Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MySQL in a Nutshell
MySQL in a Nutshell
When you need to find the right SQL keyword or MySQL client command-line option right away, turn to this convenient reference, known for the same speed and flexibility as the system it covers so thoroughly. MySQL is packed with so many capabilities that the odds of remembering a particular function or statement at the right moment are pretty slim....
Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators
Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators

The definitive guide to administering a Red Hat Enterprise Linux 6 network

Linux professionals who need a go-to guide on version 6 of Red Hat Enterprise Linux (RHEL) will find what they need in this comprehensive Sybex book. It covers RHEL administration in detail, including how to set up and manage web and mail services,...

SELinux: NSA's Open Source Security Enhanced Linux
SELinux: NSA's Open Source Security Enhanced Linux
This small but information-packed book covers the wide range of knowledge needed to secure your system using this respected extension to Linux. SELinux discusses critical topics, such as SELinux concepts and its security model; installation instructions; system and user administration; understanding,...
Guide to Networking Essentials, Fourth Edition
Guide to Networking Essentials, Fourth Edition

This book is intended to serve the needs of individuals and information systems pro- fessionals who are interested in learning more about networking technologies, but who may have little or no background in this subject matter. In the first edition of this book, the materials were originally designed to help individuals prepare for Microsoft...

Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7 (EX200 and EX300) (Certification Guide)
Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7 (EX200 and EX300) (Certification Guide)

Red Hat RHCSA/RHCE 7 Cert Guide contains proven study features that allow you to succeed on the exam the first time. Best-selling author and top Linux consultant Sander van Vugt shares preparation hints and test-taking tips, helping you identify areas of weakness to improve both your conceptual knowledge and...

Networking All-in-One Desk Reference For Dummies (Computer/Tech)
Networking All-in-One Desk Reference For Dummies (Computer/Tech)
10 books in 1 — your key to networking success!

Your one-stop guide to the latest updates on networking

Packed with new and updated material on Windows Server 2008, the latest Red Hat Fedora, Vista, and Office 2007, and the most up-to-date wireless standards, this solitary reference...

Howzzat?
Howzzat?
Sherlock Holmes with his fancy hat, magnifying glass and pipe always fascinated me. I was glued to every clue Perry Mason worked on. I would read with anticipation as Ganesh (Vasanth) reconstructed a crime with a seemingly simple object. The way these celebrated detectives worked was really captivating— piecing clues...
Fedora 8 and Red Hat Enterprise Linux Bible
Fedora 8 and Red Hat Enterprise Linux Bible
With the Fedora Linux operating system and the instructions in this book, you can transform your PC into a safe, powerful, and free computer system. Starting with Fedora, you can simply replace (or coexist with) Microsoft Windows on your everyday desktop computer. You can also configure your computer to share your files, printers, Web pages, or...
UNIX and Linux System Administration Handbook (4th Edition)
UNIX and Linux System Administration Handbook (4th Edition)

The twentieth anniversary edition of the world’s best-selling UNIX system administration book has been made even better by adding coverage of the leading Linux distributions: Ubuntu, openSUSE, and RHEL.  

 

This book approaches system...

Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

Reverse Engineering Code with IDA Pro
Reverse Engineering Code with IDA Pro

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and...

Hardening Linux
Hardening Linux

Take a proactive approach to Enterprise Linux security by implementing preventive measures against attacks—before they occur. Written by a team of Linux security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Features include examples using Red...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy