Chapter Download Library

IT professionals' learning center


Welcome to SearchEnterpriseLinux.com's library for IT professionals. Here you'll find links to our most popular chapter downloads. Sneak a peak at the books. Then, if you liked what you read check out the companion tips and author interviews. If there's something missing that you'd like to see, let us know in an email.

Beginning Databases with PostgreSQL
PostgreSQL vs. SQL Server, Oracle: Enterprise-ready and able to compete
Why pay licensing costs and maintenance fees for proprietary databases when you can get open source RDBMS PostgreSQL for free? Discover the drawbacks and advantages to using PostgreSQL over Oracle or SQL Server.

Open source databases place pressure on Oracle, SQL Server
Open source RDBMS PostgreSQL is making its way into business' software portfolios. Find out where PostgreSQL is best put to use and why businesses prefer a big name product.

Download Chapter 2, Relational database principles of Beginning Databases with PostgreSQL

User Mode Linux
User Mode Linux: Maximizing performance, jailing attackers
In this interview, User Mode Linux author and project architect Jeff Dike gives security tips on UML and discusses why, in some ways, UML is better than Xen and VMware.

Virtual operating systems, virtual machines
User Mode Linux author and project architect Jeff Dike offers some advice on how to decide whether to opt for UML, Xen or VMware.

Download Chapter 3, Exploring UML, of User Mode Linux

Red Hat Fedora 5 Unleashed
Fedora Core 5: Virtualization-capable and ready to go
If you're into paravirtualization and Xen capabilities, then Fedora Core 5 is preferable to CentOS and the latest release of RHEL, says Paul Hudson, co-author of Red Hat Fedora 5.

Fedora Core 5: Driver and installation dos and don'ts
In this tip, discover how to avoid hardware drivers that could upset your Fedora Core 5 installation and how to maximize your use of Yum.

Download Chapter 28, LDAP, of Red Hat Fedora 5 Unleashed

Pro Nagios 2.0
Nagios offers open source option for network monitoring
IT shops using HP or BMC monitoring tools might want to take Nagios for a test-drive. Pro Nagios 2.0 author James Turnbull explains why.

Download Chapter 2, Basic object configuration, of Pro Nagios 2.0

PGP & GPG: Email for the Practical Paranoid
E-mail privacy with PGP
Using PGP and GPG for e-mail encryption, decryption and digital signatures can give you the keys to digital security and keep your IT shop safe from spoofing and hacking.

IT Managers: PGP is easy
Save yourself a security headache and adopt the easy to use, comprehensive e-mail encryption tool known as PGP. Learn just what it has to offer your IT shop.

Download Chapter 8, OpenPGP and emai, of PGP & GPG: Email for the Practical Paranoidl

Phishing Exposed
Phish tales: Worse on Linux or Windows?
Phishing expert Lance James differentiates between media hype and legitimate security concerns. He exposes Windows and Linux flaws.

Phish tales: Flawed and fishy defenses
Phishing expert Lance James describes the failures of some IT security defenses against phishing.

Download Chapter 5, The dark side of the Web, of Phishing Exposed

Test Driving Linux: From Windows to Linux in 60 Seconds
The case for Konqueror over IE and Windows file managers
The author of the new book Test Driving Linux: From Windows to Linux in 60 Seconds explains how open source Konqueror compares to Internet Explorer and Firefox.

Download Chapter 2, Surf the Web, of Test Driving Linux: From Windows to Linux in 60 Seconds

Peter van der Linden's Guide to Linux
Why Linux isn't too fat & Microsoft hurts customers
The author of the new book Peter van der Linden's Guide to Linux talks about the progress of desktop Linux, GNOME vs. KDE, and 'dirt' on Microsoft's desktop plans.

Download Chapter 3, The KDE desktop, of Peter van der Linden's Guide to Linux


This was first published in October 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: