Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)

The OpenSSH suite of tools provides replacements for some of the common administrative tools used today such as telnet, FTP and the r-utilities; yet, these tools, considered insecure because they use clear-text communication over the network, are in still in common use. OpenSSH provides an encrypted channel between computers and remote servers...

InfoSec Career Hacking : Sell Your Skillz, Not Your Soul
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses...

Designing Storage Area Networks: A Practical Reference for Implementing Fibre Channel and IP SANs, Second Edition
Designing Storage Area Networks: A Practical Reference for Implementing Fibre Channel and IP SANs, Second Edition
Storage Area Networks (SANs) are now recognized as the preferred solution for fulfilling institutions' and enterprises' critical data-storage needs. Whether powered by Fibre Channel or TCP/IP and Gigabit Ethernet technology, SANs far exceed the capabilities of traditional storage access methods. SANs are quickly becoming the solution of choice...
IP Storage Networking: Straight to the Core
IP Storage Networking: Straight to the Core

"For those considering network storage consolidation, Straight to the Core walks the reader through both the how and why of IP and Ethernet's flexibility." Larry Boucher, CEO Alacritech

"A forward-looking work with excellent technical content. Orenstein knows his stuff. ...enough technical meat to satisfy the engineers and...

Cisco: A Beginner's Guide, Fourth Edition (Osborne Mcgraw Hill)
Cisco: A Beginner's Guide, Fourth Edition (Osborne Mcgraw Hill)
You generally can't pick up knowledge of Cisco products casually, the way you can learn about Microsoft Windows, Unix, and other products that are more generally accessible. For this reason, Cisco: A Beginner's Guide performs a valuable service. It introduces internetworking novices to the language and fact base that underlie routers,...
Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware: The Ultimate Guide to Network Security

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to...

Expert C++ Programming
Expert C++ Programming

C++ has ? ?come ? ?a ? ?long ? ?way ? ?and ? ?has ? ?now ? ?been ? ?adopted ? ?in ? ?several ? ?contexts. Its ? ?key ?strengths ? ?are ? ?its ?...

Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
Error Correction Coding: Mathematical Methods and Algorithms
Error Correction Coding: Mathematical Methods and Algorithms

Providing in-depth treatment of error correction

Error Correction Coding: Mathematical Methods and Algorithms, 2nd Edition provides a comprehensive introduction to classical and modern methods of error correction. The presentation provides a clear, practical introduction to using a...

CISSP Study Guide, Second Edition
CISSP Study Guide, Second Edition

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam's Common Body of Knowledge. The ten domains are covered completely and as...

Network Intrusion Detection (3rd Edition)
Network Intrusion Detection (3rd Edition)

Our goal in writing Network Intrusion Detection, Third Edition has been toempower you as an analyst. We believe that if you read this book cover to cover,and put the material into practice as you go, you will be ready to enter theworld of intrusion analysis. Many people have read our books, or attended ourlive class offered by SANS, and the...

Unix Unleashed (4th Edition)
Unix Unleashed (4th Edition)
Using Solaris 8 and Linux 7.1 as their reference flavors, Robin Anderson and Andy Johnston (as well as a slew of contributors) show how to be a system administrator--and get all sorts of other work done--in the fourth edition of Unix Unleashed. Significantly different from its predecessors, this book stays generally clear of very basic...
unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy