Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
802.11 Security
802.11 Security

802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent...

PGP & GPG: Email for the Practical Paranoid
PGP & GPG: Email for the Practical Paranoid
"...The World's first user-friendly book on email privacy...unless you're a cryptographer, or never use email, you should read this book." —Len Sassaman, CodeCon Founder

"Today, most email is sent like a postcard. We all should want to put our mail back into secure envelopes again. PGP and GPG are two of the leading tools...

Degunking Linux
Degunking Linux
Linux has grown in popularity and is increasingly being adopted by home users and others who laud this nearly un-crashable, free operating system. But setting up a Linux OS can be tricky and time consuming. And managing a Linux system can be even more difficult if you don't have the right knowledge. Degunking Linux expertly shows readers...
Pro Puppet
Pro Puppet

The lives of system administrators and operations staff often revolve around a series of repetitive tasks: configuring hosts, creating users, and managing applications, daemons, and services. Often these tasks are repeated many times in the life cycle of one host, from building to decommissioning, and as new configuration is added or...

termcap & terminfo (O'Reilly Nutshell)
termcap & terminfo (O'Reilly Nutshell)

While termcap and terminfo are no longer as important as they once were, due to the growth of the X terminal market and increased standardization among ASCII terminals, handling different terminal types can still be a headache for system administrators. The termcap and terminfo databases are UNIX's solution to the difficulty of...

The Complete FreeBSD, Fourth Edition
The Complete FreeBSD, Fourth Edition

FreeBSD is by far the most popular version of BSDВ®, the legendary operating system that has contributed a great deal to every version of UnixВ® in use today (including Mac OSВ® X). Originally a community effort by the University of California at Berkeley, FreeBSD was aimed at making Unix a little friendlier and easier to...

Mac OS X Pocket Reference: A User's Guide to Mac OS X
Mac OS X Pocket Reference: A User's Guide to Mac OS X

Apple's new operating system, Mac OS X, is reaching a critical mass. Its sleek Aqua interface, combined with a powerful BSD Unix core, bring usability and stability to a new level. As companies start to migrate to Mac OS X from earlier versions of the Mac OS and from other flavors of Unix, IT managers are looking for a quick...

Maximum Mac OS X Security
Maximum Mac OS X Security

While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.

Yet most Mac OS X books are generally...

Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
Interprocess Communications in Linux®: The Nooks & Crannies
Interprocess Communications in Linux®: The Nooks & Crannies

The topic of interprocess communication techniques is broad, challenging and dynamic. All but the most basic operating systems provide methods for processes communication. Early on, UNIX supported a number of rudimentary process communication constructs (such as lock files, signals and pipes). In the early 1980s, facilities such...

Network Backup with Bacula [How-to]
Network Backup with Bacula [How-to]

In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks.

"Network Backup with Bacula" is a practical guide to setting up the Bacula backup system...

BSD Hacks
BSD Hacks
Looking for a unique set of practical tips, tricks, and tools for administrators and power users of BSD systems? From hacks to customize the user environment to networking, securing the system, and optimization, BSD Hacks takes a creative approach to saving time and accomplishing more with fewer resources. If...
unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy