framework offers also mechanisms to verify the quality of the defined models, generate the corresponding executable infrastructural code, automatically wrap application components within proper execution containers, orchestrate all activities concerned with deployment and operation of all system components, and support on-the-fly self-adaptation and refactoring.
Learn techniques used for the Linux, Macintosh and Windows operating systems in a quick and easy side-by-side format. Anyone from the beginner to the advanced can benefit by reading "What Was It? " There is something for everyone. Learn the language and structure of computing. Learn how to and what to look for when purchasing computers and peripherals. Learn how to format a hard drive and re-install an operating system. Detailed charts and examples throughout "What Was It? " will compare the similarities, differences and benefits of operating systems, computers and peripherals. Fear not the technology revolution. Gain insight and master the techniques.
An introduction to operating systems, covering processes, states of processes, synchronization, programming methods of synchronization, main memory, secondary storage and file systems. Although the book is short, it covers all the essentials and opens up synchronization by introducing a metaphor: producer--consumer that other authors have employed. The difference is that the concept is presented without the programming normally involved with the concept. The thinking is that using a warehouse, the size of which is the shared variable in synchronization terms, without the programming will aid in understanding to this difficult concept. The book also covers main memory, secondary storage with file systems, and concludes with a brief discussion of the client-server paradigm and the way in which client-server impacts the design of the World-Wide Web.
"The definitive tool to learn what's proper for Microsoft Windows systems. Roberta's excellent guidance will easily help you build secure, resiliant systems." --Steve Riley, Security Business and Technology Unit, Windows Division, Microsoft Corporation Take a proactive approach to network security by hardening your Windows systems against attacks before they occur. Written by security evangelist Roberta Bragg, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Whether you have one Windows server or one hundred, you'll get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan. With coverage of Windows 95/98/NT 4.0/2000/XP and Windows Server 2003, this book is an essential security tool for on-the-job IT professionals. Features a four-part hardening methodology: Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack Take It From The Top--Systematic approach to hardening your enterprise from the top down, focusing on authentication, access controls, borders, logical security boundaries, communications, storage, and administrative authority Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing How to Succeed At Hardening Your Windows Systems--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program Roberta Bragg, CISSP, MCSE: Security, Security+, co-author of Network Security: The Complete Reference, instructor, and consultant, focuses on how to proactively deploy proven security principles to defend Windows systems from possible attack. Roberta is the Security Advisor columnist for MCP magazine, the Security Expert for searchWin2000.com, and writes for the Security Watch newsletter. Roberta is the series editor of McGraw-Hill/Osborne's Hardening security series.
"The robust, advanced technologies of Symbian OS are accessible to developers today in millions of phones worldwide through the Series 60 Platform. Inside "Developing Series 60 Applications" there are sixty example applications, focused entirely on native Symbian OS C++ programming, which will help developers take advantage of the rapidly growing opportunities in Symbian OS smartphone software development."-David Levin, CEO, Symbian Ltd. The first official book on Series 60 Platform development-from design to deployment Series 60 smartphone developers are deploying the next wave of mobile services. With more than 60% of all mobile phone manufacturers licensing Series 60 Platform, Series 60 represents the smartphone market with the largest user base for mobile application developers. To help nurture this growing market, Nokia has worked directly with EMCC Software, a leading Symbian and Series 60 Competence Center, to create Developing Series 60 Applications, the definitive guide to Series 60 development for C++ programmers and software designers. Fully reviewed by Nokia's subject matter experts, the authors cover the entire development process-from design, programming, and testing to debugging and deployment-while providing sixty complete projects, each with full C++ source code and installation scripts. "Developing Series 60 Applications" includes coverage of:
Novell ZENworks for Servers (ZENworks stands for Zero Effort Networking) is the cross-platform solution for server content and configuration management. It provides server consistency across Windows, Linux, Solaris and NetWare platforms, enables intelligent network automation, and increases management efficiency so everything works together as on Net. As a result, organizations get a stable server environment and significantly reduce networking costs. Novell?s ZENworks for Server 3 Administrator?s Handbook guides the reader through the potential rough spots. It explains how ZENworks for Server 3 functions and affects NetWare, Windows, Linux and/or Solaris networks.
This accessible quick reference is the ideal on-the-job companion, featuring easy-to-find information in a step-by-step, task-oriented format. Inside, you’ll get plenty of optimization and troubleshooting tips and solutions, logically organized by topic. With this practical guidebook on hand, you’ll be able to diagnose and fix most any Windows XP problem quickly and easily.
This is the definitive reference to the GCC open-source compiler. Get up-to-date information on the latest features--including compiling Java code, building applications using multiple languages, using the debugger, linking, libraries, and much more.
Comprehensive guides to the latest Beowulf tools and methodologies. Beowulf clusters, which exploit mass-market PC hardware and software in conjunction with cost-effective commercial network technology, are becoming the platform for many scientific, engineering, and commercial applications. With growing popularity has come growing complexity. Addressing that complexity, Beowulf Cluster Computing with Linux and Beowulf Cluster Computing with Windows provide system users and administrators with the tools they need to run the most advanced Beowulf clusters. The book is appearing in both Linux and Windows versions in order to reach the entire PC cluster community, which is divided into two distinct camps according to the node operating system. Each book consists of three stand-alone parts. The first provides an introduction to the underlying hardware technology, assembly, and configuration. The second part offers a detailed presentation of the major parallel programming librairies. The third, and largest, part describes software infrastructures and tools for managing cluster resources. This includes some of the most popular of the software packages available for distributed task scheduling, as well as tools for monitoring and administering system resources and user accounts. Approximately 75% of the material in the two books is shared, with the other 25% pertaining to the specific operating system. Most of the chapters include text specific to the operating system. The Linux volume includes a discussion of parallel file systems.
Essential Skills--Made Easy! Learn to set up, run, and support Solaris 9 across your network using this hands-on introductory guide. Beginning with an overview of this powerful operating system, this practical resource will show you how to install the SPARC version of Solaris 9 and manage Internet and intranet services, and will help you become familiar with the new features of Solaris 9--including role-based access control, Kerberos 5, and the LDAP directory service. You'll also learn how to integrate Windows NT/2000 or Linux with the Solaris platform. Filled with step-by-step exercises, self-assessment sections, and tips from a leading Solaris expert--this is a premier learning tool for every administrator new to Solaris.Modules--Each concept is divided into logically organized modules (chapters), ideal for self-paced learning Critical Skills--Each module opens with the specific skills covered in the module Ask-the-Experts--Q&A sections throughout are filled with bonus information and helpful tips 1-Minute Drills--Quick self-assessment sections check your progress Mastery Checks--End-of-module reviews test knowledge using short-answer, multiple-choice, and fill-in-the-blank questions Projects--Practical exercises show how to apply the critical skills learned in each module Blueprints--Key networking configurations are illustrated in detail
|
You may like...
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R7,962
Discovery Miles 79 620
Recent Developments in Applied…
Luc Devroye, Bulent Karasoezen, …
Hardcover
R1,423
Discovery Miles 14 230
Recent Developments in the Numerics of…
Rainer Ansorge, Hester Bijl, …
Hardcover
R5,185
Discovery Miles 51 850
Harold Macmillan and Britain's World…
Richard Aldous, Sabine Lee
Hardcover
R3,998
Discovery Miles 39 980
And For All These Reasons... I'm In…
Gil Oved, Lebo Gunguluza, …
Hardcover
(1)
Digital Triage Forensics - Processing…
Stephen Pearson, Richard Watson
Paperback
R1,204
Discovery Miles 12 040
90 Rules For Entrepreneurs - Your Guide…
Marnus Broodryk
Paperback
(4)
|