AIX Logical Volume Manager from A to Z: Troubleshooting and Commands (IBM Redbooks) 🔍
Laurent Vanel; International Business Machines Corporation. International Technical Support Organization
IBM, International Technical Support Organization, IBM redbooks, Safari Books Online, [United States?], United States, 2000
英语 [en] · PDF · 19.3MB · 2000 · 📗 未知类型的图书 · 🚀/duxiu/ia · Save
描述
Laurent Vanel ... [et Al.]. Includes Index.
备选作者
Redbooks, Ibm
备选作者
IBM Redbooks
备用出版商
I B M
备用版本
United States, United States of America
备用版本
March 20, 2001
元数据中的注释
Includes index.
Electronic reproduction. Boston, Mass. : Safari Books Online, 2008 Mode of access: World Wide Web. Available to subscribing institutions.
s 2008 mau n s
Electronic reproduction. Boston, Mass. : Safari Books Online, 2008 Mode of access: World Wide Web. Available to subscribing institutions.
s 2008 mau n s
元数据中的注释
topic: AIX (Computer file); Storage area networks (Computer networks)
元数据中的注释
Type: 英文图书
元数据中的注释
Bookmarks:
1. (p1) Preface
1.1. (p2) The team that wrote this redbook
1.2. (p3) Comments welcome
2. (p4) Chapter 1. LVM commands
2.1. (p5) 1.1 Volume group related commands
2.1.1. (p6) 1.1.1 Add a volume group
2.1.2. (p7) 1.1.2 Activate a volume group
2.1.3. (p8) 1.1.3 Deactivate a volume group
2.1.4. (p9) 1.1.4 Remove a physical volume from a volume group
2.1.5. (p10) 1.1.5 Remove a volume group
2.1.6. (p11) 1.1.6 Bring a volume group into the system
2.1.7. (p12) 1.1.7 Add physical volume to an existing volume group
2.1.8. (p13) 1.1.8 Change name of volume group
2.1.9. (p14) 1.1.9 Reorganize a volume group
2.1.10. (p15) 1.1.10 Listing the volume groups on the system
2.1.11. (p16) 1.1.11 Listing the configuration of a volume group
2.1.12. (p17) 1.1.12 List contents of a volume group
2.2. (p18) 1.2 Logical volume related commands
2.2.1. (p19) 1.2.1 Add a logical volume
2.2.2. (p20) 1.2.2 Copy a logical volume to a new logical volume
2.2.3. (p21) 1.2.3 Copy a logical volume to same sized or bigger logical volume
2.2.4. (p22) 1.2.4 Copy a logical volume to a smaller logical volume
2.2.5. (p23) 1.2.5 Add a mirrored copy to a logical volume
2.2.6. (p24) 1.2.6 Set allocation policy for a logical volume
2.2.7. (p25) 1.2.7 Set strictness for a logical volume
2.2.8. (p26) 1.2.8 Set write verify for a logical volume
2.2.9. (p27) 1.2.9 Set schedule policy
2.2.10. (p28) 1.2.10 Increase the maximum size of a logical volume
2.2.11. (p29) 1.2.11 Increase the size of a logical volume
2.2.12. (p30) 1.2.12 List the configuration of a logical volume
2.2.13. (p31) 1.2.13 List a logical volumes detailed mapping
2.3. (p32) 1.3 Physical volume related commands
2.3.1. (p33) 1.3.1 List all physical volumes in system
2.3.2. (p34) 1.3.2 List configuration of a physical volume
2.3.3. (p35) 1.3.3 List contents of a physical volume
2.3.4. (p36) 1.3.4 Move data from a physical volume
2.4. (p37) 1.4 Journaled file system related commands
3. (p43) Chapter 2. Problem determination and recovery
3.1. (p44) 2.1 A methodology for problem determination
3.1.1. (p45) 2.1.1 Breaking up high-level commands
3.2. (p46) 2.2 Producing debug output for LVM Scripts
3.3. (p47) 2.3 Corruption example 1: Simple ODM corruption
3.4. (p48) 2.4 Gathering information about the problem
3.5. (p49) 2.5 Corruption example 2: PVID corruption
3.6. (p50) 2.6 Inspection commands
3.6.1. (p51) 2.6.1 Checking the errorlog
3.6.2. (p52) 2.6.2 Checking for free file system space
3.6.3. (p53) 2.6.3 The high-level commands
3.6.4. (p54) 2.6.4 Checking fileset levels
3.6.5. (p55) 2.6.5 Checking device availability
3.6.6. (p56) 2.6.6 Checking the ODM
3.6.7. (p57) 2.6.7 The low-level commands
3.6.8. (p58) 2.6.8 korn shell debug
3.6.9. (p59) 2.6.9 Examining raw data on physical volumes and logical volumes
3.6.10. (p60) 2.6.10 Watching system calls
3.6.11. (p61) 2.6.11 Examining internal kernel memory structures with crash
3.7. (p62) 2.7 Rebuilding and repair
3.7.1. (p63) 2.7.1 ODM corruption
3.7.2. (p64) 2.7.2 LVM control data corruption
3.7.3. (p65) 2.7.3 JFS problems
3.7.4. (p66) 2.7.4 Hardware failures
3.7.5. (p67) 2.7.5 Setting up notification of LVM-MISSPVADDED errors
3.8. (p68) 2.8 Special considerations for rootvg
4. (p71) Chapter 3. Replacing a drive in a mirrored configuration
4.1. (p72) 3.1 Replace a failed physical volume
4.1.1. (p73) 3.1.1 Step 1
4.1.2. (p74) 3.1.2 Step 2
4.1.3. (p75) 3.1.3 Step 3
4.1.4. (p76) 3.1.4 Step 4
4.1.5. (p77) 3.1.5 Step 5
4.1.6. (p78) 3.1.6 Step 6
4.1.7. (p79) 3.1.7 Step 7
4.1.8. (p80) 3.1.8 Step 8
4.1.9. (p81) 3.1.9 Step 9
4.2. (p82) 3.2 Using the replacepv command
5. (p84) Appendix A. High-level LVM commands
5.1. (p85) A.1 The chlv command
5.2. (p86) A.2 The chpv command
5.3. (p87) A.3 The chvg command
5.4. (p88) A.4 The cplv command
5.5. (p89) A.5 The exportvg command
5.6. (p90) A.6 The extendlv command
5.7. (p91) A.7 The extendvg command
5.8. (p92) A.8 The importvg command
5.9. (p93) A.9 The Islv command
5.10. (p94) A.10 The Ispv command
5.11. (p95) A.11 The Isvg command
5.12. (p96) A.12 The Isvgfs command
5.13. (p97) A.13 The Ivedit command
5.14. (p98) A.14 The migratepv command
5.15. (p99) A.15 The mirrorvg command
5.16. (p100) A.16 The mkcd command
5.17. (p101) A.17 The mklv command
5.18. (p102) A.18 The mklvcopy command
5.19. (p103) A.19 The mksysb command
5.20. (p104) A.20 The mkszfile command
5.21. (p105) A.21 The mkvg command
5.22. (p106) A.22 The mkvgdata command
5.23. (p107) A.23 The readlvcopy command
5.24. (p108) A.24 The redefinevg command
5.25. (p109) A.25 The reducevg command
5.26. (p110) A.26 The reorgvg command
5.27. (p111) A.27 The replacepv command
5.28. (p112) A.28 The rmlv command
5.29. (p113) A.29 The rmlvcopy command
5.30. (p114) A.30 The restvg command
5.31. (p115) A.31 The savevg command
5.32. (p116) A.32 The splitlvcopy command
5.33. (p117) A.33 The synclvodm command
5.34. (p118) A.34 The syncvg command
5.35. (p119) A.35 The unmirrorvg command
5.36. (p120) A.36 The updatelv command
5.37. (p121) A.37 The updatevg command
5.38. (p122) A.38 The varyoffvg command
5.39. (p123) A.39 The varyonvg command
6. (p124) Appendix B. Intermediate-level commands
6.1. (p125) B.1 The allocp command
6.2. (p126) B.2 The cfgvg command
6.3. (p127) B.3 The chlvcopy command
6.4. (p128) B.4 The copyrawlv command
6.5. (p129) B.5 The getlvcb command
6.6. (p130) B.6 The getlvname command
6.7. (p131) B.7 The getlvodm command
6.8. (p132) B.8 The getvgname command
6.9. (p133) B.9 The Ichangelv command
6.10. (p134) B.10 The Ichlvcopy command
6.11. (p135) B.11 The Ichangepv command
6.12. (p136) B.12 The Icreatelv command
6.13. (p137) B.13 The Icreatevg command
6.14. (p138) B.14 The Ideletelv command
6.15. (p139) B.15 The Ideletepv command
6.16. (p140) B.16 The lextendlv command
6.17. (p141) B.17 The linstallpv command
6.18. (p142) B.18 The Imigratelv command
6.19. (p143) B.19 The Imigratepp command
6.20. (p144) B.20 The Iquerylv command
6.21. (p145) B.21 The Iquerypv command
6.22. (p146) B.22 The Iqueryvg command
6.23. (p147) B.23 The Iqueryvgs command
6.24. (p148) B.24 The Ireducelv command
6.25. (p149) B.25 The Iresynclp command
6.26. (p150) B.26 The Iresynclv command
6.27. (p151) B.27 The Iresyncpv command
6.28. (p152) B.28 The Ivaryonvg command
6.29. (p153) B.29 The Ivaryoffvg command
6.30. (p154) B.30 The Ivgenmajor command
6.31. (p155) B.31 The Ivgenminor command
6.32. (p156) B.32 The Ivchkmajor command
6.33. (p157) B.33 The Ivlstmajor command
6.34. (p158) B.34 The Ivmmsg command
6.35. (p159) B.35 The Ivrelmajor command
6.36. (p160) B.36 The Ivrelminor command
6.37. (p161) B.37 The migfix command
6.38. (p162) B.38 The putlvcb command
6.39. (p163) B.39 The putlvodm command
7. (p164) Appendix C. ODM commands
7.1. (p165) C.1 The odmadd command
7.2. (p166) C.2 The odmchange command
7.3. (p167) C.3 The odmcreate command
7.4. (p168) C.4 The odmdelete command
7.5. (p169) C.5 The odmdrop command
7.6. (p170) C.6 The odmget command
7.7. (p171) C.7 The odmshow command
8. (p172) Appendix D. Other related commands
8.1. (p173) D.1 The backup command
8.2. (p174) D.2 The chfs command
8.3. (p175) D.3 The chps command
8.4. (p176) D.4 The cpio command
8.5. (p177) D.5 The crfs command
8.6. (p178) D.6 The defragfs command
8.7. (p179) D.7 The df command
8.8. (p180) D.8 The dfsck command
8.9. (p181) D.9 The dumpfs command
8.10. (p182) D.10 Theft command
8.11. (p183) D.11 The file command
8.12. (p184) D.12 The fileplace command
8.13. (p185) D.13 The fsck command
8.14. (p186) D.14 The fsdb command
8.15. (p187) D.15 The imfs command
8.16. (p188) D.16 The ipl-varyon command
8.17. (p189) D.17 The istat command
8.18. (p190) D.18 The logform command
8.19. (p191) D.19 The logredo command
8.20. (p192) D.20 The Isfs command
8.21. (p193) D.21 The Isps command
8.22. (p194) D.22 The mkfs command
8.23. (p195) D.23 The mount command
8.24. (p196) D.24 The ncheck command
8.25. (p197) D.25 The restore command
8.26. (p198) D.26 The rmfs command
8.27. (p199) D.27 The savebase command
8.28. (p200) D.28 The snap command
8.29. (p201) D.29 The sync command
8.30. (p202) D.30 The sysdumpdev command
8.31. (p203) D.31 The tar command
8.32. (p204) D.32 The umount command
9. (p205) Appendix E. Scripts used during this residency
9.1. (p206) E.1 trclvm
9.2. (p207) E.2 dspmsgjndex
9.3. (p208) E.3 chpvid
9.4. (p209) E.4 gather-maps
9.5. (p210) E.5 findlvm
9.6. (p211) E.6 maker
9.7. (p212) E.7 pvsinvg
9.8. (p213) E.8 scraper
10. (p214) Appendix F. Special notices
11. (p215) Appendix G. Related publications
12. (p220) How to get IBM Redbooks
13. (p222) Glossary
14. (p223) Index
15. (p224) IBM Redbooks review
1. (p1) Preface
1.1. (p2) The team that wrote this redbook
1.2. (p3) Comments welcome
2. (p4) Chapter 1. LVM commands
2.1. (p5) 1.1 Volume group related commands
2.1.1. (p6) 1.1.1 Add a volume group
2.1.2. (p7) 1.1.2 Activate a volume group
2.1.3. (p8) 1.1.3 Deactivate a volume group
2.1.4. (p9) 1.1.4 Remove a physical volume from a volume group
2.1.5. (p10) 1.1.5 Remove a volume group
2.1.6. (p11) 1.1.6 Bring a volume group into the system
2.1.7. (p12) 1.1.7 Add physical volume to an existing volume group
2.1.8. (p13) 1.1.8 Change name of volume group
2.1.9. (p14) 1.1.9 Reorganize a volume group
2.1.10. (p15) 1.1.10 Listing the volume groups on the system
2.1.11. (p16) 1.1.11 Listing the configuration of a volume group
2.1.12. (p17) 1.1.12 List contents of a volume group
2.2. (p18) 1.2 Logical volume related commands
2.2.1. (p19) 1.2.1 Add a logical volume
2.2.2. (p20) 1.2.2 Copy a logical volume to a new logical volume
2.2.3. (p21) 1.2.3 Copy a logical volume to same sized or bigger logical volume
2.2.4. (p22) 1.2.4 Copy a logical volume to a smaller logical volume
2.2.5. (p23) 1.2.5 Add a mirrored copy to a logical volume
2.2.6. (p24) 1.2.6 Set allocation policy for a logical volume
2.2.7. (p25) 1.2.7 Set strictness for a logical volume
2.2.8. (p26) 1.2.8 Set write verify for a logical volume
2.2.9. (p27) 1.2.9 Set schedule policy
2.2.10. (p28) 1.2.10 Increase the maximum size of a logical volume
2.2.11. (p29) 1.2.11 Increase the size of a logical volume
2.2.12. (p30) 1.2.12 List the configuration of a logical volume
2.2.13. (p31) 1.2.13 List a logical volumes detailed mapping
2.3. (p32) 1.3 Physical volume related commands
2.3.1. (p33) 1.3.1 List all physical volumes in system
2.3.2. (p34) 1.3.2 List configuration of a physical volume
2.3.3. (p35) 1.3.3 List contents of a physical volume
2.3.4. (p36) 1.3.4 Move data from a physical volume
2.4. (p37) 1.4 Journaled file system related commands
3. (p43) Chapter 2. Problem determination and recovery
3.1. (p44) 2.1 A methodology for problem determination
3.1.1. (p45) 2.1.1 Breaking up high-level commands
3.2. (p46) 2.2 Producing debug output for LVM Scripts
3.3. (p47) 2.3 Corruption example 1: Simple ODM corruption
3.4. (p48) 2.4 Gathering information about the problem
3.5. (p49) 2.5 Corruption example 2: PVID corruption
3.6. (p50) 2.6 Inspection commands
3.6.1. (p51) 2.6.1 Checking the errorlog
3.6.2. (p52) 2.6.2 Checking for free file system space
3.6.3. (p53) 2.6.3 The high-level commands
3.6.4. (p54) 2.6.4 Checking fileset levels
3.6.5. (p55) 2.6.5 Checking device availability
3.6.6. (p56) 2.6.6 Checking the ODM
3.6.7. (p57) 2.6.7 The low-level commands
3.6.8. (p58) 2.6.8 korn shell debug
3.6.9. (p59) 2.6.9 Examining raw data on physical volumes and logical volumes
3.6.10. (p60) 2.6.10 Watching system calls
3.6.11. (p61) 2.6.11 Examining internal kernel memory structures with crash
3.7. (p62) 2.7 Rebuilding and repair
3.7.1. (p63) 2.7.1 ODM corruption
3.7.2. (p64) 2.7.2 LVM control data corruption
3.7.3. (p65) 2.7.3 JFS problems
3.7.4. (p66) 2.7.4 Hardware failures
3.7.5. (p67) 2.7.5 Setting up notification of LVM-MISSPVADDED errors
3.8. (p68) 2.8 Special considerations for rootvg
4. (p71) Chapter 3. Replacing a drive in a mirrored configuration
4.1. (p72) 3.1 Replace a failed physical volume
4.1.1. (p73) 3.1.1 Step 1
4.1.2. (p74) 3.1.2 Step 2
4.1.3. (p75) 3.1.3 Step 3
4.1.4. (p76) 3.1.4 Step 4
4.1.5. (p77) 3.1.5 Step 5
4.1.6. (p78) 3.1.6 Step 6
4.1.7. (p79) 3.1.7 Step 7
4.1.8. (p80) 3.1.8 Step 8
4.1.9. (p81) 3.1.9 Step 9
4.2. (p82) 3.2 Using the replacepv command
5. (p84) Appendix A. High-level LVM commands
5.1. (p85) A.1 The chlv command
5.2. (p86) A.2 The chpv command
5.3. (p87) A.3 The chvg command
5.4. (p88) A.4 The cplv command
5.5. (p89) A.5 The exportvg command
5.6. (p90) A.6 The extendlv command
5.7. (p91) A.7 The extendvg command
5.8. (p92) A.8 The importvg command
5.9. (p93) A.9 The Islv command
5.10. (p94) A.10 The Ispv command
5.11. (p95) A.11 The Isvg command
5.12. (p96) A.12 The Isvgfs command
5.13. (p97) A.13 The Ivedit command
5.14. (p98) A.14 The migratepv command
5.15. (p99) A.15 The mirrorvg command
5.16. (p100) A.16 The mkcd command
5.17. (p101) A.17 The mklv command
5.18. (p102) A.18 The mklvcopy command
5.19. (p103) A.19 The mksysb command
5.20. (p104) A.20 The mkszfile command
5.21. (p105) A.21 The mkvg command
5.22. (p106) A.22 The mkvgdata command
5.23. (p107) A.23 The readlvcopy command
5.24. (p108) A.24 The redefinevg command
5.25. (p109) A.25 The reducevg command
5.26. (p110) A.26 The reorgvg command
5.27. (p111) A.27 The replacepv command
5.28. (p112) A.28 The rmlv command
5.29. (p113) A.29 The rmlvcopy command
5.30. (p114) A.30 The restvg command
5.31. (p115) A.31 The savevg command
5.32. (p116) A.32 The splitlvcopy command
5.33. (p117) A.33 The synclvodm command
5.34. (p118) A.34 The syncvg command
5.35. (p119) A.35 The unmirrorvg command
5.36. (p120) A.36 The updatelv command
5.37. (p121) A.37 The updatevg command
5.38. (p122) A.38 The varyoffvg command
5.39. (p123) A.39 The varyonvg command
6. (p124) Appendix B. Intermediate-level commands
6.1. (p125) B.1 The allocp command
6.2. (p126) B.2 The cfgvg command
6.3. (p127) B.3 The chlvcopy command
6.4. (p128) B.4 The copyrawlv command
6.5. (p129) B.5 The getlvcb command
6.6. (p130) B.6 The getlvname command
6.7. (p131) B.7 The getlvodm command
6.8. (p132) B.8 The getvgname command
6.9. (p133) B.9 The Ichangelv command
6.10. (p134) B.10 The Ichlvcopy command
6.11. (p135) B.11 The Ichangepv command
6.12. (p136) B.12 The Icreatelv command
6.13. (p137) B.13 The Icreatevg command
6.14. (p138) B.14 The Ideletelv command
6.15. (p139) B.15 The Ideletepv command
6.16. (p140) B.16 The lextendlv command
6.17. (p141) B.17 The linstallpv command
6.18. (p142) B.18 The Imigratelv command
6.19. (p143) B.19 The Imigratepp command
6.20. (p144) B.20 The Iquerylv command
6.21. (p145) B.21 The Iquerypv command
6.22. (p146) B.22 The Iqueryvg command
6.23. (p147) B.23 The Iqueryvgs command
6.24. (p148) B.24 The Ireducelv command
6.25. (p149) B.25 The Iresynclp command
6.26. (p150) B.26 The Iresynclv command
6.27. (p151) B.27 The Iresyncpv command
6.28. (p152) B.28 The Ivaryonvg command
6.29. (p153) B.29 The Ivaryoffvg command
6.30. (p154) B.30 The Ivgenmajor command
6.31. (p155) B.31 The Ivgenminor command
6.32. (p156) B.32 The Ivchkmajor command
6.33. (p157) B.33 The Ivlstmajor command
6.34. (p158) B.34 The Ivmmsg command
6.35. (p159) B.35 The Ivrelmajor command
6.36. (p160) B.36 The Ivrelminor command
6.37. (p161) B.37 The migfix command
6.38. (p162) B.38 The putlvcb command
6.39. (p163) B.39 The putlvodm command
7. (p164) Appendix C. ODM commands
7.1. (p165) C.1 The odmadd command
7.2. (p166) C.2 The odmchange command
7.3. (p167) C.3 The odmcreate command
7.4. (p168) C.4 The odmdelete command
7.5. (p169) C.5 The odmdrop command
7.6. (p170) C.6 The odmget command
7.7. (p171) C.7 The odmshow command
8. (p172) Appendix D. Other related commands
8.1. (p173) D.1 The backup command
8.2. (p174) D.2 The chfs command
8.3. (p175) D.3 The chps command
8.4. (p176) D.4 The cpio command
8.5. (p177) D.5 The crfs command
8.6. (p178) D.6 The defragfs command
8.7. (p179) D.7 The df command
8.8. (p180) D.8 The dfsck command
8.9. (p181) D.9 The dumpfs command
8.10. (p182) D.10 Theft command
8.11. (p183) D.11 The file command
8.12. (p184) D.12 The fileplace command
8.13. (p185) D.13 The fsck command
8.14. (p186) D.14 The fsdb command
8.15. (p187) D.15 The imfs command
8.16. (p188) D.16 The ipl-varyon command
8.17. (p189) D.17 The istat command
8.18. (p190) D.18 The logform command
8.19. (p191) D.19 The logredo command
8.20. (p192) D.20 The Isfs command
8.21. (p193) D.21 The Isps command
8.22. (p194) D.22 The mkfs command
8.23. (p195) D.23 The mount command
8.24. (p196) D.24 The ncheck command
8.25. (p197) D.25 The restore command
8.26. (p198) D.26 The rmfs command
8.27. (p199) D.27 The savebase command
8.28. (p200) D.28 The snap command
8.29. (p201) D.29 The sync command
8.30. (p202) D.30 The sysdumpdev command
8.31. (p203) D.31 The tar command
8.32. (p204) D.32 The umount command
9. (p205) Appendix E. Scripts used during this residency
9.1. (p206) E.1 trclvm
9.2. (p207) E.2 dspmsgjndex
9.3. (p208) E.3 chpvid
9.4. (p209) E.4 gather-maps
9.5. (p210) E.5 findlvm
9.6. (p211) E.6 maker
9.7. (p212) E.7 pvsinvg
9.8. (p213) E.8 scraper
10. (p214) Appendix F. Special notices
11. (p215) Appendix G. Related publications
12. (p220) How to get IBM Redbooks
13. (p222) Glossary
14. (p223) Index
15. (p224) IBM Redbooks review
元数据中的注释
theme: AIX (Computer file); Storage area networks (Computer networks)
开源日期
2023-06-28
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.