Sebanyak 166 item atau buku ditemukan

Linux Patch Management

Keeping Linux Systems Up to Date

Provides information and guidance on managing Linus patches and updates.

Provides information and guidance on managing Linus patches and updates.

C for Linux 2

C言語とLinuxによるソケットプログラミングの極意を披露。クライアント・サーバプログラムを限りなくレベルアップする、サンプルプログラムと充実した解説を惜しげなくすべて掲載。

C言語とLinuxによるソケットプログラミングの極意を披露。クライアント・サーバプログラムを限りなくレベルアップする、サンプルプログラムと充実した解説を惜しげなくすべて ...

Point & Click Linux!

Your Guide to Trouble-free Computing

With step-by-step instructions and how-to videos, the reader will master everything from word processing to the Web and email, instant messaging to CD burning. This work also includes a CD: which features SimplyMEPIS Linux, and a DVD: which features the author explaining all the reader needs to know in bite-sized video tutorials.

This work also includes a CD: which features SimplyMEPIS Linux, and a DVD: which features the author explaining all the reader needs to know in bite-sized video tutorials.

SUSE Linux Toolbox

1000+ Commands for openSUSE and SUSE Linux Enterprise

In this handy, compact guide, you’ll explore a ton of powerful SUSE Linux commands while you learn to use SUSE Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running openSUSE and SUSE Linux Enterprise or any other Linux distribution.

Linux Shells by Example

CD-ROM contains: all source code and datafiles from the book.

CD-ROM contains: all source code and datafiles from the book. The complete guide to bash and tsch--PLUS grep, sed, and gawk! Learn Linux shell programming hands-on! Hundreds of classroom-proven examples throughout gawk in-depth!

Live Linux CDs

Building and Customizing Bootables

Provides information on creating live Linux CDs for gaming, security, presentations, multimedia, firewalls, and clustering.

Provides information on creating live Linux CDs for gaming, security, presentations, multimedia, firewalls, and clustering.

Linux and the Unix Philosophy

Exploring the "way of thinking that is Unix" this guide explains why Linux is a superior implementation of this highly capable operating system. Every chapter in the book has been updated for the fast-growing Linux market and the text balances an simple approach with technical detail.

Exploring the "way of thinking that is Unix" this guide explains why Linux is a superior implementation of this highly capable operating system.

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization’s critical infrastructure and information. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems.