Download Linux in a Nutshell, 5th Edition by Ellen Siever PDF

By Ellen Siever

This can be relatively a superb reference publication for newcomers in addition to complex. while you're new to Linux and seeking out a e-book that teaches you Linux by way of explaining issues, this ebook isn't for you and also you have to examine different titles.

Show description

Read or Download Linux in a Nutshell, 5th Edition PDF

Best unix books

GCC.The complete reference

This is often the definitive connection with the GCC open-source compiler. Get updated details at the most modern features--including compiling Java code, development functions utilizing a number of languages, utilizing the debugger, linking, libraries, and lots more and plenty extra.

DNS in Action: A detailed and practical guide to DNS implementation, configuration, and administration

A close and functional advisor to DNS implementation, configuration, and management Technically special with functional options complete consultant to configuration and management of DNS servers Covers DNS Extensions, delegation, and registration intimately The area identify method is among the foundations of the web.

Pluggable Authentication Modules : the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them

First this e-book explains how Pluggable Authentication Modules (PAM) simplify and standardize authentication in Linux. It indicates intimately how PAM works and the way it's configured. Then eleven universal modules used throughout UNIX/Linux distributions are tested and defined, together with all their parameters. set up of third-party modules is mentioned, and the advance of recent modules and PAM-aware purposes is printed.

Just Say No to Microsoft: How to Ditch Microsoft and Why It's Not As Hard As You Think

Simply Say No to Microsoft - starts by means of tracing Microsoft's upward push from tiny software program startup to monopolistic juggernaut and explains how the company's practices through the years have discouraged innovation, stunted festival, and helped foster an atmosphere ripe for viruses, insects, and hackers. Readers learn the way they could unload Microsoft items - even the home windows working method - and remain effective.

Extra resources for Linux in a Nutshell, 5th Edition

Sample text

Masquerading can act as additional protection, hiding the very existence of a network. It also saves the trouble and expense of obtaining multiple IP addresses. IP firewalling and masquerading are implemented with netfilter, also known as iptables. Earlier Linux kernels used ipchains or ipfwadm, which will not be covered here. Unlike the older tools, the facilities provided by netfilter are designed to be extensible; if there is some function missing from the implementation, you can add it. The packet filtering facilities provide built-in rule sets.

Shutdown Shut down system. telinit Change the current runlevel. uptime Display uptimes of local machines. 13. System Activity and Process Management A number of additional commands in Chapter 3 are particularly useful in controlling processes, including kill, killall, pidof, ps, and who. Command Action fuser Identify processes using file or filesystem. renice Change the priority of running processes. top Show most CPU-intensive processes. vmstat Print virtual-memory statistics and process statistics.

Options -b, --battery Display battery information. -B, --without-battery Do not display battery information. -t, --thermal Display temperature information. 52 53 -T, --without-thermal Do not display temperature information. -a, --ac-adapter Show whether the AC adapter is connected. -A, --without-ac-adapter Do not show information about the AC adapter. -V, --everything Show all information on every device. -s, --show-empty Display information even on devices that are not available or not installed, such as empty slots for extra batteries.

Download PDF sample

Rated 4.39 of 5 – based on 21 votes