Home | Amazing | Today | Tags | Publishers | Years | Search 
Hardening Linux
Hardening Linux

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as...

Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat Linux walks the reader through the process of installing, configuring, and using Red Hat Linux 6 and some of its most popular applications. Networking coverage includes essential local area network configuration, plus excellent coverage of Samba setup and the process of establishing a Point-to-Point Protocol (PPP)...
Configuring IPCop Firewalls: Closing Borders with Open Source
Configuring IPCop Firewalls: Closing Borders with Open Source
This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for...
Red Hat Fedora Core 6 Unleashed
Red Hat Fedora Core 6 Unleashed

Red Hat ® Fedora Core 6 Unleashed presents comprehensive coverage of Fedora Core 6, the popular Linux distribution developed by the Red Hat-sponsored Fedora Project.


This book provides detailed information on installing, using, and administering Fedora....

Ubuntu Linux Bible
Ubuntu Linux Bible
Everything you need to know—and then some!

It's the fastest-growing, coolest Linux distribution out there, and now you can join the excitement with this information-packed guide. Want to edit graphics? Create a spreadsheet? Manage groups? Set up an NFS server? You'll learn it all and more with the expert guidance,...

The Definitive Guide to SUSE Linux Enterprise Server
The Definitive Guide to SUSE Linux Enterprise Server
The Definitive Guide to SUSE Linux Enterprise Server is a comprehensive guide to Novells SUSE Linux Enterprise Server (SLES), one of the most powerful Linux-based server solutions available today. Sander van Vugtnoted author, consultant, and trainerguides you through the most important aspects of SLES, beginning with an in-depth overview...
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone...
CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
Professional Windows PowerShell Programming: Snapins, Cmdlets, Hosts and Providers
Professional Windows PowerShell Programming: Snapins, Cmdlets, Hosts and Providers
Welcome to Professional Windows PowerShell Programming.

Way back in 2003, I attended a talk at a conference center at Microsoft by some engineers from the Microsoft Management Console team who were giving a demonstration of a prototype enhancement to MMC. The prototype was one of the early murmurs of Microsoft’s response to the
...
ScreenOS Cookbook
ScreenOS Cookbook
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep...
Sams Teach Yourself Windows Server 2008 in 24 Hours
Sams Teach Yourself Windows Server 2008 in 24 Hours
In just 24 lessons of one hour or less, you will be able to install and configure Microsoft Windows Server 2008 and its various services for any size network. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of Windows Server® 2008 from the ground up.
...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy