|
|
|
|
Unix UnleashedUnix Unleashed, Third Edition is written with the power user and system administrator in mind. This book will help the reader understand the nuances of the major Unix variants including SVR4, HP-UX, Solaris, AIX, BSD, IRIX, SunOS, and Linux. It will help the reader decide which Unix shell works best for their particular situation. Other topics such... | | The Shellcoder's Handbook: Discovering and Exploiting Security HolesUncover, exploit, and close security holes in any software or operating system
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This... | | Zabbix 1.8 Network Monitoring
Imagine you're celebrating the start of the weekend with Friday-night drinks with a few friends. And then suddenly your phone rings -- one of the servers you administer has gone down, and it needs to be back up before tomorrow morning. So you drag yourself back to the office, only to discover that some log files have been growing more... |
|
|
CISSP For Dummies (Computer/Tech)Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying... | | Red Hat Enterprise Linux 4 For DummiesInstall and use the leading Linux distribution today!
Here's how to set up, manage, and upgrade RHEL Desktop, WS, AS, and ES versions
If you need to get rolling with the newest generation of Red Hat Enterprise Linux in a hurry, you'll tip your hat to this friendly guide. It walks you through all the system administration and... | | The Shellcoder's Handbook: Discovering and Exploiting Security HolesThe black hats have kept up with security enhancements. Have you?
In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution... |
|
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |