Home | Amazing | Today | Tags | Publishers | Years | Search 
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Developing XML Solutions (DV-MPS General)
Developing XML Solutions (DV-MPS General)
This book is intended for anyone who wants a glimpse into the next generation of enterprise development. If you want to develop an understanding of Extensible Markup Language (XML) and learn how to use XML for business-to-business (B2B) communications, learn what the Simple Object Access Protocol (SOAP) and BizTalk extensions are, and learn how to...
Windows and Linux Integration: Hands-on Solutions for a Mixed Environment
Windows and Linux Integration: Hands-on Solutions for a Mixed Environment
  • Don't Just Cope With Your Mixed-Environment Problems—Solve Them
  • Maximize Productivity and Lower Costs by Strategically Combining the Strengths of Linux and Windows
  • Leverage Windows Resources from Linux, and Linux Resources from Windows
  • Meet All Your Remote and Terminal Connection...
Hacker Linux Uncovered
Hacker Linux Uncovered
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log...
Internet Core Protocols: The Definitive Guide
Internet Core Protocols: The Definitive Guide
For network administrators, support professionals, and system designers, intimate knowledge of the network protocols that are the foundation of the Internet is crucial. Internet Core Protocols: The Definitive Guide is a superb summary of the nitty-gritty details of the most important Net standards.

This book assumes you have a working...

Hardening Linux
Hardening Linux

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as...

Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat Linux walks the reader through the process of installing, configuring, and using Red Hat Linux 6 and some of its most popular applications. Networking coverage includes essential local area network configuration, plus excellent coverage of Samba setup and the process of establishing a Point-to-Point Protocol (PPP)...
Configuring IPCop Firewalls: Closing Borders with Open Source
Configuring IPCop Firewalls: Closing Borders with Open Source
This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for...
Red Hat Fedora Core 6 Unleashed
Red Hat Fedora Core 6 Unleashed

Red Hat ® Fedora Core 6 Unleashed presents comprehensive coverage of Fedora Core 6, the popular Linux distribution developed by the Red Hat-sponsored Fedora Project.


This book provides detailed information on installing, using, and administering Fedora....

Ubuntu Linux Bible
Ubuntu Linux Bible
Everything you need to know—and then some!

It's the fastest-growing, coolest Linux distribution out there, and now you can join the excitement with this information-packed guide. Want to edit graphics? Create a spreadsheet? Manage groups? Set up an NFS server? You'll learn it all and more with the expert guidance,...

The Definitive Guide to SUSE Linux Enterprise Server
The Definitive Guide to SUSE Linux Enterprise Server
The Definitive Guide to SUSE Linux Enterprise Server is a comprehensive guide to Novells SUSE Linux Enterprise Server (SLES), one of the most powerful Linux-based server solutions available today. Sander van Vugtnoted author, consultant, and trainerguides you through the most important aspects of SLES, beginning with an in-depth overview...
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy