|
|
|
|
|
|
FreeBSD Corporate Networker's Guide (With CD-ROM)"FreeBSD has been the secret weapon of serious network administrators for many years now and this book should provide a welcome introduction to those who have yet to discover it for themselves." --Jordan Hubbard, Co-founder, The FreeBSD Project
FreeBSD is the engine that runs on some... | | The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
OpenBSD's stateful packet filter, PF, is the heart of the OpenBSD firewall and a necessity for any admin working in a BSD environment. With a little effort and this book, you'll gain the insight needed to unlock PF's full potential.
This second edition of The Book of PF has been completely updated and... | | Secrets of Podcasting : Audio Blogging for the MassesIf you thought Internet radio was cool, wait 'til you experience podcasting--regular audio programs delivered via the Internet, which you can listen to when you want, where you want! Here to lead you into this brave, new world of mass audio blogging--and quite possibly change your listening habits forever--is a fun, fact-filled guide that shows you... |
|
Group Policy: Fundamentals, Security, and the Managed Desktop
The Ultimate Book on Group Policy
Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft... | | ASP.NET at Work: Building 10 Enterprise Projects with CDROMImprove your ASP.NET know-how by building 10 ready-to-use applications
ASP.NET provides developers with more functionality and flexibility to develop dynamic Web applications while at the same time writing less code. If you’re an ASP developer familiar with ASP.NET and Visual Studio .NET basics but unsure of how to connect all of these... | | Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnortSystem administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.
Linux Firewalls discusses the... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |