... For example: Building Embedded Linux Systems, by Kar- im Yaghmour, Jon Masters, Gilad Ben-Yossef, and Philippe Gerum. Copyright 2008 Karim Yaghmour and Jon Masters, 97 8-0 -5 9 6-5 296 8-0 .” Contact ... once real-time capabilities are avail- able in every kind of Linux system installed from here to Timbuktu. Real Life and Embedded Linux Systems What types of embedded...
Ngày tải lên: 31/03/2014, 16:52
Building Embedded Linux Systems potx
... For example: Building Embedded Linux Systems, by Kar- im Yaghmour, Jon Masters, Gilad Ben-Yossef, and Philippe Gerum. Copyright 2008 Karim Yaghmour and Jon Masters, 97 8-0 -5 9 6-5 296 8-0 .” Contact ... once real-time capabilities are avail- able in every kind of Linux system installed from here to Timbuktu. Real Life and Embedded Linux Systems What types of embedded...
Ngày tải lên: 29/03/2014, 05:20
building embedded linux systems
... this." Building Embedded Linux Systems By Karim Yaghmour Building Embedded Linux Systems shows you how to design and build your own embedded systems using Linux as the kernel ... building embedded Linux systems. Chapter 1 gives an in-depth introduction to the world of embedded Linux. It lays out basic definitions and then introduces real-life is...
Ngày tải lên: 28/04/2014, 15:29
... iptables -I INPUT 1 -i eth0 -s 192.168.0.0/16 -j DROP iptables -I INPUT 2 -i eth0 -s 10.0.0.0/8 -j DROP iptables -I INPUT 3 -i eth1 -s ! 192.168.111.0/24 -j DROP iptables -I INPUT 4 -i eth2 -s ! ... 10.0.0.0/8 -j DROP iptables -I FORWARD 1 -i eth0 -s 192.168.0.0/16 -j DROP iptables -I FORWARD 2 -i eth0 -s 10.0.0.0/8 -j DROP iptables -I FORWARD 3 -i eth1 -s ! 192.168.111.0/24 -j DROP i...
Ngày tải lên: 25/03/2014, 10:40
o'reilly - building internet firewalls 2nd edition
... from dial-up bulletin-board systems, software brought in on floppies from home or other sites, and even software that comes pre-infected from manufacturers are just as common as virus-infected ... watching you and your computers.) Espionage is much more difficult to detect than run-of-the-mill break-ins, however. Information theft need not leave any traces at all, and even intrusions ......
Ngày tải lên: 25/03/2014, 10:40
o'reilly - building java enterprise applications volume 1 ar
... focus on Building Java™ Enterprise Applications Volume I: Architecture 7 tougher problems, real-world issues that aren't covered in other books, and typical mistakes I see in day-to-day programming. ... McLaughlin Publisher: O'Reilly First Edition March 2002 ISBN: 0-5 6 9-0 012 3-1 , 318 pages Volume 1 of this advanced 3-volume guide explores the infrastructure issu...
Ngày tải lên: 25/03/2014, 10:40
o'reilly - building oracle xml applications
... & Associates 101 Morris Street Sebastopol, CA 95472 80 0-9 9 8-9 938 (in the U.S. or Canada) 70 7-8 2 9-0 515 (international or local) 70 7-8 2 9-0 104 (FAX) You can also send O’Reilly messages electronically. ... years to fine-tune the efficiency of their proprietary data formats and tools. The reason is simple: as a vendor-neutral, platform-neutral, language-neutral tech...
Ngày tải lên: 25/03/2014, 10:40
o'reilly - understanding the linux kernel
... Compaq); AIX from IBM; HP-UX from Hewlett-Packard; and Solaris from Sun Microsystems. Linux was initially developed by Linus Torvalds in 1991 as an operating system for IBM- compatible personal ... installed into one of the filesystems supported by Linux. Since Linux is a kernel, many Linux users prefer to rely on commercial distributions, available on CD-ROM, to get the code includ...
Ngày tải lên: 25/03/2014, 10:52
o'reilly - building wireless community networks
... networking in three general applications: point-to-point links, point- to-multipoint links, and ad-hoc (or peer-to-peer) workgroups. A typical point-to-point application would be to provide network ... point-to-multipoint application. But point- to-multipoint doesn't have to end at home. Suppose you work for a school that has a fast Internet connection run to one building, but other b...
Ngày tải lên: 31/03/2014, 16:52
o'reilly - building wireless community networks
... networking in three general applications: point-to-point links, point- to-multipoint links, and ad-hoc (or peer-to-peer) workgroups. A typical point-to-point application would be to provide network ... point-to-multipoint application. But point- to-multipoint doesn't have to end at home. Suppose you work for a school that has a fast Internet connection run to one building, but other b...
Ngày tải lên: 31/03/2014, 17:00