Hacker Linux UncoveredConcentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log... | | Protect Your Information With Intrusion Detection (Power)Protect Your Information with Intrusion Detection contains a detailed overview of the new technology in information protection--intrusion detection. This is a comprehensive handbook introducing the reader to the problem of intrusion detection, exploring the main concepts and principals of intrusion detection technology, and giving an... | | Windows XP Registry: A Complete Guide to Customizing and Optimizing Windows XPTargeting IT professionals, system administrators, and experienced users moving to the Windows XP platform, this book enables the user to master registry concepts and architecture, provides a historical overview of the registry, and outlines the differences between Windows 9x/ME and Windows NT/2000/XP registries. Special attention is drawn to the... |