Search Results - "Linux kernel"
Suggested Topics within your search.
Suggested Topics within your search.
- Operating systems (Computers) 5
- operating systems 4
- Development 3
- Operating systems 3
- Programming 3
- Application software 2
- Certification 2
- Computer networks 2
- Electronic data processing personnel 2
- Embedded computer systems 2
- Examinations 2
- Virtual computer systems 2
- Access control 1
- Assembly languages (Electronic computers) 1
- BeagleBone (Computer) 1
- Business enterprises 1
- Client/server computing 1
- Cluster analysis 1
- Computer Communication Networks 1
- Computer architecture 1
- Computer network architectures 1
- Computer programming 1
- Computer software 1
- Computers 1
- Distributed processing 1
- Electronic data interchange 1
- Electronic data processing 1
- Electronic mail messages 1
- Electronic mail systems 1
- Firewalls (Computer security) 1
-
1
Advanced Infrastructure Penetration Testing : Defend your systems from methodized and proficient attackers.
Published 2018Table of Contents: “…Jobs, cron, and crontabSecurity models; Security controls; Access control models; Linux attack vectors; Linux enumeration with LinEnum; OS detection with Nmap; Privilege escalation; Linux privilege checker; Linux kernel exploitation; UserLand versus kernel land; System calls; Linux kernel subsystems ; Process ; Threads; Security-Enhanced Linux ; Memory models and the address spaces ; Linux kernel vulnerabilities; NULL pointer dereference; Arbitrary kernel read/write ; Case study CVE-2016-2443 Qualcomm MSM debug fs kernel arbitrary write; Memory corruption vulnerabilities.…”
Full text (MFA users only)
Electronic eBook -
2
How Linux works : what every superuser should know
Published 2015Table of Contents: “…The big picture -- Basic commands and directory hierarchy -- Devices -- Disks and filesystems -- How the Linux kernel boots -- How user space starts -- System configuration: logging, system time, batch jobs, and users -- A closer look at processes and resource utilization -- Understanding your network and its configuration -- Network applications and services -- Introduction to shell scripts -- Moving files across the network -- User environments -- A brief survey of the Linux desktop -- Development tools -- Introduction to compiling software from C source code -- Building on the basics.…”
Full text (MFA users only)
Electronic eBook -
3
Linux All-In-One for Dummies.
Published 2022Table of Contents: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- 1 Getting Started with Linux -- Chapter 1 Introducing Linux -- What Is Linux? -- The Linux kernel -- System memory management -- Software program management -- Hardware management -- GNU utilities -- Linux user interfaces -- The X Window system -- The KDE Plasma desktop -- The GNOME desktop -- The command-line interface -- Linux Distributions: Why So Many? …”
Full text (MFA users only)
Electronic eBook -
4
-
5
See MIPS Run.
Published 2006Table of Contents: “…MIPS Specific Issues in the Linux Kernel; Chapter 16. Linux Application Code, PIC, and Libraries; Appendix A. …”
Full text (MFA users only)
Electronic eBook -
6
Linux firewalls : attack detection and response with iptables, psad, and fwsnort
Published 2007Full text (MFA users only)
Electronic eBook -
7
Exploring BeagleBone : Tools and Techniques for Building with Embedded Linux.
Published 2018Full text (MFA users only)
Electronic eBook -
8
The Linux Enterprise Cluster : build a highly available cluster with commodity hardware and free software
Published 2005Full text (MFA users only)
Electronic eBook -
9
CompTIA Linux+ and LPIC Practice Tests.
Published 2017Table of Contents: “…Chapter 8 Essential System Services (Domain 108)Chapter 9 Networking Fundamentals (Domain 109); Chapter 10 Security (Domain 110); Part II LPIC-2; Chapter 11 Capacity Planning (Topic 200); Chapter 12 Linux Kernel (Topic 201); Chapter 13 System Startup (Topic 202); Chapter 14 Filesystems and Devices (Topic 203); Chapter 15 Advanced Storage Device Administration (Topic 204); Chapter 16 Networking Configuration (Topic 205); Chapter 17 System Maintenance (Topic 206); Chapter 18 Domain Name Server (Topic 207); Chapter 19 HTTP Services (Topic 208); Chapter 20 File Sharing (Topic 209).…”
Full text (MFA users only)
Electronic eBook -
10
-
11
Oracle SOA Suite 11g Performance Cookbook.
Published 2013Table of Contents: “…Increasing the HTTP accept backlogReducing the server logging level; Finding out which JVM you are using; Using large pages in Linux; Increasing the number of file descriptors in Linux; Tuning the SOA Suite EJB timeouts; Upgrading to a newer JVM; Setting the Linux kernel swappiness to low; Using the Oracle JRockit JVM; Running your domain in the production mode; Creating a boot.properties file; Chapter 7: Data Sources and JMS; Introduction; Setting the data source pool sizes; Configuring data source testing; Configuring data source growing and shrinking.…”
Full text (MFA users only)
Electronic eBook -
12
Lpic-1 : linux professional institute certification.
Published 2013Full text (MFA users only)
Electronic eBook -
13
Linux Command Line and Shell Scripting Bible.
Published 2014Table of Contents: “…; Looking into the Linux kernel; System memory management; Software program management; Hardware management; Filesystem management; The GNU utilities; The core GNU utilities; The shell; The Linux desktop environment; The X Window system; The KDE desktop; The GNOME desktop; The Unity desktop; Other desktops; Linux Distributions; Core Linux distributions; Specialized Linux distributions; The Linux LiveCD; Summary; Chapter 2: Getting to the Shell; Reaching the Command Line.…”
Full text (MFA users only)
Electronic eBook -
14
CentOS Quick Start Guide : Get up and Running with CentOS Server Administration.
Published 2018Full text (MFA users only)
Electronic eBook -
15
Linux network servers
Published 2002Table of Contents: “…In SumChapter 13: Troubleshooting; Configuring the Linux Kernel; Troubleshooting a Network Server; Checking the Network Interface; Testing the Connection; Testing Routing; Analyzing Network Protocols; Testing Services; In Sum; Appendices; Appendix A: Installing Linux; Installation Planning; Booting the Installation Program; Partitioning the Disk; Installing the Software; In Sum; Appendix B: BIND Reference; named.conf Commands; Appendix C: The m4 Macros for sendmail; Local Code; DAEMON_OPTIONS; LDAP Mail Routing; Index…”
Full text (MFA users only)
Electronic eBook -
16
-
17
Professional assembly language
Published 2005Table of Contents: “…Optimizing Floating-Point CalculationsSummary; Chapter 10: Working with Strings; Moving Strings; Storing and Loading Strings; Comparing Strings; Scanning Strings; Summary; Chapter 11: Using Functions; Defining Functions; Assembly Functions; Passing Data Values in C Style; Using Separate Function Files; Using Command-Line Parameters; Summary; Chapter 12: Using Linux System Calls; The Linux Kernel; System Calls; Using System Calls; Advanced System Call Return Values; Tracing System Calls; System Calls versus C Libraries; Summary; Chapter 13: Using Inline Assembly; What Is Inline Assembly?…”
Full text (MFA users only)
Electronic eBook -
18
Virtual networks : pluralistic approach for the next generation of Internet
Published 2013Table of Contents: “…Overall performance -- linux kernel compilation; 1.4.6. Single virtual machine tests; 1.4.7. …”
Full text (MFA users only)
Electronic eBook -
19
-
20
Software engineering for embedded systems : methods, practical techniques, and applications
Published 2013Table of Contents: “…Note continued: Available techniques -- Static and dynamic analysis -- Requirements traceability -- Static analysis-adherence to a coding standard -- Essential knots & essential cyclomatic complexity -- case study -- Understanding dynamic analysis -- The legacy from high-integrity systems -- Defining unit, module and integration tests -- Defining structural coverage analysis -- Achieving code coverage with unit test and system test in tandem -- Retaining the functionality through regression test -- Unit test and test-driven development -- Automatically generating test cases -- Setting the standard -- The terminology of standards -- The evolution of a recognized process standard -- Freedom to choose adequate standards -- Dealing with the unusual -- Working with auto-generated code -- Working with legacy code -- Tracing requirements through to object code verification (OCV) -- Implementing a test solution environment -- Pragmatic considerations -- Considering the alternatives -- Summary and conclusions -- Introduction to debugging tools -- GDB debugging -- Configure the GDB debugger -- Starting GDB -- Compiling the application -- Debugging the application -- Examining data -- Using breakpoints -- Stepping -- Changing the program -- Analyzing core dumps -- Debug agent design -- Use cases -- Debug agent overview -- Starting the application -- Context switch -- Position-independent executables -- Debug event from the application -- Multicore -- Starting the debug agent -- Debugging using JTAG -- Benefits of using JTAG -- Board bring-up using JTAG -- Comparison with the debug agent -- GDB and JTAG -- Debugging tools using Eclipse and GDB -- Linux application debug with GDB -- Linux kernel debug with KGDB -- Instrumented code -- Practical example -- Analysis tools -- Strace -- Mtrace -- Vaigrind -- Hardware capabilities -- Hardware breakpoints -- Hardware watchpoints -- Debugging tips and tricks -- Part 1: Analysis and high-level design -- Analysis -- Improving serial performance -- Understand the application -- High-level design -- Parallel decomposition -- Data dependencies -- Communication and synchronization -- Load balancing -- Choice of algorithm -- Decomposition approaches -- Summary of Part 1 -- Part 2: Implementation and low-level design -- Thread-based implementations -- Kernel scheduling -- Pthreads -- Using PPthreads -- Dealing with thread safety -- Implementing synchronizations and mutual exclusion -- Mutexes, locks, nested locks -- Mutex -- Condition variables -- Granularity -- Fine-grained -- Coarse-grained -- Approach -- Implementing task parallelism -- Creation and join -- Parallel-pipeline computation -- Divide-and-conquer scheme -- Task scheduling considerations -- Thread pooling -- Affinity scheduling -- Event-based parallel programs -- Implementing loop parallelism -- Aligning computation and locality -- Message-passing implementations -- MCAPI -- MRAPI -- MCAPI and MRAPI in multicore systems -- Playing-card recognition and sorting example -- Using a hybrid approach -- References -- Introduction -- Which safety requirements? …”
Full text (MFA users only)
Electronic eBook