Sebanyak 1645 item atau buku ditemukan

Releasing CSS

In an industry that communicates with terms such as "Browser Hell" and "browser wars," a web designer can be excused for having some anxiety over Microsoft's recent upgrade of Internet Explorer 6 (IE6) to Internet Explorer 7 (IE7). Web designers should ask the following questions: What problems does IE6 possess and what fixes does IE7 provide? What part of the Cascading Style Sheets (CSS) specification does IE7 for Windows support? How can web designers work around any problems that exist within IE7's support for CSS? While web designers are testing their designs on the latest browser, how fast will IE7 be adopted by their client's audience? This Short Cut attempts to answer these questions to allow web designers a smoother transition to IE7 and, hopefully, an escape from Browser Hell.

In an industry that communicates with terms such as "Browser Hell" and "browser wars," a web designer can be excused for having some anxiety over Microsoft's recent upgrade of Internet Explorer 6 (IE6) to Internet Explorer 7 (IE7).

User Mode Linux

With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator and maintainer of User Mode Linux shows how to put it to work hands-on. Jeff Dike covers everything from getting started through running enterprise-class User Mode Linux servers. You'll find authoritative advice on bootup, compilation, administration, specialized configurations, and much more. Coverage includes What User Mode Linux is, how it works, and its uses in Linux networks Key applications, including server consolidation, development, and disaster recovery Booting and exploration: logins, consoles, swap space, partitioned disks, and more Copy-On-Write (COW): UML's efficient approach to storing filesystem changes In-depth discussion of User Mode Linux networking and security Centrally managing User Mode Linux instances, and controlling their hardware resources Implementing clusters and other specialized configurations Setting up User Mode Linux servers, step-by-step: small-scale and large-scale examples The future of virtualization and User Mode Linux Whether you're a netadmin, sysadmin, teacher, student, or programmer, User Mode Linux® --the technology and this book--is indispensable.

This work covers almost everything from getting started through running enterprise-class User Mode Linux servers. It offers advice on bootup, compilation, administration, and more.

Understanding Linux Network Internals

Benvenuti describes the relationship between the Internet's TCP/IP implementation and the Linux Kernel so that programmers and advanced administrators can modify and fine-tune their network environment.

Benvenuti describes the relationship between the Internet's TCP/IP implementation and the Linux Kernel so that programmers and advanced administrators can modify and fine-tune their network environment.

Linux Patch Management

Keeping Linux Systems Up to Date

Provides information and guidance on managing Linus patches and updates.

Provides information and guidance on managing Linus patches and updates.

Live Linux CDs

Building and Customizing Bootables

Provides information on creating live Linux CDs for gaming, security, presentations, multimedia, firewalls, and clustering.

Provides information on creating live Linux CDs for gaming, security, presentations, multimedia, firewalls, and clustering.

Data Recovery Tips & Solutions: Windows, Linux, and BSD

This comprehensive manual covers three areas in which system administrators must be proficient to successfully recover data: the structure and operating principles of the most popular file systems, automatic data recovery techniques, and manual recovery techniques used in cases of total data destruction. Data recovery from hard drives and optical storage in Windows, BSD, and Linux file systems is described, as are automatic recovery utilities, manual and automatic recovery of deleted files on ext2/ext3 partitions and NTFS partitions, formatted NTFS partitions and deleted UFS/FFS files, RAID data recovery, media restoration with physical damage, and data loss prevention.

This comprehensive manual covers three areas in which system administrators must be proficient to successfully recover data: the structure and operating principles of the most popular file systems, automatic data recovery techniques, and ...