intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Linux

Xem 1-20 trên 3720 kết quả Linux
  • Phần 1 của cuốn sách "Quản trị hệ thống Linux" cung cấp cho bạn đọc những nội dung gồm: Chương 1 - Bắt đầu với hệ thống Linux, trong đó giới thiệu một số vấn đề cơ bản trong quản trị hệ thống Linux như quá trình khởi động và kết thúc hệ thống, vẫn để phân quyền trong Unix, quản lý người sử dụng. Chương II - Quản lý tài nguyên, đề cập đến các vấn đề quản lý việc sử dụng tài nguyên của hệ thống như máy in, các thiết bị lưu trữ, các tiến trình. Đồng thời cũng giới thiệu các chương trình lập lịch để thực hiện tự động hóa việc quản trị hệ thống.

    pdf107p khuynhlinhnguyet1009 05-04-2024 2 1   Download

  • Phần 2 của cuốn sách "Quản trị hệ thống Linux" cung cấp cho bạn đọc những nội dung gồm: Chương III - Quản lý cấu hình mạng, giới thiệu các vấn đề cơ bản trong việc lập cấu hình cho mạng máy tính sử dụng Linux. Chương IV - Quản lý dịch vụ mạng, đề cập đến việc sử dụng, thiết lập và quản lý các dịch vụ mạng được cung cấp trong môi trường Linux. Chương V - Khai thác Shell và Kernel, giới thiệu về các trình thông dịch lệnh (shell) của Linux và việc lập trình trên shell.

    pdf153p khuynhlinhnguyet1009 05-04-2024 3 1   Download

  • Part 2 book "Networking - The complete reference" by author Bobbi Sandberg includes content: TCP/IP, other TCP/IP protocols; the domain name system; internet services, windows chapter 18 active directory; linux; unix; other network operating systems and networking in the cloud, network clients; network security basics; wireless security; overview of network administration; network management and troubleshooting tools; backing up.

    pdf426p muasambanhan10 11-04-2024 2 0   Download

  • Lecture "C Programming introduction: Week 1 - Setting up environment" presents the following main contents: Practice C programming on the UNIX (LINUX) environment; Method of writing and executing simple programs in C language; Basic syntax; Use functions in standard libraries. We invite you to consult!

    pdf13p gaupanda022 03-04-2024 2 0   Download

  • Bài giảng "C Programming introduction: Tuần 1 - Thiết lập môi trường" trình bày những nội dung chính sau đây: Thực hành lập trình C trên môi trường UNIX (LINUX); Phương pháp viết và thực thi các chương trình đơn giản bằng ngôn ngữ C; Cú pháp cơ bản; Sử dụng các hàm trong các thư viện chuẩn. Mời các bạn cùng tham khảo!

    pdf26p gaupanda022 03-04-2024 3 0   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 1 includes contents: Chapter 1 linux security overview; chapter 2 proactive measures and recovering from a break-in; chapter 3 mapping your machine and network getting in from the outside; chapter 4 social engineering, trojans, and other hacker trickery; chapter 5 physical attacks; chapter 6 attacking over the network; chapter 7 abusing the network itself.

    pdf268p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 2 includes contents: Chapter 8 elevating user privileges; chapter 9 password cracking; chapter 10 how hackers maintain access; chapter 11 mail and ftp security; chapter 12 web servers and dynamic content; chapter 13 access control and firewalls; appendixe a keeping your programs current; appendixe b turning off unneeded services; appendixe c online resources; appendixe d case studies.

    pdf316p longtimenosee05 31-03-2024 1 0   Download

  • The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET Server (code named Whistler), and IIS 5--plus a whole lot more!

    pdf260p longtimenosee05 31-03-2024 0 0   Download

  • This second edition of Hacking: The Art of Exploitation makes the world of hacking more accessible by providing the complete picture—from programming to machine code to exploitation. In addition, this edition features a bootable LiveCD based on Ubuntu Linux that can be used in any computer with an x86 processor, without modifying the computer’s existing OS. Ebook Hacking: the art of exploitation (2nd edition): Part 2 includes contents: 0x500: Shellcode, 0x600: Countermeasures, 0x700: Cryptology, 0x800: Conclusion.

    pdf198p longtimenosee05 31-03-2024 1 0   Download

  • Ebook "UNIX & Linux forensic analysis DVD toolkit" includes contents: Chapter 1: introduction; chapter 2: understanding unix; chapter 3: live response: data collection; chapter 4: initial triage and live response: data analysis; chapter 5: the hacking top 10; chapter 6: the /proc file system; chapter 7: file analysis; chapter 8: malware.

    pdf244p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Managing Linux systems with webmin: Part 1 includes contents: Introduction to Webmin, installing Webmin, securing your Webmin server, users and groups, disk and network filesystems, NFS file sharing, disk quotas, bootup and shutdown, scheduled commands, process management, software packages, network information service,…

    pdf393p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Managing Linux systems with webmin: Part 2 includes contents: Downloading email with fetchmail, managing majordomo mailing lists, the MySQL database, the PostgreSQL database, configuring sendmail, configuring qmail, analyzing log files,...

    pdf415p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Maximum linux security (2nd edition): Part 1 includes contents: Chapter 1 introducing Linux security, chapter 2 physical security, chapter 3 installation issues, chapter 4 basic Linux system administration, chapter 5 password attacks, chapter 6 data attacks, chapter 7 malicious code, chapter 8 sniffers and electronic eavesdropping, chapter 9 scanners, chapter 10 spoofing.

    pdf367p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Maximum linux security (2nd edition): Part 2 includes contents: Chapter 11 FTP security, chapter 12 mail security, chapter 13 TELNET and SSH security, chapter 14 web server security, chapter 15 secure web protocols, chapter 16 secure web development, chapter 17 file sharing security, chapter 18 denial-of-service attacks, chapter 19 Linux and firewalls, chapter 20 intrusion detection, chapter 21 logs and audit trails, chapter 22 disaster recovery.

    pdf528p longtimenosee05 31-03-2024 0 0   Download

  • In this part, the following content will be discussed: Appendix A: Glossary, Appendix B: Port numbers used by malicious trojan horse programs, Appendix C: Attack signatures, Appendix D: UNIX/Linux commands, Appendix E: Cisco PIX firewall commands, Appendix F: Discovering unauthorized access to your computer, Appendix G: U.S. Department of justice search and seizure guidelines.

    pdf199p longtimenosee05 31-03-2024 1 0   Download

  • Part 1 of ebook "Linux networking cookbook™" includes content: introduction to Linux networking; building a Linux gateway on a single-board computer; building a Linux firewall; building a Linux wireless access point; building a VoIP server with asterisk; routing with Linux; secure remote administration with SSH; using cross-platform remote graphical desktops;...

    pdf329p longtimenosee03 22-02-2024 3 3   Download

  • Continued part 1, part 2 of ebook "Linux networking cookbook™" includes content: single sign-on with samba for mixed Linux/Windows LANs; centralized network directory with OpenLDAP; network monitoring with nagios; network monitoring with MRTG; getting acquainted with IPv6; setting up hands-free network installations of new systems; Linux server administration via serial console; running a Linux dial-up server;...

    pdf311p longtimenosee03 22-02-2024 4 3   Download

  • Ebook Beginning ethical hacking with python: Part 1 includes contents: Chapter 1: legal side of hacking; chapter 2: hacking environment; chapter 3: installing virtual box; chapter 4: installing Kali Linux and other operating systems on VB; chapter 5: Linux terminal, basic commands; chapter 6: python 3 and ethical hacking; chapter 7: python environment; chapter 8: general syntaxes; chapter 9: variables, objects and values; chapter 10: conditionals; chapter 11: loops; chapter 12: regular expressions; chapter 13: exceptions, catching errors; chapter 14: functions.

    pdf127p haojiubujain010 14-12-2023 3 2   Download

  • Ebook Hacking for dummies Part 2 includes contents: Chapter 11: windows, chapter 12: Linux, chapter 13: novell netware, chapter 14: malware, chapter 15: messaging systems, chapter 16: web applications, chapter 17: reporting your results, chapter 18: plugging security holes, chapter 19: managing security changes, chapter 20: ten tips for getting upper management buy-in, chapter 21: ten deadly mistakes.

    pdf200p haojiubujain010 14-12-2023 2 1   Download

  • Ebook Gray hat hacking: The ethical hacker’s handbook (Third edition) - Part 1 Chapter 1 includes contents: ethics of ethical hacking, chapter 2 ethical hacking and the legal system, chapter 3 proper and ethical disclosure, chapter 4 social engineering attacks, chapter 5 physical penetration attacks, chapter 6 insider attacks, chapter 7 using the backtrack linux distribution, chapter 8 using metasploit, chapter 9 managing a penetration test,…

    pdf438p haojiubujain010 14-12-2023 2 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1436 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2