This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book.
Learn, prepare, and practice for CompTIA Linu……続きを見る
The Most Useful Tutorial and Reference, with Hundreds of High-Quality Examples for Every Popular Linux Distribution
“First Sobell taught people how to use Linux . . . now he teaches you the power o……続きを見る
Here are all the CompTIA Linux+/LPIC-1 Linux commands you need in one condensed, portable resource. The CompTIA Linux+/LPIC-1 Portable Command Guide is filled with valuable, easy-to-access informati……続きを見る
The free Ubuntu operating system has won the hearts and minds of millions of users worldwide. It combines a strong technical platform, impressive quality, and an enthusiastic global community of use……続きを見る
Covers 20.04, 20.10, and 21.04
Ubuntu Linux Unleashed 2021 Edition is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This n……続きを見る
Rocky Linux 9 Essentials is designed to provide detailed information on the installation, use, and administration of the Rocky Linux 9 distribution. For beginners, the book covers topics such as ope……続きを見る
Dive into the world of ethical hacking and cybersecurity with "Ian Talks PenTest+ CompTIA PT0-002 A-Z" by Ian Eress, a comprehensive guide for PenTest+ exam candidates seeking to master the tools, t……続きを見る
Ce livre est un guide pratique pour les administrateurs système, développeurs web et autres professionnels qui cherchent à apprendre la configuration de Apache Tomcat sous Linux.
Ce livre est conçu ……続きを見る
Gain a solid practical understanding and sufficient theoretical insight into Linux kernel internals while learning to write high-quality kernel module code and understanding the complexities of kern……続きを見る
Linux is the most popular operating system in the IT industry due to its security and performance. In this book, you will get familiar with the most important and advanced concepts of Linux server a……続きを見る
Ce livre est un guide complet pour comprendre, générer et gérer des certificats de sécurité TLS/SSL sous Linux.
Vous apprendrez les bases de la sécurité réseau, la différence entre un certificat aut……続きを見る
I dati annuali pubblicati dagli appositi enti di sicurezza informatica sono sempre più spaventosi. Il numero degli attacchi cresce esponenzialmente ogni anno e i danni che ne derivano comportano con……続きを見る
著者:Sandro Melo
出版社: Editora Senac São Paulo
発売日: 2023年05月09日
A Série Universitária foi desenvolvida pelo Senac São Paulo com o intuito de preparar profissionais para o mercado de trabalho. Os títulos abrangem diversas áreas, abordando desde conhecimentos teór……続きを見る
Книга посвящена концепциям, стратегиям, инструментам и настройке операционных систем и приложений на примере систем на базе Linux. Понимание этих инструментов и методов критически важно при разработ……続きを見る
"Maîtrisons VI/Vim sous Linux" est un livre qui vous guidera pas à pas dans l'apprentissage des commandes Vim sous Linux.
Vous apprendrez les commandes de base, les techniques avancées et les astuce……続きを見る
Ce livre est destiné aux débutants et utilisateurs avancés qui souhaitent apprendre et approfondir leurs compétences en shell sous Linux.
Il est accessible, même si vous n'avez aucune expérience en ……続きを見る
"Practice Questions for Salesforce Administrator Certification - Concept Based Questions - Latest Edition" is the ultimate resource for those preparing for the Salesforce Administrator Certification……続きを見る
If you are comfortable using the typical desktop computer and have an interest in PC Virtualization and Linux, then this module is for you!
VirtualBox is a powerful piece of software that allows you……続きを見る
"Mitigating Supply Chain Attacks in the Digital Age" is a comprehensive guide that delves into the complex world of supply chain attacks and provides invaluable insights for cybersecurity profession……続きを見る
Embark on a fascinating journey through the powerful world of Unix command-line tools in this comprehensive reference guide for aspiring developers and system administrators. "Ian Talks Unix Tools A……続きを見る
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES
Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identifica……続きを見る
Unleash Your Ethical Hacking Powers! Dive into the world of hacking with confidence and finesse in "Hacking Like a Pro: Unleashing Your Ethical Powers." This captivating ebook takes you on a thrilli……続きを見る
Welcome to this comprehensive guide to personal cybersecurity. As we navigate our lives in an increasingly digital world, cybersecurity has become a paramount concern. Each click, share, and downloa……続きを見る
The purpose of this book is to provide an average computer user with the knowledge that will help them stay safe while online, as well as help them make privacy choices that work for them. My goal i……続きを見る
This book is an invaluable resource for aspiring network administrators aiming to deepen their understanding of networking concepts while strengthening their C++ programming skills. Across eleven ch……続きを見る
Even though terrorism poses an increasing threat to multinational companies, corporate leaders can thwart attacks by learning to navigate the complexities of foreign governments, social unrest, and ……続きを見る
This timely and compelling book presents a broad study of all key cyber security issues of the highest interest to government and business as well as their implications.
This comprehensive work focu……続きを見る
CentOS Stream 9 Essentials is designed to provide detailed information on the installation, use, and administration of the CentOS 9 distribution. For beginners, the book covers topics such as operat……続きを見る
"Empower Yourself Against Cyber Crimes and Frauds" is a comprehensive guide that equips readers with the knowledge and strategies needed to navigate the treacherous world of cyber threats. With an i……続きを見る
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But only when you approach incident re……続きを見る