Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Learn the skills to complete the full installation, configuration, and maintenance of an enterprise class internet server, no matter what Unix-like operating system you prefer. This book will rapidly guide you towards real system administration, with clear explanations along the way.

After a chapter explaining the most...

Internet Core Protocols: The Definitive Guide
Internet Core Protocols: The Definitive Guide
For network administrators, support professionals, and system designers, intimate knowledge of the network protocols that are the foundation of the Internet is crucial. Internet Core Protocols: The Definitive Guide is a superb summary of the nitty-gritty details of the most important Net standards.

This book assumes you have a working...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

pfSense 2 Cookbook
pfSense 2 Cookbook

pfSense is an open source distribution of FreeBSD-based firewall which provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options which, compared to other offerings, makes determining requirements a little more difficult and a lot more important....

Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?

With an expanded discussion of network protocols and 45 completely new scenarios, this extensively...

Hardening Linux
Hardening Linux

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as...

Samba-3 by Example: Practical Exercises to Successful Deployment (2nd Edition) (Bruce Perens Open Source)
Samba-3 by Example: Practical Exercises to Successful Deployment (2nd Edition) (Bruce Perens Open Source)

The Practical, Tested, Step-by-Step Samba-3 Guidebook Has Now Been Fully Updated!

The definitive Samba-3 guidebook has been completely updated to reflect the latest Samba releases and migration techniques. This book’s complete configuration files, step-by-step implementation instructions, network diagrams, and...

Qmail Quickstarter: Install, Set Up and Run your own Email Server
Qmail Quickstarter: Install, Set Up and Run your own Email Server

A fast-paced and easy-to-follow, step-by-step guide that gets you up and running quickly

  • Qmail Basics
  • Storing and retrieving of emails
  • Virtualisation
  • Filtering Spam
  • Hosting Multiple Domains, Encryption, and Mailing Lists

In Detail

This book...

Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat Linux walks the reader through the process of installing, configuring, and using Red Hat Linux 6 and some of its most popular applications. Networking coverage includes essential local area network configuration, plus excellent coverage of Samba setup and the process of establishing a Point-to-Point Protocol (PPP)...
DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy