End the year with Super Savings on bestselling MC Press titles! Pay just $15 each for popular books on RPG, PHP, Java, Project Management, DB2, and more. Don’t wait – at these prices, books will sell out soon!
One of the core tenets of open source is freedom to obtain and use software. Now it's time to see that benefit in action.
Written by Aaron Bartell
In the first article of this series, we learned about how IFS Containers could be manually created by copying things into a new directory and then running the chroot command against that directory. This was a laborious process that would cause the technology to not be used unless some amount of automation was introduced. In the second article, I introduced the IBM i Chroot (ibmichroot) project, which addresses the automation of creating IFS Containers in a matter of minutes and even more important, uniformity. In this article, we will navigate through the other core feature of the IBM i Chroot project: package installation.
Take the next step with PHP! Expand your knowledge and understanding of this essential programming language with the latest book from PHP guru Kevin Schroeder: Advanced Guide to PHP on IBM i. Master important PHP topics such as debugging, test-driven development, web-based development, advanced object-oriented programming, and web security. You’ll also get an in-depth look at the new PHP Toolkit for IBM i provided by Zend Technologies. Don’t delay; get started today on building your understanding and skill level with this example-packed, accessible book. Order today!
Just $15 during the MC Press Year-End Inventory Blowout!
Lists are a special type of “thing” in C#; they have no parallel in RPG. This is most unfortunate, because lists are awesome!
Written by Rafael Victória-Pereira
The last couple of TechTips introduced Arrays and explained the foreach loop. This kind of sets the stage for theListdata type. You can think of aListas anArraywith all the bells and whistles and none of its limitations. For instance, when you define anArray, you have to define its size. That value is (more or less) definitive, because the memory will be statically allocated to store the variable.Lists, however, are dynamically allocated, which means that you don’t have to specify the size of theList. Actually, you can’t specify it. Instead, you’re able to specify the initial capacity, but even that is optional.
Relax…he knows his stuff!You’ll be sure to pass Exam 615 with the help of DB2 expert Roger Sanders. He helped develop Exam 615 plus 22 other certification exams. This is the latest in the popular MC Press DB2 Certification Study Guide series. Get all you need to know about DB2 10.5 for Linux, UNIX, and Windows. This guide includes a complete practice exam with 125 questions and answers. Nothing will prepare you more for the DB2 10.5 Fundamentals for LUW exam! Order your copy today.
Just $35 during the MC Press Year-End Inventory Blowout!
A Step by Step Guide Active monitoring is one of the most critical and effective security controls that an organization can deploy. Unlike many Windows and Linux server deployments, the IBM i can host a complex mix of back-office applications, web applications, and open source applications and services - leaving millions of security events to actively monitor. This eBook discusses:
Real-time security event logging and monitoring
Security architecture and logging sources on the IBM i
Creating the IBM security audit journal QAUDJRN
Enabling IBM security events through system values
File integrity monitoring (FIM)
A step by step checklist begin collecting and monitoring IBM i security logs