Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Power Tools
Linux Power Tools

Wondering if it’s possible to work more efficiently in the X Windows System or squeeze more oomph from your existing hardware? Or perhaps you’re searching for a way to improve your web browser’s performance or want to know how to choose the best mail server for your needs. If you’ve mastered the basics and are itching...

SUSE Linux 9.3 For Dummies
SUSE Linux 9.3 For Dummies

SUSE Linux is an increasingly popular Linux distribution that competes head-on with Red Hat’s Linux versions. SUSE Linux’s fortunes have been on the rise following Novell’s acquisition of Germany’s SUSE Linux AG for $210 million. SUSE is looking for more growth in the U.S. marketplace, helped in part by IBM’s $50...

Red Hat Linux Bible: Fedora and Enterprise Edition
Red Hat Linux Bible: Fedora and Enterprise Edition
Use this comprehensive guide to harness the power of Red Hat Linux on a server, desktop, or laptop computer. Coverage includes desktop and server basics, simple, painless installations, Linux Shell, using VmWare, VNC, and more.

If Red Hat Linux can do it, you can do it too…

With Red Hat Linux separating into the open source...

Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
For many years the RHCE from Red Hat has been based on managing services on a single Red Hat host. The big question is: how many RHCEs manage just a single host? With that in mind, Red Hat has updated the exam and training to support Ansible, allowing you to learn to manage many hosts.

Ansible is a configuration
...
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion...

Professional Pen Testing for Web Applications (Programmer to Programmer)
Professional Pen Testing for Web Applications (Programmer to Programmer)
There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical...
The Oracle Hacker's Handbook: Hacking and Defending Oracle
The Oracle Hacker's Handbook: Hacking and Defending Oracle

Knowledge is power, and the power can be yours

While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you...

Practical Guide to Fedora and Red Hat Enterprise Linux, A (5th Edition)
Practical Guide to Fedora and Red Hat Enterprise Linux, A (5th Edition)

Praise for Previous Editions of A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®

 

“Since I’m in an educational environment, I found the content of Sobell’s book...

Facts and Fallacies of Software Engineering
Facts and Fallacies of Software Engineering

The practice of building software is a “new kid on the block” technology. Though it may not seem this way for those who have been in the field for most of their careers, in the overall scheme of professions, software builders are relative “newbies.”

In the short history of the software field, a lot of facts have...

After Effects Expressions
After Effects Expressions
Expressions are tools. Just as you use the Rotation tool and the Pen tool, you can use Expressions to control animation and composition in After Effects (AE).

Whereas you use most tools by clicking on their icons (e.g., the pointer or the pen) and clicking or dragging with the mouse, you use Expressions by typing commands on the
...
Sams Teach Yourself Red Hat Linux Fedora in 24 Hours
Sams Teach Yourself Red Hat Linux Fedora in 24 Hours
An easy-to-understand, step-by-step guide and starter kit to help beginners install, configure, and use the latest version of Linux. Updated to cover the latest major release of Red Hat Linux, expected fall, 2003. Red Hat Linux is the most popular choice among Linux users in the U.S., with about 85% of the U.S. Linux market. Assumes no prior...
Brute Force: Cracking the Data Encryption Standard
Brute Force: Cracking the Data Encryption Standard
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy