Written with a clear, straightforward writing style and packed with step-by-step projects for direct, hands-on learning, Guide to UNIX Using Linux, 4E is the perfect resource for learning UNIX and Linux from the ground up. Through the use of practical examples, end-of-chapter reviews, and interactive exercises, novice users are transformed into confident UNIX/Linux users who can employ utilities, master files, manage and query data, create scripts, access a network or the Internet, and navigate popular user interfaces and software. The updated 4th edition incorporates coverage of the latest versions of UNIX and Linux, including new versions of Red Hat, Fedora, SUSE, and Ubuntu Linux. A new chapter has also been added to cover basic networking utilities, and several other chapters have been expanded to include additional information on the KDE and GNOME desktops, as well as coverage of the popular OpenOffice.org office suite. With a strong focus on universal UNIX and Linux commands that are transferable to all versions of Linux, this book is a must-have for anyone seeking to develop their knowledge of these systems. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Maintain a robust, mission-critical Oracle8i database. This book provides administrative solutions for the day-to-day DBA. You'll learn how to install the database for maximum efficiency, upgrades, patches, migrations, tune, and maintain its security. The book also explains in detail how to build and support a fully functioning Oracle database. This authoritative text contains up-to-date information available on Oracle's latest release and shows you how to: configure database architecture; install and set up with UNIX requirements; create the actual database with scripts; GUI management produc.
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed to any significant depth largely due to a lack of understanding on the part of the investigator, an understanding and knowledge base that has been achieved by the attacker. The book begins with a chapter to describe why and how the book was written, and for whom, and then immediately begins addressing the issues of live response (volatile) data collection and analysis. The book continues by addressing issues of collecting and analyzing the contents of physical memory (i.e., RAM). The following chapters address /proc analysis, revealing the wealth of significant evidence, and analysis of files created by or on UNIX systems. Then the book addresses the underground world of UNIX hacking and reveals methods and techniques used by hackers, malware coders, and anti-forensic developers. The book then illustrates to the investigator how to analyze these files and extract the information they need to perform a comprehensive forensic analysis. The final chapter includes a detailed discussion of loadable kernel Modules and malware. Throughout the book the author provides a wealth of unique information, providing tools, techniques and information that won't be found anywhere else. This book contains information about UNIX forensic analysis that is not available anywhere else. Much of the information is a result of the author's own unique research and work. The authors have the combined experience of law enforcement, military, and corporate forensics. This unique perspective makes this book attractive to all forensic investigators.
In this updated edition, authors Deborah and Eric Ray use crystal-clear instructions and friendly prose to introduce you to all of today's Unix essentials. You’ll find the information you need to get started with the operating system and learn the most common Unix commands and concepts so that Unix can do the hard work for you. After mastering the basics of Unix, you’ll move on to how to use directories and files, work with a shell, and create and edit files. You’ll then learn how to manipulate files, configure a Unix environment, and run–and even write–scripts. Throughout the book–from logging in to being root–the authors offer essential coverage of Unix.
With Unix, 4th Edition: Visual QuickStart Guide, readers can start from the beginning to get a tour of the Unix operating system, or look up specific tasks to learn just what they need to know. This task-based, visual reference guide uses step-by-step instructions and plenty of screenshots, and includes three years worth of new material based on the latest Unix developments. This reference guide details all Unix commands and options along with tips that put those commands in context. Leading Unix authorities Deborah S. Ray and Eric J. Ray leverage their expertise as technical writers and working in the industry (Sun Microsystems) as they take readers step-by-step through the most common Unix commands and options.
Wouldnt you like to automate the tedious daily tasks of system administration? Automating UNIX and Linux Administration will show you how, by exploring existing tools and offering real-world examples. Although some of the book is Linux-specific, most of the information applies to any UNIX system, including material on automating tasks across multiple variants of UNIX. Author Kirk Bauer briefly overviews tools and technologiesand assumes preliminary knowledge about editing a configuration file or mounting a file system. The techniques, methods, and tools in this book will help you manage a single systembut will prove especially powerful across multiple systems. No matter if the systems are desktops, servers, or Beowulf clustersall of them will benefit from this automation. And managing five to five thousand systems will become a simpler task!
Surveys the best practices for all aspects of system administration, covering such topics as storage management, email, Web hosting, performance analysis, virtualization, DNS, security, and configuration management.
IBM DB2 Universal Database V8 offers breakthrough availability, manageability, performance, and scalability. Now, straight from IBM, there's a start-to-finish guide to DB2 Universal Database V8 administration and development for UNIX, Linux, and Windows. This definitive reference covers every aspect of deploying and managing DB2 Universal Database V8, including database design for optimal performance, availability, and recoverability; day-to-day administration and backup; comparing, selecting, and using appropriate DB2 programming techniques; deploying networked and Internet-centered database applications; migrating to DB2 UDB from other databases or earlier versions of DB2; and much more. Using real-world examples, this book shows how to take full advantage of DB2 V8's most powerful enhancements. Philip K. Gunning brings together IBM's best tips and techniques for saving time and money in every facet of database design, development, deployment, and administration. Coverage includes: bull; Leveraging DB2 V8's new Wizards, Advisors, and other automation/self-management features Using the enhanced DB2 XML Extender to build next-generation B2B applications Quickly creating Stored Procedures and UDFs with the new Development Center Exploiting multidimensional clustering, prefetching, materialized query tables, Java threading, and other performance improvements Using the DB2 improved monitoring and logging facilities Maximizing availability via online table and index reorganization and dynamic configuration Understanding the latest changes in the DB2 product family
This manual seeks to provide hands-on advice and technical tips on how to use the Korn Shell features effectively, to customize the Unix/Linux environment, and write, test and debug Korn Shell scripts. It contains hundreds of examples plus complete ready to run sample scripts.