|
Showing 1 - 17 of
17 matches in All Departments
Take your Linux skills to the next level! Whether you're a system
administrator, software developer, site reliability engineer, or
enthusiastic hobbyist, this practical, hands-on book will help you
work faster, smarter, and more efficiently. You'll learn how to
create and run complex commands that solve real business problems,
process and retrieve information, and automate manual tasks. You'll
also truly understand what happens behind the shell prompt, so no
matter which commands you run, you can be more successful in
everyday Linux use and more competitive on the job market. As you
build intermediate to advanced command-line skills, you'll learn
how to: Choose or construct commands that get your work done
quickly Run commands efficiently and navigate the Linux filesystem
with ease Build powerful, complex commands out of simpler ones
Transform text files and query them like databases to achieve
business goals Control Linux point-and-click features from the
command line
Are you serious about network security? Then check out SSH, the
Secure Shell, which provides key-based authentication and
transparent encryption for your network connections. It's reliable,
robust, and reasonably easy to use, and both free and commercial
implementations are widely available for most operating systems.
While it doesn't solve every privacy and security problem, SSH
eliminates several of them very effectively.
Everything you want to know about SSH is in our second edition
of "SSH, The Secure Shell: The Definitive Guide," This updated book
thoroughly covers the latest SSH-2 protocol for system
administrators and end users interested in using this increasingly
popular TCP/IP-based solution.
How does it work? Whenever data is sent to the network, SSH
automatically encrypts it. When data reaches its intended
recipient, SSH decrypts it. The result is "transparent"
encryption-users can work normally, unaware that their
communications are already encrypted. SSH supports secure file
transfer between computers, secure remote logins, and a unique
"tunneling" capability that adds encryption to otherwise insecure
network applications. With SSH, users can freely navigate the
Internet, and system administrators can secure their networks or
perform remote administration.
Written for a wide, technical audience, "SSH, The Secure Shell:
The Definitive Guide" covers several implementations of SSH for
different operating systems and computing environments. Whether
you're an individual running Linux machines at home, a corporate
network administrator with thousands of users, or a PC/Mac owner
who just wants a secure way to telnet or transfer files between
machines, ourindispensable guide has you covered. It starts with
simple installation and use of SSH, and works its way to in-depth
case studies on large, sensitive computer networks.
No matter where or how you're shipping information, "SSH, The
Secure Shell: The Definitive Guide" will show you how to do it
securely.
Unlock the secrets of the Terminal and discover how this
powerful tool solves problems the Finder can't handle. With this
handy guide, you'll learn commands for a variety of tasks, such as
killing programs that refuse to quit, renaming a large batch of
files in seconds, or running jobs in the background while you do
other work.
Get started with an easy-to-understand overview of the Terminal
and its partner, the shell. Then dive into commands neatly arranged
into two dozen categories, including directory operations, file
comparisons, and network connections. Each command includes a
concise description of its purpose and features.Log into your Mac
from remote locationsSearch and modify files in powerful
waysSchedule jobs for particular days and timesLet several people
use one Mac at the same timeCompress and uncompress files in a
variety of formatsView and manipulate Mac OS X processesCombine
multiple commands to perform complex operationsDownload and install
additional commands from the Internet
|
MediaWiki (Paperback)
Daniel J. Barrett
1
|
R979
R805
Discovery Miles 8 050
Save R174 (18%)
|
Ships in 10 - 15 working days
|
'A good book! It's a nice overview of wiki editing and
administration, with pointers to handy extensions and further
online documentation' - Brion Vibber, Chief Technical Officer,
Wikimedia Foundation. 'This book is filled with practical knowledge
based on experience. It's not just spouting some party line' - Rob
Church, a developer of MediaWiki. MediaWiki is the world's most
popular wiki platform, the software that runs Wikipedia and
thousands of other websites. Though it appears simple to use at
first glance, MediaWiki has extraordinarily powerful and deep
capabilities for managing and organizing knowledge. In corporate
environments, MediaWiki can transform the way teams write and
collaborate. This comprehensive book covers MediaWiki's rich (and
sometimes subtle) features, helping you become a wiki expert in no
time.You'll learn how to: find your way around by effective
searching and browsing; create and edit articles, categories, and
user preferences; use advanced features for authors, such as
templates, dynamic lists, logical parser functions, and RSS, to
organize and maintain large numbers of articles; install and run
your own wiki, and configure its look and behavior; and, develop
custom wiki features, called extensions, with the PHP programming
language and MySQL database. This book also provides special
guidance for creating successful corporate wikis. For beginners who
want to create or work on collaborative, community-driven websites
with this platform, "MediaWiki" is the essential one-stop guide. 'I
was a MediaWiki newbie before reading this book. Now, many aspects
of the platform that were murky before are crystal clear' - JP
Vossen, author of O'Reilly's "Bash Cookbook".
The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax.
|
You may like...
American Gangster
Denzel Washington, Russell Crowe, …
Blu-ray disc
R192
Discovery Miles 1 920
Crybaby
Tegan & Sara
CD
R363
Discovery Miles 3 630
|