Home | Amazing | Today | Tags | Publishers | Years | Search 
Linux Firewalls (3rd Edition)
Linux Firewalls (3rd Edition)
An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most...
Mac OS X Tiger for Unix Geeks
Mac OS X Tiger for Unix Geeks

If you're one of the many Unix developers drawn to Mac OS X for its Unix core, you'll find yourself in surprisingly unfamiliar territory. Unix and Mac OS X are kissing cousins, but there are enough pitfalls and minefields in going from one to another that even a Unix guru can stumble, and most guides to Mac OS X are written...

Red Hat Fedora Linux 3 Bible
Red Hat Fedora Linux 3 Bible
If Fedora Linux 3 can do it, you can do it too ...

Fedora Core 3 is Red Hat's most solid Fedora to date, including features destined for Red Hat Enterprise Linux 4. Use Fedora Core 3, with the latest Linux technology, to set up a personal desktop, small business server, or programming workstation. This book will teach you the basics of using...

The Linux Process Manager
The Linux Process Manager
The book assumes that the reader has some previous knowledge of operating system
structure and terminology. For anyone needing such a background I can recommend my
book Operating Systems (O’Gorman, 2000), which is a short readable introduction to the
topic. Operating Systems with Linux (O’Gorman, 2001) is much more
...
Rapid Mobile Enterprise Development for Symbian OS: An Introduction to OPL Application Design and Programming
Rapid Mobile Enterprise Development for Symbian OS: An Introduction to OPL Application Design and Programming
A guide to programming Symbian OS smartphones using OPL (The Open Programming Language): a simple to learn, open-source scripting language, ideal for fast-track development of enterprise applications.

This book provides a hands-on development environment for both the experienced and aspiring programmer, demonstrating the ease of use of Symbian...

HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

SUSE Linux 9 Bible
SUSE Linux 9 Bible
If SUSE Linux 9 can do it, you can do it, too ...

SUSE is the oldest commercial Linux distribution, favored in Europe and rapidly gaining popularity in the United States. Whether you're just discovering Linux or switching from another distribution, this comprehensive reference gives you not only the "how-to" information, but also...

Mac OS X Internals: A Systems Approach
Mac OS X Internals: A Systems Approach

Mac OS X was released in March 2001, but many components, such as Mach and BSD, are considerably older. Understanding the design, implementation, and workings of Mac OS X requires examination of several technologies that differ in their age, origins, philosophies, and roles.

Mac OS X Internals: A Systems...

Red Hat Linux Pocket Administrator
Red Hat Linux Pocket Administrator

Your On-the-Job Quick Reference

Carry essential Red Hat Linux administration and troubleshooting information right in your back pocket so you can handle a wide variety of tasks on-the-spot. This handy resource covers key management topics, with an emphasis on system administration, and gives you quick solutions in an easy-to-find format....

Hardening Windows, Second Edition
Hardening Windows, Second Edition

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...

Sams' Teach Yourself Linux in 24 Hours
Sams' Teach Yourself Linux in 24 Hours
While this guide won't make you an expert in Linux, it will explain how to get Red Hat Linux to work and how to do basic things with it. Organized into 24 lessons that take about an hour apiece, this book helps you ensure that your system can handle Linux and walks you through the process of installing Red Hat Linux and the Xfree86 windowing...
Ubuntu Unleashed
Ubuntu Unleashed
Incorporating an advanced approach to presenting information about Ubuntu, Ubuntu Unleashed aims to provide the best and latest information that intermediate to advanced Linux users need to know about installation, configuration, system administration, server operations, and security. Written by renowned open source...
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy