Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Command Line Fundamentals: Learn to use the Unix command-line tools and Bash shell scripting
Command Line Fundamentals: Learn to use the Unix command-line tools and Bash shell scripting

Master shell basics and Unix tools and discover easy commands to perform complex tasks with speed

Key Features

  • Learn why the Bash shell is widely used on Linux and iOS
  • Explore advanced shell concepts, such as pipes and redirection
  • Understand how to use...
Modern C Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library
Modern C Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library

Discover how C's efficiency makes it a popular choice in a wide variety of applications and operating systems with special applicability to wearables, game programming, system level programming, embedded device/firmware programming and in Arduino and related electronics hobbies in this condensed code and syntax guide. This book...

Hands-On System Programming with Go: Build modern and concurrent applications for Unix and Linux systems using Golang
Hands-On System Programming with Go: Build modern and concurrent applications for Unix and Linux systems using Golang

Explore the fundamentals of systems programming starting from kernel API and filesystem to network programming and process communications

Key Features

  • Learn how to write Unix and Linux system code in Golang v1.12
  • Perform inter-process communication using pipes, message...
Linux: The Ultimate Step by Step Guide to Quickly and Easily Learning Linux
Linux: The Ultimate Step by Step Guide to Quickly and Easily Learning Linux
LINUX The Ultimate Step by Step Guide to Quickly and Easily Learning Linux This book is a precise yet comprehensive manual that includes all the tips, secrets and procedures that will help you learn Linux in a fun, fast and easy manner. It is a step-by-step guide that contains an in-depth analysis of contemporary and proven steps that will help...
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

System Programming with C and Unix
System Programming with C and Unix

Beginning computing students often finish the introduction to programming course without having had exposure to various system tools, without knowing how to optimize program performance and without understanding how programs interact with the larger computer system. 

...
Mac OS X Advanced Development Techniques
Mac OS X Advanced Development Techniques

Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else.

The book concentrates on teaching Cocoa development first, and then takes that knowledge and...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Professional Windows PowerShell (Programmer to Programmer)
Professional Windows PowerShell (Programmer to Programmer)
Professional Windows® PowerShell

Forget everything you know about the Windows command line because you're about to enter a whole new ballgame. Windows PowerShell provides a new environment for interactive exploration and administration of Windows machines that's different from and more consistent than what you've previously used on Windows...

Managing Security with Snort and IDS Tools
Managing Security with Snort and IDS Tools
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Free as in Freedom: Richard Stallman's Crusade for Free Software
Free as in Freedom: Richard Stallman's Crusade for Free Software
In 1984, Richard Stallman launched the GNU Project for the purpose of developing a complete UNIX-like operating system that would allow for free software use. What he developed was the GNU operating system. (GNU is a recursive acronym for "GNU's Not UNIX,'' and it is pronounced guh-NEW. Linux is a variant of the GNU operating system.) This...
Result Page: 69 68 67 66 65 64 63 62 61 60 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy