Anderson et al., 2002 - Google Patents
Unix unleashedAnderson et al., 2002
- Document ID
- 497893176459723188
- Author
- Anderson R
- Johnston A
- Publication year
External Links
Snippet
The fourth edition of'Unix Unleashed'will take a different tack from previous editions and other Unix books: It is readable as though it is a series of lectures on individual topics from Unix Wizards. This different approach will take the reader through the following topics: Basic …
- 238000007639 printing 0 abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
- G06F11/1451—Management of the data involved in backup or backup restore by selection of backup contents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fox | Linux with operating system concepts | |
Rankin et al. | The official Ubuntu server book | |
Finn et al. | Windows Server 2012 Hyper-V Installation and Configuration Guide | |
Lowe | Mastering VMware vSphere 4 | |
Anderson et al. | Unix unleashed | |
Boswell | Inside Windows Server 2003 | |
Westfall | Set up and manage your virtual private server | |
Garrels | Introduction to Linux | |
Flickenger | Linux server hacks: 100 industrial-strength tips and tools | |
Dalheimer et al. | Running Linux: A Distribution-Neutral Guide for Servers and Desktops | |
Pitts et al. | Red Hat Linux | |
Ahmed | Proxmox Cookbook | |
Schroder | Linux Cookbook | |
Helmke | Ubuntu Linux Unleashed 2021 Edition | |
Mackey et al. | XenServer Administration Handbook: Practical Recipes for Successful Deployments | |
Tulloch | Windows Server 2008 Server Core Administrator's Pocket Consultant | |
Clinton | Linux in action | |
Tevault | Linux Service Management Made Easy with systemd: Advanced techniques to effectively manage, control, and monitor Linux systems and services | |
Van Vugt | Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators | |
Turnbull et al. | Pro Linux System Administration | |
Kuo et al. | SUSE LINUX Enterprise Server 9 Administrator's Handbook | |
Ahmed | Mastering Proxmox | |
Parrella | Instant Debian: Build a Web Server | |
Hall et al. | Red Hat Linux Fedora for Dummies | |
Benner et al. | Oracle Linux Cookbook: Embrace Oracle Linux and Master Linux Server Management |