Linux 功能強大,但是其彈性往往會讓初學者無所適從,所以使用 Linux 架站時,必須瞭解每個設定環節,以及可能遭遇的問題,才能成功架設伺服器,並提供所需的各項服務。 本書詳細說明架站所需的各項知識與技能,以及必要的各項檢查流程及問題排解,省略繁瑣不實用的內容,讓您可以快速成功架站,並瞭解伺服器的運作原委,將是您管理、維護伺服器的最佳指引。 各類伺服器運作原理、設定項目及管理技
The leading Fedora book-over a quarter of a million copies sold of previous editions! What better way to learn Fedora 11 than with the leading Fedora book from the best-selling Linux author, Christop
《Red Hat Enterprise Linux服務器配置與管理》詳細介紹了Red Hat Enterprise Linux網絡服務的安裝和配置過程,內容包括目錄服務、文件服務、DHCP服務、DNS服務、Web服務、FTP服務、E-mail服務、VPN服務、流媒體服務、代理服務、終端服務、VPN服務和時間服務等,Shell命令行、桌面管理和系統管理,SSH、Telnet和Webmin遠程管理,以
Risk Management in Port Operations, Logistics and Supply Chain Security is the first book to address security, risk and reliability issues in maritime, port and supply chain settings. In particular th
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect
The Globalization of Security is an important rethinking of the connections between globalization and security, focusing on a conceptual examination of the role of the state combined with key case stu
These are extraordinary times in U.S. national security policy. America remains engaged in both Iraq and Afghanistan while facing a global economic downturn. Homeland security concerns still abound in
Security and Dependability for Ambient Intelligence is the primary publication for the SERENITY approach which provides security and dependability (S&D) solutions for dynamic, highly distributed
This volume provides a coherent and comprehensive understanding of Chinese security policy, comprising essays written by one of America's leading scholars.Chinese Security Policy covers such fundament
This volume provides a coherent and comprehensive understanding of Chinese security policy, comprising essays written by one of America's leading scholars.Chinese Security Policy covers such fundament
Helen James considers security in Myanmar/Burma. She uses the ideas put forward in the United Nations Development Programme's 1994 report, of human, as opposed to state and security, going on to argue
High-Rise Security and Fire Life Safety, Third Edition, is a comprehensive reference for managing security and fire life safety operations within high-rise buildings. It spells out the unique characte
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thi
Of interest to academics and practitioners in computing and security, this collection of current international work explores solutions to problems in cyber security from both national and global persp
Central Nervous System is the new atlas-oriented resource in central nervous system pathology. As the fourth book in the Cambridge Illustrated Surgical Pathology series it is the most comprehensive te
CompTIAR Security+ Cert Flash Cards Online SYO-201 Diane Barrett The CompTIA Security+ Cert Flash Cards Online provides a concise review of all objectives on the Security+ SYO-201 exam. Th
"The aim of the Managing Global Insecurity project is to launch a reform effort of the global security system in 2009. That task is both ambitious and urgent.... The time to act is now." ?from the For
The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. Th
This book gives a detailed overview of SIP specific security issues and how to solve them While the standards and products for VoIP and SIP services have reached market maturity, security and regulat
Just a decade ago security had little claim to criminological attention. Today a combination of disciplinary paradigm shifts, policy changes, and world political events have pushed security to the for
Just a decade ago security had little claim to criminological attention. Today a combination of disciplinary paradigm shifts, policy changes, and world political events have pushed security to the for
Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective
Mobile Communication Systems and Security arms readers with a thorough understanding of all major cellular air-interface technologies and their security layer techniques. Rhee covers the technological
Specialists in information security with companies that sell such security or companies that buy it, explain and question current and traditional approaches in order to determine their weaknesses and
This concise text presents a focused, well-rounded, and clear-eyed introduction to the concept of human security. Questioning the utility of traditional national-security frameworks in the postDCold W
This concise text presents a focused, well-rounded, and clear-eyed introduction to the concept of human security. Questioning the utility of traditional national-security frameworks in the post–Cold W
CompTIA is revising the popular Security+ exam for the first time since it launched in 2002. This kit includes the key Sybex titles for the new CompTIA Security+ exam: CompTIA Security+ Study Guide, F
A contemporary primer on the leading arguments about U.S. national security,National Security Dilemmas addresses the major challenges and opportunities that are live-issue areas for American policymak
The world's bestselling computer security book--fully expanded and updated "Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline par