Linux network services

Xem 1-20 trên 31 kết quả Linux network services
  • RH253 - Red Hat Enterprise Linux Network Services and Security Administration below to capture the contents: Network Services and Security Administration, System Performance and Security, System Service Access Controls, Network Resource Access Controls, Organizing Networked Systems,...

    pdf272p thetam263 28-03-2016 7 1   Download

  • Tham khảo sách 'red hat linux networking and system administration', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf50p ptng13 16-05-2012 72 26   Download

  • Invite you to consult the document content "Advanced Linux Network Administration: Lab work for LPI 202" below to capture the contents: Send mail, Web Services, Network Client Management,... With the specialized technology your information, this is a useful reference.

    pdf95p thetam263 28-03-2016 8 1   Download

  • Send mail, Web Services, Network Client Management, Detailed Objectives, Networking Configuration,... As the main contents of the document "Advanced Linux Network Administration: Lab work for LPI 202". Invite you to consult. Hope content useful document serves the academic needs and research. 

    pdf121p thetam263 28-03-2016 14 1   Download

  • In the previous chapter, you learned about Linux processes. We discussed the init process, which is the grandparent of all other processes. We also discussed how to use init scripts to start and stop services on the system. In this chapter, we’re going to build upon this knowledge and go into depth about the Linux boot process. We’ll discuss the following topics: Managing the Linux Boot Process For your Linux+ exam, you need to have a sound understanding of how the Linux boot process works.

    pdf378p olicaxa1 07-09-2012 47 12   Download

  • In this part • Network Interface (naming, type ....) • Network Configuration Files • Interface control command and scripts • Basic routing using route command Network interface • The first Ethernet NIC is given the alias eth0, the second Ethernet NIC is given the alias eth1, and so on. • Loopback lo.

    pdf15p minhdau77 16-08-2012 48 11   Download

  • LINUX IS A MULTIUSER, multitasking operating system from the ground up, and in this regard the system administrator has flexibility — and responsibility — far beyond those of other operating systems. Now, Red Hat has employed innovations that extend these duties even for the experienced Linux user. In this chapter, we look at those requirements.

    pdf889p quanght_cntt 04-12-2012 35 11   Download

  • Kernel Concepts The two different types of Linux kernel are: A: Monolithic A monolithic kernel is one which has support for all hardware, network, and filesystem compiled into a single image file. B: Modular A modular kernel is one which has some drivers compiled as object files, which the kernel can load and remove on demand. Loadable modules are kept in /lib/modules. The advantage of a modular kernel is that it doesn’t always need to be recompiled when hardware is added or replaced on the system.

    pdf150p lehungk44f4 10-09-2012 38 10   Download

  • Fedora Core là một hệ điều hành đầy đủ dành cho máy để bàn hoặc máy Server với phần mềm có mã nguồn mở Vòng đời của Fedora Core Fedora Core là một hệ thống có tốc độ phát triển rất nhanh nó cho phép nhân viên kỹ thuật triển khai nhanh một hệ thống. Bản hướng dẫn này giúp bạn cài đặt Fedora Core trên máy để bàn, máy sách tay và server.

    pdf73p hoang3 03-11-2009 304 116   Download

  • Tham khảo sách 'red hat enterprise linux 5 administration - unleashed', công nghệ thông tin, hệ điều hành phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf618p soidamientrung 25-08-2010 178 89   Download

  • More complex networking services in Red Hat Linux require more advanced administration methods. While graphical tools such as Network Configuration (via the redhat-config-network command) are available to assist in configuring all aspects of Linux networking, the best way to learn networking is by practicing with the key command line utilities and associated configuration files.

    pdf54p mylinh 17-08-2009 206 71   Download

  • As Bill Lubanovic and I were putting the final touches on this book, I overheard a conversation between two coworkers in our Cisco lab discussing Linux. The senior networking guru of the two made an interesting remark. He said that despite all his knowledge, he felt incomplete as a professional because he had never learned Linux. A moment later he and the other gentleman turned to me and looked me square in the eyes. I smiled and went on working. That evening, our director of Information Technology made an offhand remark to me during a conference that struck me as unusual.

    pdf297p trung254 23-07-2012 120 36   Download

  • Mohammed Kabir is the founder and CEO of Evoknow, Inc. His company specializes in open-source solutions and customer relationship management software development. When he is not busy managing software projects or writing books, he enjoys traveling around the world. Kabir studied computer engineering at California State University, Sacramento. He is also the author of Red Hat Linux Server and Apache Server Bible. He can be reached at kabir@evoknow.com.

    pdf721p kyopro 12-09-2011 53 18   Download

  • Tham khảo sách 'supporting & maintaining a microsoft windows nt server 4.0 network', công nghệ thông tin, hệ điều hành phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf84p thuxuan 07-08-2009 111 8   Download

  • This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks....

    pdf649p shop_123 29-04-2013 38 6   Download

  • Building a linux vertual server system offers highly - available and scaluble solution for production services using specialized routing and load balancing tenique configured through the PIRANHA.Since the first desktop computers emerged in the late 1970s and early 1980s, the power, speed and storage capacity has increased radically, especially in recent years. Indeed, the whole approach to computing and database management has shifted...

    pdf72p hanguyen 27-06-2009 525 176   Download

  • LINUX: Rute Users Tutorial and Exposition is the only Linux sysadmin's guide proven by 50,000+ Web users. It presents in-depth coverage of all aspects of system administration: user management, security, networking, Internet services, packages, config files, shell scripting, and more. It also contains detailed cross-references to LPI and RHCE certification topics, making it invaluable for exam preparation.

    pdf660p trung254 22-07-2012 90 26   Download

  • SUSE Linux is gaining popularity everywhere, and you'll soon see why. This friendly guide will help you install and configure the newest version, then help you work with digital media, build a network, get acquainted with Firefox (the super-secure browser that has everybody excited),explore Skype and Linphone Internet phone services, and much more!

    pdf386p bluesky_12 19-12-2012 31 9   Download

  • Ensure that systems are kept up-to-date with patches. As a result of security testing, it may become necessary to patch many systems. Applying patches in a timely manner can sharply reduce the vulnerability exposure of an organization. Organizations should centralize their patching efforts so as to ensure that more systems are patched as quickly as possible and immediately tested. Look at the big picture. The results of routine testing may indicate that an organization should readdress its systems security architecture.

    pdf272p cao_can 02-01-2013 16 3   Download

  • Security vendors strive to provide new and innovative products and services that allow customers to rapidly deploy and provide optimal protection against today's continually evolving and sophisticated threat ecosystem. Despite these ongoing efforts, traditional security solutions and approaches by themselves sometimes fall short in protecting enterprises against many of today's complex and zero-day attack forms. The reality is that due to existing unknown security gaps and vulnerabilities, current enterprise infrastructure security is not 100%.

    pdf22p khongmuonnghe 04-01-2013 33 3   Download

Đồng bộ tài khoản