Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Solaris Operating Environment Boot Camp
Solaris Operating Environment Boot Camp
The aim of this book is not to be just another "Guide for System Administrators," but rather a workshop manual that describes the tasks that need to be performed to build a complex network using the standard components delivered with the system.

We present the chapters in the same chronological order that the system administrator...

sendmail Desktop Reference
sendmail Desktop Reference
The sendmail program is a Mail Transport Agent (MTA). It accepts mail from Mail User Agents
(MUAs), mail users (humans), and other MTAs. It then delivers that mail to Mail Delivery Agents
(MDAs) on the local machine, or transports that mail to another MTA at another machine. The behavior
of sendmail is determined by its command line
...
Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

Red Hat Linux Security and Optimization
Red Hat Linux Security and Optimization
Your Official Red Hat® Linux® Guide to Security and Optimization Reviewed and approved by the experts at Red Hat, this comprehensive guide delivers the know-how you need to improve the performance of your Red Hat Linux system—and protect it from attacks and break-ins. Red Hat Linux expert Mohammed Kabir starts by...
Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

Managing Linux Systems with Webmin: System Administration and Module Development
Managing Linux Systems with Webmin: System Administration and Module Development

I am more than satisfied (actually impressed) with how much system administration is possible from Webmin. Comprehensive and convenient, just about any administration I've done is covered here, along with several areas that I've hesitated to explore.
--Karel Baloun, Sr. Software Engineer, Looksmart, Ltd.

Easy, browser-based...

Linux Apache Web Server Administration (Linux Library)
Linux Apache Web Server Administration (Linux Library)
Authoratative Answers to All Your Apache Questions—Now Updated to Cover Apache 2.0

Linux Apache Web Server Administration is the most complete, most advanced guide to the Apache Web server you’ll find anywhere. Written by a leading Apache expert—and now updated to
...
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services

Manage complex systems with ease and equip yourself for a new career. This book builds upon the skills you learned in Volumes 1 and 2 of this course and it depends upon the virtual network and virtual machine you created there. 

However, more experienced Linux users can begin with this volume and download an...

Linux System Administration, Second Edition (Craig Hunt Linux Library)
Linux System Administration, Second Edition (Craig Hunt Linux Library)
Authoritative Answers to All Your Linux Questions

You can rely on the fully updated second edition of Linux System Administration for answers to all your questions about installing, configuring, and administering Linux. Written by two Linux experts, this book teaches you, step-by-step, all the standard...

Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
The Definitive Guide to GCC, Second Edition
The Definitive Guide to GCC, Second Edition

The GNU Compiler Collection (GCC) offers a variety of compilers for different programming languages including C, C++, Java, Fortran, and Ada. The Definitive Guide to GCC, Second Edition has been revised to reflect the changes made in the most recent major GCC release, version 4. Providing in-depth information on GCC's enormous...

unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy