|
|
|
|
Security Technologies for the World Wide Web, Second EditionThis newly revised edition of the Artech House bestseller offers the most up-to-date comprehensive analysis of the current trends in WWW security available, with brand new chapters on authentication and authorization infrastructures, server-side security, and risk management. Practitioners will also find coverage of entirely new topics such as... | | Hacker AttackHacker Attack is the only book about computer security that is at once entertaining, understandable, and practical. You'll be fascinated as you read about hackers, crackers and whackers--people who spend their time trying to break into your computer, spreading computer viruses, or peeping (and recording what they see!) as you surf the Internet or... | | Red Hat Linux 7.2: The Complete Reference, Second EditionThe Most Comprehensive Red Hat Linux Resource Available
Master Red Hat Linux--including version 7.2--using this authoritative reference. Linux guru Richard Petersen provides details on networking, kernel management, Internet servers, system administration, and much more. You'll also get full coverage of Internet clients, office suites,... |
|
Building Internet Firewalls (2nd Edition)In the vast and varied universe of computer books, only a few stand out as the best in their subject areas. Building Internet Firewalls is one of those. It's deep, yet carefully focused, so that almost anything you might want to know about firewall strategies for protecting networks is here. In addition, there's lots of information on... | | How Linux Works: What Every Superuser Should Know
Unlike some operating systems, Linux doesn't try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does.
In this completely revised second... | | Home Network Security SimplifiedPhishing. Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. If that connection is high-speed (always on) or you run a wireless network, your needyour vulnerabilityis that much greater. Now, with Home Network Security... |
|
Linksys WRT54G Ultimate HackingThis book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the... | | Juniper(r) Networks Secure Access SSL VPN Configuration GuideJuniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for... | | The Complete Idiot's Guide to Creating Your Own CDs (2nd Edition)CD-ROM "burners" are a standard feature on many new PCs. This title provides expert advice on creating CD-ROMs in an easy to comprehend language. Topics covered include: CD burning troubleshooting, copyright and format issues. --This text refers to an out of print or unavailable edition of this title.
... |
|
Beginning Fedora Desktop: Fedora 28 Edition
Get the most out of Fedora 28 Desktop, including free Office suites, editors, e-book readers, music and video applications. In addition to those features, you’ll also work with codecs, email clients, web browsers, FTP and BitTorrent clients, VoIP clients, and IM applications. The major Fedora 28 desktop spins are covered in... | | Linux Troubleshooting BibleIf something goes wrong, roll up your sleeves, then troubleshoot and fix Linux yourself!
Commercial support packages for Linux can be expensive. This unique book gives you the power to diagnose and fix a wide range of Linux problems. Using Fedora Core Linux and Red Hat Enterprise Linux examples, Thomas Weeks and bestselling Red Hat... | | |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |