• spring文档4.3.x版本

    spring 4.3.x版本,官方文档,pdf格式。 目前spring已经主推spring boot,推荐使用

    0
    122
    5.52MB
    2018-12-10
    9
  • The Art Of Assembly Language

    ACKNOWLEDGMENTS This book has literally taken over a decade to create. It started out as "How to Program the IBM PC, Using 8088 Assembly Language" way back in 1989. I originally wrote this book for the students in my assembly language course at Cal Poly Pomona and UC Riverside. Over the years, hundreds of students have made small and large contributions (it's amazing how a little extra credit can motivate some students). I've also received thousands of comments via the Internet after placing an early, 16-bit edition of this book on my website at UC Riverside. I owe everyone who has contributed to this effort my gratitude. I would also like to specifically thank Mary Phillips, who spent several months helping me proofread much of the 16-bit edition upon which I've based this book. Mary is a wonderful person and a great friend. I also owe a deep debt of gratitude to William Pollock at No Starch Press, who rescued this book from obscurity. He is the one responsible for convincing me to spend some time beating on this book to create a publishable entity from it. I would also like to thank Karol Jurado for shepherding this project from its inception — it's been a long, hard road. Thanks, Karol.

    0
    25
    17.55MB
    2013-10-26
    2
  • network programming for microsoft windows

    Welcome to Network Programming for Microsoft Windows, Second Edition! The second edition covers the same topics as the first edition and even more as well. This book primarily focuses on the Winsock network programming technology. In particular, we've added a chapter on writing high-performance, scalable Winsock applications and a chapter devoted to Winsock programming in the C# programming language using the exciting new .NET Application Frameworks library. In addition, we've completely updated the chapter on the Windows Service Provider Interface (SPI), and we cover additional protocols (such as IPv6 and reliable multicasting) and reveal functionality that is new to Windows XP. This book covers a wide variety of networking functions available in Windows 95, Windows 98, Windows Me, Windows NT 4.0, Windows 2000, Windows XP, and Windows CE. The majority of the text covers intermediate and advanced networking topics, but we retooled the Winsock section so that it is more accessible to programmers of all levels.

    5
    53
    1.72MB
    2013-10-26
    9
  • UNIX Shells by Example 4th Edition

    The world's #1 shell programming book—now fully updated for Linux and more! UNIX Shells by Example is the world's #1 shell programming book, from the world's #1 shell programming instructor: Ellie Quigley. In UNIX Shells by Example, Fourth Edition, Quigley has thoroughly updated her classic and delivers the information today's shell programmers need most—including comprehensive coverage of Linux shell programming with bash! Drawing on 20 years' experience as a shell programming instructor, Quigley guides you through every facet of programming all leading UNIX/Linux shells: bourne, bash, korn, C, and tcsh. Quigley illuminates each concept with up-to-date, classroom-tested code examples designed to help you jump-start your own projects. She also systematically introduces awk, sed, and grep for both UNIX and GNU/Linux . . . making this the only shell programming book you'll ever need! New in this edition: Comprehensive coverage of Linux shell programming with bash Shell Programming QuickStart: makes first-time shell programmers productive in just 15 pages Complete, practical debugging chapter Updated coverage of the latest UNIX and GNU/Linux versions of awk, sed, and grep Shell programming for sysadmins: walks you through key UNIX and Linux system shell scripts Completely updated: Shell programming fundamentals: what shells are, what they do, how they work Choosing the right shell for any application Nearly 50,000 UNIX/Linux sysadmins, developers, and power users have used previous editions of UNIX Shells by Example to become expert shell programmers. With UNIX Shells by Example, Fourth Edition, you can, too—even if you're completely new to shell programming. Then, once you're an expert, you'll turn to this book constantly as the best source for reliable answers, solutions, and code.

    5
    67
    2.77MB
    2013-10-18
    11
  • Unix Systems Programming

    This completely updated classic (originally titled Practical UNIX Programming) demonstrates how to design complex software to get the most from the UNIX operating system. UNIX Systems Programming provides a clear and easy-to-understand introduction tothe essentials of UNIX programming. Starting with short code snippetsthat illustrate how to use system calls, Robbins and Robbins movequickly to hands-on projects that help readers expand their skill levels. This practical guide thoroughly explores communication, concurrency,and multithreading. Known for its comprehensive and lucid explanations of complicated topics such as signals and concurrency, the book features practical examples, exercises, reusable code, and simplified libraries for use in network communication applications. A self-contained reference that relies on the latest UNIX standards,UNIX Systems Programming provides thorough coverage of files, signals,semaphores, POSIX threads, and client-server communication. Thisedition features all-new chapters on the Web, UDP, and server performance. The sample material has been tested extensively in theclassroom.

    0
    23
    2.51MB
    2013-10-18
    0
  • real world linux security

    Linux is a solid operating system. It is easy to use and install, has very powerful capabilities, runs fast on almost any hardware, and rarely crashes. It has few bugs and its widespread support from a cast of thousands ensures that any remaining bugs get fixed as soon as they are discovered. It is highly versatile and can be made as secure as any UNIX system. Unfortunately, UNIX and Linux machines are broken into every day, not because they are inherently insecure, but because the steps required to expose a system to the real world safely梩he modern Internet梐re not always so obvious. The single goal of this book is to teach any Linux or UNIX system administrator how to secure his systems, keep them secure, and feel confident that all necessary steps have been taken.

    0
    30
    1.86MB
    2013-10-18
    2
  • unix system crash dump analysis

    UNIX systems crash. It's a fact of life. Until now, little information has been available regarding system crashes. Panic! is the first book to concentrate solely on system crashes and hangs, explaining what triggers them and what to do when they occur. Panic! guides you through system crash dump postmortem analysis towards problem resolution. Analysis of system crash dumps usually requires the skills and resources of a UNIX guru,including a wide set of programming skills, an indepth knowledge of UNIX internals, and access to source code. However, by following the advice and "tricks of the trade" presented in Panic!, you will be able to establish what killed your system.

    0
    51
    1.05MB
    2013-10-18
    3
  • Unix Backup and Recovery

    This book is divided into six parts: Part I, Introduction This part of this book contains just enough information to whet your backup and recovery appetite. Chapter 1, Preparing for the Worst, contains the six steps that you must go through to create and maintain a disaster recovery plan, one part of which will be a good backup and recovery system. Chapter 2, Backing It All Up, goes into detail about the essential elements of a good backup and recovery system. Part II, Freely Available Filesystem Backup & Recovery Utilities This section covers the freely available utilities that you can use to back up your systems if you can't afford a commercial backup package. Chapter 3, Native Backup & Recovery Utilities, covers Unix's native backup and recovery utilities in detail, including dump, tar, GNU tar, cpio, GNU cpio, and dd. Chapter 4, Free Backup Utilities, starts with some simple tools to assist you in your backups, and contains a complete overview of the popular AMANDA utility, which is used to back up many small to medium-sized Unix installations around the world. Part III, Commercial Filesystem Backup & Recovery Utilities If you have outgrown the capabilities of free utilities, or would just like to take advantage of new backup and recovery technologies, you'll need to look at a commercial product. Chapter 5, Commercial Backup Utilities, is your guide to the hundreds of features available in the over 50 commercial backup products available on the market today, allowing you to make an educated purchase decision. Page xvii Chapter 6, High Availability, details how, when backups just aren't fast enough, a high availability system is designed to keep you from ever needing to use your backups. Part IV, Bare-Metal Backup & Recovery Methods A bare-metal recovery is the fastest way to bring a dead system back to life, even if its root drive is completely destroyed. Chapter 7, SunOS/Solaris, contains an in-depth description of the "homegrown" bare-metal recovery procedure that can also be used to back up Linux, Compaq, HP-UX, and IRIX, as well as a detailed Solaris-based example of bare-metal recovery. Chapter 8, Linux, detail how you can perform a bare-metal recovery of a Linux system with a floppy, a backup device, pax, and lilo. Chapter 9, Compaq True-64 Unix, covers both Compaq True-64 Unix's bare-metal recovery tool and the Compaq version of the homegrown procedure covered in Chapter 7. Chapter 10, HP-UX, covers the make_recovery tool, which now comes with HP-UX to perform bare-metal recoveries, along with the HP version of the homegrown procedure. Chapter 11, IRIX, explains how the different versions of IRIX's Backup and Restore scripts work, as well as the IRIX version of the homegrown procedure. Chapter 12, AIX, discusses AIX, a procedure that does not support the homegrown procedure discussed in Chapter 7, but does use mksysb, probably one of the oldest and best-known bare-metal recovery tools. Part V, Database Backup & Recovery This section explains in plain language an area that presents some of the greatest backup and recovery challenges that a system administrator or database administrator will face-backing up and recovering databases. Chapter 13, Backing Up Databases, is a chapter that will be your friend if you're an SA who's afraid of databases or a DBA learning a new database. It explains database architecture in plain language, while relating each architectural element to the appropriate term in Informix, Oracle, and Sybase. Chapter 14, Informix Backup & Recovery, explains both the older ontape and the newer onbar, after which it provides a logically flowcharted recovery procedure that can be used with either utility. Page xviii Chapter 15, Oracle Backup & Recovery, explains how to perform Oracle hot backups whether you are using Oracle's native utilities, EBU, or RMAN, and then provides a detailed flowchart guiding you through even a difficult recovery. Chapter 16, Sybase Backup & Recovery, shows exactly how to use the Backup Server utility, including another flow chart to guide you through Sybase recoveries. Part VI, Backup & Recovery Potpourri The information contained in this part of the book is by no means unimportant; it simply wouldn't fit anywhere else! Chapter 17, ClearCase Backup & Recovery, explains in detail the unique backup and recovery challenges presented by ClearCase. Chapter 18, Backup Hardware, explains the many different types of backup hardware available today, as well as providing criteria that you may use to decide which type of backup drive is right for you. Chapter 19, Miscellanea, covers everything from the oft-debated "live filesystem dumps" question to a few jokes that I found about backup and recovery!

    0
    43
    5.61MB
    2013-10-18
    10
  • UNIX Network Programming

    "Everyone will want this book because it provides a great mix of practical experience, historical perspective, and a depth of understanding that only comes from being intimately involved in the field. I've already enjoyed and learned from reading this book, and surely you will too." -Sam Leffler The classic guide to UNIX networking APIs... now completely updated! To build today's highly distributed, networked applications and services, you need deep mastery of sockets and other key networking APIs. One book delivers comprehensive, start-to-finish guidance for building robust, high-performance networked systems in any environment: UNIX Network Programming, Volume 1, Third Edition. Building on the legendary work of W. Richard Stevens, this edition has been fully updated by two leading network programming experts to address today's most crucial standards, implementations, and techniques. New topics include: POSIX Single UNIX Specification Version 3 IPv6 APIs (including updated guidance on IPv6/IPv4 interoperability) The new SCTP transport protocol IPsec-based Key Management Sockets FreeBSD 4.8/5.1, Red Hat Linux 9.x, Solaris 9, AIX 5.x, HP-UX, and Mac OS X implementations New network program debugging techniques Source Specific Multicast API, the key enabler for widespread IP multicast deployment The authors also update and extend Stevens' definitive coverage of these crucial UNIX networking standards and techniques: TCP and UDP transport Sockets: elementary, advanced, routed, and raw I/O: multiplexing, advanced functions, nonblocking, and signal-driven Daemons and inetd UNIX domain protocols ioctl operations Broadcasting and multicasting Threads Streams Design: TCP iterative, concurrent, preforked, and prethreaded servers Since 1990, network programmers have turned to one source for the insights and techniques they need: W. Richard Stevens' UNIX Network Programming. Now, there's an edition specifically designed for today's challenges-and tomorrow's.

    5
    198
    5.41MB
    2013-10-18
    15
  • Understanding The Linux Kernel

    In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn't kept waiting any longer than necessary for the relatively slow disks. The third edition of Understanding the Linux Kernel takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel. Probing beyond superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Important Intel-specific features are discussed. Relevant segments of code are dissected line by line. But the book covers more than just the functioning of the code; it explains the theoretical underpinnings of why Linux does things the way it does. This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices. The book focuses on the following topics: Memory management, including file buffering, process swapping, and Direct memory Access (DMA) The Virtual Filesystem layer and the Second and Third Extended Filesystems Process creation and scheduling Signals, interrupts, and the essential interfaces to device drivers Timing Synchronization within the kernel Interprocess Communication (IPC) Program execution Understanding the Linux Kernel will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. This book will help you make the most of your Linux system.

    5
    77
    2.77MB
    2013-10-18
    8
  • 知无不言

    回答1个问题,每日最多计数5次
关注 私信
上传资源赚积分or赚钱