You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
More than 50 percent new and revised content for today's Linux environment gets you up and running in no time! Linux continues to be an excellent, low-cost alternative to expensive operating systems. Whether you're new to Linux or need a reliable update and reference, this is an excellent resource. Veteran bestselling author Christopher Negus provides a complete tutorial packed with major updates, revisions, and hands-on exercises so that you can confidently start using Linux today. Offers a complete restructure, complete with exercises, to make the book a better learning tool Places a strong focus on the Linux command line tools and can be used with all distributions and versions of Linux Features in-depth coverage of the tools that a power user and a Linux administrator need to get started This practical learning tool is ideal for anyone eager to set up a new Linux desktop system at home or curious to learn how to manage Linux server systems at work.
Despite its reputation as an operating system exclusively for professionals and hardcore computer hobbyists, Debian's open development cycle and strict quality control have helped it to gain popularity. With an installed base that’s growing annually by an estimated 25 percent, Debian clearly has its fair share of fans (not to mention the newsmaking Debian-based Linux distributions such as Knoppix, Ubuntu, and Xandros). Unlike other popular Linux distributions, the Debian GNU/Linux operating system favors text-based configuration over graphical user interfaces (GUIs). In The Debian System, author Martin Krafft, an experienced Debian developer, introduces the concept of the Debian operating ...
User identification and authentication are absolutely essential to modern security. Mechanics of User Identification and Authentication presents the general philosophy of user authentication and access control. Introducing key concepts, this text outlines the process of controlled access to resources through authentication, authorization, and accounting. It provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is presented with a specific authentication scenario.
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to...
كتاب تعرض فيه المؤلف لمجمل الفترة التي عاشها أصحاب رسول الله صلى الله عليه وسلم ودعوة الرسول صلى الله عليه وسلم أولا لهم ثم انطلاقهم بعد ذلك للدعوة وحبهم لهذا العمل، وهجرتهم، وجهادهم، وصبرهم، وإنفاقهم، وإيثارهم وغير ذلك من صفاتهم الحميدة من خلال روايات مس
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable ...
“As an author, editor, and publisher, I never paid much attention to the competition–except in a few cases. This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against.” –From the Foreword by Tim O’Reilly, founder of O’Reilly Media “This book is fun and functional as a desktop reference. If you use UNIX and Linux systems, you need this book in your short-reach library. It covers a bit of the systems’ history but doesn’t bloviate. It’s just straightfoward information delivered in colorful and memorable fashion.” –Jason A. Nunnelley “This is a comprehensive guide to the care and feeding of UNIX and Lin...
LIDS - a job well done. The micro-course contains information on the configuration of the LIDS system which enables the increase of the kernel reliability and introduces the mechanism of MAC access control. It also describes the method of administrating and configuring the LIDS mechanism with the use of the lidsadm and the lidsconf commands. Keywords: LIDS, lidsconf, lidnadm, TPE, TDE
This book is based on Red Hat® Enterprise Linux 5 (RHEL 5) and is intended for individuals who plan to take the new Red Hat® Certified Technician (RH202) and/or Red Hat® Certified Engineer (RH302) exams and pass them, want to use it as a quick on-the-job resource or like to learn RHEL from the beginning in an easy-to-understand way. The book has 31 chapters and facilitates readers to grasp concepts, understand implementation procedures, learn command syntax, configuration files and daemons involved, and comprehend troubleshooting. The chapters are divided into four areas: Linux Essentials, RHEL System Administration, RHEL Network and Security Administration, and RHEL Troubleshooting. 01. ...
Now covers Red Hat Linux! Written by Evi Nemeth, Garth Snyder, Scott Seebass, and Trent R. Hein with Adam Boggs, Rob Braun, Ned McClain, Dan Crawl, Lynda McGinley, and Todd Miller "This is not a nice, neat book for a nice, clean world. It's a nasty book for a nasty world. This is a book for the rest of us." –Eric Allman and Marshall Kirk McKusick "I am pleased to welcome Linux to the UNIX System Administration Handbook!" –Linus Torvalds, Transmeta "This book is most welcome!" –Dennis Ritchie, AT&T Bell Laboratories This new edition of the world's most comprehensive guide to UNIX system administration is an ideal tutorial for those new to administration and an invaluable reference for e...