Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+.Principles of Comput
本書以Red Hat Enterprise Linux為依託,介紹了Linux的安裝過程,重點闡述了各種伺服器的配置和管理方法。全書共有21章,內容包括Linux的安裝與配置,DNS服務、WWW服務、FTP服務、E-Mail服務、流媒體服務、網路時間服務、DHCP服務、Samba服務、NFS服務、Nginx服務、代理服務、SSH服務、VPN服務、目錄服務、Telnet和虛擬終端服務、網路資料庫Po
《Red Hat Enterprise Linux 7.0系統管理》以Red Hat Enterprise Linux 7.0為藍本,分15章介紹了RHEL 7.0的基本使用和系統管理。主要包括自由軟件和開源軟件的基礎知識、Linux的基礎知識、RHEL7.0的安裝、軟件包管理、用戶管理、磁盤管理和LV
In the twenty-first century, the United States confronts an international system of great complexity and shifting security challenges. Among these challenges are those posed by nuclear weapons. Instea
?The institutional and legal status of the WTO, with its integrated dispute settlement system, provides a framework for certainty, security and stability for trade as well as a coherent system to prot
本書以Red Hat Enterprise Linux 6.3 Server為例,通過11個學習情境(包括41個子情境),介紹了Linux桌面應用、伺服器管理維護、嵌入式開發等工作中的應用技能,包括Linux作業系統的基本概念、安裝和設置方法、圖形化使用者介面應用、字元介面和Shell命令基本應用、用戶和組群管理、檔案系統和檔管理、進程管理及系統監視、Linux應用程式、網路配置、伺服器配置、Sh
This book examines a fundamental contradiction at the heart of Japan’s security strategy. In recent years, Japan has, with US support, developed a missile defence system, which the Japanese argue is e
This book presents a rich collection of Betty A. Reardon’s writing on gender studies, sexism and the war system, and human security from a feminist perspective. Betty A. Reardon is a pioneer of gender
Raspberry Pi is Linux, but it's a unique flavor of Linux, specifically for the ARM-based Pi. Raspberry Pi Software Reference guides you through the boot process, including options for tweaking HDMI, m
滲透測試業務整體流程理解 諮詢業務經驗、技巧及專案經理必備知識 Kali Linux Live CD與BackTrack工具分析簡易方法 利用Kali Linux與BackTrack的診斷業務高效強化方案 攻擊者角度的技術技巧與實際管理業務中的有效應對方案 利用BackTrack進行滲透測試的基礎知識 Kali Linux與BackTrack的比較 利用Kali Linux進行滲透測試深化診斷的方
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former N
Our industrialized food system is failing us, and as individuals we must take more responsibility for our own health and food security. Leaf crops produce more nutrients per square foot of growing spa
本書從開源科技的發展講起,由淺入深,詳細講述新一代大型主機ELS(Enterprise Linux Server)應用情景、ELS主機架構、z/VM與Linux for z的優勢、z/VM的基本原理和常用指令、z/VM系統操作、Linux for z的基本操作、z/VM上安裝運行Linux for z的方法、控制程式(CP)的基本命令操作、使用工具集CPFMTXA的方法、會話監視系統(CMS)基本
As embedded systems grow more complex, developers are integrating full-fledged operating systems into them. Linux is an especially attractive option: it supports virtually all hardware architectures a
Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. A good security assessment is a fact-findin
本書基於“專案導向、任務驅動”的專案化教學方式編寫而成,體現“基於工作過程”,“教、學、做”一體化的教學理念。 本書以Red Hat Enterprise Linux 6.4為平臺,對Linux網路作業系統的應用進行了詳細講解。內容劃分為12個教學專案,具體內容包括:安裝Red Hat Enterprise Linux 6.4、使用Linux常用命令、管理Linux用戶和組、管理Linux
A task-oriented look at Linux Mint, using actual real-world examples to stimulate learning. Each topic is presented in an easy-to-follow order, with hands-on activities to reinforce the content. If yo
本書從實用角度出發,對Red Hat Enterprise Linux 6平臺下的系統管理及網路服務做了全面、系統的介紹。全書分為三篇,共28章,內容涵蓋了Linux系統概述、圖形桌面管理、使用者和使用者組管理、磁片管理、檔和目錄管理、終端常用命令、系統監測與維護、常用應用軟體、網路基礎、DNS服務的配置與管理、WWW服務的配置與管理、LDAP服務的配置與管理、VPN服務的配置與管理、Webmin