Author: Dan Abnett
Publisher: Games Workshop
ISBN: 9781844162390
Category : Fiction
Languages : en
Pages : 0
Book Description
Fantasy-roman.
Star Wars
Author: Timothy Zahn
Publisher: Titan Books
ISBN: 9781848565845
Category : Graphic novels
Languages : en
Pages : 435
Book Description
Luke has become the forst of a long line of Jedi Knights, but the last of the emperor's warlords has taken command of the shattered Imperial Fleet, readied it for war, and pointed it at the fragile heart of the new Republic.
Publisher: Titan Books
ISBN: 9781848565845
Category : Graphic novels
Languages : en
Pages : 435
Book Description
Luke has become the forst of a long line of Jedi Knights, but the last of the emperor's warlords has taken command of the shattered Imperial Fleet, readied it for war, and pointed it at the fragile heart of the new Republic.
The Last Command: Star Wars Legends (The Thrawn Trilogy)
Author: Timothy Zahn
Publisher: Random House Worlds
ISBN: 0553564927
Category : Fiction
Languages : en
Pages : 498
Book Description
The epic story that began with Heir to the Empire reaches its dramatic conclusion in this essential Star Wars Legends novel. The embattled Republic reels from the attacks of Grand Admiral Thrawn, who has marshaled the remnants of the Imperial forces and driven the Rebels back with an abominable technology recovered from the Emperor's secret fortress: clone soldiers. As Thrawn mounts his final siege, Han Solo and Chewbacca struggle to form a coalition of smugglers for a last-ditch attack, while Princess Leia holds the Alliance together and prepares for the birth of her Jedi twins. The Republic has one last hope—sending a small force into the very stronghold that houses Thrawn’s terrible cloning machines. There a final danger awaits, as the Dark Jedi C’baoth directs the battle against the Rebels and builds his strength to finish what he already started: the destruction of Luke Skywalker.
Publisher: Random House Worlds
ISBN: 0553564927
Category : Fiction
Languages : en
Pages : 498
Book Description
The epic story that began with Heir to the Empire reaches its dramatic conclusion in this essential Star Wars Legends novel. The embattled Republic reels from the attacks of Grand Admiral Thrawn, who has marshaled the remnants of the Imperial forces and driven the Rebels back with an abominable technology recovered from the Emperor's secret fortress: clone soldiers. As Thrawn mounts his final siege, Han Solo and Chewbacca struggle to form a coalition of smugglers for a last-ditch attack, while Princess Leia holds the Alliance together and prepares for the birth of her Jedi twins. The Republic has one last hope—sending a small force into the very stronghold that houses Thrawn’s terrible cloning machines. There a final danger awaits, as the Dark Jedi C’baoth directs the battle against the Rebels and builds his strength to finish what he already started: the destruction of Luke Skywalker.
Learning the Bash Shell
Author: Cameron Newham
Publisher: "O'Reilly Media, Inc."
ISBN: 0596009658
Category : Computers
Languages : en
Pages : 352
Book Description
O'Reilly's bestselling book on Linux's bash shell is at it again. Now that Linux is an established player both as a server and on the desktop Learning the bash Shell has been updated and refreshed to account for all the latest changes. Indeed, this third edition serves as the most valuable guide yet to the bash shell. As any good programmer knows, the first thing users of the Linux operating system come face to face with is the shell the UNIX term for a user interface to the system. In other words, it's what lets you communicate with the computer via the keyboard and display. Mastering the bash shell might sound fairly simple but it isn't. In truth, there are many complexities that need careful explanation, which is just what Learning the bash Shell provides. If you are new to shell programming, the book provides an excellent introduction, covering everything from the most basic to the most advanced features. And if you've been writing shell scripts for years, it offers a great way to find out what the new shell offers. Learning the bash Shell is also full of practical examples of shell commands and programs that will make everyday use of Linux that much easier. With this book, programmers will learn: How to install bash as your login shell The basics of interactive shell use, including UNIX file and directory structures, standard I/O, and background jobs Command line editing, history substitution, and key bindings How to customize your shell environment without programming The nuts and bolts of basic shell programming, flow control structures, command-line options and typed variables Process handling, from job control to processes, coroutines and subshells Debugging techniques, such as trace and verbose modes Techniques for implementing system-wide shell customization and features related to system security
Publisher: "O'Reilly Media, Inc."
ISBN: 0596009658
Category : Computers
Languages : en
Pages : 352
Book Description
O'Reilly's bestselling book on Linux's bash shell is at it again. Now that Linux is an established player both as a server and on the desktop Learning the bash Shell has been updated and refreshed to account for all the latest changes. Indeed, this third edition serves as the most valuable guide yet to the bash shell. As any good programmer knows, the first thing users of the Linux operating system come face to face with is the shell the UNIX term for a user interface to the system. In other words, it's what lets you communicate with the computer via the keyboard and display. Mastering the bash shell might sound fairly simple but it isn't. In truth, there are many complexities that need careful explanation, which is just what Learning the bash Shell provides. If you are new to shell programming, the book provides an excellent introduction, covering everything from the most basic to the most advanced features. And if you've been writing shell scripts for years, it offers a great way to find out what the new shell offers. Learning the bash Shell is also full of practical examples of shell commands and programs that will make everyday use of Linux that much easier. With this book, programmers will learn: How to install bash as your login shell The basics of interactive shell use, including UNIX file and directory structures, standard I/O, and background jobs Command line editing, history substitution, and key bindings How to customize your shell environment without programming The nuts and bolts of basic shell programming, flow control structures, command-line options and typed variables Process handling, from job control to processes, coroutines and subshells Debugging techniques, such as trace and verbose modes Techniques for implementing system-wide shell customization and features related to system security
UNIX in a Nutshell
Author: Arnold Robbins
Publisher: "O'Reilly Media, Inc."
ISBN: 0596529481
Category : Linux
Languages : en
Pages : 908
Book Description
As an open operating system, Unix can be improved on by anyone and everyone: individuals, companies, universities, and more. As a result, the very nature of Unix has been altered over the years by numerous extensions formulated in an assortment of versions. Today, Unix encompasses everything from Sun's Solaris to Apple's Mac OS X and more varieties of Linux than you can easily name. The latest edition of this bestselling reference brings Unix into the 21st century. It's been reworked to keep current with the broader state of Unix in today's world and highlight the strengths of t.
Publisher: "O'Reilly Media, Inc."
ISBN: 0596529481
Category : Linux
Languages : en
Pages : 908
Book Description
As an open operating system, Unix can be improved on by anyone and everyone: individuals, companies, universities, and more. As a result, the very nature of Unix has been altered over the years by numerous extensions formulated in an assortment of versions. Today, Unix encompasses everything from Sun's Solaris to Apple's Mac OS X and more varieties of Linux than you can easily name. The latest edition of this bestselling reference brings Unix into the 21st century. It's been reworked to keep current with the broader state of Unix in today's world and highlight the strengths of t.
Hack Attacks Testing
Author: John Chirillo
Publisher: John Wiley & Sons
ISBN: 0471463051
Category : Computers
Languages : en
Pages : 562
Book Description
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as: Building a multisystem Tiger Box Basic Windows 2000 Server installation and configuration for auditing Basic Linux and Solaris installation and configuration Basic Mac OS X installation and configuration for auditing ISS, CyberCop, Nessus, SAINT, and STAT scanners Using security analysis tools for Mac OS X Vulnerability assessment Bonus CD! The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more.
Publisher: John Wiley & Sons
ISBN: 0471463051
Category : Computers
Languages : en
Pages : 562
Book Description
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as: Building a multisystem Tiger Box Basic Windows 2000 Server installation and configuration for auditing Basic Linux and Solaris installation and configuration Basic Mac OS X installation and configuration for auditing ISS, CyberCop, Nessus, SAINT, and STAT scanners Using security analysis tools for Mac OS X Vulnerability assessment Bonus CD! The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more.
The OpenVMS User's Guide
Author: Patrick Holmay
Publisher: Digital Press
ISBN: 9781555582036
Category : Computers
Languages : en
Pages : 330
Book Description
Completely updated and revised, The OpenVMS User's Guide continues to be the prime resource for new and non-technical users on how to use OpenVMS and customize it to their working environment. For more proficient users, the book serves as a quick look-up reference. The book begins with an introduction to the OpenVMS operating system and its built-in functions, and then provides a thorough explanation of OpenVMS files and directories, use of DCL, and how to edit files using EVE and EDT. It also discusses how to create command procedures and the Mail and Phone utilities. New to this edition are additional insights into application development and sending e-mail to remote notes via the Internet, remote logins and file transfers. Each chapter is liberally sprinkled with learning aids including summaries and tables of commands, exercises, and review quizzes. Completely covers the OpenVMS operating system - from logging in to creating command procedures, with thorough discussions of files and directories Covers both EVE and EDT editors in detail Shows how to customize your working environment
Publisher: Digital Press
ISBN: 9781555582036
Category : Computers
Languages : en
Pages : 330
Book Description
Completely updated and revised, The OpenVMS User's Guide continues to be the prime resource for new and non-technical users on how to use OpenVMS and customize it to their working environment. For more proficient users, the book serves as a quick look-up reference. The book begins with an introduction to the OpenVMS operating system and its built-in functions, and then provides a thorough explanation of OpenVMS files and directories, use of DCL, and how to edit files using EVE and EDT. It also discusses how to create command procedures and the Mail and Phone utilities. New to this edition are additional insights into application development and sending e-mail to remote notes via the Internet, remote logins and file transfers. Each chapter is liberally sprinkled with learning aids including summaries and tables of commands, exercises, and review quizzes. Completely covers the OpenVMS operating system - from logging in to creating command procedures, with thorough discussions of files and directories Covers both EVE and EDT editors in detail Shows how to customize your working environment