sites.The 10th chapter uses the VSFTPD service to transfer files.The 11th chapter uses Samba or NFS for file sharing.The 12th chapter uses bind to provide the domain name resolution service.The 13th chapter uses DHCP to dynamically manage host addresses.The 14th chapter uses postfix and Dovecot to send and receive e-mails.The 15th chapter uses squid to deploy the proxy cache service.16th. Deploy networked storage using iSCSI services.The 17th chapter deploys the directory service using OPENLDAP
1. "In-depth understanding of Java Virtual machines: JVM advanced features and best practices"2. "Hotspot Combat"3. Java concurrency Programming in action Brian Goetz4. Java multithreaded Programming Core technology (Gaohong)5. "Effective Java Chinese version"6. In-depth analysis of Java Web Technology Insider Xilingpo7. The core principle and case analysis of large web site technology architecture Hae8. "Large-scale website system and Java middleware
-client deployment model greatly reduces the user threshold, and its excellent design without sacrificing the architectural advantages of piping orchestration. The content of this book is easy to understand, convenient for readers to master, and quickly applied to their own real environment. Along with the chapters of this book, readers can gradually grasp the large-scale environment of the automated operation and maintenance capabilities, truly become a devops surfers.--Journal of Easy product
Android system architecture-microservice architecture, android system architectureDirectory
I. microservice Architecture Model
1.1 mode description
1.2 mode Topology
1.3 avoid dependency and Scheduling
1.4 precautions
1.5 Mode Analysis
Ii. microservice architecture in Android
Iii. Conclusion
T
Every hacker needs a solid library to find inspiration and references. The list here provides you with some things you want, including top university textbooks for computer science, insights into the industry, and indispensable reference books. It includes hackers' classic books.
Mythical man-month: Software Engineering Review-anniversary edition
Fredrick P. Brooks
This classic book on Human Factors in so
Every hacker needs a solid library to find inspiration and references. The list here provides you with some things you want, including top university textbooks for computer science, insights into the industry, and indispensable reference books. It includes hackers' classic books.
Mythical man-month: Software Engineering Review-anniversary edition
Fredrick P. Brooks
This classic book on Human Factors in sof
One, the road of Linux1. Introductory article"Linux authoritative guide " book is good, write very comprehensive also relatively broad, involved in not deep, as a primer book Good, you can more comprehensive understanding of Linux. In addition, the more popular can also look at " Bird Brother's private food " and other books, the management of the book. If you want to do the server direction can be found to see. 2. Driver Chapter"Linux device driver
Some classic Linux booksOne, the road of Linux, the road long its repair far XI, I will go up and down and quest! Get the classic book first!1. Introductory article"Linux authoritative guide" book is good, write very comprehensive also relatively broad, involved in not deep, as a primer book Good, you can more comprehensive understanding of Linux. In addition, the more popular can also look at "bird Brother's private food" and other books, the managem
Web Front-end R D engineers are regarded as a job in Chaoyang in China. There is no formal education in this field, and most people rely on their own self-taught talents. This article mainly introduces the books I have read since I was engaged in Web Development (since my sophomore year) and my own growth process. It aims to show my friends who want to know JavaScript or who are new to JavaScript, this section describes how to learn JavaScript by rea
-study. The industry-famous Uncle Bob is a staunch supporter of code cleanliness and object-oriented programming, and its writings in this area can be called authority. Martin Fowler is also famous for his work on refactoring-refactoring-improving the design of existing code should be a manual. Reading the works of two people above is a boon to technology.This article is a list of six of the industry's works of cattle, but also the classic classic programming
.--------------------------------------------------------------------------------------------------------------- -------------------------------------------------Linux Network Architecture: Design and implementation of network protocols in the Linux kernelPublishing House: Tsinghua University PressBinding: Paperbackpublication year: 2006-7also known as: The Linux network architecture:design and implementation of Network protocols in the Linux KernelTi
It is impossible to read only one or two books to learn a new knowledge. A step-by-step reading process is required. I recommend the Java series books published by oreilly.
Here I just want to add one point. Many people start with thinking in Java, but I think this book is not suitable for beginners. I think the correct way to use this book should be as an auxiliary reader. Thinking in Java is not a compl
Reprinted: http://blog.csdn.net/crzy_sparrow/article/details/7422962
For a programmer, he can only learn accumulated and read some excellent books at work, but cannot learn much really needed in school, we can work better only by combining practice and theory. Today, with the development and change of technology, every developer should take the initiative to read books to learn programming skills and change
People often ask me what C + + and programming book recommendations, today for you to share a few
First Note: If you plan to learn C + +, be sure to learn the latest version of C + + 2011. This version of C + + removes many of the pain that comes with the power of C + +. In addition, there is no need to worry about C + + 2014 books, most compilers have started to support it.
Learning programming
Learning programming includes several important aspec
" promotion/unit test4. Java EE Framework"Spring 3.x Enterprise Application development actual Combat" actual combat/Spring Combat "Netty Authoritative Guide 2nd Edition" actual Combat/Network "REDIS Design and Implementation Analysis" actual combat/Redis actual "Docker: Container and Container Cloud" understanding "G It authoritative guide , "maven combat " reference book5. Architecture"Large Web site Technology
Http://product.china-pub.com/192981
Splendid blueprint: how to plan a memorable website (version 2nd) online reading of e-books
This book is a new version of the best-selling book on information architecture. The author tells you how to plan easy-to-use websites and the information architecture principles behind them easily. This book first introduces the eight
Recently in doing some JS work, through the promotion of various great gods, sorting out 10 more classic JS books. (At the end)As a scripting language, JS plays an indispensable role in web development. The launch of the HTML5, so that it is more fire added fire.How to learn JS this language, I put these 10 books into 4 levels, respectively, is the introduction, advanced, high-level, framework.Then you can
Many small partners said that want to learn to study but did not study books, I give you to share a big wave of learning books, concrete can be turned down? " Stupid Way to learn" Python3 "Zed Shaw(May 2018)This book was written based on the Python version 3.6. Millions of fan programmers take you easy to get started with Python language! Mobile phone scan code to watch video, learn more easily! 5 hours of
With the rapid development of intelligent mobile terminals, people's electronic reading methods are also changing. From the user download TXT document, to package the download of the collection of applications, and now by the Internet companies to provide real-time updates to the reading tools, users can see more and more rich content. The reading terminal, being a single text display, becomes a common export of multiple information.
This means that the reading tool is likely to get rid of the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.