Author: Terry Collings
Publisher: John Wiley & Sons
ISBN: 0471777315
Category : Computers
Languages : en
Pages : 1033
Book Description
Starts with the basics of Red Hat, the leading Linux distribution in the U.S., such as network planning and Red Hat installation and configuration Offers a close look at the new Red Hat Enterprise Linux 4 and Fedora Core 4 releases New chapters cover configuring a database server, creating a VNC server, monitoring performance, providing Web services, exploring SELinux security basics, and exploring desktops Demonstrates how to maximize the use of Red Hat Network, upgrade and customize the kernel, install and upgrade software packages, and back up and restore the file system The four CDs contain the full Fedora Core 4 distribution
Red Hat Linux Networking and System Administration
Author: Terry Collings
Publisher: John Wiley & Sons
ISBN: 0471777315
Category : Computers
Languages : en
Pages : 1033
Book Description
Starts with the basics of Red Hat, the leading Linux distribution in the U.S., such as network planning and Red Hat installation and configuration Offers a close look at the new Red Hat Enterprise Linux 4 and Fedora Core 4 releases New chapters cover configuring a database server, creating a VNC server, monitoring performance, providing Web services, exploring SELinux security basics, and exploring desktops Demonstrates how to maximize the use of Red Hat Network, upgrade and customize the kernel, install and upgrade software packages, and back up and restore the file system The four CDs contain the full Fedora Core 4 distribution
Publisher: John Wiley & Sons
ISBN: 0471777315
Category : Computers
Languages : en
Pages : 1033
Book Description
Starts with the basics of Red Hat, the leading Linux distribution in the U.S., such as network planning and Red Hat installation and configuration Offers a close look at the new Red Hat Enterprise Linux 4 and Fedora Core 4 releases New chapters cover configuring a database server, creating a VNC server, monitoring performance, providing Web services, exploring SELinux security basics, and exploring desktops Demonstrates how to maximize the use of Red Hat Network, upgrade and customize the kernel, install and upgrade software packages, and back up and restore the file system The four CDs contain the full Fedora Core 4 distribution
Linux and Windows Interoperability Guide
Author: Ed Bradford
Publisher: Prentice Hall Professional
ISBN: 0130324779
Category : Electronic books
Languages : en
Pages : 618
Book Description
Up-to-the-minute coverage includes Windows 2000 and Windows XP. Includes practical Linux/Windows network design and implementation solutions. Covers a wide range of interoperability issues including Internet/intranet, TCP/IP, dial-up access, software, backup/restore, security, and file/print.
Publisher: Prentice Hall Professional
ISBN: 0130324779
Category : Electronic books
Languages : en
Pages : 618
Book Description
Up-to-the-minute coverage includes Windows 2000 and Windows XP. Includes practical Linux/Windows network design and implementation solutions. Covers a wide range of interoperability issues including Internet/intranet, TCP/IP, dial-up access, software, backup/restore, security, and file/print.
Security Strategies in Linux Platforms and Applications
Author: Ric Messier
Publisher: Jones & Bartlett Learning
ISBN: 1284289230
Category : Computers
Languages : en
Pages : 562
Book Description
The third edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments.
Publisher: Jones & Bartlett Learning
ISBN: 1284289230
Category : Computers
Languages : en
Pages : 562
Book Description
The third edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments.
Managing NFS and NIS
Author: Mike Eisler
Publisher: "O'Reilly Media, Inc."
ISBN: 0596551940
Category : Computers
Languages : en
Pages : 513
Book Description
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem.Managing NFS and NIS, in a new edition based on Solaris 8, is a guide to two tools that are absolutely essential to distributed computing environments: the Network Filesystem (NFS) and the Network Information System (formerly called the "yellow pages" or YP).The Network Filesystem, developed by Sun Microsystems, is fundamental to most Unix networks. It lets systems ranging from PCs and Unix workstations to large mainframes access each other's files transparently, and is the standard method for sharing files between different computer systems.As popular as NFS is, it's a "black box" for most users and administrators. Updated for NFS Version 3, Managing NFS and NIS offers detailed access to what's inside, including: How to plan, set up, and debug an NFS network Using the NFS automounter Diskless workstations PC/NFS A new transport protocol for NFS (TCP/IP) New security options (IPSec and Kerberos V5) Diagnostic tools and utilities NFS client and server tuning NFS isn't really complete without its companion, NIS, a distributed database service for managing the most important administrative files, such as the passwd file and the hosts file. NIS centralizes administration of commonly replicated files, allowing a single change to the database rather than requiring changes on every system on the network.If you are managing a network of Unix systems, or are thinking of setting up a Unix network, you can't afford to overlook this book.
Publisher: "O'Reilly Media, Inc."
ISBN: 0596551940
Category : Computers
Languages : en
Pages : 513
Book Description
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem.Managing NFS and NIS, in a new edition based on Solaris 8, is a guide to two tools that are absolutely essential to distributed computing environments: the Network Filesystem (NFS) and the Network Information System (formerly called the "yellow pages" or YP).The Network Filesystem, developed by Sun Microsystems, is fundamental to most Unix networks. It lets systems ranging from PCs and Unix workstations to large mainframes access each other's files transparently, and is the standard method for sharing files between different computer systems.As popular as NFS is, it's a "black box" for most users and administrators. Updated for NFS Version 3, Managing NFS and NIS offers detailed access to what's inside, including: How to plan, set up, and debug an NFS network Using the NFS automounter Diskless workstations PC/NFS A new transport protocol for NFS (TCP/IP) New security options (IPSec and Kerberos V5) Diagnostic tools and utilities NFS client and server tuning NFS isn't really complete without its companion, NIS, a distributed database service for managing the most important administrative files, such as the passwd file and the hosts file. NIS centralizes administration of commonly replicated files, allowing a single change to the database rather than requiring changes on every system on the network.If you are managing a network of Unix systems, or are thinking of setting up a Unix network, you can't afford to overlook this book.
NFS Illustrated
Author: Brent Callaghan
Publisher: Addison-Wesley Professional
ISBN: 0201325705
Category : Computers
Languages : en
Pages : 544
Book Description
One of the original developers of the NFS and WebNFS offers unique insight into these key technologies, for both programmers creating and debugging NFS-based applications and network engineers creating new implementations. Readers can gain a deeper understanding of how network file protocols are designed and learn how NFS is implemented on UNIX, Windows NT, Java and web browsers.
Publisher: Addison-Wesley Professional
ISBN: 0201325705
Category : Computers
Languages : en
Pages : 544
Book Description
One of the original developers of the NFS and WebNFS offers unique insight into these key technologies, for both programmers creating and debugging NFS-based applications and network engineers creating new implementations. Readers can gain a deeper understanding of how network file protocols are designed and learn how NFS is implemented on UNIX, Windows NT, Java and web browsers.
FS (Series)
Author:
Publisher:
ISBN:
Category : Forests and forestry
Languages : en
Pages : 872
Book Description
Publisher:
ISBN:
Category : Forests and forestry
Languages : en
Pages : 872
Book Description
LPI Linux Certification in a Nutshell
Author: Steven Pritchard
Publisher: "O'Reilly Media, Inc."
ISBN: 0596554931
Category : Computers
Languages : en
Pages : 983
Book Description
LPI Linux Certification in a Nutshell,Second Edition is an invaluable resource for determining what you needto practice to pass the Linux Professional Institute exams. This bookwill helpyou determine when you're ready to take the exams, which aretechnically challenging and designed to reflect the skills thatadministrators needin real working environments. As more corporations adopt Linux as the networking backbone for theirIT systems, the demand for certified technicians will becomeeven greater. Passing the LPI exams will broaden your career optionsbecause the LPICis the most widely known and respected Linux certification program intheworld. Linux Journal recognized the LPI as the bestTraining andCertification Program. The exams were developed by the LinuxProfessional Institute,an international, volunteer-driven organization with affiliates in adozen countries. The core LPI exams cover two levels. Level 1 tests a basic knowledge ofLinux installation, configuration, and command-lineskills. Level 2 goes into much more depth regarding systemtroubleshooting andnetwork services such as email and the Web. The second edition of LPILinuxCertification in a Nutshell is a thoroughly researchedreference to these exams. The book is divided into four parts, one foreach of theLPI exams. Each part features not only a summary of the core skills youneed, but sample exercises and test questions, along with helpful hintsto letyou focus your energies. Major topics include: GNU and Unix commands Linux installation and package management Devices, filesystems, and kernel configuration Text editing, processing, and printing The X Window System Networking fundamentals and troubleshooting Security, including intrusion detection, SSH, Kerberos, andmore DNS, DHCP, file sharing, and other networking infrastructure Email, FTP, and Web services Praise for the first edition: "Although O'Reilly's Nutshell series are intended as 'DesktopReference' manuals, I have to recommend this one as a goodall-round read; not only as a primer for LPI certification, but as anexcellent introductory text on GNU/Linux. In all, this is a valuableaddition toO'Reilly's already packed stable of Linux titles and I look forward tomore from the author."--First Monday
Publisher: "O'Reilly Media, Inc."
ISBN: 0596554931
Category : Computers
Languages : en
Pages : 983
Book Description
LPI Linux Certification in a Nutshell,Second Edition is an invaluable resource for determining what you needto practice to pass the Linux Professional Institute exams. This bookwill helpyou determine when you're ready to take the exams, which aretechnically challenging and designed to reflect the skills thatadministrators needin real working environments. As more corporations adopt Linux as the networking backbone for theirIT systems, the demand for certified technicians will becomeeven greater. Passing the LPI exams will broaden your career optionsbecause the LPICis the most widely known and respected Linux certification program intheworld. Linux Journal recognized the LPI as the bestTraining andCertification Program. The exams were developed by the LinuxProfessional Institute,an international, volunteer-driven organization with affiliates in adozen countries. The core LPI exams cover two levels. Level 1 tests a basic knowledge ofLinux installation, configuration, and command-lineskills. Level 2 goes into much more depth regarding systemtroubleshooting andnetwork services such as email and the Web. The second edition of LPILinuxCertification in a Nutshell is a thoroughly researchedreference to these exams. The book is divided into four parts, one foreach of theLPI exams. Each part features not only a summary of the core skills youneed, but sample exercises and test questions, along with helpful hintsto letyou focus your energies. Major topics include: GNU and Unix commands Linux installation and package management Devices, filesystems, and kernel configuration Text editing, processing, and printing The X Window System Networking fundamentals and troubleshooting Security, including intrusion detection, SSH, Kerberos, andmore DNS, DHCP, file sharing, and other networking infrastructure Email, FTP, and Web services Praise for the first edition: "Although O'Reilly's Nutshell series are intended as 'DesktopReference' manuals, I have to recommend this one as a goodall-round read; not only as a primer for LPI certification, but as anexcellent introductory text on GNU/Linux. In all, this is a valuableaddition toO'Reilly's already packed stable of Linux titles and I look forward tomore from the author."--First Monday
Advanced Industrial Control Technology
Author: Peng Zhang
Publisher: William Andrew
ISBN: 1437778089
Category : Science
Languages : en
Pages : 866
Book Description
Control engineering seeks to understand physical systems, using mathematical modeling, in terms of inputs, outputs and various components with different behaviors. It has an essential role in a wide range of control systems, from household appliances to space flight. This book provides an in-depth view of the technologies that are implemented in most varieties of modern industrial control engineering. A solid grounding is provided in traditional control techniques, followed by detailed examination of modern control techniques such as real-time, distributed, robotic, embedded, computer and wireless control technologies. For each technology, the book discusses its full profile, from the field layer and the control layer to the operator layer. It also includes all the interfaces in industrial control systems: between controllers and systems; between different layers; and between operators and systems. It not only describes the details of both real-time operating systems and distributed operating systems, but also provides coverage of the microprocessor boot code, which other books lack. In addition to working principles and operation mechanisms, this book emphasizes the practical issues of components, devices and hardware circuits, giving the specification parameters, install procedures, calibration and configuration methodologies needed for engineers to put the theory into practice. - Documents all the key technologies of a wide range of industrial control systems - Emphasizes practical application and methods alongside theory and principles - An ideal reference for practicing engineers needing to further their understanding of the latest industrial control concepts and techniques
Publisher: William Andrew
ISBN: 1437778089
Category : Science
Languages : en
Pages : 866
Book Description
Control engineering seeks to understand physical systems, using mathematical modeling, in terms of inputs, outputs and various components with different behaviors. It has an essential role in a wide range of control systems, from household appliances to space flight. This book provides an in-depth view of the technologies that are implemented in most varieties of modern industrial control engineering. A solid grounding is provided in traditional control techniques, followed by detailed examination of modern control techniques such as real-time, distributed, robotic, embedded, computer and wireless control technologies. For each technology, the book discusses its full profile, from the field layer and the control layer to the operator layer. It also includes all the interfaces in industrial control systems: between controllers and systems; between different layers; and between operators and systems. It not only describes the details of both real-time operating systems and distributed operating systems, but also provides coverage of the microprocessor boot code, which other books lack. In addition to working principles and operation mechanisms, this book emphasizes the practical issues of components, devices and hardware circuits, giving the specification parameters, install procedures, calibration and configuration methodologies needed for engineers to put the theory into practice. - Documents all the key technologies of a wide range of industrial control systems - Emphasizes practical application and methods alongside theory and principles - An ideal reference for practicing engineers needing to further their understanding of the latest industrial control concepts and techniques
Linux Troubleshooting Bible
Author: Christopher Negus
Publisher: John Wiley & Sons
ISBN: 0764577166
Category : Computers
Languages : en
Pages : 626
Book Description
* An indispensable resource for Fedora users who must now work without customer support from Red Hat, Inc., covering critical troubleshooting techniques for networks, internal servers, and external servers * Chris Negus is a well-known Linux authority and also the author of the top-selling Red Hat Linux Bible (0-7645-4333-4); Thomas Weeks is a trainer and administrator who manages hundreds of Red Hat Linux systems * Covers all of the most common Fedora problem areas: firewalls, DNS servers, print servers, Samba, NFS, Web servers, FTP servers, e-mail servers, modems, adding hardware, and hardware certification * Features easy-to-use flowcharts that guide administrators step by step through common Fedora troubleshooting scenarios * A companion Web site offers troubleshooting updates to keep pace with the frequent Fedora Core releases as well as a forum for exchanging troubleshooting tips
Publisher: John Wiley & Sons
ISBN: 0764577166
Category : Computers
Languages : en
Pages : 626
Book Description
* An indispensable resource for Fedora users who must now work without customer support from Red Hat, Inc., covering critical troubleshooting techniques for networks, internal servers, and external servers * Chris Negus is a well-known Linux authority and also the author of the top-selling Red Hat Linux Bible (0-7645-4333-4); Thomas Weeks is a trainer and administrator who manages hundreds of Red Hat Linux systems * Covers all of the most common Fedora problem areas: firewalls, DNS servers, print servers, Samba, NFS, Web servers, FTP servers, e-mail servers, modems, adding hardware, and hardware certification * Features easy-to-use flowcharts that guide administrators step by step through common Fedora troubleshooting scenarios * A companion Web site offers troubleshooting updates to keep pace with the frequent Fedora Core releases as well as a forum for exchanging troubleshooting tips
Official (ISC)2 Guide to the CISSP CBK
Author: Steven Hernandez, CISSP
Publisher: CRC Press
ISBN: 9780849382314
Category : Computers
Languages : en
Pages : 1118
Book Description
The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry’s first and only CBK®, a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK continues to serve as the basis for (ISC)2’s education and certification programs. Unique and exceptionally thorough, the Official (ISC)2® Guide to the CISSP®CBK®provides a better understanding of the CISSP CBK — a collection of topics relevant to information security professionals around the world. Although the book still contains the ten domains of the CISSP, some of the domain titles have been revised to reflect evolving terminology and changing emphasis in the security professional’s day-to-day environment. The ten domains include information security and risk management, access control, cryptography, physical (environmental) security, security architecture and design, business continuity (BCP) and disaster recovery planning (DRP), telecommunications and network security, application security, operations security, legal, regulations, and compliance and investigations. Endorsed by the (ISC)2, this valuable resource follows the newly revised CISSP CBK, providing reliable, current, and thorough information. Moreover, the Official (ISC)2® Guide to the CISSP® CBK® helps information security professionals gain awareness of the requirements of their profession and acquire knowledge validated by the CISSP certification. The book is packaged with a CD that is an invaluable tool for those seeking certification. It includes sample exams that simulate the actual exam, providing the same number and types of questions with the same allotment of time allowed. It even grades the exam, provides correct answers, and identifies areas where more study is needed.
Publisher: CRC Press
ISBN: 9780849382314
Category : Computers
Languages : en
Pages : 1118
Book Description
The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry’s first and only CBK®, a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK continues to serve as the basis for (ISC)2’s education and certification programs. Unique and exceptionally thorough, the Official (ISC)2® Guide to the CISSP®CBK®provides a better understanding of the CISSP CBK — a collection of topics relevant to information security professionals around the world. Although the book still contains the ten domains of the CISSP, some of the domain titles have been revised to reflect evolving terminology and changing emphasis in the security professional’s day-to-day environment. The ten domains include information security and risk management, access control, cryptography, physical (environmental) security, security architecture and design, business continuity (BCP) and disaster recovery planning (DRP), telecommunications and network security, application security, operations security, legal, regulations, and compliance and investigations. Endorsed by the (ISC)2, this valuable resource follows the newly revised CISSP CBK, providing reliable, current, and thorough information. Moreover, the Official (ISC)2® Guide to the CISSP® CBK® helps information security professionals gain awareness of the requirements of their profession and acquire knowledge validated by the CISSP certification. The book is packaged with a CD that is an invaluable tool for those seeking certification. It includes sample exams that simulate the actual exam, providing the same number and types of questions with the same allotment of time allowed. It even grades the exam, provides correct answers, and identifies areas where more study is needed.