Flylib.com
J
Previous page
Table of content
Next page
K
K Java Virtual Machine (KVM), 17
kadmin command, 333, 334
kdb5_util, 334
KDC (key distribution center), 332
kdmconfig, 78-79
Kerberos, 332-333
compared with SSH, 332
configuring, 333
Internet access, 332-333
managing database with kdb5_util, 334
managing with kadmin command, 333-334
Solaris configuration and, 82
version 5 enhancements, 20
kernel, 35-38
default values for booting, 111
defined, 37
layered design and, 37
SunOS basis of, 35-36
System V and BSD basis of, 37
UNIX development and, 38
UNIX systems, 6, 36
Kernighan, Brian, 25
key distribution center (KDC), 332
keys
IKE (Internet Key Exchange) and, 625
public/private, 540-543
kh (Korn shell), 39
kill command
killing processes, 110
signals, 170, 187-188
kill scripts
single user , 100
writing, 109-111
killall command, 188
killprocid ( ), 110
Korn shell (kh), 39
KVM (K Java Virtual Machine), 17
Previous page
Table of content
Next page
Sun Certified Solaris(tm) 9 System and Network Administrator All-in-One Exam Guide
ISBN: 0072225300
EAN: 2147483647
Year: 2003
Pages: 265
Authors:
Paul Watters
BUY ON AMAZON
Java I/O
Network Streams
Hash Functions
Object Streams
File Dialogs
USB Architecture
Network Security Architectures
Confidentiality and Security Are Not the Same
Secure Networking Threats
References
General Design Considerations
IP Addressing Design Considerations
Competency-Based Human Resource Management
A Need for Implementing Competency-Based HR Management
Competency-Based HR Planning
Competency-Based Employee Training
Competency-Based Performance Management
Appendix C Examples of Life-Career Assessment Exercises
Twisted Network Programming Essentials
Installing from Source Files
Working with POST Data from HTML Forms
Calling XML-RPC Functions
Mail Clients
Providing IMAP Access to Mailboxes
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Oracle and PL/SQL
Triggers
Indirect Privilege Escalation
Defeating Virtual Private Databases
Digital Character Animation 3 (No. 3)
Approaching Design as an Artist
Facial Rigging
Secondary Action
Creating Appealing Poses
Conclusion
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies