Download Free Ebook Video Training

Download Free Ebook Video Training

Video training,video training rapidshare.com,video training rapidshare,Video training megaupload,video training hotfile uploading,Video training mediafire,free ebook rapidshare,computers books rapidshare,Books rapidshare,Book rapidshare, Book mediafire, video tutorials


Showing posts with label Linux/Unix. Show all posts
Showing posts with label Linux/Unix. Show all posts

Fedora(TM) Core and Red Hat Enterprise Linux, 3rd Edition

Aug 5, 2009

Mark G. Sobell - A Practical Guide to Red Hat(R) Linux(R): Fedora(TM) Core and Red Hat Enterprise Linux, 3rd Edition
Prentice Hall PTR | 2006 | ISBN: 0132280272 | Pages: 1168 | CHM | 10.88 MB

The Best Just Became BETTER—Again! Completely Revised to Meet All Your Fedora Core and Red Hat Enterprise Linux Needs!

Fedora Core and Red Hat Enterprise Linux are advanced operating systems. You need a book that’s just as advanced. This book explains Linux clearly and effectively—with a focus on features you care about, from system security and Internet server setup to Windows file/printer sharing. Best-selling author Mark Sobell starts at the beginning and walks you through everything that matters, from installing Linux using the included DVD to working with GNOME, KDE, Samba, sendmail, Apache, DNS, NIS, and iptables.

This edition contains extensive coverage, including full chapters on using Linux from the command line and GUI; even more thorough system administration and security guidance; and up-to-the-minute, step-by-step instructions for setting up networks and every major type of Internet server. Along the way, you learn the “hows” and the “whys.” Mark Sobell knows every Linux nook and cranny, has taught hundreds of thousands of readers, and never forgets what it’s like to be new to Linux. Whether you are a user, an administrator, or a programmer, this book gives you all you need—and more.
Don’t settle for yesterday’s Linux book...get the ONLY book that meets today’s challenges and tomorrow’s!

Compared with the other Linux books out there, A Practical Guide to Red Hat® Linux®, Third Edition, delivers...

* Complete coverage of Fedora Core and Red Hat Enterprise Linux
* Deeper coverage of the command line and the GNOME and KDE GUIs, including GUI customization
* More practical coverage of file sharing with Samba, NFS, and FTP
* More detailed, usable coverage of Internet server configuration including Apache, sendmail, NFS, and DNS/BIND
* More state-of-the-art security techniques, including SELinux (Security Enhanced Linux), ACLs (Access Control Lists), firewall setup using the Red Hat GUI and using iptables, and a full chapter on OpenSSH
* More and better coverage of “meat-and-potatoes” system/network administration tasks
* A more practical introduction to writing bash shell scripts
* Complete instructions on how to keep your Linux system up-to-date using yum
* And much more...including a 500+ term glossary and a comprehensive index to help you find what you need fast!


http://uploading.com/files/GMHDTLHQ/booktraining.net_ed01.rar.html
http://rapidshare.com/files/263898218/booktraining.net_ed01.rar


Password default : wpspot.info
read more “Fedora(TM) Core and Red Hat Enterprise Linux, 3rd Edition”

SELinux by Example: Using Security Enhanced Linux


Frank Mayer, Karl MacMillan - SELinux by Example: Using Security Enhanced Linux
Prentice Hall | 2006 | ISBN: 0131963694 | Pages: 456 | CHM | 3.92 MB

The three authors are well versed in the topic and comprise the best team to write on SELinux that you could find. Even though it is written as a straightforward text - as opposed to a study guide - I appreciate how each chapter ends with a summary and then exercises to reinforce what you've just finished reading. "--Emmett Dulaney, Editor, UnixReview.com "This is a very good book and is easily the best I've seen yet on the subject of SELinux. If you've been tasked with maintaining an SELinux-enabled machine, would like to write or enhance existing SELinux policy, or just want to understand what SELinux is and how it came to be, then this is the book for you.

http://uploading.com/files/4RXLEYZ0/ed08.rar.html
http://rapidshare.com/files/263894887/ImplemVoice.zip


Password default : wpspot.info
read more “SELinux by Example: Using Security Enhanced Linux”

Beginning Linux Programming

Jun 6, 2009


Author: Neil Matthew and Richard Stones
Paperback: 816 pages
Publisher: Wrox; 4 edition (November 5, 2007)
Language: English
ISBN-10: 0470147628
ISBN-13: 978-0470147627
Format: pdf
Details:
Beginning Linux Programming, Fourth Edition continues its unique approach to teaching UNIX programming in a simple and structured way on the Linux platform. Through the use of detailed and realistic examples, students learn by doing, and are able to move from being a Linux beginner to creating custom applications in Linux. The book introduces fundamental concepts beginning with the basics of writing Unix programs in C, and including material on basic system calls, file I/O, interprocess communication (for getting programs to work together), and shell programming. Parallel to this, the book introduces the toolkits and libraries for working with user interfaces, from simpler terminal mode applications to X and GTK+ for graphical user interfaces. Advanced topics are covered in detail such as processes, pipes, semaphores, socket programming, using MySQL, writing applications for the GNOME or the KDE desktop, writing device drivers, POSIX Threads, and kernel programming for the latest Linux Kernel.

Download

Password default : wpspot.info
read more “Beginning Linux Programming”

Unix eBooks Collection

Jun 5, 2009
Image
Beginning Unix
Unix Power Tools, Third Edition
Hacking: The Art of Exploitation
Mac OS X Unix 101 Byte-Sized Projects
SSH, The Secure Shell: The Definitive Guide
HackNotes(tm) Linux and Unix Security Portable Reference
Implementing SSH: Strategies for Optimizing the Secure Shell
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Migrating to the Solaris Operating System: The Discipline of UNIX-to-UNIX Migrations

Download

Password default : wpspot.info
read more “Unix eBooks Collection”

Mastering UNIX Shell Scripting

Image
ncluding Source codes.

Paperback: 640 pages
Publisher: Wiley; 1 edition (January 31, 2003)
Language: English
ISBN-10: 0471218219
ISBN-13: 978-0471218210

Book Description
* Provides readers with end-to-end shell scripts that can be used to automate repetitive tasks and solve real-world system administration problems
* Targets the specific command structure for four popular UNIX systems: Solaris, Linux, AIX, and HP-UX
* Illustrates dozens of example tasks, presenting the proper command syntax and analyzing the performance gain or loss using various control structure techniques
* Web site includes all the shell scripts used in the book

Synopsis
Provides readers with end--to--end shell scripts that can be used to automate repetitive tasks and solve real--world system administration problems Targets the specific command structure for four popular UNIX systems: Solaris, Linux, AIX, and HP--UX Illustrates dozens of example tasks, presenting the proper command syntax and analyzing the performance gain or loss using various control structure techniques Web site includes all the shell scripts used in the book


Download

Password default : wpspot.info
read more “Mastering UNIX Shell Scripting”

Addison Wesley UNIX Network Programming

Image


"Everyone will want this book because it provides a great mix of practical experience, historical perspective, and a depth of understanding that only comes from being intimately involved in the field. I've already enjoyed and learned from reading this book, and surely you will too."
-Sam Leffler

The classic guide to UNIX networking APIs... now completely updated!

To build today's highly distributed, networked applications and services, you need deep mastery of sockets and other key networking APIs. One book delivers comprehensive, start-to-finish guidance for building robust, high-performance networked systems in any environment: UNIX Network Programming, Volume 1, Third Edition.

Building on the legendary work of W. Richard Stevens, this edition has been fully updated by two leading network programming experts to address today's most crucial standards, implementations, and techniques. New topics include:

POSIX Single UNIX Specification Version 3

IPv6 APIs (including updated guidance on IPv6/IPv4 interoperability)

The new SCTP transport protocol

IPsec-based Key Management Sockets

FreeBSD 4.8/5.1, Red Hat Linux 9.x, Solaris 9, AIX 5.x, HP-UX, and Mac OS X implementations

New network program debugging techniques

Source Specific Multicast API, the key enabler for widespread IP multicast deployment


The authors also update and extend Stevens' definitive coverage of these crucial UNIX networking standards and techniques:

TCP and UDP transport

Sockets: elementary, advanced, routed, and raw

I/O: multiplexing, advanced functions, nonblocking, and signal-driven

Daemons and inetd

UNIX domain protocols

ioctl operations

Broadcasting and multicasting

Threads

Streams

Design: TCP iterative, concurrent, preforked, and prethreaded servers


Since 1990, network programmers have turned to one source for the insights and techniques they need: W. Richard Stevens' UNIX Network Programming. Now, there's an edition specifically designed for today's challenges-and tomorrow's.

Download

Password default : wpspot.info
read more “Addison Wesley UNIX Network Programming”

The UNIX haters handbook

Image

Product Description
In the tradition of 12-step programs that help people overcome their addictions by sharing stories, The UNIX-Haters Handbook is the self-help guide for people affected by the world's most esoteric and most widely used operating system.

Turn here for answers to all-important questions, such as...

Why does the online documentation lie to us? Why does the operating system overwrite valuable files with garbage? Why does the user's guide bear no relationship to reality? Why do the commands have cryptic names that have no bearing on their function? What is a grep? What is vi? Do troffs live under bridges, or are they inverted trons? WHERE ARE THEY SENDING ALL THE UPPERCASE LETTERS?


Download

Password default : wpspot.info
read more “The UNIX haters handbook”

advanced unix programming by Richard Stevens

http://ecx.images-amazon.com/images/I/4158Y9604PL.jpg
The best possible book of advanced unix programming by Richard Stevens...
Product Description
Bestselling UNIX author Rich Stevens offers application and system programmers his professional, experienced-based guidance on using the system call interface with C. Since good examples are the key to a book like this, a simple shell program is developed in the first chapter and then expanded throughout the book to demonstrate the principles.

Download

Password default : wpspot.info
read more “advanced unix programming by Richard Stevens”

Linux For You - March 2009

Linux For You - March 2009

Linux For You - March 2009

LINUX For You is the latest publication from the EFY Group. This magazine caters to newbies, power-users, administrators, developers and those belonging to the IT industry. It’s main goal is to enhance the return on investment (RoI) for organisations by deploying Linux (or open-source) solutions.

Download

Password default : wpspot.info
read more “Linux For You - March 2009”

LINUX / UNIX (and Relevent) eBooks Thread

Jun 3, 2009
Image

Your one-stop guide to Linux--fully revised and expanded.

Get in-depth coverage of all Linux features, tools, and utilities from this thoroughly updated and comprehensive resource, designed for all Linux distributions. Written by Linux expert Richard Petersen, this book explains how to get up-and-running on Linux, use the desktops and shells, manage applications, deploy servers, implement security measures, and handle system and network administration tasks.

With full coverage of the latest platform, Linux: The Complete Reference, Sixth Edition includes details on the very different and popular Debian (Ubuntu) and Red Hat/Fedora software installation and service management tools used by most distributions. This is a must-have guide for all Linux users. Install, configure, and administer any Linux distributionWork with files and folders from the BASH, TCSH, and Z shellsUse the GNOME and KDE desktops, X Windows, and display managersSet up office, database, Internet, and multimedia applicationsSecure data using SELinux, netfilter, SSH, and KerberosEncrypt network transmissions with GPG, LUKS, and IPsec Deploy FTP, Web, mail, proxy, print, news, and database serversAdminister system resources using HAL, udev, and virtualization (KVM and Xen)Configure and maintain IPv6, DHCPv6, NIS, networking, and remote accessAccess remote files and devices using NFSv4, GFS, PVFS, NIS, and SAMBA.


Download


Image

As Linux continues to grow in market share as an enterprise operating system, system administrators need to solve problems in a wide range of applications and work environments. To help you get to the bottom of real-life problems quickly, Linux System Administration is organized around three common administration scenarios: Linux as a hub for a home or small office, Linux as LAMP system (Linux-Apache web server-MySQL database- PHP/Perl/Python scripting languages), and remote administration of Linux machines.

You will be able to move beyond the basics of individual Linux tools in order to competently support users and maintain systems in actual work environments. Linux System Administration provides a solid background for Linux desktop users who want to move beyond the basics of Linux, and for experienced system administrators who are looking to gain more advanced skills.


Download


Image

This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn't mean you have all the answers. Networking is a complex subject with reams of reference material that's difficult to keep straight, much less remember. If you want a book that lays out the steps for specific tasks, that clearly explains the commands and configurations, and does not tax your patience with endless ramblings and meanderings into theory and obscure RFCs, this is the book for you. You will find recipes for: Building a gateway, firewall, and wireless access point on a Linux network Building a VoIP server with Asterisk Secure remote administration with SSH Building secure VPNs with OpenVPN, and a Linux PPTP VPN server Single sign-on with Samba for mixed Linux/Windows LANs Centralized network directory with OpenLDAP Network monitoring with Nagios or MRTG Getting acquainted with IPv6 Setting up hands-free networks installations of new systems Linux system administration via serial console And a lot more. Each recipe includes a clear, hands-on solution with tested code, plus a discussion on why it works. When you need to solve a network problem without delay, and don't have the time or patience to comb through reference books or the Web for answers, Linux Networking Cookbook gives you exactly what you need.


Download


Image

Linux, like all Unix variants, was built for networking above all. As a result, its networking features are flexible and reliable and daunting to Linux newcomers who aren't familiar enough with terms and concepts even to know what to look for in the documentation. Bryan Pfaffenberger does a service to people new to Linux networking with Linux Networking Clearly Explained, an assume-nothing guide to local area networks (LANs) and Internet connectivity under the open-source operating system. Pfaffenberger shows how to do everything file sharing, printer sharing, inter-machine backups, and Internet connection sharing that most home and office computer users want to do with their LANs. He explains how Linux fits into an environment of diverse equipment, showing how to make Linux machines talk to Mac OS units and Windows computers.


Download


Image

Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log the system to detect potential security problems. Backup and recovery policies that provide a structure for secure operations are also considered, and information related to configuring an Apache server, e-mail service, and the Internet gateway using a proxy server, an FTP server, DNS server for mapping DNS names to IP addresses, and firewall for system protection is provided.


Download


Image

Beginning Fedora: From Novice to Professional guides you through the tasks most new Linux users desire to perform while explaining potentially confusing concepts along the way. It will steer you through system customization opportunities and common tasks like listening to audio CDs and MP3s, watching movies, and performing office- and Internet-related jobs. A large part of the book is dedicated to advanced command-line techniques necessary to maintain your system and become a true Linux master!

Highlights of this title include the following:

* Provides an illustrated, step-by-step guide to Fedora installation and hardware configuration.
* Includes a DVD consisting of the latest Fedora operating system. Just place the disk into your drive and begin.
* Eases the transition from the Windows to the Linux desktop by focusing on key everyday tasks such as file management, peripheral configuration, MP3/video playback, and office tasks.


Download


Image

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.

Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:

* Passive network authentication and OS fingerprinting.
* iptables log analysis and policies.
* Application layer attack detection with the iptables string match extension.
* Building an iptables ruleset that emulates a Snort ruleset.
* Port knocking vs. Single Packet Authorization (SPA).
* Tools for visualizing iptables logs.

Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables along with psad and fwsnort to detect and even prevent compromises.


Download


Image

[quote]If you think Knoppix is just a Linux demo disk, think again. Klaus Knopper created an entire Linux distribution on a bootable CD (and now a DVD) so he could use his favorite open source tools on any computer. This book includes a collection of tips and techniques for using the enormous amount of software Knoppix offers-not just to work and play, but also to troubleshoot, repair, upgrade, and disinfect your system without having to install a thing.

Knoppix Hacks is just like the distribution it covers: a veritable Swiss Army knife packed full of tools. Scores of industrial-strength hacks-many of them new to this second edition-cover both the standard Knoppix CD and the feature-rich DVD "Maxi" distribution, which is included with this book. Discover how to use Knoppix to its full potential as your desktop, rescue CD, or as a launching point for your own live CD.

With Knoppix Hacks, you can:

* Investigate features of the KDE desktop and its Internet applications.
* Save your settings and data between reboots with persistent storage.
* Employ Knoppix as a system administration multitool to replace failed servers and more.
* Use the CD/DVD as a rescue disc to repair filesystems or a system that won't boot.
* Rescue Windows systems with Knoppix to back up files and settings, hack the registry, and more.
* Explore other live CDs based on Knoppix that could augment your system.
* Easily install the popular Debian GNU/Linux distribution with all of your hardware detected and configured.
* Remaster Knoppix to include your favorite software and custom branding.

Whether you're a new Linux user, power user, or system administer, this book helps you take advantage of Knoppix and customize it to your needs. You may just find ways to use Knoppix that you never considered.


Download


Image

The Linux Network Administrator's Guide, Third Edition dispenses all the practical advice you need to join a network. Along with some hardware considerations, this highly acclaimed guide takes an in-depth look at all of the essential networking software that comes with the operating system--including basic infrastructure (TCP/IP, wireless networking, firewalling) and the most popular services on Linux systems. But as the follow-up to a classic, the third edition of the Linux Network Administrator's Guide does more than just spruce up the basics. It also provides the very latest information on the following cutting-edge services:

* Wireless hubs.
* OpenLDAP.
* FreeS/WAN.
* IMAP.
* Spam filtering.
* OpenSSH.
* BIND.
* IPv6.

Featuring a litany of insider tips and techniques, the Linux Network Administrator's Guide, Third Edition is an invaluable companion for any network administrator interested in integrating Linux into their Windows environment Authored by Terry Dawson, Tony Bautts, and Gregor N. Purdy, the Linux Network Administrator's Guide, Third Edition emerged from the Linux Documentation Project (LDP). The LDP's goal is to centralize all of the issues of Linux documentation, ranging from online documentation topics such as installing, using, and running Linux.


Download


Image

Ubuntu Linux is a state-of-the-art operating system, and you need a book that's just as advanced. Along with being the most comprehensive reference to installing, configuring, and working with Ubuntu, A Practical Guide to Ubuntu Linux« also provides extensive server coverage you won't find in any other Ubuntu book.

Best-selling author Mark Sobell begins by walking you through every feature and technique you need to know, from installing Ubuntu using the DVD included with the book to working with GNOME, Samba, exim4, Apache, DNS, NIS, firestarter, and iptables. Sobell's exceptionally clear explanations demystify everything from system security to Windows file/printer sharing.


Download


Image

Make the Most of Today's Smallest, Fastest Desktop Linux Distribution Damn Small Linux!

Damn Small Linux (DSL) is a super-efficient platform for everything from custom desktops to professional servers. Now, DSL's creator and lead developer have written the first definitive, practical guide to this remarkable system. The Official Damn Small Linux Book brings together everything you need to put DSL to work in just minutes. Simply learn a few essentials, boot the live CD-ROM, and master the rest...one step at a time, hands-on.

If you're new to Linux, you can quickly discover how to use DSL to take your data on the road, safely running your programs and personal environment on nearly any computer. Easily adapt DSL to run on anything from an alternative device (Internet appliance, hand-held, diskless PC, or mini-ITX system) to an older PC that might otherwise be headed for landfill.

Use this book to:

* Run DSL at blazing speed, from CD, USB pen drive, or directly from RAM.
* Run DSL from your hard drive or in a virtual environment within Windows.
* Add applications and create shareable extensions.
* Customize and remaster DSL to create your own distribution.
* Build a complete music and multimedia server.
* Use Skype VoIP phone service in DSL.
* Quickly set up an XAMPP Web server, complete with MySQL, PHP, and Perl, to host your personal Web pages.


Download


Image

The Linux operating system is widely used for networking and software development. It includes features to identify and control breaches of security, both internal and external. Linux Security gives you the knowledge to maximize the benefits of Linux products, keep your business safe, and gain a competitive edge!


Download


Image

GNU/Linux is an immensely popular operating system that is both extremely stable and reliable. But it can also induce minor headaches at the most inopportune times, if you're not fully up to speed with its capabilities.

A unique approach to running and administering Linux systems, Linux Annoyances for Geeks addresses the many poorly documented and under-appreciated topics that make the difference between a system you struggle with and a system you really enjoy. This book is for power users and system administrators who want to clear away barriers to using Linux for themselves and for less-trained users in their organizations.

This book meticulously tells you how to get a stubborn wireless card to work under Linux, and reveals little-known sources for wireless driversand information. It tells you how to add extra security to your systems, such as boot passwords, and how to use tools such as rescue disks to overcome overly zealous security measures in a pinch. In every area of desktop and server use, the book is chock full of advice based on hard-earned experience.

Author Michael Jang has spent many hours trying out software in a wide range of environments and carefully documenting solutions for the most popular Linux distributions. (The book focuses on Red Hat/Fedora, SUSE, and Debian.) Many of the topics presented here are previously undocumented or are discussed only in obscure email archives.

One of the valuable features of this book for system administrators and Linux proponents in general is the organization of step-by-step procedures that they can customize for naive end-users at their sites. Jang has taken into account not only the needs of a sophisticated readership, but the needs of other people those readers may serve.

Sometimes, a small thing for a user (such as being able to play a CD) or for an administrator (such as updating an organizations' systems from a central server) can make or break the adoption of Linux. This book helps you overcome the most common annoyances in deploying Linux, and trains you in the techniques that will help you overcome other problems you find along the way.

In keeping with the spirit of the Annoyances series, the book adopts a sympathetic tone that will quickly win you over. Rather than blaming you for possessing limited Linux savvy, Linux Annoyances for Geeks takes you along for a fun-filled ride as you master the system together.


Download


Image

This practical guide teaches you how to implement effective network protection by using your own customized firewall solution. Based on extensive practical experience, this book distills a unique set of scenario based scripts and guidelines for a proven firewall solution, into one succinct and precise book. This book shows you how to implement Linux firewalls and Quality of Service using practical examples from very small to very large networks.

After giving us a background of network security, the book moves on to explain the basic technologies we will work with, namely netfilter, iproute2, NAT and l7-filter. These form the crux of building Linux firewalls and QOS.Providing only necessary theoretical background, the book takes a practical approach, presenting case studies and plenty of illustrative examples.

Download
Rapidshare


Image

The Best Fully Integrated Study System Available.

With hundreds of practice questions and hands-on exercises, RHCE Red Hat Certified Engineer Linux Study Guide, Fifth Edition covers what you need to know--and shows you how to prepare--for this challenging exam.

* 100% complete coverage of all objectives for exam RH302.
* Exam Readiness Checklist at the front of the book--you're ready for the exam when all objectives on the list are checked off.
* Inside the Exam sections in every chapter highlight key exam topics covered.
* Real-world exercises modeled after hands-on exam scenarios.
* Two complete lab-based exams simulate the format, tone, topics, and difficulty of the real exam.
* Bonus content (available for download) includes installation screen review, basic instructions for using VMware and Xen as testbeds, and paper and pencil versions of the lab exams.

Covers all RH302 exam topics, including:

* Hardware installation and configuration.
* The boot process.
* Linux filesystem administration.
* Package management and Kickstart.
* User and group administration.
* System administration tools.
* Kernel services and configuration.
* Apache and Squid.
* Network file sharing services (NFS, FTP, and Samba).
* Domain Name System (DNS).
* E-mail (servers and clients).
* Extended Internet Services Daemon (xinetd), the Secure package, and DHCP.
* The X Window System.
* Firewalls, SELinux, and troubleshooting.

Download


Image

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone who knows which systems are vulnerable and how crackers get into them--this unique guide to Linux security identifies existing and potential security holes and faults, and then describes how to go about fixing them.

Download


Image

This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

Long-time Red Hat insider Tammy Fox brings together today's best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central identity management services, and providing shared data with NFS and Samba.

Red Hat Enterprise Linux 5 Administration Unleashed contains extensive coverage of network and web services, from the Apache HTTP server and Sendmail email services to remote login with OpenSSH. Fox also describes Red Hat's most valuable tools for monitoring and optimization and presents thorough coverage of security including a detailed introduction to Security-Enhanced Linux (SELinux).

* Streamline deployment with Kickstart.
* Find, install, update, remove, and verify software.
* Detect, analyze, and manage hardware.
* Manage storage with LVM, RAID, ACLs, and quotas.
* Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systems.
* Administer users and groups more efficiently and securely.
* Ensure trustworthy backup and rapid recovery.
* Script and schedule tasks to run automatically.
* Provide unified identity management services.
* Configure Apache, BIND, Samba, and Sendmail.
* Monitor and tune the kernel and individual applications.
* Protect against intruders with SELinux and ExecShield.
* Set up firewalls with iptables.
* Enable the Linux Auditing System.
* Use virtualization to run multiple operating systems concurrently.

Download


Image

FreeBSD the powerful, flexible, and free Unix-like operating system is the preferred server for many enterprises. But it can be even trickier to use than either Unix or Linux, and harder still to master.

Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas considers this completely revised and rewritten second edition of his landmark work to be his best work ever; a true product of his love for FreeBSD and the support of the FreeBSD community. Absolute FreeBSD, 2nd Edition covers installation, networking, security, network services, system performance, kernel tweaking, filesystems, SMP, upgrading, crash debugging, and much more, including coverage of how to:

* Use advanced security features like packet filtering, virtual machines, and host-based intrusion detection.
* Build custom live FreeBSD CDs and bootable flash.
* Manage network services and filesystems.
* Use DNS and set up email, IMAP, web, and FTP services for both servers and clients.
* Monitor your system with performance-testing and troubleshooting tools.
* Run diskless systems.
* Manage schedulers, remap shared libraries, and optimize your system for your hardware and your workload.
* Build custom network appliances with embedded FreeBSD.
* Implement redundant disks, even without special hardware.
* Integrate FreeBSD-specific SNMP into your network management system.

Whether you're just getting started with FreeBSD or you've been using it for years, you'll find this book to be the definitive guide to FreeBSD that you've been waiting for.


Download


Image

Hong's straightforward style makes it easy for the do-it-yourself crowd to build a server quickly using the ports collection (a software package management system). But rather than wade through the thousands of ports available, Hong focuses on the most popular and useful ones. Each package is treated as an independent project (and given a difficulty rating), so readers can dip into the book at any point to install just the packages they need, when they need them.

The book's modules cover topics like:

* Running common FreeBSD admin commands and tasks.
* Managing the FreeBSD ports collection.
* Installing third-party apps like Apache, Courier-IMAP, SpamAssassin, CUPS, Cyrus SASL, MediaWiki, and WordPress.
* Setting up MySQL, NTP, ISC DHCP, ISC BIND DNS, PHP, OpenLDAP, OpenSSH, OpenSSL, and OpenVPN.

Appendixes explain user management, backup/restore, and network protocols.

Building a Server with FreeBSD 7 will have readers running their own server loaded with useful modules in no time, with a minimum of hassle.

Download


Image

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network.

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software development, security is constantly being compromised. Linux has always been considered the digital playground for hackers. Many hacks, exploits, and network security tools are written on Linux because it's readily available. Hacking Linux Exposed: Linux Security Secrets & Solutions shows you, step-by-step, how to defend against the latest Linux attacks by understanding the hacker's methods and sinister thought processes. You'll learn how your adversaries gather information, acquire targets, escalate privilege, gain control, plant back doors, and cover their tracks. Each chapter is divided into bite-sized chunks, covering highly publicized and little-known break-ins, tips on why they occurred, and detailed countermeasures that no Linux professional can afford to be without.

*Get details on the security features of each Linux distribution, including Red Hat Linux, SuSE, Debian, and Slackware.
*Zero in on vulnerable systems using whois, traceroute, DNS zone transfers, OS detection, ping sweeps, and port scans.
*Detect Trojan horses, backdoors, password cracking, IP spoofing, session hijacking, and trail hiding.
*Implement Log analysis tools such as the Advanced Intrusion Detection Environment (AIDE) and advanced kernel security patches, including the Linux Intrusion Detection System (LIDS).
*Learn how to prevent local users from getting root privileges.
*Prevent Denial of Service and other network attacks.
*Configure FTP sites, DNS servers, and other daemons securely.
*Plug common and obscure security holes in Sendmail, Qmail, Postfix, POP, and IMAP servers.
*Defend against Web server attacks using secure scripting techniques, user verification, and secure Apache Server configurations.
*Design, position, and test secure firewalls and other network access restrictions.


Download


Image

Pro DNS and BIND guides you through the challenging array of features surrounding DNS, with a special focus on BIND, the world’s most popular DNS implementation. This book unravels the mysteries of DNS, offering insight into origins, evolution, and key concepts like domain names and zone files. This book focuses on running DNS systems based on BIND 9.3.0—the first stable release that includes support for the latest DNSSEC (DNSSEC.bis) standards and a major functional upgrade from previous BIND 9 releases.

If you administer a DNS system or are thinking about running one, or if you need to upgrade to support IPv6 DNS, need to secure a DNS for zone transfer, dynamic update, or other reasons, or if you need to implement DNSSEC, or simply want to understand the DNS system, then this book provides you with a single point of reference. Pro DNS and BIND starts with simple concepts, then moves on to full security-aware DNSSEC configurations. Various features, parameters, and resource records are described and, in the majority of cases, illustrated with one or more examples.

The book contains a complete reference to zone files, Resource Records, and BIND’s configuration file parameters. You can treat the book as as a simple paint-by-numbers guide to everything from a simple caching DNS, to the most complex secure DNS (DNSSEC) implementation. Background information is still included for when you need to know what to do and why you have to do it, and so that you can modify processes to meet your unique needs.

Topics Include:
Introduction to the DNS Basic DNS types with complete configuarion examples DNS and IPv6 Installing BIND on Linux, FreeBSD and Windows Subdomain delegation DNS and load balancing Reverse map delegation DNSSEC (DNSSEC.bis) and the DLV experimental service Key rollover and DNSSEC maintenance DNS tools and diagnostics.

Download



Image

Content management, blogs, and online forums are among the most significant online trends today, and Drupal, phpBB, and WordPress are three of the most popular open source applications facilitating these trends.

Drupal is a full content management system that allows you to create any type of website you desire, from an e-commerce to a community-based site. phpBB enables you to set up a bulletin board or forum. And WordPress is the software of choice for the exploding blog community. All three technologies are based on PHP and MySQL.

Building Online Communities with Drupal, phpBB, and Wordpress is authored by a team of experts. Robert T. Douglass recently created the Drupal-powered blog site NowPublic.com. Mike Little is a founder and contributing developer of the WordPress project. And Jared W. Smith has been a longtime support team member of phpBBHacks.com and has been building sites with phpBB since the first beta releases.

Download


Image

Fully updated for the most current Linux distributions, Linux Administration: A Beginner's Guide, Fifth Edition, shows you how to set up, maintain, and troubleshoot Linux on a single server or an entire network. Get full details on granting user rights and permissions, configuring software and hardware, providing Internet and intranet services, and customizing Linux kernel 2.6. You'll also learn how to get your network services IPv6 ready, implement sound security, create foolproof system backups, and use the latest virtualization technologies. Real-world, hands-on examples are included throughout.

*Install and configure popular Linux distributions, including Fedora 9, Red Hat Enterprise Linux, OpenSuSE, and Ubuntu.
*Manage users, permissions, files, folders, and applications.
*Administer Linux servers from the GUI or from the command line (shell).
*Understand and manage file systems in Linux.
*Compile, tune, and customize Linux kernel 2.6.
*Build robust firewalls and routers using netfilter and Linux.
*Manage the Linux TCP/IP networking stack and services for both IPv4 and IPv6.
*Build and deploy Web, e-mail, and FTP servers.
*Use NIS, NFS, LDAP, and Samba for resource sharing and identity management.
*Set up and administer print, DNS, POP3, IMAP3, and DHCP servers.
*Implement Linux virtualization technologies, including the native KVM platform.


Download


Image

Don't believe the myth about Linux servers being more secure than Windows servers. With an increasing number of high-severity security vulnerabilities being discovered on Linux servers, which now account for a third of all network servers worldwide, administrators must act diligently to ensure system security. The latest in the How to Cheat series, How to Cheat at Securing Linux, is a highly relevant resource and the only book on Linux security to come out in the past few years. Discover why securing Linux means "measure twice, cut once" and get essential how-to on hardening the operating system, implementing an intrusion detection system and defending databases.

Download


Image

This book is a guide to FreeBSD for network administrators; therefore it does not cover basic installation and configuration of FreeBSD, but is about using FreeBSD to build, secure, and maintain networks.

After introducing the basic tools for monitoring the performance and security of the system the book moves on to cover using jails—FreeBSD virtual environments—to virtually run multiple instances of FreeBSD on the same hardware. Then it shows how to overcome the different bottlenecks that you may meet depending on the services you are running by tweaking different parameters to maintain a high performance from your FreeBSD server. Next it covers using the ifconfig utility to configure interfaces with different layer protocols and about connectivity testing and debugging tools. After covering using User PPP or Kernel PPP for Point-to-Point Protocol network configuration it explains basic IP forwarding in FreeBSD and the use of the built-in routing daemons, routed and route6d, which support RIPv1, RIPv2, RIPng, and RDISC. Next it covers the OpenOSPFD and OpenBGPD daemons that you can install to run OSPF and BGP on your host. Then it covers setup and configuration of IPFW and PF, and finally looks at some important internet services and how to set them up on your FreeBSD server.

Download



This is my 1st thread on *nix (and anything related to it) ebooks and I plan to update this thread whenever I get more useful stuff on it.

To extract these files, use WinRAR 3.71 or 7-Zip freely available from:
http://www.7-zip.org/

Password default : wpspot.info
read more “LINUX / UNIX (and Relevent) eBooks Thread”

Red Hat Fedora Linux Secrets

Red Hat Fedora Linux Secrets

Red Hat Fedora Linux Secrets

Product Description

  • Featuring the latest changes in Fedora Core, this book offers valuable new secrets for Fedora users, including yum, mail filtering with SpamAssassin, mandatory access control with Security Enhanced Linux (SELinux), and improved device handling with udev
  • Demonstrates how to use Linux for real-world tasks, from learning UNIX commands to setting up a secure Java-capable Web server for a business
  • Because Fedora Core updates occur frequently, the book contains a helpful appendix with instructions on how to download and install the latest release of Fedora Core
  • The DVD contains the Fedora distribution as well as all binary code packages and source code


Download

Password default : wpspot.info
read more “Red Hat Fedora Linux Secrets”

Linux Cookbook

Linux Cookbook

Linux Cookbook

Product Description
This unique and valuable collection of tips, tools, and scripts provides clear, concise, hands-on solutions that can be applied to the challenges facing anyone running a network of Linux servers from small networks to large data centers in the practical and popular problem-solution-discussion O’Reilly cookbook format.

The Linux Cookbook covers everything you’d expect: backups, new users, and the like. But it also covers the non-obvious information that is often ignored in other books the time-sinks and headaches that are a real part of an administrator’s job, such as: dealing with odd kinds of devices that Linux historically hasn’t supported well, building multi-boot systems, and handling things like video and audio. The knowledge needed to install, deploy, and maintain Linux is not easily found, and no Linux distribution gets it just right. Scattered information can be found in a pile of man pages, texinfo files, and source code comments, but the best source of information is the experts themselves who built up a working knowledge of managing Linux systems. This cookbook’s proven techniques distill years of hard-won experience into practical cut-and-paste solutions to everyday Linux dilemmas. Use just one recipe from this varied collection of real-world solutions, and the hours of tedious trial-and-error saved will more than pay for the cost of the book. But those who prefer to learn hands-on will find that this cookbook not only solves immediate problems quickly, it also cuts right to the chase pointing out potential pitfalls and illustrating tested practices that can be applied to a myriad of other situations. Whether you’re responsible for a small Linux system, a huge corporate system, or a mixed Linux/Windows/MacOS network, you’ll find valuable, to-the-point, practical recipes for dealing with Linux systems everyday. The Linux Cookbook is more than a time-saver; it’s a sanity saver.

About the Author
Carla Schroder is a freelance system administrator and technical writer, who has written for IBM Developerworks, Intel, Crossnodes.com, and Computerbits.com.


Download

Password default : wpspot.info
read more “Linux Cookbook”

Linux Timesaving Techniques for Dummies

May 31, 2009


The Timesaving Techniques For Dummies books focus on high-payoff techniques that save you time, either on the spot or somewhere down the road. And these books get to the point in a hurry, with step-by-step instructions to pace you through the tasks you need to do, without any of the fluff you don’t want. We’ve identified more than 60 techniques that Linux users need to know to make the most of their time. In addition, each technique includes figures that make following along a breeze. Decide for yourself how to use this book: Read it cover to cover if you like, or skip right to the technique that interests you the most.

In Linux Timesaving Techniques For Dummies, you can find out how to

*. Tame time-consuming tasks: We’re letting you in on more than 60 tips and tricks for your Linux system, so you can spend more time on creating great results and less time on fiddling with a fea*ture so that it works correctly.

*. Take your skills up a notch: You’re already famil*iar with the basics of using Linux. Now this book takes you to the next level, helping you become a more powerful user.

*. Customize Linux to meet your needs: Spending some upfront time customizing Linux so that it works faster, more reliably, and more like how you work on a daily basis can save you time (and aggravation) later.

*. Fine-tune your system: You can fine-tune your Linux system for better performance and usabil*ity. Customizing your system to better serve users saves everyone time.

*. Improve your system security: Building a secure user environment with good user hygiene and regular backups will save everyone time. With adequate security in place, your chances of hav*ing to restore your system are minimized.

*. Automate repetitive tasks: You can automate and schedule repetitive tasks to run while you’re away, and save the bandwidth for the times that you need it most.

What’s in This Book

This book is organized into parts — groups of tech*niques about a common subject that will save you time and help you get your system running better. Each technique is written to be independent of the others, so you only need to implement those tech*niques that are important to you and your users. From time to time, we may send you to another tech*nique to implement a feature that we’ll be using in our current technique — we just don’t want to waste valuable space repeating ourselves. Each of the parts is about a different facet of a Linux system so you can scan the part title easily, looking for problem-solving techniques that will help you, quick.

Part I: Making the Desktop Work for You

Part I is full of tips and techniques to help you make the most of your time at the desktop. Teaching your system how to recognize file types (so you don’t have to specify them every time you open a file), keyboard shortcuts, and customizing your prompt are included among the techniques. We also include a rundown on the KDE protocols and the GNOME virtual file systems — the handy tools that work in a browser window to access other sources (like cam*eras or CDs). You’ll also find techniques about using automagic variables and history files to make the command line simple, easy, and quick.

Part II: Getting the Most from Your File System

This part focuses on moving and sharing data. Using Windows filesharing across a network, finding the files you need when you need them, and some quick downloading techniques are included in this part. This part also includes a technique about using User Mode Linux to create a playpen with a built-in copy of Fedora — handy if you need to jail a server or just want to experiment with program modifications safely.

Part III: Good Housekeeping with Linux

You’ll find techniques to help you make the most of the RPM tool (the Red Hat Package Manager) for installations, updates, and queries. Part III also includes a technique introducing you to Synaptic — a handy tool that will keep your software current and up-to-date with just a few clicks of the mouse. We’ll also introduce you to task scheduling tools that can help you automate administrative tasks to run without any supervision at all. Everyday timesaving doesn’t get much better than Part III.

Part IV: Tweaking the Kernel on Your Linux System

The techniques in Part IV are dedicated to the ker*nel. We’ll show you how to build a new kernel, clean up an old kernel, or find out about the condition of your existing kernel. We’ll also introduce you to SE Linux — the new security-enhanced kernel fresh with this release of Fedora.

Part V: Securing Your Workspace

Part V is all about security — we’ll introduce you to PAM (Pluggable Authentication Modules), and show you quick ways to encrypt e-mail and files to keep the prying eyes of snoops out of your personal docu*ments. We’ll also show you how to safeguard your system by using sudo to dole out the superuser privi*leges to only those users on your system who need them. Your system will be a safer place with the techniques in Part V implemented.

Part VI: Networking Like a Professional

The techniques in Part VI focus on using network features and network analysis tools to your advan*tage. We’ll show you how to set up and use remote desktops from your local system, as well as how to share desktops with remote users. We’ll also show you how to take care of your network security by building sturdy but supple firewalls, and how to harden those firewalls with the network security analysis tool, Nessus. We’ll also show you how to watch network traffic to see what’s traveling across your network to your users.

Part VII: Monitoring Your System

In this part, we’ll introduce you to tools that will help you keep an eye on your system resources and control runaway processes. We’ll also show you some quick ways to take care of users and their accounts — both new users and old.

Part VIII: Serving Up the Internet and More

In Part VIII, we’ll focus on server-related issues. We’ll show you the quick way to build and configure an Apache Web server, a Sendmail mail server, and a MySQL database server, as well as how to monitor your servers once they’re in place. We’ll also show you how to make your new Web site a more secure place with SSL certificates, and the easy way to cre*ate your own certificate signing authority. Then we’ll delve into e-mail — you’ll save a ton of time with our techniques that help you avoid spam with SpamAssassin and retrieve your HTTPMail (that’s Hotmail, MSN, and Lycos mail) with hotway, avoiding all of the ads and pop-ups that come with most Internet mail accounts.

Part IX: Backing Up Means Never Having to Say You’re Sorry

The techniques in this part are all about backing up. Techniques include getting ready to back up your data, choosing a fast but sturdy backup scheme, implementing a good backup routine, and backing

up to remote storage. We’ll also introduce you to CVS archiving — a great way to keep not only cur*rent renditions of projects, but also a living history of a project’s growth.

Part X: Programming Tricks

These techniques will help you save time in your programming projects. You’ll find a technique that helps you use prewritten, open-source APIs in your own code to help you cover ground quickly. You’ll also find a technique that focuses on moving data in and out of your PHP code. We’ll also introduce you to a great graphical debugger (DDD) that will save you time when you need to debug your code — that’s the last thing you want to spend too much time on.

Part XI: The Scary (Or Fun!) Stuff

This part contains a medley of timesaving tech*niques that will help you burn CDs, find dangerous programs, create a UML jail, troubleshoot problem programs, and more. We’ll introduce you to Bastille, a system-hardening, open-source tool that makes most security schemes look wimpy. We’ll also give you the rundown on LIDS — an under-documented but powerful security tool that you can use on your system to create a secure user environment. We’ll throw in an introduction to Zenity — a handy toolkit you can use to add graphical prompts to any user shell scripts you use on your system.


Download

http://uploading.com/files/E6RKYXP2/booktraining.net_Linux_Timesaving.rar.html
http://rapidshare.com/files/239126256/booktraining.net_Linux_Timesaving.rar

Password default : wpspot.info
read more “Linux Timesaving Techniques for Dummies”

Linux: The Complete Reference, Sixth Edition

May 20, 2009

Your one-stop guide to Linux--fully revised and expanded
Get in-depth coverage of all Linux features, tools, and utilities from this thoroughly updated and comprehensive resource, designed for all Linux distributions. Written by Linux expert Richard Petersen, this book explains how to get up-and-running on Linux, use the desktops and shells, manage applications, deploy servers, implement security measures, and handle system and network administration tasks.
With full coverage of the latest platform, Linux: The Complete Reference, Sixth Edition includes details on the very different and popular Debian (Ubuntu) and Red Hat/Fedora software installation and service management tools used by most distributions. This is a must-have guide for all Linux users.
* Install, configure, and administer any Linux distribution* Work with files and folders from the BASH, TCSH, and Z shells* Use the GNOME and KDE desktops, X Windows, and display managers* Set up office, database, Internet, and multimedia applications* Secure data using SELinux, netfilter, SSH, and Kerberos* Encrypt network transmissions with GPG, LUKS, and IPsec* Deploy FTP, Web, mail, proxy, print, news, and database servers* Administer system resources using HAL, udev, and virtualization (KVM and Xen)* Configure and maintain IPv6, DHCPv6, NIS, networking, and remote access* Access remote files and devices using NFSv4, GFS, PVFS, NIS, and SAMBA
About the Author
Richard Petersen, MLIS, teaches UNIX and C/C++ courses at the University of California at Berkeley. He is the author of all previous editions of Linux:The Complete Reference and regularly writes articles for Linux World Magazine.

Mirror

Password default : wpspot.info
read more “Linux: The Complete Reference, Sixth Edition”

Linux Bible 2007 Edition

May 10, 2009

Get ready to master the basics and beyond with this in-depth guide to Linux. You’ll discover how Linux is productive enough to use as your only desktop system and powerful enough to run entire corporate enterprise installations. Plus, you’ll walk through 16 different Linux distributions, find step-by-step instructions, be introduced to new programming tools, and tap into the world of free software, all aimed at helping you succeed with Linux.

Download

http://uploading.com/files/3DVNZ3JI/Wiley.Linux.Bible.2007.Edition.Mar.2007.pdf.html


Password default : wpspot.info
read more “Linux Bible 2007 Edition”

Struts: The Complete Reference

May 8, 2009

Struts: The Complete Reference


Struts: The Complete Reference

Struts: The Complete Reference

In his book, James Holmes, a Committer on the Struts development team, provides you with the first comprehensive treatment of Struts 1.1. His coverage begins with a comprehensive tutorial, followed by in-depth coverage of API, config files, Struts’ tag library, and an entire section on end-to-end application development. He also emphasizes ways to handle Struts’ most complex concepts including tiles, validators, security, and internationalization. Insider tips and techniques for making an amazing Struts application take you to that next level of manipulating this cutting-edge framework. Source code will be available online.

From the Back Cover
The Ultimate Struts Resource! Covers Struts 1.2
Use the Struts framework to create flexible, high-performance, business-oriented Web applications that use Java servlets and JavaServer Pages. James Holmes, a committer on the Struts project, provides a comprehensive Struts tutorial that gets you started building real-world applications as quickly as possible. He offers in-depth coverage of the MVC architecture, Validators, Tiles, modules, the Struts Tag Libraries, and JSTL. You’ll also get details on securing and testing your applications as well as expert tips and techniques on how to make a Struts application sizzle.
Understand the Model-View-Controller (MVC) architecture
Take advantage of the built-in validation interface
Create and reuse a Tiles JSP layout
Configure and use Struts’ declarative exception handler
Set up and use modules in your applications
Use the HTML, Bean, Logic, and Nested Tag Libraries
Use the JSP Standard Tag Library (JSTL)
Work with the Struts, Tiles, and Validator configuration files
Secure your Struts applications
Perform a variety of unit tests on Struts applications

download



Password default : wpspot.info
read more “Struts: The Complete Reference”

Exceptional C++ Style: 40 New Engineering Puzzles, Programming Problems, and Solutions (C++ In-Depth Series)

Exceptional C++ Style: 40 New Engineering Puzzles, Programming Problems, and Solutions (C++ In-Depth Series)


Exceptional C++ Style: 40 New Engineering Puzzles, Programming Problems, and Solutions (C++ In-Depth Series)

Exceptional C++ Style: 40 New Engineering Puzzles, Programming Problems, and Solutions (C++ In-Depth Series)

Product Description
Software “style” is about finding the perfect balance between overhead and functionality… elegance and maintainability… flexibility and excess. In Exceptional C++ Style, legendary C++ guru Herb Sutter presents 40 new programming scenarios designed to analyze not only the what but the why and help you find just the right balance in your software.

Organized around practical problems and solutions, this book offers new insight into crucial C++ details and interrelationships, and new strategies for today’s key C++ programming techniques–including generic programming, STL, exception safety, and more. You’ll find answers to questions like:

What can you learn about library design from the STL itself?
How do you avoid making templated code needlessly non-generic?
Why shouldn’t you specialize function templates? What should you do instead?
How does exception safety go beyond try and catch statements?
Should you use exception specifications, or not?
When and how should you “leak” the private parts of a class?
How do you make classes safer for versioning?
What’s the real memory cost of using standard containers?
How can using const really optimize your code?
How does writing inline affect performance?
When does code that looks wrong actually compile and run perfectly, and why should you care?
What’s wrong with the design of std::string?

Exceptional C++ Style will help you design, architect, and code with style–and achieve greater robustness and performance in all your C++ software.

download



Password default : wpspot.info
read more “Exceptional C++ Style: 40 New Engineering Puzzles, Programming Problems, and Solutions (C++ In-Depth Series)”

Java Certification JumpStart

Java Certification JumpStart


Java Certification JumpStart

Java Certification JumpStart

Product Description
Java is the fastest-growing programming language, which explains why Sun’s programmer and developer certifications are two of the hottest in the industry. As popular as Java is, it can be a daunting topic for a beginner. Java Certification JumpStart demystifies the subject and gives aspiring Java programmers the solid foundation they need to pursue more advanced Java training. Written by an experienced instructor, this book is an ideal first-step for Java certification candidates, or those considering a career in Java programming who have little or no experience with the technology. And it’s a perfect precursor to Sybex’s best-selling Complete Java 2 Certification Study Guide, 3ed (ISBN: 0782140777).

download



Password default : wpspot.info
read more “Java Certification JumpStart”

BusinessObjects XI (Release 2): The Complete Reference

BusinessObjects XI (Release 2): The Complete Reference


BusinessObjects XI (Release 2): The Complete Reference

BusinessObjects XI (Release 2): The Complete Reference

Product Description
This book is a must read for anyone deploying BusinessObjects. It covers everything from planning your upgrade to the latest release, to best practices in universe design, and powerful report creation that maximizes business insight. This book covers the most frequently used features for the full BI suite, in one comprehensive book.

There’s in depth coverage of Designer, security via the Central Management Console, InfoView, Web Intelligence, and Desktop Intelligence. It goes beyond step-by-step instructions to cover how and why in a business context. Transition notes are interspersed for version 5 and 6 customers to understand the biggest changes in XI Release 2. If you drive BI requirements in your company or are a data warehouse program manager, Business Objects administrator, report author or consumer, this book is for you.. .

download



Password default : wpspot.info
read more “BusinessObjects XI (Release 2): The Complete Reference”

Linux(R) Troubleshooting for System Administrators and Power Users (HP Professional Series)

Linux(R) Troubleshooting for System Administrators and Power Users (HP Professional Series)


Linux(R) Troubleshooting for System Administrators and Power Users (HP Professional Series)

Linux(R) Troubleshooting for System Administrators and Power Users (HP Professional Series)

Product Description
Linux is a fast-growing operating system with power and appeal, and enterprises worldwide are quickly adopting the system to utilize its benefits. But as with all operating systems, performance problems do occur causing system administrators to scramble into action. Finally, there is a complete reference for troubleshooting Linux–quickly! Linux Troubleshooting for System Administrators and Power Users is THE book for locating and solving problems and maintaining high performance in Red Hat(R) Linux and Novell(R) SUSE(R) Linux systems.

This book not only teaches you how to troubleshoot Linux, it shows you how the system works–so you can attack any problem at its root. Should you reinstall if Linux does not boot? Or can you save time by troubleshooting the problem? Can you enhance performance when Linux hangs or runs slowly? Can you overcome problems with printing or accessing a network? This book provides easy-to-follow examples and an extensive look at the tools, commands, and scripts that make Linux run properly.* A troubleshooting guide for all Linux users: Focuses on common problems with start-up, printing, login, the network, security, and more *Restore Linux when boot, startup, or shutdown fails–and reinstall Linux properly when all troubleshooting fails *Explains how to use some of the most popular Linux performance tools, including top, sar, vmstat, iostat, and free *Handle storage problems and CPU slamming to ensure high Linux performance *Solve hardware device problems by deciphering error messages and using the lspci tool *Use backup/recover commands and tape libraries to create proper backups *Identify and correct remote and network printing problems using spooler commands Gone are the days of searching online for solutions that are out of date and unreliable. Whether you are a system admin, developer, or user, this book is an invaluable resource for ensuring that Linux runs smoothly, efficiently, and securely.

download



Password default : wpspot.info
read more “Linux(R) Troubleshooting for System Administrators and Power Users (HP Professional Series)”

Download Free Ebook Video Training

Video training,video training rapidshare.com,video training rapidshare,Video training megaupload,video training hotfile uploading,Video training mediafire,free ebook rapidshare,computers books rapidshare,Books rapidshare,Book rapidshare, Book mediafire, video tutorials


This site does not store any files on its server.We only index and link to content provided by other sites. In case of any query/objection regarding copyright or piracy, please inform us at shytex@gmail.com. we will immediately respond to you.