Home | Amazing | Today | Tags | Publishers | Years | Search 
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Unix for Mac : Your visual blueprintї to maximizing the foundation of Mac OS X
Unix for Mac : Your visual blueprintї to maximizing the foundation of Mac OS X
* Mac OS X combines the Unix power developers need with Mac's ease of use, offering a unique combination of technical elements with enhanced performance, compatibility, and usability

* Shows readers how to use the Terminal application and the command interface, and explores the many Unix applications using step-by-step screen shots...
Beginning GIMP: From Novice to Professional
Beginning GIMP: From Novice to Professional

Beginning GIMP: From Novice to Professional explains how to use the open source image manipulation program, GIMP version 2.4. You'll learn how to install GIMP on Windows, Linux, and MacOS X platforms. Once you've installed the application, you'll learn about the interface and configuration options, and then jump into a quick-and-simple...

Java Programming on Linux
Java Programming on Linux
Java Programming on Linux is a detailed how-to book on using Java on a Linux operating system. Topics include installing and enabling a Java runtime environment under Linux, Java development in Linux, running Java applications and applets under Linux, using Java with Linux-based Web servers, using Sun Components JCE and JAI in Linux, using Sun...
LPI Linux Certification in a Nutshell
LPI Linux Certification in a Nutshell

Objective certification of professionals is a time-honored tradition in many fields, including medicine and law. As small computer systems and networks proliferated over the last decade, Novell and Microsoft produced extremely popular certification products for their respective operating system and network technologies. These...

Linux Applications on Pseries
Linux Applications on Pseries
The strengths of the AIX operating system are well known among in the UNIX software community. Its reliability and great degree of scaling make AIX the perfect choice for hosting mission-critical applications. It is a robust and flexible operating system that meets all the requirements for the various demands of e-business environments. At the same...
The Linux Cookbook: Tips and Techniques for Everyday Use
The Linux Cookbook: Tips and Techniques for Everyday Use
Debian
“The Linux Cookbook is a good guide for beginners who want to learn about the standard commands that are available on all systems."

SKIPPING DOT NET
"(With this book)I can face the Linux command line without fear..."
...
Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Embedded Linux: Hardware, Software, and Interfacing
Embedded Linux: Hardware, Software, and Interfacing

Embedded Linux covers the development and implementation of interfacing applications on an embedded Linux platform. It includes a comprehensive discussion of platform selection, crosscompilation, kernel compilation, root filesystem creation, booting, remote debugging, real-world interfacing, application control, data...

The Debian System: Concepts and Techniques
The Debian System: Concepts and Techniques
The Debian GNU/Linux operating system approaches Linux system administration differently than other popular Linux distributions, favoring text-based configuration mechanisms over graphical user interfaces (GUIs). Debian may appear simplistic and even slightly outdated, but it is actually very robust, scalable, and secure. Debian's open development...
Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers
Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers
A comprehensive and practical guide to PAM for Linux: how modules work and how to implement them, covering 11 common modules, and installation of third-party offerings. Also covers developing your own modules in C. First this book explains how Pluggable Authentication Modules (PAM) simplify and standardize authentication in Linux. It shows in...
Shell Scripting Recipes: A Problem-Solution Approach (Expert's Voice in Open Source)
Shell Scripting Recipes: A Problem-Solution Approach (Expert's Voice in Open Source)

In today’s IT environment, harried system administrators are finding themselves more overworked than ever. This book helps them regain some of the lost time spent creating and testing shell scripts, and guides readers through more than 150 much-needed and practical real-world examples.

Because all scripts found in this book are...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy