|
Unix & Linux EBooks
|
|
|
Free Unix & Linux EBooks for Download
Below we have listed all the Free Unix & Linux EBooks for download. Feel free to comment on any Unix & Linux EBooks for download or answer by the comment feature available on the page.
To buy an eBook containing 9000 Interview Questions, with Answers, Click Here.
|
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds: To circumvent detection, attackers are increasingly moving away from pure bandwidth floods to stealthy DDoS attacks that masquerade as flash crowds. They profile the victim server and mimic legitimate Web browsing behavior of a large number of clients. Date Added: 7/25/2006 | Visits: 32849 |
Detecting BGP Configuration Faults with Static Analysis : The Internet is composed of many independent autonomous systems (ASes) that exchange reachability information to destinations using the Border Gateway Protocol (BGP). Network operators in each AS configure BGP routers to control the routes that are learned, selected, and announced to other routers. Date Added: 7/25/2006 | Visits: 31517 |
Reincarnating PCs with Portable SoulPads : Today�s laptop computers give users two highly desirable features. One is the ability to suspend a computing session (e.g., running applications, open windows) and resume it later, perhaps at a different location. Date Added: 7/25/2006 | Visits: 33456 |
Mapping Internet Sensors with Probe Response Attacks : Internet sensor networks, including honeypots and log analysis centers such as the SANS Internet Storm Center, are used as a tool to detect malicious Internet traffic. For maximum effectiveness, such networks publish public reports without disclosing sensor locations, so that the Internet community can take steps to counteract the malicious traffic Date Added: 7/25/2006 | Visits: 32768 |
Debugging Operating Systems with Time-Traveling Virtual Machines: Operating systems are difficult to debug with traditional cyclic debugging. They are non-deterministic; they run for long periods of time; they interact directly with hardware devices; and their state is easily perturbed by the act of debugging. This paper describes a time-traveling virtual machine that overcomes many of the difficulties associated with debugging operating systems. Date Added: 7/25/2006 | Visits: 31612 |
Reducing Downtime Due to System Maintenance and Upgrades: As computers become more ubiquitous in large corporate, government, and academic organizations, the total cost of owning and maintaining them is becoming unmanageable. Computers are increasingly networked, which only complicates the management problem, given the myriad of viruses and other attacks commonplace in today's networks. Security problems can wreak havoc on an organization's computing infrastructure. Date Added: 7/25/2006 | Visits: 31781 |
Handling Churn in a DHT: This paper addresses the problem of churn--the continuous process of node arrival and departure--in distributed hash tables (DHTs) Date Added: 7/25/2006 | Visits: 30956 |
Improving Storage System Availability with D-GRAID: Storage systems comprised of multiple disks are the backbone of modern computing centers, and when the storage system is down, the entire center can grind to a halt. Downtime is clearly expensive; for example, in the on-line business world, millions of dollars per hour are lost when systems are not available [26,34].
Date Added: 7/25/2006 | Visits: 32807 |
Itanium�A System Implementor's Tale: Itanium is a fairly new and rather unusual architecture. Its defining feature is explicitly-parallel instruction-set computing (EPIC), which moves the onus for exploiting instruction-level parallelism (ILP) from the hardware to the code generator. Date Added: 7/25/2006 | Visits: 33668 |
<< Back || 11 |12| 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | Next >>
Free Unix & Linux eBooks - Download Unix & Linux eBooks - List of Unix & Linux eBooks
|
|