Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Network Administration with FreeBSD
Network Administration with FreeBSD
This book is a guide to FreeBSD for network administrators; therefore it does not cover basic installation and configuration of FreeBSD, but is about using FreeBSD to build, secure, and maintain networks. After introducing the basic tools for monitoring the performance and security of the system the book moves on to cover using jails-FreeBSD...
Foundations of Qt Development
Foundations of Qt Development
As the standard for KDE desktop environment, Trolltech's Qt is a necessary basis for all programmers who want to develop cross-platform applications on Windows, Mac OS, Linux, and FreeBSD. A multitude of popular applications have been written in Qt including Adobe Photoshop Elements, Google Earth, Perforce Visual Client, and Skype....
The FreeBSD Handbook
The FreeBSD Handbook

The FreeBSD Handbook comes with the full FreeBSD Operating System on 1 CDROM. FreeBSD is a powerful, professional quality UNIX-compatible operating system.

The FreeBSD Handbook is a comprehensive FreeBSD tutorial and reference. It covers installation, day-to-day use of FreeBSD, and much more, such as the Ports collection, creating...

Absolute BSD: The Ultimate Guide to FreeBSD
Absolute BSD: The Ultimate Guide to FreeBSD
    Welcome to Absolute BSD! This book is a one-stop shop for new UNIX administrators who want to build, configure, and manage dedicated FreeBSD servers. It will also be useful for those folks who want to run FreeBSD on their desktop or combined desktop/server systems.
    By the time you finish this book, you
...
Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
FreeBSD 6 Unleashed
FreeBSD 6 Unleashed
This book teaches the reader everything he/she needs to know in order to use FreeBSD to its full potential. It will show individuals how to use the same FreeBSD power that Yahoo!, the Internet Movie Database, and many other high profile internet sites depend on. Whether someone needs an enterprise class server, a small business server, or a...
iPod + iTunes for Windows and Mac in a Snap (2nd Edition) (Sams Teach Yourself)
iPod + iTunes for Windows and Mac in a Snap (2nd Edition) (Sams Teach Yourself)
iPod enthusiasts, this book is for you. iPod + iTunes for Windows and Mac in a Snap, Second Edition has been updated to cover the latest version of iTunes and the entire family of iPods, including the new Nano, and podcast and video download features. Organized into a series of well-organized,...
Unix Unleashed: Internet Edition
Unix Unleashed: Internet Edition
The first edition of Unix Unleashed provided a thick, comprehensive guide to the basic tools of the Unix trade, covering everything from system administration to the windowing system to the compiler environments. The guide also featured information on other tools, such as the vi editor, the command shells, the AWK, PERL, C and C++...
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad...
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Learn the skills to complete the full installation, configuration, and maintenance of an enterprise class internet server, no matter what Unix-like operating system you prefer. This book will rapidly guide you towards real system administration, with clear explanations along the way.

After a chapter explaining the most...

Managing Security with Snort and IDS Tools
Managing Security with Snort and IDS Tools
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy