|
|
|
|
Tuning and Customizing a Linux System
- Includes complete instructions and resources for duplicating and customizing the material in the book
- Delves into the latest versions of three popular Linux distributions: Red Hat, Slackware, and Devian GNU/Linux
- Features three usable, real-world case studies: a home user desktop system, a corporate
... | | LPIC 1 Certification BibleEvery other teenager and tens of thousands of university students have installed Linux and configured it for this job or that. That doesn't mean they're qualified to run Linux servers for a company that relies on them, regardless of what they may claim on their résumés. Your claim to real professional Linux competence will be... | | Red Hat Enterprise Linux Server Cookbook
Key Features
-
Create fully unattended installations and deploy configurations without breaking a sweat
-
Discover and kick-start the newest RHEL 7 configuration and management tools through an easy-to-follow, practical approach for a lazy system management
-
Be guided by an experienced RHEL
... |
|
|
Rootkits: Subverting the Windows KernelRootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James... | | Red Hat Linux 7.2: The Complete Reference, Second EditionThe Most Comprehensive Red Hat Linux Resource Available
Master Red Hat Linux--including version 7.2--using this authoritative reference. Linux guru Richard Petersen provides details on networking, kernel management, Internet servers, system administration, and much more. You'll also get full coverage of Internet clients, office suites,... | | Cross Site Scripting Attacks: Xss Exploits and DefenseCross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they... |
|
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |