Home | Amazing | Today | Tags | Publishers | Years | Search 
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)

The OpenSSH suite of tools provides replacements for some of the common administrative tools used today such as telnet, FTP and the r-utilities; yet, these tools, considered insecure because they use clear-text communication over the network, are in still in common use. OpenSSH provides an encrypted channel between computers and remote servers...

Mastering UNIX Shell Scripting
Mastering UNIX Shell Scripting
Discover how to solve real-world system administration problems with this collection of end-to-end shell scripts

This comprehensive book takes you step-by-step through the process of writing shell scripts to solve real-world Unix problems and tasks. Each chapter begins by presenting a typical Unix challenge that you’ll most likely...

Sams Teach Yourself J2EE in 21 Days
Sams Teach Yourself J2EE in 21 Days

J2EE has become required knowledge for any serious Java developer, but learning this large and complex specification requires a substantial investment of time and energy. Sams Teach Yourself J2EE in 21 Days presents the enterprise Java architecture in accessible, easy-to-comprehend lessons, describing how each J2EE tool solves the challenges of...

Threads Primer: A Guide to Multithreaded Programming
Threads Primer: A Guide to Multithreaded Programming
Providing an overview of the Solaris and POSIX multithreading architectures, this book explains threads at a level that is completely accessible to programmers and system architects with no previous knowledge of threads. Covers the business and technical benefits of threaded programs, along with discussions of third party software that is...
The JR Programming Language: Concurrent Programming in an Extended Java
The JR Programming Language: Concurrent Programming in an Extended Java
JR is a language for concurrent programming. It is an imperative language that provides explicit mechanisms for concurrency, communication, and synchronization. JR is an extension of the Java programming language with additional concurrency mechanisms based on those in the SR (Synchronizing Resources) programming language. It is suitable for...
Red Hat Linux Administration: A Beginner's Guide
Red Hat Linux Administration: A Beginner's Guide

Essential Skills--Made Easy!

Authors Michael Turner and Steve Shah deliver sound instruction and valuable information in this structured learning tool. Valuable to systems and network administrators migrating from Windows to Linux, it is also perfect for novice users. Coverage includes all areas of administering the open-source operating...

LPI Linux Certification in a Nutshell
LPI Linux Certification in a Nutshell

Objective certification of professionals is a time-honored tradition in many fields, including medicine and law. As small computer systems and networks proliferated over the last decade, Novell and Microsoft produced extremely popular certification products for their respective operating system and network technologies. These...

The Protocols (TCP/IP Illustrated, Volume 1)
The Protocols (TCP/IP Illustrated, Volume 1)

TCP/IP Illustrated is a complete and detailed guide to the entire TCP/IP protocol suite-with an important difference from other books on the subject. Rather than just describing what the RFCs say the protocol suite should do, this unique book uses a popular diagnostic tool so you may actually watch the protocols in action.By...

Practical Programming in Tcl and Tk (3rd Edition)
Practical Programming in Tcl and Tk (3rd Edition)

The Tcl/Tk best-seller, now completely updated for Tcl 8.2 and the Tcl Web Server!

Tcl/Tk 8.2 is the first scripting language that can handle enterprise-wide integration tasks that encompass Windows, Solaris, Macintosh, and other key platforms. Now, in this fully updated Third Edition, Tcl/Tk development team member and best-selling...

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

IPv6 Essentials
IPv6 Essentials
IPv6, the next generation Internet Protocol, has been in the works since the early 90s when the rapid growth of the Internet threatened to exhaust existing IP addresses. Drawing on 20 years--operational experience with the existing protocol (IPv4), the new protocol offers scalability, increased security features, real-time traffic support, and...
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy