Shingeki no Kyojin: Lost Girls | Eps 26 Cowboy Bebop | Rizzoli Isles 8.4
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Git in Practice
Git in Practice

Summary

Git in Practice is a collection of 66 tested techniques that will optimize the way you and your team manage your development projects. The book begins with a brief reminder of the core version control concepts you need when using Git and moves on to the high-value features you may not have explored...

Making it Big in Software: Get the Job. Work the Org. Become Great.
Making it Big in Software: Get the Job. Work the Org. Become Great.

The Software Insider’s Guide to Getting Hired and Getting to the Top!

 

Here’s all the information you need to jumpstart your software career: the best ways to get hired, move up, and blaze your way to the top! The software business...

Linux Administration Handbook (2nd Edition)
Linux Administration Handbook (2nd Edition)
As the deployment of Linux systems in production environments has accelerated, Linux administrators have longed for a book that addresses the challenges of this complex and exciting frontier. Linux Administration Handbook was written with this audience in mind. This book serves both as a valuable tutorial for the novice administrator and as a...
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
Learning Linux Binary Analysis
Learning Linux Binary Analysis

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning...

Programming in Objective-C, Third Edition (Developer's Library)
Programming in Objective-C, Third Edition (Developer's Library)

Dennis Ritchie at AT&T Bell Laboratories pioneered the C programming language in the early 1970s. However, this programming language did not begin to gain widespread popularity and support until the late 1970s.This was because, until that time, C compilers were not readily available for commercial use outside of Bell Laboratories....

Exploring SE for Android
Exploring SE for Android

Discover Security Enhancements (SE) for Android to build your own protected Android-based systems

About This Book

  • Learn the fundamental security models and motivations behind Linux, SELinux, and SE for Android.
  • Build and enable current security enhancements from the SE for Android project...
The Linux Kernel Module Programming Guide
The Linux Kernel Module Programming Guide
Linux Kernel Module Programming Guide is for people who want to write kernel modules. It takes a hands-on approach starting with writing a small "hello, world" program, and quickly moves from there. Far from a boring text on programming, Linux Kernel Module Programming Guide has a lively style that entertains while it educates. An...
Embedded Android: Porting, Extending, and Customizing
Embedded Android: Porting, Extending, and Customizing

Looking to port Android to other platforms such as embedded devices? This hands-on book shows you how Android works and how you can adapt it to fit your needs. You’ll delve into Android’s architecture and learn how to navigate its source code, modify its various components, and create your own version of Android for your...

Linux Kernel Networking: Implementation and Theory (Expert's Voice in Open Source)
Linux Kernel Networking: Implementation and Theory (Expert's Voice in Open Source)

Linux Kernel Networking takes you on a guided in-depth tour of the current Linux networking implementation and the theory behind it. Linux kernel networking is a complex topic, so the book won't burden you with topics not directly related to networking. This book will also not overload you with cumbersome line-by-line code...

Result Page: 24 23 22 21 20 19 18 17 16 15 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy