 |
|
|
 Hacker Linux UncoveredConcentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log... |  |  Internet Core Protocols: The Definitive GuideFor network administrators, support professionals, and system designers, intimate knowledge of the network protocols that are the foundation of the Internet is crucial. Internet Core Protocols: The Definitive Guide is a superb summary of the nitty-gritty details of the most important Net standards.
This book assumes you have a working... |  |  Hardening Linux"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as... |
|
|
 Ubuntu Linux BibleEverything you need to know—and then some!
It's the fastest-growing, coolest Linux distribution out there, and now you can join the excitement with this information-packed guide. Want to edit graphics? Create a spreadsheet? Manage groups? Set up an NFS server? You'll learn it all and more with the expert guidance,... |  |  The Definitive Guide to SUSE Linux Enterprise ServerThe Definitive Guide to SUSE Linux Enterprise Server is a comprehensive guide to Novells SUSE Linux Enterprise Server (SLES), one of the most powerful Linux-based server solutions available today. Sander van Vugtnoted author, consultant, and trainerguides you through the most important aspects of SLES, beginning with an in-depth overview... |  |  Hacking Exposed VoIP: Voice Over IP Security Secrets & SolutionsBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues... |
|
| Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |