Logo

AIX Reference for Sun Solaris Administrators

Small book cover: AIX Reference for Sun Solaris Administrators

AIX Reference for Sun Solaris Administrators
by

Publisher: Vervante
ISBN/ASIN: 073842708X
ISBN-13: 9780738427089
Number of pages: 558

Description:
In today's heterogeneous computer environments, especially UNIX servers and workstations, it is essential that the system administrator have basic knowledge of different operating systems. This redbook is written for Sun Solaris administrators who wants to transfer their knowledge of Solaris UNIX skills to the AIX 5L operating system. This redbook will basically compare system administration tasks in Solaris 8 to AIX 5L Version 5.1. The book shows the reader similarities and differences between each operating system.

Home page url

Download or read it online for free here:
Download link
(5MB, PDF)

Similar books

Book cover: Beej's Guide to Unix Interprocess CommunicationBeej's Guide to Unix Interprocess Communication
by
This document discusses several methods of Interprocess Communication, some of which are better suited to certain tasks than others. If you know C or C++ and are pretty good using a Unix environment, these documents are for you.
(11479 views)
Book cover: Bash Guide for BeginnersBash Guide for Beginners
by
Useful concepts in the daily life of a Bash user. Basic shell knowledge is required. Discussion about common shell practices and building blocks, grep, awk and sed tools with more examples. The second part is about loops, functions and traps.
(15011 views)
Book cover: Secure Programming for Linux and Unix HOWTOSecure Programming for Linux and Unix HOWTO
by
The book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. This document includes specific guidance for a number of languages, including C, C++, Java, Perl, Python, and Ada95.
(16299 views)
Book cover: UNIX System Security: A Guide for Users and System AdministratorsUNIX System Security: A Guide for Users and System Administrators
by - Addison-Wesley
The first up-to-date source to provide the UNIX system user or administrator with the information needed to protect data and system from unauthorized use. By following the procedures described, you can protect your UNIX system from most attackers.
(6368 views)