Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

Get up to speed on the latest Group Policy tools, features, and best practices

Group Policy, Fundamentals, Security, and the Managed Desktop, 3rd Edition helps you streamline Windows and Windows Server management using the latest Group Policy tools and techniques. This updated edition covers Windows 10...

Continuous Delivery and DevOps: A Quickstart guide
Continuous Delivery and DevOps: A Quickstart guide

Streamline and optimize your workflow with this fast and engaging guide to continuous delivery and DevOps. Delivering quality software every time will become a way of life.

Overview

  • Real world and realistic examples of how to go about implementing continuous delivery and DevOps
  • Learn...
Ansible: Up and Running
Ansible: Up and Running

Among the many configuration management tools available, Ansible has some distinct advantages—it’s minimal in nature, you don’t need to install anything on your nodes, and it has an easy learning curve. This practical guide shows you how to be productive with this tool quickly, whether you’re a developer...

Learning SAP Analytics Cloud
Learning SAP Analytics Cloud

Key Features

  • Predict new opportunities and risks in a few mouse clicks
  • Eliminate complexity with tools that let you plan, analyze, and collaborate in context—in real time
  • Discover, visualize, plan, and predict in a single product with agile BI tools

Book...

Windows PowerShell in Action
Windows PowerShell in Action
PowerShell replaces cobbled-together assemblies of third-party management tools with an elegant programming language and a powerful scripting shell for the Windows environment. In the tradition of Manning's ground breaking "In Action" series, this book comes from right from the source. Written by Bruce Payette, one of principal creators...
Linux Server Hacks, Volume Two : Tips & Tools for Connecting, Monitoring, and Troubleshooting
Linux Server Hacks, Volume Two : Tips & Tools for Connecting, Monitoring, and Troubleshooting

Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows there are...

WordPress Plugin Development Cookbook
WordPress Plugin Development Cookbook
Developing plugins for WordPress is the next big thing for you if you are an administrator looking to enhance a personal site with custom functionality for which no plugin exists, a developer looking to enhance the WordPress platform with new ideas for the community, or a website designer building a specific project for a client....
Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity
Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity

Create simple to advanced shell scripts and enhance your system functionality with effective recipes

Key Features

  • Automate tedious and repetitive tasks
  • Create several novel applications ranging from a simple IRC logger to a Web Scraper
  • Manage your system...
SSH, the Secure Shell: The Definitive Guide
SSH, the Secure Shell: The Definitive Guide
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every...
The Linux Philosophy for SysAdmins: And Everyone Who Wants To Be One
The Linux Philosophy for SysAdmins: And Everyone Who Wants To Be One

Reveals and illustrates the awesome power and flexibility of the command line, and the design and usage philosophies that support those traits. This understanding of how to extract the most from the Linux command line can help you become a better SysAdmin. Understand why many things in the Linux and Unix worlds are done as...

Result Page: 79 78 77 76 75 74 73 72 71 70 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy