|
|
|
|
|
|
Virtual Private Networks, 2nd Edition (O'Reilly Nutshell)This book explains how to build a Virtual Private Network (VPN), a collection of technologies that creates secure collections or "tunnels" over regular Internet lines. It discusses costs, configuration, and how to install and use technologies that are available for Windows NT and UNIX, such as PPTP and L2TP, Altavista... | | Beginning Unix (Programmer to Programmer)The Unix operating system is the basis for some of today's most-used platforms, including Mac OS® X and Linux®. This book covers Unix basics for these as well as the more commonly recognized Sun Solaris and BSD.
First, you will learn Unix terminology, core concepts, methodology, and how to log in... | | Learning Unix for Mac OS X PantherThis compact book provides a user-friendly tour for the uninitiated of the Mac Unix base. You can safely explore Terminal and familiarize yourself with the command line, learning as you go about the hundreds of Unix programs that come with your Mac. You'll begin to understand the power and flexibility of Unix. And if Unix isn't new to you, you'll... |
|
Oracle Enterprise Manager 12c Command-Line Interface
Oracle Enterprise Manager 12c Command-Line Interface shows how to use Enterprise Manager’s powerful scripting language to automate your database administration work and save time by scripting routine tasks, and then executing those scripts across collections of databases and instances in your environment. This book is chock... | | Linux in a Nutshell (In a Nutshell (O'Reilly))
Linux in a Nutshell covers the core commands available on common Linux distributions. This isn't a scaled-down quick reference of common commands, but a complete reference containing all user, programming, administration, and networking commands.Contents include:
-
Commands with complete lists of...
| | Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... |
|
|
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 |