|
|
|
|
|
UNIX Unleashed: System Administrator's EditionMaster the Unix file systems and syntax as both a user and administrator with Unix Unleashed: System Administrator's Edition. Become an expert on the Unix system's organization, file storage, and essential commands. This large, comprehensive volume provides you with the fundamentals of system administration, including how to get around the... | | | | DB2(R) Universal Database V8 Handbook for Windows, UNIX, and LinuxIBM DB2 Universal Database V8 offers breakthrough availability, manageability, performance, and scalability. Now, straight from IBM, there's a start-to-finish guide to DB2 Universal Database V8 administration and development for UNIX, Linux, and Windows.
This definitive reference covers every aspect of deploying and managing DB2 Universal... |
|
A Guide to Kernel Exploitation: Attacking the Core
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop... | | Spring Data
Want to make it easier to implement data access with your Spring-powered applications? Then this is the book you need. A complete tutorial to Spring Data, it makes learning easier with lots of code examples and clear instructions.
Overview
-
Implement JPA repositories with lesser code
- ...
| | Pro OpenSSHSSH, or Secure Shell, is the de facto standard among users and administrators who wish to establish secure communication between disparate networks. This book is authored by a Fortune 100 system administrator, who will provide you with a highly practical reference for configuring and deploying OpenSSH in your own environment.
Some of the... |
|
Fedora Core 7 & Red Hat Enterprise Linux: The Complete ReferenceThe Red Hat Linux and Fedora distributions have become one of the major Linux distributions, bringing to the PC all the power and flexibility of a Unix workstation as well as a complete set of Internet applications and a fully functional desktop interface. This book is designed not only to be a complete reference on Linux, but also to provide clear... | | Sams Teach Yourself Linux Security Basics in 24 HoursThis book is an introductory, tutorial-style text designed to give the reader a strong foundational knowledge of securing a Linux system. This book teaches the reader how to securely install and run Linux as it comes shipped from most Linux distributors. Most other titles in this market focus on the use of tools and software not normally included... | | C: An advanced introduction (Principles of computer science series)The C programming language was designed and implemented by Dennis Ritchie in 1972 at AT&T Bell Laboratories. Despite a late start, the popularity of C has been increasing rapidly. C compilers are now available for many machines and the list of available C compilers is growing fast [Halfant 1983, Kern 1983, Phraner 1983]. Two important reasons... |
|
|
Result Page: 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 |