This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices. The book focuses on the following topics:
* Memory management, including file buffering, process swapping, and Direct memory Access (DMA)
* The Virtual Filesystem layer and the Second and Third Extended Filesystems
* Process creation and scheduling
* Signals, interrupts, and the essential interfaces to device drivers
* Timing
* Synchronization within the kernel
* Interprocess Communication (IPC)
* Program execution
Understanding the Linux Kernel will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. This book will help you make the most of your Linux system.
# 942 pages
# Publisher: O'Reilly Media, Inc.; 3 edition (November 17, 2005)
# Language: English
# ISBN-10: 0596005652
# ISBN-13: 978-0596005658
http://rapidshare.com/files/81835513/un
- Anonymous Mass Mailers (1)
- bots (1)
- browser (1)
- cool links (1)
- cracking tools (3)
- dos commands (3)
- ebooks (104)
- Exploits (14)
- file upload (3)
- firefox (1)
- flash games (2)
- free space (2)
- gmail (1)
- google (7)
- google chrome Vulnerability (7)
- graphics (5)
- greasemonkey scripts (8)
- gtalk (4)
- hacking (12)
- hacking ebooks (45)
- hacking tools (42)
- hacking tutorials (22)
- haking tutorials (37)
- hosting (1)
- image hosting (1)
- information (11)
- invisible (2)
- IP Scanner (14)
- java (2)
- javascript (4)
- keygen (1)
- Keyloggers (3)
- magazine (1)
- Mail Bombers (1)
- mcse (1)
- muliti login (1)
- networking (2)
- news (9)
- orkut (15)
- Port Scanner (14)
- proxy (2)
- RapidShare Libraries (1)
- regedit (1)
- Sniffers (1)
- sniffing (1)
- sql injection (5)
- tips n trics (41)
- upload sites (3)
- virus (9)
- virus removal (6)
- visual c++ (2)
- Vulnerability Scanner (1)
- wallpapers (5)
- web based hackiing (1)
- web design (1)
- web templates (1)
- Wireless Hacking (5)
-
▼
2009
(127)
- ► August 2009 (33)
-
▼
March 2009
(40)
- Web Dragons: Inside the Myths of Search Engine
- Mathematics for Algorithm and Systems Analysis
- Javascript The Definitive Guide 5th Edition
- Brute Force: Cracking the Data Encryption Standard
- Operating Systems Design and Implementation
- Access Denied
- Exploiting Software: How to Break Code
- The Ethical Hack: A Framework for Business Value
- Create your own linux distribution
- Fuzzing: Brute Force Vulnerability Discovery
- Principles of Computer Science
- Pro Decrypting VBScript Viruses
- Learn-Key's Hacking Revealed
- Hacking Exposed Wireless
- Assembly Language Step-By-Step
- Professional JavaScript for Web Developers
- Network Security Assessment
- Advanced Linux Programming
- Introduction to Computing and Programming wit Java
- Hacking the Cable Modem
- Hacking the Cable Modem
- Java Cryptography Extensions:Practical Guide
- Internet and the World Wide Web: How to Program
- IPSec, 2nd Edition
- Understanding the Linux Kernel
- Software Piracy Exposed
- Computer Security Art And Science
- Network Security: A Beginner's Guide
- Code Reading: The Open Source Perspective
- 5 C Programming eBooks
- The Invisible Web
- MYSQL Books
- Reverse Engineering Code with IDA Pro
- Forensic Computing A Practitioner’s Guide
- Network Security Tools
- XML Books
- Internet Denial of Service: Attack and Defense
- Practical Internet Security
- Ankit Fadia ebooks
- Offensive Security Tutorial Videos...zone
- ► February 2009 (17)
-
►
2008
(211)
- ► November 2008 (13)
- ► September 2008 (198)
Blog Archive
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment