本書以目前市場佔有率較廣的Red Hat公司Red Hat Enterprise Linux 6.4為平臺,對Linux的網絡服務進行了講解。全書根據網絡工程實際工作過程所需要的知識和技能抽象出14個教學項目:安裝Red Hat Enterprise Linux、Red Hat Enterprise Linux文件和磁盤管理、配置Linux基礎網絡、遠程登錄管理、架設FTP服務器、架設DHCP服務
本書共分為兩部分:Windows Server服務器配置與管理、Linux服務器配置與管理。其中,Windows Server採用Windows Server 2008 R2環境,介紹如何搭建Windows Server 2008 R2服務器以及Hyper―V服務器、活動目錄、DNS、DHCP、Web、FTP服務器的安裝、配置與管理;Linux採用Red Hat Enterprise Linux
This study examines ASEAN's role in the establishment of regional security. Angela Pennisi di Floristella posits a more nuanced and flexible concept of regional security partnership to capture the fea
This major three-part work is the definitive history of Irish Republican prisoners detained in England's maximum security prison 'dispersal system' during the entire period of the 'Troubles.' A resurg
In the winter of 1942–3, photographer Jack Delano was assigned by the Office of War Information (successor of the Farm Security Administration) to tell the story of the American railroad system and it
Although a considerable number of books have appeared recently on the future of states facing severe security challenges from non-state actors, there are few treatments of the fate of the state system
Revised for the 2015 update to the Linux+/LPIC-1 objectives, this value-packed exam guide covers the leading vendor-neutral credential for Linux and comes with a virtual machine configured for
Small steps can create big changes in your community’s food quality and food security, helping to get more healthy food to more people and support a better food system. Ali Berlow shows you dozens of
Linux Web Server Development will teach you how to build a Linux Web server from scratch using Free/Open Source programs. The only requirement is a computer with an Internet connection. You will learn
Corporate security is a form of regulation that involves centralized management of access control, physical security, personnel security, and information security inside an organization. For all the r
The institutional procedures for the UN’s decision-making on issues of global peace and security, first and foremost the Security Council (SC), were conceived with the objective of enabling a swift bu
Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+.Principles of Comput
本書以Red Hat Enterprise Linux為依託,介紹了Linux的安裝過程,重點闡述了各種伺服器的配置和管理方法。全書共有21章,內容包括Linux的安裝與配置,DNS服務、WWW服務、FTP服務、E-Mail服務、流媒體服務、網路時間服務、DHCP服務、Samba服務、NFS服務、Nginx服務、代理服務、SSH服務、VPN服務、目錄服務、Telnet和虛擬終端服務、網路資料庫Po
《Red Hat Enterprise Linux 7.0系統管理》以Red Hat Enterprise Linux 7.0為藍本,分15章介紹了RHEL 7.0的基本使用和系統管理。主要包括自由軟件和開源軟件的基礎知識、Linux的基礎知識、RHEL7.0的安裝、軟件包管理、用戶管理、磁盤管理和LV
In the twenty-first century, the United States confronts an international system of great complexity and shifting security challenges. Among these challenges are those posed by nuclear weapons. Instea
本書以Red Hat Enterprise Linux 6.3 Server為例,通過11個學習情境(包括41個子情境),介紹了Linux桌面應用、伺服器管理維護、嵌入式開發等工作中的應用技能,包括Linux作業系統的基本概念、安裝和設置方法、圖形化使用者介面應用、字元介面和Shell命令基本應用、用戶和組群管理、檔案系統和檔管理、進程管理及系統監視、Linux應用程式、網路配置、伺服器配置、Sh
This book examines a fundamental contradiction at the heart of Japan’s security strategy. In recent years, Japan has, with US support, developed a missile defence system, which the Japanese argue is e
This book presents a rich collection of Betty A. Reardon’s writing on gender studies, sexism and the war system, and human security from a feminist perspective. Betty A. Reardon is a pioneer of gender
Raspberry Pi is Linux, but it's a unique flavor of Linux, specifically for the ARM-based Pi. Raspberry Pi Software Reference guides you through the boot process, including options for tweaking HDMI, m
滲透測試業務整體流程理解 諮詢業務經驗、技巧及專案經理必備知識 Kali Linux Live CD與BackTrack工具分析簡易方法 利用Kali Linux與BackTrack的診斷業務高效強化方案 攻擊者角度的技術技巧與實際管理業務中的有效應對方案 利用BackTrack進行滲透測試的基礎知識 Kali Linux與BackTrack的比較 利用Kali Linux進行滲透測試深化診斷的方
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former N
Written by leading IT security educators, this fully updated lab manual supplements Principles of Computer Security, Fourth EditionPrinciples of Computer Security Lab Manual, Fourth Edition contains m