Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux in a Nutshell, Fourth Edition
Linux in a Nutshell, Fourth Edition
Comprehensive but concise, Linux in a Nutshell is an essential desktop reference for the commands that users of Linux utilize every day. It covers all substantial user, programming, administration, and networking commands for the most common Linux distributions. It's several quick references rolled into one:...
Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system. In addition to explaining rootkits and rootkit writing, the book aims to inspire readers to explore the FreeBSD kernel and gain a better understanding of the kernel and the FreeBSD operating system itself. Unlike...
How Open Source Ate Software: Understand the Open Source Movement and So Much More
How Open Source Ate Software: Understand the Open Source Movement and So Much More

Learn how free software became open source and how you can sell open source software. This book provides a historical context of how open source has thoroughly transformed how we write software, how we cooperate, how we communicate, how we organize, and, ultimately, how we think about business values.

You’ll look...

Unix Unleashed
Unix Unleashed
Unix Unleashed, Third Edition is written with the power user and system administrator in mind. This book will help the reader understand the nuances of the major Unix variants including SVR4, HP-UX, Solaris, AIX, BSD, IRIX, SunOS, and Linux. It will help the reader decide which Unix shell works best for their particular situation. Other topics such...
File System Forensic Analysis
File System Forensic Analysis
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier...
Learning the UNIX Operating System, Fifth Edition
Learning the UNIX Operating System, Fifth Edition

If you are new to Unix, this concise book will tell you just what you need to get started and no more. Unix was one of the first operating systems written in C, a high-level programming language, and its natural portability and low price made it a popular choice among universities. Initially, two main dialects of Unix existed: one...

Ubuntu Unleashed
Ubuntu Unleashed
Incorporating an advanced approach to presenting information about Ubuntu, Ubuntu Unleashed aims to provide the best and latest information that intermediate to advanced Linux users need to know about installation, configuration, system administration, server operations, and security. Written by renowned open source...
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF....

Wicked Cool Shell Scripts
Wicked Cool Shell Scripts

This cookbook of useful, customizable, and fun scripts gives you the tools to solve common Linux, Mac OS X and UNIX problems and personalize your computing environment.

The UNIX shell is the main scripting environment of every Linux, Mac OS X and UNIX system, whether a rescued laptop or a million-dollar mainframe. This cookbook of...

Ipv6 Essentials
Ipv6 Essentials

IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. The new IPv6...

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Cisco Routers for the Desperate: Router Management, The Easy Way
Cisco Routers for the Desperate: Router Management, The Easy Way
Cisco routers are the standard devices used to connect companies to the Internet. They are highly reliable and robust, and support anything from small connections to huge circuits used by telephone companies. Cisco Routers for the Desperate is a brief, meaty introduction to Cisco routers that will make a competent systems administrator...
unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy