Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ubuntu Unleashed 2011 Edition: Covering 10.10 and 11.04 (6th Edition)
Ubuntu Unleashed 2011 Edition: Covering 10.10 and 11.04 (6th Edition)

We are pleased to present the 2011 edition of Ubuntu Unleashed. Ubuntu is a Linux-based computer operating system that has taken the world by storm. From its humble beginning in 2004, Ubuntu has risen to be the vanguard of desktop Linux, as well as a popular choice for servers.

 

...
Windows NT File System Internals : A Developer's Guide
Windows NT File System Internals : A Developer's Guide
Writing kernel-mode Windows NT programs--such as file-system drivers (FSDs), filter drivers, and antivirus programs--poses a challenge to even experienced Windows programmers. It's hard enough to get these programs to work, but getting them to live peacefully with other kernel programs and NT itself is an art. Nagar sorts through the mechanics...
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Linux Firewalls (3rd Edition)
Linux Firewalls (3rd Edition)
An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most...
Linux Power Tools
Linux Power Tools

Wondering if it’s possible to work more efficiently in the X Windows System or squeeze more oomph from your existing hardware? Or perhaps you’re searching for a way to improve your web browser’s performance or want to know how to choose the best mail server for your needs. If you’ve mastered the basics and are itching...

The Linux® Kernel Primer: A Top-Down Approach for x86 and PowerPC Architectures
The Linux® Kernel Primer: A Top-Down Approach for x86 and PowerPC Architectures

The Linux® Kernel Primer is the definitive guide to Linux kernel programming. The authors' unique top-down approach makes kernel programming easier to understand by systematically tracing functionality from user space into the kernel and carefully associating kernel internals with...

Linux Programming Unleashed
Linux Programming Unleashed
Linux Programming Unleashed is a complete and comprehensive reference for intermediate to advanced Linux developers that covers every possible use of Linux. Topics include: Core Linux Programming; Interprocess Communication; Device Drivers; Development Tools (make, Emacs, diff and patch, etc.); Programming the User Interface; programming...
MicroC OS II: The Real Time Kernel (With CD-ROM)
MicroC OS II: The Real Time Kernel (With CD-ROM)
MicroC/OS II Second Edition describes the design and implementation of the MicroC/OS-II real-time operating system (RTOS). In addition to its value as a reference to the kernel, it is an extremely detailed and highly readable design study particularly useful to the embedded systems student. While documenting the design and implementation of the...
UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
Inductive Inference for Large Scale Text Classification: Kernel Approaches and Techniques (Studies in Computational Intelligence)
Inductive Inference for Large Scale Text Classification: Kernel Approaches and Techniques (Studies in Computational Intelligence)

Text classification is becoming a crucial task to analysts in different areas. In the last few decades, the production of textual documents in digital form has increased exponentially. Their applications range from web pages to scientific documents, including emails, news and books. Despite the widespread use of digital texts, handling them is...

SELinux System Administration
SELinux System Administration

NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security...

Mastering FreeBSD and OpenBSD Security
Mastering FreeBSD and OpenBSD Security

FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy