Search results for: gnupg-using-the-gnu-privacy-guard

Searcher

Author :
File Size : 49.21 MB
Format : PDF
Download : 101
Read : 837
Download »

the official red hat linux customization guide

Author :
File Size : 50.28 MB
Format : PDF
Download : 599
Read : 943
Download »

Computer and Information Security Handbook

Author : John R. Vacca
File Size : 47.86 MB
Format : PDF
Download : 449
Read : 350
Download »
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Written by leaders in the field Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices Presents methods for analysis, along with problem-solving techniques for implementing practical solutions

Mastering Modern Linux

Author : Paul S. Wang
File Size : 55.27 MB
Format : PDF, ePub, Docs
Download : 875
Read : 942
Download »
Praise for the First Edition: "This outstanding book ... gives the reader robust concepts and implementable knowledge of this environment. Graphical user interface (GUI)-based users and developers do not get short shrift, despite the command-line interface’s (CLI) full-power treatment. ... Every programmer should read the introduction’s Unix/Linux philosophy section. ... This authoritative and exceptionally well-constructed book has my highest recommendation. It will repay careful and recursive study." --Computing Reviews, August 2011 Mastering Modern Linux, Second Edition retains much of the good material from the previous edition, with extensive updates and new topics added. The book provides a comprehensive and up-to-date guide to Linux concepts, usage, and programming. The text helps the reader master Linux with a well-selected set of topics, and encourages hands-on practice. The first part of the textbook covers interactive use of Linux via the Graphical User Interface (GUI) and the Command-Line Interface (CLI), including comprehensive treatment of the Gnome desktop and the Bash Shell. Using different apps, commands and filters, building pipelines, and matching patterns with regular expressions are major focuses. Next comes Bash scripting, file system structure, organization, and usage. The following chapters present networking, the Internet and the Web, data encryption, basic system admin, as well as Web hosting. The Linux Apache MySQL/MariaDB PHP (LAMP) Web hosting combination is also presented in depth. In the last part of the book, attention is turned to C-level programming. Topics covered include the C compiler, preprocessor, debugger, I/O, file manipulation, process control, inter-process communication, and networking. The book includes many examples and complete programs ready to download and run. A summary and exercises of varying degrees of difficulty can be found at the end of each chapter. A companion website (http://mml.sofpower.com) provides appendices, information updates, an example code package, and other resources for instructors, as well as students.

Simple Steps to Data Encryption

Author : Peter Loshin
File Size : 54.20 MB
Format : PDF, Mobi
Download : 657
Read : 1237
Download »
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard. The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file. There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche. By reading this title readers will be provided with a step by step hands-on guide that includes: Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing data How to use open source, time-proven and peer-reviewed cryptographic software Easy to follow tips for safer computing Unbiased and platform-independent coverage of encryption tools and techniques Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing data How to use open source, time-proven and peer-reviewed cryptographic software Easy-to-follow tips for safer computing Unbiased and platform-independent coverage of encryption tools and techniques

InfoWorld

Author :
File Size : 80.85 MB
Format : PDF, ePub, Mobi
Download : 691
Read : 626
Download »
InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.

Sys Admin

Author :
File Size : 67.1 MB
Format : PDF, Kindle
Download : 922
Read : 391
Download »

Linux Journal

Author :
File Size : 50.93 MB
Format : PDF, Docs
Download : 310
Read : 865
Download »

Virtualization

Author : Chris Wolf
File Size : 53.95 MB
Format : PDF, Kindle
Download : 271
Read : 1246
Download »
* This will be the only complete virtualization reference on the market; brings all virtualization technologies together * Microsoft has shifted its training strategy to include virtual machine technology in all new ALS/MOC courses, which leads to high demand for knowledge about this technology * Covers both Microsoft and Linux environments

Fedora Core 7 Red Hat Enterprise Linux The Complete Reference

Author : Richard Petersen
File Size : 43.57 MB
Format : PDF
Download : 341
Read : 387
Download »
The Definitive Linux Resource--Fully Updated and Expanded Get full details on the powerful features of Red Hat Enterprise Linux and Fedora 7 from this fully revised, one-stop guide. Linux expert Richard Petersen covers all the bases, from configuring your desktop, customizing your system, and accessing software repositories to handling files and directories, managing devices and servers, and sharing system resources. Inside, you'll get in-depth coverage of Fedora 7's device and network autoconfiguration, IPv6 and .NET support, SE Linux, software repository installs, custom distribution spins, and system administration tools. You'll learn how to deploy sound security measures, configure automatic device detection, set up logical volumes for file management, and create your own Fedora distribution using your favorite software. Install, use, secure, and manage Red Hat Enterprise Linux and the new Fedora 7 Configure services using Fedora administration tools for network access, software updates, and file management (LVM and GFS2) Manage users, services, file systems, hotplug devices, and printers Deploy powerful desktop, office, database, graphics, multimedia, e-mail, Web, and FTP applications Optimize security with IPsec, SE Linux, Kerberos, and Netfilter Maintain FTP, Web, mail, DNS, proxy, print, news, and database servers Administer system resources using GRUB, Yum, HAL, MONO, and udev Select, download, and install a Fedora distribution spin Auto-configure IPv6, DHCPv6, and DHCP networks Access remote files and printers with NFS, GFS2, and SAMBA

SuSE Linux Unleashed

Author : Bill Ball
File Size : 82.50 MB
Format : PDF, ePub, Mobi
Download : 679
Read : 788
Download »
Covers installation of SuSE Linux 6.2, system management, configuration, network security, Internet connections, backup, file storage, managing peripherals, and Linux productivity clients

Hacking Linux Exposed

Author : Brian Hatch
File Size : 81.39 MB
Format : PDF, ePub
Download : 799
Read : 807
Download »
Offers detailed information on Linux-specific internal and external hacks, explaining how to tighten and maintain security on Linux networks.

The Book of Webmin Or How I Learned to Stop Worrying and Love UNIX

Author : Joe Cooper
File Size : 30.97 MB
Format : PDF, ePub, Mobi
Download : 561
Read : 362
Download »
Describes the concepts needed to maintain a UNIX system through the use of Webmin.

Peer to Peer

Author : Bo Leuf
File Size : 40.61 MB
Format : PDF, ePub, Docs
Download : 733
Read : 1303
Download »
Peer to Peer" melds practical info with in-depth analysis, all in an easy-to-read, informal, and personal style. The book cuts through all the media hype to present a clear understanding of what can be done using P2P, and provides an overview of P2P concepts, a practical guide to installation and deployment, information on specific protocols and tools, and discussions of legal and security issues.

Microsoft Encyclopedia of Security

Author : Mitch Tulloch
File Size : 39.96 MB
Format : PDF, Kindle
Download : 813
Read : 1293
Download »
Contains more than one thousand entries covering computer security technology, standards, products, and issues.

Information Hiding

Author :
File Size : 74.47 MB
Format : PDF, Mobi
Download : 989
Read : 1309
Download »

Linux

Author : David Engle
File Size : 35.83 MB
Format : PDF, Kindle
Download : 740
Read : 978
Download »
A preparatory text for the CompTia Linux+ (Exam# XK0-001). The purpose of this textbook is to prepare the reader to successfully complete the latest CompTIA Linux+ Certification Exam, which requires that the person seeking certification possess a working knowledge of Planning and Implementation, Installation, Configuration, Administration, Systems Maintenance, and Troubleshooting. These specific areas of required knowledge are provided inside the front cover of this book. It is suitable for readers and students in computer engineering technology, electrical engineering technology, networking technology and telecommunications technology programs, corporations, and government agencies. Linux has become popular over a relatively short period of time. There are literally thousands of programmers who have an active role in developing Linux, with hundreds of ongoing projects using Linux and various hardware for many purposes. This product is a blended educational and training solution that combines a printed text, a lab experience and an online web-based curriculum that can be delivered anytime and anywhere there is an internet connection. Students are provided with ample resource information in the text as well as from the online course. The online course includes hundreds of FLASH animations and graphics that allow a level of engagement not possible by using a text alone. It includes an online component that allows students to take the tests electronically. Once the student completes the exam it is graded; the grades are stored in the instructor's electronic gradebook and the student is provided with a "Personalized Feedback" that leads them to the points missed on the exam. This feature helps students and teachers ensure that the appropriate level of proficiency is reached for each objective. The Cisco Learning Institute is a 501 C3 not-for-profit corporation dedicated to helping teachers and students use technology to enhance the learning experience. It has developed a variety of e-learning tools over the past five years for the purpose of authoring and delivering e-learning course material. The Cisco Networking Academy Program is a worldwide deployment of e-learning courses in the IT area with over 12,000 sites and 500,000 students currently taking courses, translating into the largest e-learning deployment in the world. The content delivery tools developed by the Cisco Learning Institute called Virtuoso deliver the content to the students and teachers in this extraordinarily successful program, and now the benefit of those tools is available to teachers and students preparing for CompTIA certification exams. The products developed by Cisco Learning Institute for Prentice Hall are all powered by Virtuoso.

A Practical Guide to Fedora and Red Hat Enterprise Linux

Author : Mark G. Sobell
File Size : 68.66 MB
Format : PDF
Download : 208
Read : 367
Download »
"I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid Linux reference." -Eric Hartwell, Chair, School of Information Technology, ITT Technical Institute The #1 Fedora and RHEL resource--a tutorial AND on-the-job reference Master Linux administration and security using GUI-based tools, the command line, and Perl scripts Set up key Internet servers, step by step, including Samba, Apache, sendmail, DNS, LDAP, FTP, and more Master All the Techniques You Need to Succeed with Fedora(tm) and Red Hat® Enterprise Linux® In this book, one of the world's leading Linux experts brings together all the knowledge you need to master Fedora or Red Hat Enterprise Linux and succeed with it in the real world. Best-selling author Mark Sobell explains Linux clearly and effectively, focusing on skills you'll actually use as a user, programmer, or administrator. Now an even more versatile learning resource, this edition adds skill objectives at the beginning of each chapter. Sobell assumes no prior Linux knowledge. He starts at the beginning and walks you through every topic and task that matters, using easy-to-understand examples. Step by step, you'll learn how to install and configure Linux from the accompanying DVD, navigate its graphical user interface, provide file/print sharing, configure network servers, secure Linux desktops and networks, work with the command line, administer Linux efficiently, and even automate administration with Perl scripts. Mark Sobell has taught hundreds of thousands of Linux and UNIX professionals. He knows every Linux nook and cranny--and he never forgets what it's like to be new to Linux. Whatever you want to do with Linux--now or in the future--you'll find it here. Compared with the other Linux books out there, A Practical Guide to Fedora(tm) and Red Hat® Enterprise Linux®, Sixth Edition, delivers Complete, up-to-the-minute coverage of Fedora 15 and RHEL 6 State-of-the-art security techniques, including up-to-date firewall setup techniques using system-config-firewall and iptables, and a full chapter on OpenSSH (ssh) Coverage of crucial topics such as using su and sudo, and working with the new systemd init daemon Comprehensive coverage of the command line and key system GUI tools More practical coverage of file sharing using Samba, NFS, and FTP Superior coverage of automating administration with Perl More usable, realistic coverage of Internet server configuration, including Apache (Web), sendmail, NFSv4, DNS/BIND, and LDAP, plus new coverage of IPv6 More and better coverage of system/network administration tasks, including network monitoring with Cacti Deeper coverage of essential administration tasks--from managing users to CUPS printing, configuring LANs to building a kernel Complete instructions on keeping Linux systems up-to-date using yum And much more, including a 500+ term glossary and comprehensive indexes Includes DVD! Get the full version of the Fedora 15 release!

Essential System Administration

Author : AEleen Frisch
File Size : 42.73 MB
Format : PDF, ePub, Docs
Download : 175
Read : 747
Download »
Since its first printing in October 1991, Essential System Administration has been the definitive practical guide for Unix and Linux system administrators. The book talks about all the usual administrative tools that Unix and Linux provide-and also shows how to use those tools in smarter and more efficient ways. Author AEleen Frisch expands coverage of networking, electronic mail, security, and kernel configuration-topics of increasing importance to administrators. It also includes coverage of services such as LDAP, PAM, DHCP, and DNS, and discussions of many important open source tools, including SSH, Cfengine, Amanda, RRDTool, and Cricket. The latest versions of all major Unix platforms, including Red Hat Linux 7.3 and SuSE Linux 8, Solaris 8 and 9, FreeBSD 4.6, AIX 5, HP-UX 11 and 11i, and Tru64 5.1, have been thoroughly reviewed and tested. You will find this book indispensable whether you are responsible for a large, shared computer system or a network of workstations, or you use a standalone Unix or Linux system and have found that the fine line between a user and an administrator has vanished. And even if you aren't directly or solely responsible for system administration, you'll find that understanding important administrative functions will greatly increase your ability to use Unix effectively.

Computer System Security

Author : Gildas Avoine
File Size : 58.13 MB
Format : PDF, Mobi
Download : 263
Read : 732
Download »