Sebanyak 1165 item atau buku ditemukan

Pro Oracle Database 11g RAC on Linux

Pro Oracle Database 11g RAC on Linux provides full-life-cycle guidance on implementing Oracle Real Application Clusters in a Linux environment. Real Application Clusters, commonly abbreviated as RAC, is Oracle’s industry-leading architecture for scalable and fault-tolerant databases. RAC allows you to scale up and down by simply adding and subtracting inexpensive Linux servers. Redundancy provided by those multiple, inexpensive servers is the basis for the failover and other fault-tolerance features that RAC provides. Written by authors well-known for their talent with RAC, Pro Oracle Database 11g RAC on Linux gives you a rock-solid and technically flawless foundation on which to build your RAC-management skills. Authors Julian Dyke and Steve Shaw share their hard-won experience in building RAC clusters, showing you how to build for success using the very latest Oracle technologies, such as Automatic Storage Management (ASM) and Oracle Clusterware. You’ll learn to troubleshoot performance and other problems. You’ll even learn how to correctly deploy RAC in a virtual-machine environment based upon Oracle VM, which is the only virtualization solution supported by Oracle Corporation. RAC is a complex and powerful technology. It demands expertise in its deployment. You can’t just “wing it” in creating a RAC solution. Julian and Steve have earned the right to term themselves expert—in Pro Oracle Database 11g RAC on Linux, they offer a rigorous and technically-correct treatment of RAC that helps you build a solid foundation of expertise and achieve success. Rigorous and technically accurate content Complete coverage of RAC, from planning to implementation to rollout to ongoing maintenance and troubleshooting Up-to-date with the very latest RAC features What you’ll learn Plan the architecture for a successful RAC installation Implement failover and other fault-tolerant features Scale RAC clusters up and down as needed to achieve performance targets Consolidate RAC clusters using Oracle’s virtualization solution Manage RAC proactively so as to sleep well at night Troubleshoot and solve performance and availability problems Who this book is for Pro Oracle Database 11g RAC on Linux is written for Oracle Database administrators who want to step up their skills to be equal to the task of managing Real Application Clusters. Table of Contents Introduction RAC Concepts RAC Architecture Hardware Virtualization Linux Installation and Configuration Grid Infrastructure Installation Clusterware Automatic Storage Management RDBMS Installation and Configuration Workload Management Oracle Performance Monitoring Linux Performance Monitoring Parallel Execution Upgrading to Oracle 11g Release 2

Rigorous and technically accurate content Complete coverage of RAC, from planning to implementation to rollout to ongoing maintenance and troubleshooting Up-to-date with the very latest RAC features What you’ll learn Plan the architecture ...

Linux Administration A Beginners Guide 6/E

Essential Linux Management Skills Made Easy Effectively deploy and maintain Linux and other Free and Open Source Software (FOSS) on your servers or entire network using this practical resource. Linux Administration: A Beginner's Guide, Sixth Edition provides up-to-date details on the latest Linux distributions, including Fedora, Red Hat Enterprise Linux, CentOS, Debian, and Ubuntu. Learn how to install and customize Linux, work from the GUI or command line, configure Internet and intranet services, interoperate with Windows systems, and create reliable backups. Performance tuning, security, and virtualization are also covered and real-world examples help you put the techniques presented into practice. Install and configure popular Linux distributions, including the latest versions of Fedora, CentOS, openSUSE, Debian, and Ubuntu Administer Linux servers from the GUI or from the command line (shell) Manage users, permissions, folders, and native FOSS applications Compile, tune, upgrade, and customize the latest Linux kernel 3.x series Work with proc, SysFS, and cgroup file systems Understand and manage the Linux TCP/IP networking stack and services for both IPv4 and IPv6 Build robust firewalls, and routers using Netfilter and Linux Create and maintain print, e-mail, FTP, and web servers Use LDAP or NIS for identity management Set up and administer DNS, POP3, IMAP3, and DHCP servers Use GlusterFS, NFS, and Samba for sharing and distributing file system resources Explore and implement Linux virtualization technologies using KVM

Essential Linux Management Skills Made Easy Effectively deploy and maintain Linux and other Free and Open Source Software (FOSS) on your servers or entire network using this practical resource.

Building Secure Servers with Linux

Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured--some of which rival expensive commercial equivalents--making Linux a particularly appropriate platform for providing secure Internet services. Building Secure Servers with Linuxwill help you master the principles of reliable system and network security by combining practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the larger Internet--and shows readers how to harden their hosts against attacks. Author Mick Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. The book does not cover firewalls, but covers the more common situation where an organization protects its hub using other systems as firewalls, often proprietary firewalls. The book includes: Precise directions for securing common services, including the Web, mail, DNS, and file transfer. Ancillary tasks, such as hardening Linux, using SSH and certificates for tunneling, and using iptables for firewalling. Basic installation of intrusion detection tools. Writing for Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals.Building Secure Servers with Linuxprovides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages. An all-inclusive resource for Linux users who wish to harden their systems, the book covers general security as well as key services such as DNS, the Apache Web server, mail, file transfer, and secure shell. With this book in hand, you'll have everything you need to ensure robust security of your Linux system.

With this book in hand, you'll have everything you need to ensure robust security of your Linux system.

WordPerfect For Linux For Dummies

Download edition of WordPerfect 8 for Linux on CD-ROM! Filled with tips for perfect pages and dashing documents Get up and running today on the world's most powerful Linux word processor Introducing the perfect way to create professional-looking documents with your Linux PC — without all those complicated Linux commands! It's simple with this friendly guide. Just pop in the CD, load WordPerfect 8 on your computer, and open the book to find savvy tips on editing, formatting, graphics, file management, and more. all this on the bonus CD-ROM Corel WordPerfect 8 for Linux, Download Edition Share information easily with enhanced compatibility features and maximize your hardware with support for over 1,000 printers! 486 PC or faster running Linux with Kernel 2.0x or higher (with ibc5 installed), running X Windows systems (KDE, GNOME, or other). For complete information, see the About the CD Appendix. Discover how to: Create and edit documents Format memos, mailing labels, and more Liven things up with graphics Manage, rename, and move files Build Web pages without HTML Get smart! www.dummies.com Register to win cool prizes Browse exclusive articles and excerpts Get a free Dummies Daily™ e-mail newsletter Chat with authors and preview other books Talk to us, ask questions, get answers

It's simple with this friendly guide.

Using Corel WordPerfect 8 for Linux

A guide for experienced users explains how to configure the word processing program, record macros, organize large documents, and record mathematical expressions with WordPerfect's equation editor

A guide for experienced users explains how to configure the word processing program, record macros, organize large documents, and record mathematical expressions with WordPerfect's equation editor

Linux System Administration

A guide geared toward seasoned Linux and Unix administrators offers practical knowledge for managing a range of Linux systems and servers, covering such topics as installing servers, setting up e-mail systems, and creating shell scripts.

A guide geared toward seasoned Linux and Unix administrators offers practical knowledge for managing a range of Linux systems and servers, covering such topics as installing servers, setting up e-mail systems, and creating shell scripts.

Building Linux and OpenBSD firewalls

A step-by-step guide to bulding a commercial-grade firewall with open source software Building Linux and OpenBSD Firewalls It's now more important than ever before to protect your data and computers from people trying to hack into your network. Without the proper security, the wrong person can gain access to your system and read critical documents, change data, delete items, and much worse. With this book, you'll quickly learn how to protect your network from such attacks as you build a Linux or OpenBSD firewall. From determining how much security you'll need to configuring the firewall and monitoring your system, authors Tom Yates and Wes Sonnenreich clearly guide you through all the necessary steps to improve your security. They show you how to: * Build Linux and OpenBSD firewalls that meet your security needs * Choose the appropriate hardware for each operating system and put the machine together * Configure a firewall that allows network services such as email, newsgroups, and Internet and intranet access * Monitor and update your system to close any holes in security * Detect intruders and restore your network security The companion Web site at www.wiley.com/compbooks/sonnenreich features: * Updates for the most recent releases of OpenBSD and Red Hat * Useful scripts and tools * Sample firewall configurations * Additional online resources

With this book, you'll quickly learn how to protect your network from such attacks as you build a Linux or OpenBSD firewall.

Ubuntu Linux Toolbox

1000+ Commands for Ubuntu and Debian Power Users

Provides information on using Ubuntu Linux from the command line, covering such topics as using the shell, working with files, backing up data, accessing network resources, and handling remote system administration.

Apply skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.