The following documents are new in the Solaris 10 product.
This tutorial provides hands-on information about how to develop device drivers for the Solaris Operating System. This book includes descriptions of writing, building, installing, loading, and testing real device drivers. These instructions help you understand how drivers control devices. This book also gives an overview of the driver development environment, tools available to you to develop drivers, and techniques for avoiding some driver development problems.
The Solaris Operating System provides developers with numerous interfaces, frameworks, and tools to take advantage of Solaris technologies. This book provides an overview of the Solaris OS, abstracts of key documentation for Solaris developers, and links to sources of detailed information.
The Solaris Express 1/03 release introduced the new Solaris Dynamic Tracing Guide. The guide includes a complete feature reference and examples for new users. See DTrace Dynamic Tracing Facility for further information about DTrace.
The Solaris Security for Developers Guide describes the public application programming interfaces (API) and service provider interfaces (SPI) for the security features in the Solaris OS. This book is intended for C-language developers who want to write the following types of programs:
Privileged applications that can override system controls
Applications that use authentication and related security services
Applications that need to secure network communications
Applications that use cryptographic services
Libraries, shared objects, and plug-ins that provide or consume security services
The book describes the following public Solaris interfaces for security:
Process privileges permit developers to enable the delegation of security overrides in privileged applications.
Pluggable authentication modules for the initial authentication of a user to a system.
Generic security service application program interface, for secure communication between peer applications. GSS-API provides authentication, integrity, and confidentiality protection services as well.
Simple authentication and security layer, used largely by protocols for authentication, privacy, and data integrity. SASL is intended for higher-level network-based applications.
A framework based on standard PKCS #11 interfaces that accommodates consumers and providers of cryptographic services.
A set of interfaces for developers of IFD handlers for smart card terminals.
Working examples are provided.
The System Management Agent (SMA) is based on the open source Net-SNMP agent. This book is for administrators who want to use the System Management Agent to manage network devices securely, and to migrate their SNMP solution from the Solstice Enterprise Agents software to the System Management Agent. This book includes a chapter that covers security topics with examples provided.
The System Management Agent (SMA) is based on the open source Net-SNMP agent. This book provides information for developers who want to create MIB modules to extend the functionality of the agent.
The Solaris Express 2/04 release introduced the new System Administration Guide: Solaris Containers-Resource Management and Solaris Zones. This book is for anyone responsible for administering one or more systems that run the Solaris 10 OS. The book covers resource management topics such as projects and tasks, extended accounting, resource controls, and dynamic resource pools. This book also covers virtualization with Solaris Zones. See Solaris Zones Software Partitioning Technology and all descriptions in System Resources Enhancements.
Introduced in the Solaris Express 6/04 release, the x86 Assembly Language Reference Manual documents the syntax of the Solaris assembly language for x86 systems. This book is provided to help experienced assembly language programmers understand disassembled output of Solaris compilers. This book is neither an introductory book about assembly language programming nor a reference manual for the x86 architecture.