𝔖 Scriptorium
✦   LIBER   ✦

📁

openSUSE Linux Unleashed

✍ Scribed by Michael McCallister


Publisher
SAMS Publishing
Year
2007
Tongue
English
Leaves
733
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


openSUSE Linux Unleashed presents comprehensive coverage of the community version of SUSE Linux, one of the most popular and most complete Linux distributions in the world. This book provides detailed information on installing, using, and administering openSUSE. You'll learn how to unleash the vast array of software products included in openSUSE so that you can use it as a desktop computer, as a professional workstation, or as a powerful server.


📜 SIMILAR VOLUMES


openSUSE Linux Unleashed
✍ Michael McCallister 📂 Library 📅 2007 🌐 English

DVD Includes openSUSE 10.3   openSUSE Linux Unleashed presents comprehensive coverage of the community version of SUSE Linux, one of the most popular and most complete Linux distributions in the world.   This book provides detailed information on installing, using, and administering openSUSE. Yo

OpenSUSE Linux: Unleashed
✍ Michael McCallister 📂 Library 🏛 Sams Publishing 🌐 English

Comprehensive, authoritative guide to installing, configuring, and administering openSUSE, the community version of Novell's Linux Distro.

openSUSE Linux Unleashed
✍ Michael McCallister 📂 Library 📅 2007 🏛 O Reilly 🌐 English

Книга openSUSE Linux Unleashed openSUSE Linux UnleashedКниги Linux Автор: Michael McCallister Год издания: 2007 Формат: pdf Издат.:O Reilly Страниц: 744 Размер: 23 ISBN: 0-672-32945-X Язык: Русский 68 (голосов: 1) Оценка:Additionally, this book provides details on openSUSE s acclaimed YaST administr

SUSE Linux Toolbox: 1000+ Commands for o
✍ Christopher Negus, Francois Caen 📂 Library 📅 2007 🏛 Wiley 🌐 English

In this handy, compact guide, you’ll explore a ton of powerful SUSE Linux commands while you learn to use SUSE Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the