 |
|
|
|
 grep Pocket Referencegrep Pocket Reference is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket... |  |  |  |  Apache Server 2 Bible"Kabir has done it again! The Apache Server 2 Bible is an invaluable reference for both beginning and experienced administrators." —Elizabeth Zinkann, Sys Admin Magazine Contributing Editor and Review Columnist
- Configure Apache Server for a Linux/Unix or Win32 system
- Leverage Apache using SSI, CGI, PHP,
... |
|
 HackNotes(tm) Web Security Pocket ReferenceHackNotes Web Security Portable Reference describes the hacks and vulnerabilities threatening today's Web applications, then provides the defenses necessary to counteract and destroy threats of all manner. Determine whether a vulnerability exists, then attack and overcome application weaknesses through a series of tested and trusted... |  |  Python Web Development with Django
Using the simple, robust, Python-based Django framework, you can build powerful Web solutions with remarkably few lines of code. In Python Web Development with Django®, three experienced Django and Python developers cover all the techniques, tools, and concepts you need to make the most of Django 1.0, including all the major... |  |  Applied Security VisualizationAPPLIED SECURITY VISUALIZATION
“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a... |
|
|
 Creating Web Pages For DummiesShare photos and video online with friends and family
Take advantage of free tools, find out about Web design, and get interactive
Okay, you've taken that deep breath and are ready to jump into Web page creation. Before you get hopelessly tangled in all the possibilities, dive into this book! You'll start with free and easy tools,... |  |  Personal Firewalls for Administrators and Remote UsersPersonal firewalls explained—for remote corporate and home users.
In today's work environment, increasing numbers of mobile employees are using PCs, laptops, and handheld devices to connect to corporate servers. That's great for productivity, but it can also pose a security nightmare. Many of these... |  |  Hack Proofing Linux : A Guide to Open Source SecurityHack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.
First, we show you how to obtain... |
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |