![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Managing Apple Devices, Third Edition will enable you to create an effective plan for deploying and maintaining groups of Apple devices using iOS 9 and OS X El Capitan in your organization. This all-in-one resource teaches a wide variety of Apple management technologies; explains the theory behind the tools; and provides practical, hand-on exercises to get you up and running with the tools. You will be introduced to Apple management technologies including Mobile Device Management, the Volume Purchase Program, and the Device Enrollment Program. For example, not only will you learn how to use Profile Manager-Apple's implementation of Mobile Device Management-but you will also learn about the ideas behind profile management and how to make configuration easier for both administrators and users while maintaining a highly secure environment. The exercises contained within this guide are designed to let you explore and learn the tools provided by Apple for deploying and managing iOS 9 and OS X El Capitan systems. They start with verification of access to necessary services, move on to the configuration of those services, and finally test the results of those services on client devices. Each lesson builds on previous topics and is designed to give technical coordinators and system administrators the skills, tools, and knowledge to deploy and maintain Apple devices by: Providing knowledge of how Apple deployment technologies work Showing how to use specific deployment tools Explaining deployment procedures and best practices Offering practical exercises step-by-step solutions available
Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled "Building Secure Servers with Linux," combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the Internet--and shows readers how to harden their hosts against attacks. An all-inclusive resource for Linux users who wish to harden their systems, "Linux Server Security" covers general security such as intrusion detection and firewalling a hub, as well as key services such as DNS, the Apache Web server, mail, and secure shell. Author Michael D. Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in the "Linux Journal," carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. He is joined on several chapters by administrator and developer Bill Lubanovic. A number of new security topics have been added for this edition, including: Database security, with a focus on MySQL Using OpenLDAP for authentication An introduction to email encryption The Cyrus IMAP service, a popular mail delivery agent The vsftpd FTP server Geared toward Linux users with little security expertise, the author explainssecurity concepts and techniques in clear language, beginning with the fundamentals. "Linux Server Security" with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages on several popular distributions. With this book in hand, you'll have both the expertise and the tools to comprehensively secure your Linux system.
To the outside world, a "supercomputer" appears to be a single system. In fact, it's a cluster of computers that share a local area network and have the ability to work together on a single problem as a team. Many businesses used to consider supercomputing beyond the reach of their budgets, but new Linux applications have made high-performance clusters more affordable than ever. These days, the promise of low-cost supercomputing is one of the main reasons many businesses choose Linux over other operating systems. This new guide covers everything a newcomer to clustering will need to plan, build, and deploy a high-performance Linux cluster. The book focuses on clustering for high-performance computation, although much of its information also applies to clustering for high-availability (failover and disaster recovery). The book discusses the key tools you'll need to get started, including good practices to use while exploring the tools and growing a system. You'll learn about planning, hardware choices, bulk installation of Linux on multiple systems, and other basic considerations. Then, you'll learn about software options that can save you hours--or even weeks--of deployment time. Since a wide variety of options exist in each area of clustering software, the author discusses the pros and cons of the major free software projects and chooses those that are most likely to be helpful to new cluster administrators and programmers. A few of the projects introduced in the book include: MPI, the most popular programming library for clusters. This book offers simple but realistic introductory examples along with some pointers for advanced use. OSCAR and Rocks, two comprehensiveinstallation and administrative systems openMosix (a convenient tool for distributing jobs), Linux kernel extensions that migrate processes transparently for load balancing PVFS, one of the parallel filesystems that make clustering I/O easier C3, a set of commands for administering multiple systems Ganglia, OpenPBS, and cloning tools (Kickstart, SIS and G4U) are also covered. The book looks at cluster installation packages (OSCAR & Rocks) and then considers the core packages individually for greater depth or for folks wishing to do a custom installation. Guidelines for debugging, profiling, performance tuning, and managing jobs from multiple users round out this immensely useful book.
With today's hardware and chips, 90% of the time, interpreted unix scripts will perform as efficiently as code written in higher level languages - such as java. The difference is that, with unix scripts, you cut out about 80-90% of the lines of code, and have something that can easily be maintained and supported. Even if you still want to code in a higher level language, unix shell scripting is invaluable for support functions - such as moving around files, parsing log files, etc. An analyst or support person who uses the topics and examples in this book to master scripting can save him or herself literally hundreds of hours - especially when dealing with repetitive tasks with many lines of data.
The Mono Project is the much talked-about open source initiative to create a Unix implementation of Microsoft's .NET Development Framework. Its purpose is to allow Unix developers to build and deploy cross-platform .NET applications. The project has also sparked interest in developing components, libraries and frameworks with C#, the programming language of .NET. The controversy? Some say Mono will become the preferred platform for Linux development, empowering Linux/Unix developers. Others say it will allow Microsoft to embrace, extend, and extinguish Linux. The controversy rages on, but--like many developers--maybe you've had enough talk and want to see what Mono is really all about. There's one way to find out: roll up your sleeves, get to work, and see what you Mono can do. How do you start? You can research Mono at length. You can play around with it, hoping to figure things out for yourself. Or, you can get straight to work with "Mono: A Developer's Notebook"--a hands-on guide and your trusty lab partner as you explore Mono 1.0. Light on theory and long on practical application, "Mono: A Developer's Notebook" bypasses the talk and theory, and jumps right into Mono 1.0. Diving quickly into a rapid tour of Mono, you'll work through nearly fifty mini-projects that will introduce you to the most important and compelling aspects of the 1.0 release. Using the task-oriented format of this new series, you'll learn how to acquire, install, and run Mono on Linux, Windows, or Mac OS X. You'll work with the various Mono components: Gtk#, the Common Language Runtime, the class libraries (both .NET and Mono-provided class libraries), IKVM and the Mono C# compiler. No other resourcewill take you so deeply into Mono so quickly or show you as effectively what Mono is capable of. The new Developer's Notebooks series from O'Reilly covers important new tools for software developers. Emphasizing example over explanation and practice over theory, they focus on learning by doing--you'll get the goods straight from the masters, in an informal and code-intensive style that suits developers. If you've been curious about Mono, but haven't known where to start, this no-fluff, lab-style guide is the solution.
This is the first book designed to help Windows developers decide not only which technologies to use but also how to use them. It teaches them to combine the wide variety of technologies that make up Windows DNA into effective solutions for their own enterprise application requirements. The author makes use of his long consulting experience in the client-server world to describe "best practices" that apply to building Windows DNA applications.
Despite Python's increasing popularity on Windows, Python Programming on Win32 is the first book to demonstrate how to use it as a serious Windows development and administration tool. This book addresses all the basic technologies for common integration tasks on Windows, explaining both the Windows issues and the Python code you need to glue things together.
In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun. "Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But "BSD Hacks," the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools--and even fun--for administrators and power users of BSD systems. "BSD Hacks" takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command. The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas: Customizing the User Environment Dealing with Files and Filesystems The Boot and LoginEnvironments Backing Up Networking Hacks Securing the System Going Beyond the Basics Keeping Up-to-Date Grokking BSD If you want more than your average BSD user--you want to explore and experiment, unearth shortcuts, create useful tools, and come up with fun things to try on your own--"BSD Hacks" is a must-have. This book will turn regular users into power users and system administrators into super system administrators.
qmail has quietly become one of the most widely used applications on the Internet today. It's powerful enough to handle mail for systems with millions of users--Like Yahoo! Mail and Hotmail, while remaining compact and manageable enough for the smallest Unix- and Linux-based PC systems. Its component design makes it easy to extend and customize while keeping its key functions secure, so it's no wonder that adoption of qmail continues at a rapid pace. The downside? Apparently none. Except that qmail's unique design can be disorienting to those familiar with other popular MTAs (Mail Transfer Agents). If you're coming from sendmail, for instance, you might have trouble recasting your problems and solutions in qmail terms. qmail first helps you establish a "qmail frame of mind," then explores the installation, configuration, administration, and extension of this powerful MTA. Whether you're installing from scratch or managing mailing lists with thousands of users, qmail provides detailed information about how to make qmail do precisely what you want qmail concentrates on common tasks like moving a sendmail setup to qmail, or setting up a "POP toaster," a system that provides mail service to a large number of users on other computers sending and retrieving mail remotely. The book also fills crucial gaps in existing documentation, detailing exactly what the core qmail software does. Topics covered include: Installation and configuration, including patching qmail Moving from sendmail to qmail Handling locally and remotely originated messages Managing virtual domains Logging qmail activity Tuning qmail performance Running multiple copies of qmail on thesame computer Mailing list setup and management Integrating the qmail MTA with POP and IMAP delivery Filtering out spam and viruses If you need to manage mailing lists, large volumes of mail, or simply find sendmail and other MTAs too complicated, qmail may be exactly what's called for. Our new guide, qmail, will provide the guidance you need to build an email infrastructure that performs well, makes sense, and is easy to maintain.
This book is the formal proceedings of the Eurographics Workshop on Design, Specifi cation and Verification ofInteractive Systems, DSV-IS'99, which was held at the Uni versity of Minho, Braga, Portugal from June 2 to June 4, 1999. The previous events of this series were held at Pisa, Toulouse, Namur, Granada, and Abingdon; the theme this year was "Engaging the Mind by Enriching the Senses," emphasising the importance of the interface in making interaction both effective and enjoyable. Presentations and discussions covered topics that included specification methods and their use in design, model-based tool support, task and dialogue models, distributed col laboration, and models for VR input. As in previous years, there was a strong emphasis on formal representations and modelling techniques, and their use in understanding in teraction and informing the design of artefacts. However, the aim of the workshop is to encourage an exchange of views within a broad community, and other approaches, in particular tool support for model-based design, were also represented. This book includes the papers of the two invited speakers (one as an abstract only), the fourteen full papers accepted for publication, two shorter position papers, and the reports from the working group discussions. The format of the workshop aimed to mix formal paper presentations with informal discussion sessions, with the two invited talks setting the tone for the meeting."
Much more than a quick list of commands and options, the CVS Pocket Reference, 2nd Edition, is packed with a surprising amount of detail-- including an overview of background concepts, thorough descriptions on how to use and administer a CVS repository, and discussions of CVS-related files and how to manage them-- all in a convenient reference format. It's an absolute must for developers who need an on-the-job guide for quick answers to CVS dilemmas.
This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.
This new edition, covering version 5 of FreeBSD, is now available through O'Reilly Community Press. It is an eminently practical guidebook that explains not only how to get a computer up and running with the FreeBSD operating system, but also how to turn it into a highly functional and secure server that can host large numbers of users and disks, support remote access, and provide web service, mail service, and other key parts of the Internet infrastructure.
Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files. You'll learn alternative ways to do backups, how to use system monitoring tools to track system performance and a variety of secure networking solutions. Linux Server Hacks also helps you manage large-scale Web installations running Apache, MySQL, and other open source tools that are typically part of a Linux system.
Managing RAID on Linux covers everything system administrators need to know to put together a system that can support RAID. You will learn about the different types of RAID, along with associated technologies and issues, and how to choose the best RAID system for your needs. With a step-by-step, hands-on approach, the author guides you through the installation of either Linux software RAID or a hardware RAID card.
Learning the Korn Shell is the key to gaining control of the Korn shell and becoming adept at using it as an interactive command and scripting language. Readers will learn how to write many applications more easily and quickly than with other high-level languages. A solid offering for many years, this newly revised title inherits a long tradition of trust among computer professionals who want to learn or refine an essential skill.
Palm OS Programming: The Developer's Guide , Second Edition shows intermediate to experienced C and C++ programmers how to build a Palm application from the ground up. The book follows up the success of our best-selling first edition with expanded coverage of the Palm OS, up to and including the latest version, 4.0. This book will set the standard for the next generation of Palm developers.
The C# & VB.NET Conversion Pocket Reference helps you easily make the switch from C# to Visual Basic .NET and vice versa. Differences between the two languages occur in three main areas: syntax, object-oriented principles, and the Visual Studio .NET IDE. A perfect companion for documents and books that don?t have examples using your mastered language, this guide expects that you know one of the two languages, but does not make an assumption about which one.
DESCRIPTION WMI, Windows Management Instrumentation, provides a standard infrastructure for managing all aspects of Windows-based systems.WMI isn't new, but now that administrators can script it using PowerShell, it's just gotten infinitely easier to use! Taken together, WMI and PowerShell create an extraordinarily powerful mechanism automating the management of servers, networks, and remote Windows computers. PowerShell and WMI is an example-driven guide for administrators managing networks of Windows servers and desktops. With over 150 specific examples Xincluding ready-to-reuse scripts and techniques Xreaders will learn the ins and outs of automating WMI via PowerShell2. The author provides deep coverage of all aspects of Windows administration, including IIS, DNS and Hyper-V. KEY POINTS "h In-depth guide to PowerShell and WMI "h Packed with over 150 practical, field-tested techniques "h Written by a PowerShell MVP
This guide covers all aspects of deploying Solaris as an enterprise-level network operating system, with a focus on e-commerce. Written for experienced network administrators who want an objective guide to networking with Solaris, the book covers installation on the Intel and Sparc platforms, and instructs you how to setup Solaris as a file server, application server, and database server.
AppleScript in a Nutshell is the first complete reference to AppleScript, the popular programming language that gives both power users and sophisticated enterprise customers the important ability to automate repetitive tasks and customize applications. AppleScript in a Nutshell is a high-end handbook at a low-end price--an essential desktop reference that puts the full power of this user-friendly programming language into every AppleScript user's hands.
If you are an Oracle DBA moving to Unix from another environment such as Windows NT or IBM Mainframe, you know that the commands you need to learn are far different from those covered in most beginning Unix books. In this handy pocket-sized book, Don Burleson introduces those Unix commands that you as an Oracle DBA most need to know.
In Windows 2000 Pro: The Missing Manual, bestselling Windows NT author Sharon Crawford provides the friendly, authoritative book that should have been in the box. It's the ideal (and desperately needed) user's guide for the world's most popular corporate operating system.
The GIMP Pocket Reference explains the numerous features of the GNU Image Manipulation Program--and is the essential guide for designers working in a Linux/Unix environment. This handy reference covers GIMP version 1.2. It explains the function of every menu item and offers tips for everyday use. |
You may like...
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
|