|
|
|
|
Red Hat Fedora Linux 2 All-in-One Desk Reference For Dummies9 books in 1– one great price for nine handy, quick reference guides!
Your one-stop guide to the latest release of this popular Linux distribution
Get ready to tip your hat to the latest version of Fedora! From installing Fedora on your PC and using OpenOffice.org to securing your system and setting up servers, the nine... | | Honeypots: Tracking Hackers"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute
"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture... | | Python for Unix and Linux System AdministrationPython is an ideal language for solving problems, especially in Linux and Unix networks. With this pragmatic book, administrators can review various tasks that often occur in the management of these systems, and learn how Python can provide a more efficient and less painful way to handle them. Each chapter in Python for Unix and... |
|
|
Hacking MythTV (ExtremeTech)Want control? Build your own MythTV PC.
You don't do stuff like this to cut corners. You do it because you want what you wantand because it's fun. And a personalized MythTV is so much more than a PVR. You can combine HDTV, DVD, all kinds of music, radio, photos, even a plug-in videophone module. All you need is a little Linux know-how,... | | Fedora Bible 2011 Edition: Featuring Fedora Linux 14
With the Fedora Linux operating system and the instructions in this book, you can transform your PC into a safe, powerful, and free computer system. Starting with Fedora, you can easily replace (or coexist with) Microsoft Windows on your everyday desktop computer. You can also configure your computer to share your files, printers, Web pages,... | | Linux Server Security: Hack and Defend
Learn how to attack and defend the world’s most popular web server platform
Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server... |
|
UNIX Power Tools, Second EditionIdeal for UNIX users who hunger for technical -- yet accessible -- information, UNIX Power Tools, 2nd Edition, consists of tips, tricks, concepts, and freeware (CD-ROM included). It also covers add-on utilities and how to take advantage of clever features in the most popular UNIX utilities. Loaded with even more... | | Hacking Exposed 5th Edition“The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.” --Bill Machrone, PC Magazine
"The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine
"For almost any computer book, you can find a... | | Ubuntu: The Complete Reference (Complete Reference Series)The Definitive Guide to Ubuntu--Covers Ubuntu 8.04 LTS
Maximize the powerful features of Ubuntu with expert guidance, tips, and techniques from bestselling Linux author Richard Petersen. Packed with clear explanations and detailed examples, this comprehensive volume shows you how to get off the ground with Ubuntu, set up... |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |