𝔖 Scriptorium
✦   LIBER   ✦

📁

Linux Security

✍ Scribed by Paul Cobbaut


Year
2015
Tongue
English
Leaves
129
Series
Mastering Linux
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The Mastering Linux Series consisting of 6 books (Fundamentals, System Administration, Servers, Storage, Security, Networking) provides you with a solid foundation about the Linux Operating System. It abstracts from a particular distribution by giving you the background knowledge to easily work with any Linux distribution out there.


📜 SIMILAR VOLUMES


Securing Linux: A Survival Guide for Lin
✍ David Koconis, Jim Murray, Jos Purvis, Darrin Wassom 📂 Library 📅 2003 🏛 SANS Institute 🌐 English

Increase the security of your Linux system with this handy, definitive guide. It presents the latest and best practices for securing a Linux system on both workstations and many server setups.

Securing Linux: A Survival Guide for Lin
✍ David Koconis, Jim Murray, Jos Purvis, Darrin Wassom 📂 Library 📅 2003 🏛 MIX 🌐 English

As the Linux operating system has matured and grown in popularity, security risks have increased. SANS is pleased to announce publication of Securing Linux, a collaborative effort from many authorities who work with and secure Linux on a daily basis. This new addition to the Security Step-by-Step gu

Linux Security
✍ Ramon J. Hontanon 📂 Library 📅 2001 🏛 Sybex 🌐 English
Linux Security
✍ Shadab Siddiqui 📂 Library 📅 2002 🏛 Premier Press 🌐 English

Книга Linux Security Linux SecurityКниги Linux Автор: Shadab Siddiqui Год издания: 2002 Формат: pdf Издат.:Premier Press Страниц: 488 Размер: 2,6 ISBN: 1-931841-99-3 Язык: Английский0 (голосов: 0) Оценка:Electronic commerce has become a significant part of business. As more companies are moving to t

Linux: Linux Security and Administration
✍ Andy Vickler 📂 Library 📅 2021 🌐 English

Did you wonder what the Linux operating system is and how you can install it on your system? Do you want to learn how to separate the Linux operating system from the main operating system used? Have you been trying to learn how to perform penetration testing or other ethical hacking processes to det