本書全面地介紹了基于Red Hat Fedora Core Linux的基礎應用與配置管理的內容。書中不僅包括Linux的安裝、系統配置、桌面管理、系統管理、Linux系統常用命令、Linux系統常用軟件、網絡配置與應用、文件系統配置、軟件包管理等基礎內容,還包括Samba服務的配置與應用、NFS服務的配置與應用、DHCP服務的配置與應用、DNS服務的配置與應用、Web服務的配置與應用、FTP服務
本書以Red Hat Linux 9.O為平臺,介紹了Linux網絡操作系統的基本操作和主要應用。全書共13章,主要涉及的內容有:Linux操作系統概述;Linux操作系統的安裝和配置;圖形界面下的基本操作:字符界面、vi編輯器及常用Shell命令的使用;用戶和組群的管理;文件系統管理;進程管理;OpenOffice.org中的文字處理、電子表格、文稿演示等。此外,對Linux平臺上的Samba、
本書以Red Hat Linux 9為介紹對象,重點介紹Linux操作系統的系統應用及管理、網絡服務器配置和程序開發等知識點。主要內容包括Linux系統應用及管理(Linux操作系統的安裝、X11環境、基本系統命令、用戶管理、軟件包及常用工具、文件系統與磁盤管理、系統管理及維護)、Linux網絡服務器配置(遠程登錄服務(Telnet、SSH、XDM,VNC)、FTP服務器(VSFTP、Proftp
本書在保留第一版核心內容的基礎上,更加注重基礎知識描述的準確與精練,并對比分析了Linux相對于DOS、Windows系統的特色,特別是針對Linux 出現的新技術、新特點的介紹進行了修訂與完善。全書共分為5個部分,分別介紹Red Hat Linux 9.0快速入門、基本操作、系統管理、網絡互聯和基礎編程等方面的內容。 為使讀者能夠快速熟悉和掌握Red Hat Linux,本書對基礎知識的講
Intended for power users, this guide identifies changes to the latest Windows operating system, describes the contents of the control panel, and explains the new administration tools and security enha
本書從Red Hat Linux 9的特點及基本配置入手,全面而詳細地介紹了Linux的系統配置、系統應用、系統管理、網絡管理、服務器配置、Shell編程、Linux下的編程、Linux防火墻、路由器等高級應用以及網絡安全設置等內容。 本書最大的特點是圖文并茂,實用性強。無論是簡單的inux命令和系統管理,還是較難懂的服務器配置,都采用通俗易懂的語言并配有圖文信息進行介紹,力求把復雜的問題簡
Modern appliances are complex machines with processors, operating systems, and application software. While there are books that will tell you how to run Linux on embedded hardware, and books on how to
對于初涉Linux世界的Windows用戶來說,選擇一個合適的Linux發行版本,選擇一種容易入門的配置和管理方法,選擇一本好和工具和一種好的實驗環境將會事半功倍。為加速讀者駕馭Linux的進度,本書根據對Linux服務器配置和管理的知識結構、專業技能等方面的要求,以Quick Enterprise Linux AS4為主要背景,使用虛擬機VMware搭建實驗環境,以網絡操作系統的實際應用為主線,
The security of the U.S. commercial aviation system has been a growing concern since the 1970's when the hijacking of aircraft became a serious problem. Over that period, federal aviation officials ha
本書系統介紹Linxu網絡技術中涉及的網絡操作命令、各種應用服務器的架設,通過詳解實例,使讀者很快掌握在Linux平臺下操作網絡服務的方法和技巧,并具備架設服務器的能力。 本書內容以Linux網絡技術的理論知識和實踐操作技能相結合,主要包括:Red Hat Linux桌面管理、常用配置命令、DHCP服務器、NFS服務器、DNS服務器、Samba服務器、WWW服務器、VSFTP服務器、Sendma
One of the most striking developments in recent international politics has been the significant increase in security cooperation among European Union states. Seth Jones argues that this increase in cooperation, in areas such as economic sanctions, weapons production and collaboration among military forces, has occurred because of the changing structure of the international and regional systems. Since the end of the Cold War, the international system has shifted from a bipolar to a unipolar structure characterized by United States dominance. This has caused EU states to cooperate in the security realm to increase their ability to project power abroad and to decrease reliance on the US. Furthermore, European leaders in the early 1990s adopted a 'binding' strategy to ensure long-term peace on the continent, suggesting that security cooperation is caused by a desire to preserve peace in Europe whilst building power abroad.
One of the most striking developments in recent international politics has been the significant increase in security cooperation among European Union states. Seth Jones argues that this increase in cooperation, in areas such as economic sanctions, weapons production and collaboration among military forces, has occurred because of the changing structure of the international and regional systems. Since the end of the Cold War, the international system has shifted from a bipolar to a unipolar structure characterized by United States dominance. This has caused EU states to cooperate in the security realm to increase their ability to project power abroad and to decrease reliance on the US. Furthermore, European leaders in the early 1990s adopted a 'binding' strategy to ensure long-term peace on the continent, suggesting that security cooperation is caused by a desire to preserve peace in Europe whilst building power abroad.
本書從實用角度出發,全面地介紹Red Hat Enterprise Linux4.0的系統配置與管理。主要內容包括安裝Red Hat Enterprise Linux系統、Linux管理工具、用戶賬戶管理、文件和目錄的權限設置、磁盤管理、Linux的文件和目錄共享、連接Internet、網絡服務配置與管理、Linux系統常用命令、系統性能監控及管理、Linux安全設置、Linux上的軟件包管理工具
This book offers a comprehensive guide to Novell’s Linux Enterprise Server, one of the most powerful Linux-based server solutions available today. The book guides readers through all of the most impor
In January 2004, the U.S. Department of Homeland Security inaugurated a new system for tracking foreign visitors at Ports of entry to the United States, the United States Visitor and Immigrant Status
This is the definitive work on Medicare's prospective payment system (PPS), which had its origins in the 1972 Social Security Amendments, was first applied to hospitals in 1983, and came to fruition
"Neither a "Starting Linux" book nor a dry reference manual, this book has a lot to offer to those coming to Fedora from other operating systems or distros."-- Behdad Esfahbod, Fedora developerThis bo
The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.IT professionals and IT students will fi
The fall of the Apartheid system in South Africa precipitated a reconfiguration of the country's arms industry related to a rethinking of issues of security by the new South African government. Henk (
There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure w
Information Security: Contemporary Cases addresses fundamental information security concepts in realistic scenarios. Through a series of substantive cases, different aspects of information security a
Outlines a system for achieving financial security and building wealth, discussing how to make the most out of automated financial transactions, including 401(k) plans, scheduled transfers, and early-
Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice. The software security best practices, or touchpoints
幾年, 隨著 X Window 圖形介面的更加完善, 使得 Linux 急速竄起。但想要更得心應手地掌握 Linux 系統, 如果只會在 X Window 圖形介面下用滑鼠東按按、西按按, 那是絕對不夠的。Linux 的眾多指令, 就如同工具箱中的鎚子、螺絲釘…等, 每個指令都有其獨特的功用。這些數量眾多且功能齊備的指令, 就是 Linux 的精華所在。只要學會這些指令, 就如同打通任督二脈一樣,
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the syst
Benvenuti describes the relationship between the Internet's TCP/IP implementation and the Linux Kernel so that programmers and advanced administrators can modify and fine-tune their network environmen
This book is for Web developers who want to learn how to use Linux and Apache for website hosting. The text covers installation of Linux and Apache 2.0 on a home or office machine for testing purpose
Bestselling author Ron Krutz once again demonstrates his ability to make difficult security topics approachable with this first in-depth look at SCADA (Supervisory Control And Data Acquisition) system
In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions
An essential, one-stop study tool, A Study Guide for the (ISC)2 Information System Security Engineering Professional (ISSEP) Exam provides an inclusive text containing all of the topics covered on t
This volume addresses the central theme of adjusting the United Nations system in light of, firstly, the broadening definition of security, secondly, a perceived shift from modernity to postmodernity;