Home | Amazing | Today | Tags | Publishers | Years | Search 
Managing NFS and NIS, 2nd Edition
Managing NFS and NIS, 2nd Edition
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem.
Managing NFS and NIS, in a new edition based on Solaris 8,
...
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Wicked Cool Shell Scripts
Wicked Cool Shell Scripts

This cookbook of useful, customizable, and fun scripts gives you the tools to solve common Linux, Mac OS X and UNIX problems and personalize your computing environment.

The UNIX shell is the main scripting environment of every Linux, Mac OS X and UNIX system, whether a rescued laptop or a million-dollar mainframe. This cookbook of...

OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)

The OpenSSH suite of tools provides replacements for some of the common administrative tools used today such as telnet, FTP and the r-utilities; yet, these tools, considered insecure because they use clear-text communication over the network, are in still in common use. OpenSSH provides an encrypted channel between computers and remote servers...

Mastering UNIX Shell Scripting
Mastering UNIX Shell Scripting
Discover how to solve real-world system administration problems with this collection of end-to-end shell scripts

This comprehensive book takes you step-by-step through the process of writing shell scripts to solve real-world Unix problems and tasks. Each chapter begins by presenting a typical Unix challenge that you’ll most likely...

LPI Linux Certification in a Nutshell
LPI Linux Certification in a Nutshell

Objective certification of professionals is a time-honored tradition in many fields, including medicine and law. As small computer systems and networks proliferated over the last decade, Novell and Microsoft produced extremely popular certification products for their respective operating system and network technologies. These...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Practical Programming in Tcl and Tk (3rd Edition)
Practical Programming in Tcl and Tk (3rd Edition)

The Tcl/Tk best-seller, now completely updated for Tcl 8.2 and the Tcl Web Server!

Tcl/Tk 8.2 is the first scripting language that can handle enterprise-wide integration tasks that encompass Windows, Solaris, Macintosh, and other key platforms. Now, in this fully updated Third Edition, Tcl/Tk development team member and best-selling...

The Protocols (TCP/IP Illustrated, Volume 1)
The Protocols (TCP/IP Illustrated, Volume 1)

TCP/IP Illustrated is a complete and detailed guide to the entire TCP/IP protocol suite-with an important difference from other books on the subject. Rather than just describing what the RFCs say the protocol suite should do, this unique book uses a popular diagnostic tool so you may actually watch the protocols in action.By...

The JR Programming Language: Concurrent Programming in an Extended Java
The JR Programming Language: Concurrent Programming in an Extended Java
JR is a language for concurrent programming. It is an imperative language that provides explicit mechanisms for concurrency, communication, and synchronization. JR is an extension of the Java programming language with additional concurrency mechanisms based on those in the SR (Synchronizing Resources) programming language. It is suitable for...
Threads Primer: A Guide to Multithreaded Programming
Threads Primer: A Guide to Multithreaded Programming
Providing an overview of the Solaris and POSIX multithreading architectures, this book explains threads at a level that is completely accessible to programmers and system architects with no previous knowledge of threads. Covers the business and technical benefits of threaded programs, along with discussions of third party software that is...
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy