Home | Amazing | Today | Tags | Publishers | Years | Search 
Ubuntu Unleashed
Ubuntu Unleashed
Incorporating an advanced approach to presenting information about Ubuntu, Ubuntu Unleashed aims to provide the best and latest information that intermediate to advanced Linux users need to know about installation, configuration, system administration, server operations, and security. Written by renowned open source...
LPI Linux Certification in a Nutshell
LPI Linux Certification in a Nutshell

Objective certification of professionals is a time-honored tradition in many fields, including medicine and law. As small computer systems and networks proliferated over the last decade, Novell and Microsoft produced extremely popular certification products for their respective operating system and network technologies. These...

Professional Pen Testing for Web Applications (Programmer to Programmer)
Professional Pen Testing for Web Applications (Programmer to Programmer)
There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical...
Honeypots: Tracking Hackers
Honeypots: Tracking Hackers

"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute

"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Linux HPC Cluster Installation
Linux HPC Cluster Installation
Few people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more...
Fedora Linux
Fedora Linux

"Neither a "Starting Linux" book nor a dry reference manual, this book has a lot to offer to those coming to Fedora from other operating systems or distros." -- Behdad Esfahbod, Fedora developer

This book will get you up to speed quickly on Fedora...

Linux (Hacking Exposed)
Linux (Hacking Exposed)

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software...

Essential System Administration Pocket Reference
Essential System Administration Pocket Reference
This pocket reference brings together all the important Unix and Linux system administration information in a single compact volume. Not only are all of the important administrative commands covered, but this reference also includes the locations and formats of important configuration files (including both general system databases like the password...
Programming Microsoft SQL Server 2000 with Microsoft Visual Basic .NET
Programming Microsoft SQL Server 2000 with Microsoft Visual Basic .NET
Learn how to turn data into solutions with SQL Server 2000, Visual Basic .NET, and XML. Get a fundamental grasp of SQL Server 2000 data access, data manipulation, and data definition T-SQL programming techniques, Visual Basic .NET language enhancements, Microsoft Visual Studio .NET integrated development environment advances, and the...
Degunking Linux
Degunking Linux
Linux has grown in popularity and is increasingly being adopted by home users and others who laud this nearly un-crashable, free operating system. But setting up a Linux OS can be tricky and time consuming. And managing a Linux system can be even more difficult if you don't have the right knowledge. Degunking Linux expertly shows readers...
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy