Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Linux Networking
Advanced Linux Networking

With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful...

BeagleBone Essentials
BeagleBone Essentials

Harness the power of the BeagleBone Black to manage external environments using C, Bash, and Python/PHP programming

About This Book

  • Learn the fundamentals of Beaglebone Black via a detailed tutorial that provides practical examples, from initial board setup to device driver management
  • ...
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Linux Administration Handbook (2nd Edition)
Linux Administration Handbook (2nd Edition)
As the deployment of Linux systems in production environments has accelerated, Linux administrators have longed for a book that addresses the challenges of this complex and exciting frontier. Linux Administration Handbook was written with this audience in mind. This book serves both as a valuable tutorial for the novice administrator and as a...
Implementing CIFS: The Common Internet File System
Implementing CIFS: The Common Internet File System

"The book that Microsoft should have written, but didn't."
—Jeremy Allison, Samba Team

"Your detailed explanations are clear and backed-up with source code—and the numerous bits of humor make a dry subject very enjoyable to read."
—J.D. Lindemann, network engineer, Adaptec, Inc.

The...

The Debian System: Concepts and Techniques
The Debian System: Concepts and Techniques
The Debian GNU/Linux operating system approaches Linux system administration differently than other popular Linux distributions, favoring text-based configuration mechanisms over graphical user interfaces (GUIs). Debian may appear simplistic and even slightly outdated, but it is actually very robust, scalable, and secure. Debian's open development...
Linux® Patch Management: Keeping Linux® Systems Up To Date
Linux® Patch Management: Keeping Linux® Systems Up To Date

The Start-to-Finish Patch Management Guide for Every Linux® Environment

To keep your Linux systems secure, reliable, and productive, you must stay current with patches and updates. But, until now, it has been difficult to find usable,...

Ubuntu 8.10 Linux Bible
Ubuntu 8.10 Linux Bible
A Linux distribution is basically the sum of the things that you need to run Linux on your computer. There are many different Linux distributions, each with its own target audience, set of features, administrative tools, and fan club, the latter of which is more properly known as a user community. Putting aside the downright fanatics, most of the...
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)

For use with all versions of Linux, including Ubuntu,™ Fedora,™ openSUSE,™ Red Hat,® Debian, Mandriva, Mint, and now OS X, too!

  • Get more done faster, and become a true Linux guru by mastering the command line!
  • ...
Managing Security with Snort and IDS Tools
Managing Security with Snort and IDS Tools
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

iPhone Games Projects
iPhone Games Projects
One look at the App Store will show you just how hot iPhone games have become. Games make up over 25 percent of all apps, and over 70 percent of the apps in the App Store's Most Popular category. Surprised? Of course not! We've all filled our iPhones with games, and many of us hope to develop the next best seller.

This book is a...

Result Page: 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy