Introduction This document is intended to be used by the System Manager of an IECC Build Computer. It explains how to set up a Unix-based computer for use as an IECC Build Computer. It assumes a moderate familiarity with IECC terms and terminology, with the Unix operating...
"A hands-on guide to making system programming with C++ easy Key Features *Write system-level code leveraging C++17 *Learn the internals of the Linux Application Binary Interface (ABI) and apply it to system programming *Explore C++ concurrency to take advantage of server-level...
"Master shell basics and Unix tools and discover easy commands to perform complex tasks with speed Key Features *Learn why the Bash shell is widely used on Linux and iOS *Explore advanced shell concepts, such as pipes and redirection *Understand how to use Unix command-line tools as...
Explore the fundamentals of systems programming starting from kernel API and filesystem to network programming and process communications Key Features * Learn how to write Unix and Linux system code in Golang v1.12 * Perform inter-process communication using pipes, message...
ISO/IEC TR 13066-4:2015 provides an overview to the structure and terminology of the Linux/UNIX graphical environments accessibility API. It will provide the following: - a description of the overall architecture and terminology of the API; - further introductory explanations regarding the...
This part of ISO/IEC 13066 provides an overview to the structure and terminology of the Linux/UNIX graphical environments accessibility API. It will provide the following: - a description of the overall architecture and terminology of the API; - further introductory explanations regarding...
This book provides a practical approach to UNIX/Linux authentication. The design principles are explained thoroughly, then illustrated through the examination of popular modules. It is intended as a one-stop introduction and reference to PAM. This book is for experienced system...
A step-by-step tutorial that will teach you, through real-world examples, how to configure and use zsh and its various features. If you are a system administrator, developer, or computer professional involved with UNIX who are looking to improve on their daily tasks involving the...
Learning the new system's programming language for all Unix-type systems About This Book • Learn how to write system's level code in Golang, similar to Unix/Linux systems code • Ramp up in Go quickly • Deep dive into Goroutines and Go concurrency to be able to take...
Here is all the practical, hands-on information you need to build, manage and maintain a heterogeneous computing environment with hardware, software, and network equipment from a number of different vendors. Packed with real-world case studies and proven techniques for integrating disparate...
"Develop a solid understanding of the important command-line tools and utilities in Linux About This Book • Delve into the fundamentals of Linux • Explore and work with virtualization, command lines, and Bash shell scripts • Use special file permission flags such as setuid and setgid Who...
Purpose Several principles guided the development of this standard: • Application-Oriented
Solve specific problems using individual self-contained code recipes, or work through the book to develop your capabilities. This book is packed with easy-to-follow code and commands used for illustration, which makes your learning curve easy and quick.If you are a Hadoop cluster system...
This book is ideal for skilled web masters and site reliability engineers who want to switch to Nginx or solidify their knowledge of Nginx. Knowledge of Unix and webmaster skills are required.
This book takes a tutorial approach and each chapter contains step-wise instructions to perform specific tasks. This book is for Linux/Unix System Administrators interested in designing and setting up a CUPS network and provides enough knowledge to understand how the technology works,...
This document describes an extension to the Sieve email filtering language for an autoresponder similar to that of the Unix "vacation" command for replying to messages. Various safety features are included to prevent problems such as message loops.
Uncover the secrets of Linux binary analysis with this handy guide About This Book Grasp the intricacies of the ELF binary format of UNIX and Linux Design tools for reverse engineering and binary forensic analysis Insights into UNIX and Linux memory infections, ELF viruses, and binary...