When PracticalUnixSecurity was first published more than a decade ago it bec...When Practical Unix Security was first published more than a decade ago it became an instant classic. Crammed with information about host security it saved many a Unix system administrator from disaster. The second edition added much-needed Internet...more
When PracticalUNIXSecurity was first published in 1991 it became an instant ...When Practical UNIX Security was first published in 1991 it became an instant classic. Crammed with information about host security it saved many a UNIX system administrator and user from disaster.This second edition is a complete rewrite of the...more
Explains how to use the powerful and complex computer operating system discuss...Explains how to use the powerful and complex computer operating system discussing topics including installation security features packet filters encryption and system upgrades.more
Voice Over Internet Protocol Security has been designed to help the reader ful...Voice Over Internet Protocol Security has been designed to help the reader fully understand prepare for and mediate current security and QoS risks in today s complex and ever changing converged network environment and it will help you secure your...more
Newton s Telecom Dictionary is the bible of the telecommunications networking ...Newton s Telecom Dictionary is the bible of the telecommunications networking Internet the Cloud computer and information technology industries. It earned this reputation through its widespread adoption for training for management and sales...more
Helps you to safeguard your systems from all types of hackers hijackers and pr...Helps you to safeguard your systems from all types of hackers hijackers and predators. It provides you just-the-facts coverage of Linux UNIX and Solaris and helps you learn about advanced hacking techniques including buffer overflows password theory...more
Essential Computer Security provides the vast home user and small office compu...Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Tony Bradley is...more
DESCRIPTION Oracle Cloud Infrastructure (OCI) Security Handbook is the ultimat...DESCRIPTION Oracle Cloud Infrastructure (OCI) Security Handbook is the ultimate guide for safeguarding your mission-critical resources and data on OCI. In the world of a cloud-first approach it is essential to understand the security risks and how...more
Das Buch bietet eine zuverlässige Einstiegs- und Arbeitshilfe zur Text- und Q...Das Buch bietet eine zuverlässige Einstiegs- und Arbeitshilfe zur Text- und Quellkodeverarbeitung unter UNIX. Von den bewährten einheimischen Texteditoren ed und ex/vi über das klassische Textmusterverarbeitungssystem awk bis zum...more
Das Buch gibt eine Einführung in das Betriebssystem UNIX und seine unterschie...Das Buch gibt eine Einführung in das Betriebssystem UNIX und seine unterschiedlichen Varianten. Es wird dabei versucht den Leser mit der Terminologie des Systems vertraut zu machen und die Konzepte von UNIX vorzustellen. Viele in der...more
Auf der Grundlage von SCO UNIX ist hier ein Buch entstanden daß die Ins und O...Auf der Grundlage von SCO UNIX ist hier ein Buch entstanden daß die Ins und Outs der Systemverwaltung praxisnah und umfassend darstellt. Ob es um den Anschluß eines Terminals die Passwort- und Login-Kontrolle Report-Templates das Einrichten eines...more
UNIX time-sharing system: UNIX programmer s manual by Inc. Bell Telephone Labo...UNIX time-sharing system: UNIX programmer s manual by Inc. Bell Telephone Laboratoriesmore
UNIX Shell Programming Revised Edition shows UNIX users how to quickly and eas...UNIX Shell Programming Revised Edition shows UNIX users how to quickly and easily automate routine tasks by taking command of the UNIX shell. The shell makes light work of big tasks by transferring your simple instructions into powerful commands...more
*Essential reference and resource for practitioners and professionals who mana...*Essential reference and resource for practitioners and professionals who manage administer and design Internet security computer systems.more
Are you tired of losing track of login/usernames and passwords you must create...Are you tired of losing track of login/usernames and passwords you must create every time you visit a new website? Do you have sticky notes and scraps of paper scattered about your office and home computer space covered with these vital pieces of...more