The security of the U.S. commercial aviation system has been a growing concern since the 1970's when the hijacking of aircraft became a serious problem. Over that period, federal aviation officials ha
本書系統介紹Linxu網絡技術中涉及的網絡操作命令、各種應用服務器的架設,通過詳解實例,使讀者很快掌握在Linux平臺下操作網絡服務的方法和技巧,并具備架設服務器的能力。 本書內容以Linux網絡技術的理論知識和實踐操作技能相結合,主要包括:Red Hat Linux桌面管理、常用配置命令、DHCP服務器、NFS服務器、DNS服務器、Samba服務器、WWW服務器、VSFTP服務器、Sendma
One of the most striking developments in recent international politics has been the significant increase in security cooperation among European Union states. Seth Jones argues that this increase in cooperation, in areas such as economic sanctions, weapons production and collaboration among military forces, has occurred because of the changing structure of the international and regional systems. Since the end of the Cold War, the international system has shifted from a bipolar to a unipolar structure characterized by United States dominance. This has caused EU states to cooperate in the security realm to increase their ability to project power abroad and to decrease reliance on the US. Furthermore, European leaders in the early 1990s adopted a 'binding' strategy to ensure long-term peace on the continent, suggesting that security cooperation is caused by a desire to preserve peace in Europe whilst building power abroad.
One of the most striking developments in recent international politics has been the significant increase in security cooperation among European Union states. Seth Jones argues that this increase in cooperation, in areas such as economic sanctions, weapons production and collaboration among military forces, has occurred because of the changing structure of the international and regional systems. Since the end of the Cold War, the international system has shifted from a bipolar to a unipolar structure characterized by United States dominance. This has caused EU states to cooperate in the security realm to increase their ability to project power abroad and to decrease reliance on the US. Furthermore, European leaders in the early 1990s adopted a 'binding' strategy to ensure long-term peace on the continent, suggesting that security cooperation is caused by a desire to preserve peace in Europe whilst building power abroad.
本書從實用角度出發,全面地介紹Red Hat Enterprise Linux4.0的系統配置與管理。主要內容包括安裝Red Hat Enterprise Linux系統、Linux管理工具、用戶賬戶管理、文件和目錄的權限設置、磁盤管理、Linux的文件和目錄共享、連接Internet、網絡服務配置與管理、Linux系統常用命令、系統性能監控及管理、Linux安全設置、Linux上的軟件包管理工具
This book offers a comprehensive guide to Novell’s Linux Enterprise Server, one of the most powerful Linux-based server solutions available today. The book guides readers through all of the most impor
In January 2004, the U.S. Department of Homeland Security inaugurated a new system for tracking foreign visitors at Ports of entry to the United States, the United States Visitor and Immigrant Status
This is the definitive work on Medicare's prospective payment system (PPS), which had its origins in the 1972 Social Security Amendments, was first applied to hospitals in 1983, and came to fruition
"Neither a "Starting Linux" book nor a dry reference manual, this book has a lot to offer to those coming to Fedora from other operating systems or distros."-- Behdad Esfahbod, Fedora developerThis bo
The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.IT professionals and IT students will fi
The fall of the Apartheid system in South Africa precipitated a reconfiguration of the country's arms industry related to a rethinking of issues of security by the new South African government. Henk (
There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure w
Information Security: Contemporary Cases addresses fundamental information security concepts in realistic scenarios. Through a series of substantive cases, different aspects of information security a
Outlines a system for achieving financial security and building wealth, discussing how to make the most out of automated financial transactions, including 401(k) plans, scheduled transfers, and early-
Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice. The software security best practices, or touchpoints
幾年, 隨著 X Window 圖形介面的更加完善, 使得 Linux 急速竄起。但想要更得心應手地掌握 Linux 系統, 如果只會在 X Window 圖形介面下用滑鼠東按按、西按按, 那是絕對不夠的。Linux 的眾多指令, 就如同工具箱中的鎚子、螺絲釘…等, 每個指令都有其獨特的功用。這些數量眾多且功能齊備的指令, 就是 Linux 的精華所在。只要學會這些指令, 就如同打通任督二脈一樣,
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the syst
Benvenuti describes the relationship between the Internet's TCP/IP implementation and the Linux Kernel so that programmers and advanced administrators can modify and fine-tune their network environmen
This book is for Web developers who want to learn how to use Linux and Apache for website hosting. The text covers installation of Linux and Apache 2.0 on a home or office machine for testing purpose
Bestselling author Ron Krutz once again demonstrates his ability to make difficult security topics approachable with this first in-depth look at SCADA (Supervisory Control And Data Acquisition) system
In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions
An essential, one-stop study tool, A Study Guide for the (ISC)2 Information System Security Engineering Professional (ISSEP) Exam provides an inclusive text containing all of the topics covered on t
This volume addresses the central theme of adjusting the United Nations system in light of, firstly, the broadening definition of security, secondly, a perceived shift from modernity to postmodernity;
Knoppix is a portable Linux distribution replete with hundreds of valuable programs and utilities -- a veritable Swiss Army knife in bootable CD form. It includes Linux software and desktop environme
Introduces Linux concepts to programmers who are familiar with other operating systems such as Windows XPProvides comprehensive coverage of the Pentium assembly language
The Linux Network Administrator's Guide, Third Edition dispenses all the practical advice you need to join a network. Along with some hardware considerations, this highly acclaimed guide takes an in-
Prepares users for the Red Hat Certified Technician (RHCT) Certification, Linux Professional Institute (LPI) Certification, and SAIR/GNU Linux Certified Administrator (LCA) Certification.
The Linux Cookbook, 2nd Edition is your guide to getting the most out of Linux. Organized by general task (such as working with text, managing files, and manipulating graphics), each section contains
In Linux Unwired, you'll learn the basics of wireless computing, from the reasons why you'd want to go wireless in the first place, to setting up your wireless network or accessing wireless data servi
Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastruc
This practical book on retirement planning answers important questions about savings and investment income, the Social Security system, and so much more. Each section covers a particular area of conc
The East German Ministry of State Security, popularly known as the Stasi, was one of the largest and most intrusive secret police systems in world history. So extensive was the system of surveillance
Discover new security features and easier installationLight up your system with a new resource manager, volume manager, and directory serverIn the dark about Solaris 9? Open this book and let the sun
The airline system has reached a nightmarish state, due to economics, technology, and now heightened security. As the average cost of a flight has come down in the last twenty years, the airlines have