Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Maximize the powerful capabilities of Red Hat Enterprise and Fedora Linux using this
comprehensive and up-to-date reference. You'll get full details on everything from installation and
configuration to system administration and server management of Enterprise Linux-with specifics
on the Linux Kernel 2.6. Thorough security coverage
...
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Pragmatic Version Control: Using Subversion (The Pragmatic Starter Kit Series) (2nd Edition)
Pragmatic Version Control: Using Subversion (The Pragmatic Starter Kit Series) (2nd Edition)
This book covers the theory behind version control and how it can help developers become more efficient, work better as a team, and keep on top of software complexity. Version control, done well, is your "undo" button for the project: nothing is final, and mistakes are easily rolled back.

This book describes Subversion 1.3, the...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Mastering VMware vSphere Storage
Mastering VMware vSphere Storage

Monitor and optimize the storage capabilities of your vSphere environment

About This Book

  • Design a storage solution for your vSphere environment
  • Troubleshoot vSphere Storage performance problems
  • An advanced guide to vSphere Storage performance along with best practices to...
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

trixbox CE 2.6
trixbox CE 2.6

The open source telephony platform trixbox CE is designed to implement a PBX system with features typically reserved for large enterprise businesses. trixBox allows an individual or organization to set up a telephone system with traditional telephone networks as well as internet-based telephony or VoIP. The task is time consuming and involves a...

Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
Linux Networking Cookbook
Linux Networking Cookbook
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn't mean...
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)

For use with all versions of Linux, including Ubuntu,™ Fedora,™ openSUSE,™ Red Hat,® Debian, Mandriva, Mint, and now OS X, too!

  • Get more done faster, and become a true Linux guru by mastering the command line!
  • ...
Result Page: 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy