intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Linux

Xem 1-20 trên 3728 kết quả Linux
  • Part 1 of ebook "Linux networking cookbook™" includes content: introduction to Linux networking; building a Linux gateway on a single-board computer; building a Linux firewall; building a Linux wireless access point; building a VoIP server with asterisk; routing with Linux; secure remote administration with SSH; using cross-platform remote graphical desktops;...

    pdf329p longtimenosee03 22-02-2024 2 2   Download

  • Continued part 1, part 2 of ebook "Linux networking cookbook™" includes content: single sign-on with samba for mixed Linux/Windows LANs; centralized network directory with OpenLDAP; network monitoring with nagios; network monitoring with MRTG; getting acquainted with IPv6; setting up hands-free network installations of new systems; Linux server administration via serial console; running a Linux dial-up server;...

    pdf311p longtimenosee03 22-02-2024 3 2   Download

  • Ebook Maximum linux security (2nd edition): Part 2 includes contents: Chapter 11 FTP security, chapter 12 mail security, chapter 13 TELNET and SSH security, chapter 14 web server security, chapter 15 secure web protocols, chapter 16 secure web development, chapter 17 file sharing security, chapter 18 denial-of-service attacks, chapter 19 Linux and firewalls, chapter 20 intrusion detection, chapter 21 logs and audit trails, chapter 22 disaster recovery.

    pdf528p longtimenosee02 03-01-2024 3 2   Download

  • Ebook Maximum linux security (2nd edition): Part 1 includes contents: Chapter 1 introducing Linux security, chapter 2 physical security, chapter 3 installation issues, chapter 4 basic Linux system administration, chapter 5 password attacks, chapter 6 data attacks, chapter 7 malicious code, chapter 8 sniffers and electronic eavesdropping, chapter 9 scanners, chapter 10 spoofing.

    pdf367p longtimenosee02 03-01-2024 2 1   Download

  • Ebook Managing Linux systems with webmin: Part 1 includes contents: Introduction to Webmin, installing Webmin, securing your Webmin server, users and groups, disk and network filesystems, NFS file sharing, disk quotas, bootup and shutdown, scheduled commands, process management, software packages, network information service,…

    pdf393p longtimenosee02 03-01-2024 2 0   Download

  • Ebook Managing Linux systems with webmin: Part 2 includes contents: Downloading email with fetchmail, managing majordomo mailing lists, the MySQL database, the PostgreSQL database, configuring sendmail, configuring qmail, analyzing log files,...

    pdf415p longtimenosee02 03-01-2024 1 0   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 1 includes contents: Chapter 1 linux security overview; chapter 2 proactive measures and recovering from a break-in; chapter 3 mapping your machine and network getting in from the outside; chapter 4 social engineering, trojans, and other hacker trickery; chapter 5 physical attacks; chapter 6 attacking over the network; chapter 7 abusing the network itself.

    pdf268p longtimenosee02 03-01-2024 1 1   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 2 includes contents: Chapter 8 elevating user privileges; chapter 9 password cracking; chapter 10 how hackers maintain access; chapter 11 mail and ftp security; chapter 12 web servers and dynamic content; chapter 13 access control and firewalls; appendixe a keeping your programs current; appendixe b turning off unneeded services; appendixe c online resources; appendixe d case studies.

    pdf316p longtimenosee02 03-01-2024 1 1   Download

  • The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET Server (code named Whistler), and IIS 5--plus a whole lot more!

    pdf260p longtimenosee02 03-01-2024 3 1   Download

  • Ebook The official CHFI study guide for computer hacking forensics investigators: Part 1 includes contents: Chapter 1: computer forensics in today’s world; chapter 2: systems, disks, and media; chapter 3: the computer investigation process; chapter 4: acquiring data, duplicating data, and recovering deleted files; chapter 5: Windows, Linux, and macintosh boot processes; chapter 6: Windows and Linux Forensics; chapter 7: steganography and application password crackers; chapter 8 computer-assisted attacks and crimes; chapter 9: investigating network traffic and investigating logs.

    pdf485p longtimenosee02 03-01-2024 2 1   Download

  • Ebook "UNIX & Linux forensic analysis DVD toolkit" includes contents: Chapter 1: introduction; chapter 2: understanding unix; chapter 3: live response: data collection; chapter 4: initial triage and live response: data analysis; chapter 5: the hacking top 10; chapter 6: the /proc file system; chapter 7: file analysis; chapter 8: malware.

    pdf244p longtimenosee02 03-01-2024 2 2   Download

  • In this part, the following content will be discussed: Appendix A: Glossary, Appendix B: Port numbers used by malicious trojan horse programs, Appendix C: Attack signatures, Appendix D: UNIX/Linux commands, Appendix E: Cisco PIX firewall commands, Appendix F: Discovering unauthorized access to your computer, Appendix G: U.S. Department of justice search and seizure guidelines.

    pdf199p longtimenosee02 03-01-2024 3 2   Download

  • Ebook Beginning ethical hacking with python: Part 1 includes contents: Chapter 1: legal side of hacking; chapter 2: hacking environment; chapter 3: installing virtual box; chapter 4: installing Kali Linux and other operating systems on VB; chapter 5: Linux terminal, basic commands; chapter 6: python 3 and ethical hacking; chapter 7: python environment; chapter 8: general syntaxes; chapter 9: variables, objects and values; chapter 10: conditionals; chapter 11: loops; chapter 12: regular expressions; chapter 13: exceptions, catching errors; chapter 14: functions.

    pdf127p haojiubujain010 14-12-2023 1 1   Download

  • Ebook Hacking for dummies Part 2 includes contents: Chapter 11: windows, chapter 12: Linux, chapter 13: novell netware, chapter 14: malware, chapter 15: messaging systems, chapter 16: web applications, chapter 17: reporting your results, chapter 18: plugging security holes, chapter 19: managing security changes, chapter 20: ten tips for getting upper management buy-in, chapter 21: ten deadly mistakes.

    pdf200p haojiubujain010 14-12-2023 1 0   Download

  • Ebook Gray hat hacking: The ethical hacker’s handbook (Third edition) - Part 1 Chapter 1 includes contents: ethics of ethical hacking, chapter 2 ethical hacking and the legal system, chapter 3 proper and ethical disclosure, chapter 4 social engineering attacks, chapter 5 physical penetration attacks, chapter 6 insider attacks, chapter 7 using the backtrack linux distribution, chapter 8 using metasploit, chapter 9 managing a penetration test,…

    pdf438p haojiubujain010 14-12-2023 1 0   Download

  • Ebook Hack attacks testing: How to conduct your own security audit - Part 1 includes contents: Chapter 1: Basic windows 2000/windows 2000 server installation and configuration, chapter 2 basic linux and solaris installations and configurations, chapter 3 mac OS X tiger box solutions, chapter 4 installing and configuring a testing target, chapter 5 cerberus internet scanner, chapter 6 cybercop scanner, chapter 7 internet scanner, chapter 8 security threat avoidance technology scanner, chapter 9 tigersuite 4.0.

    pdf309p haojiubujain010 14-12-2023 2 0   Download

  • Ebook Hack attacks testing: How to conduct your own security audit - Part 2 includes contents: Chapter 10 hping/2, chapter 11 nessus security scanner, chapter 12 Nmap, chapter 13 SAINT, chapter 14 SARA, chapter 15 comparative analysis, appendix A Linux/Unix Shortcuts and Commands.

    pdf252p haojiubujain010 14-12-2023 0 0   Download

  • Ebook Hacking exposed Linux: Linux security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 applying security, Chapter 2 applying interactive controls, Chapter 3 applying process controls, Chapter 4 local access control, Chapter 5 data networks security, Chapter 6 unconventional data attack vectors, chapter 7 voice over IP, chapter 8 wireless networks, chapter 9 input/output devices, chapter 10 RFID radio frequency identification, chapter 11 emanation attacks, chapter 12 trusted computing.

    pdf397p haojiubujain010 14-12-2023 1 0   Download

  • Ebook Hacking exposed Linux: Linux security secrets & solutions (Third edition) – Part 2 includes contents: Chapter 13 web application hacking, chapter 14 mail services, chapter 15 name services, chapter 16 reliability: static analysis of C code, chapter 17 security tweaks in the Linux Kernel, Appendixes A Management and Maintenance, Appendixes B Linux Forensics and Data Recovery, Appendixes C BSD.

    pdf248p haojiubujain010 14-12-2023 0 0   Download

  • Ebook UNIX and Linux system administration handbook (5th Edition): Part 1 includes contents: Chapter 1 where to start, chapter 2 booting and system management daemons, chapter 3 access control and rootly powers, chapter 4 process control, chapter 5 the file system, chapter 6 software installation and management, chapter 7 scripting and the shell, chapter 8 user management, chapter 9 cloud computing, chapter 10 logging, chapter 11 drivers and the Kernel, chapter 12 printing, chapter 13 TCP/IP networking, chapter 14 physical networking, chapter 15 IP routing, chapter 16 DNS: the domain name s...

    pdf961p haojiubujain010 14-12-2023 5 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1427 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2