 |
|
 Installing and Administering Linux, Second EditionAn indispensable working resource for IT professionals moving to Linux-based network systems
More and more companies are now using Linux as their server operating system of choice. That’s because the costs are lower, there’s a greater amount of flexibility, and the code is much more reliable. As a result, there is a bigger demand... |  |  Canning Spam: You've Got Mail (That You Don't Want)We've all seen it — the e-mails that come to us from a sender we don't know and promise a frog that jumps across our screen, a low mortgage rate or a medical miracle pill. These e-mails are otherwise known as spam. Your inbox gets cluttered or worse, your computer is infected with a virus as you scratch your head, wondering how it ever... |  |  The Mac OS X Command Line: Unix Under the HoodWork More Quickly and Easily—and Learn Some New Tricks The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that aren't accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major... |
|
|
|
 Next Generation SSH2 Implementation: Securing Data in MotionThe most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book... |  |  Open Source E-mail Security (Kaleidoscope)In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping... |  |  |
|
| Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 |