|
|
|
|
|
Debian 7: System Administration Best Practices
Learn the best ways to install and administer a Debian Linux distribution
Overview
-
An in-depth look at Debian administration subjects
-
Discover what distinguishes Debian from other Linux distributions
-
Learn how to install, maintain, and administer Debian Linux
... | | Virtual Private Networks, 2nd Edition (O'Reilly Nutshell)This book explains how to build a Virtual Private Network (VPN), a collection of technologies that creates secure collections or "tunnels" over regular Internet lines. It discusses costs, configuration, and how to install and use technologies that are available for Windows NT and UNIX, such as PPTP and L2TP, Altavista... | | Beginning Unix (Programmer to Programmer)The Unix operating system is the basis for some of today's most-used platforms, including Mac OS® X and Linux®. This book covers Unix basics for these as well as the more commonly recognized Sun Solaris and BSD.
First, you will learn Unix terminology, core concepts, methodology, and how to log in... |
|
Learning Unix for Mac OS X PantherThis compact book provides a user-friendly tour for the uninitiated of the Mac Unix base. You can safely explore Terminal and familiarize yourself with the command line, learning as you go about the hundreds of Unix programs that come with your Mac. You'll begin to understand the power and flexibility of Unix. And if Unix isn't new to you, you'll... | | Mac OS X in a NutshellMac OS X is a stunning technical achievement--a virtually crash-proof Unix core paired with the sleek Aqua interface, bringing style, usability, and stability to a new level. It has almost everything that Macintosh fans have been waiting for: protected memory, crash resistance, and the ability to run the 18,000 existing Mac programs and an... | | Linux in a Nutshell (In a Nutshell (O'Reilly))
Linux in a Nutshell covers the core commands available on common Linux distributions. This isn't a scaled-down quick reference of common commands, but a complete reference containing all user, programming, administration, and networking commands.Contents include:
-
Commands with complete lists of...
|
|
Special Ops: Host and Network Security for Microsoft, UNIX, and OracleAs “techies,” we embrace the ability to understand the technology behind how and why things work, to a point beyond most other people’s interest. Usually what drives our interest is curiosity, a curiosity very similar to that which we experienced in childhood.
Curiosity comes in different shapes and sizes... | | Essential SourceSafeThis training aid and reference manual assists casual users, software developers, and SourceSafe administrators in installing, configuring, and maintaining SourceSafe in a variety of development environments. A broad spectrum of topics are covered, from the basics of installation and maintenance, to more advanced features such as reporting, to ... | | Linux Security: Craig Hunt Linux LibraryAuthoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators
This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the... |
|
|
Result Page: 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 |