下载  >  操作系统  >  Linux  > Securing & Optimizing Linux: The Ultimate Solution (v.2.0)

Securing & Optimizing Linux: The Ultimate Solution (v.2.0) 评分:

This book has been written and achieved with tightening security to an incomparable level, in mind. One of its main features is the easy path from beginning to end in a smooth manner, step by step for beginners as well as for experts.

...展开详情
2018-06-26 上传 大小:6.23MB
举报 收藏
分享
Securing & Optimizing Linux: The Ultimate Solution (v.2.0)

This book has been written and achieved with tightening security to an incomparable level, in mind. One of its main features is the easy path from beginning to end in a smooth manner, step by step for beginners as well as for experts.

立即下载
Securing Hadoop

教你如何搭建安全的Hadoop的相关策略及其他安全问题

立即下载
SSL & TLS Essentials: Securing the Web

SSL & TLS Essentials: Securing the Web Publisher: Wiley Language: English ISBN: 0471383546 Paperback: 224 pages Data: February 11, 2000 Format: PDF Description: "Great writing . . . a clear introduction to the most widely deployed security technology in the Internet."-Paul Lambert, former co-chair

立即下载
Securing REST WebServices

Securing REST WebServices with Spring Security and Custom HTTP Request Factories

立即下载
Securing Ajax Application

Securing Ajax Application 很好的 AJAX 安全方面的书!

立即下载
Securing_DevOps

PART 1: CASE STUDY: APPLYING LAYERS OF SECURITY TO A SIMPLE DEVOPS PIPELINE 2 Building a barebones DevOps pipeline to secure 3 Security layer 1: protecting web applications 4 Security layer 2: protecting cloud infrastructures 5 Security layer 3: securing communications 6 Security layer 4: securing t

立即下载
Securing_IPSAN

security on IPSAN (iSCSI)

立即下载
Securing the Barn

OJ题,有关搜索算法的一道经典的题,算法通过组合数输出的思想一样

立即下载
Securing Ajax Applications

file format:pdf date:July 2007: First Edition. language:en

立即下载
Securing And Optimizing Linux

Securing And Optimizing Linux

立即下载
Securing Docker.pdf

Securing Docker.pdf

立即下载
“Performance, Feasibility & Scalibility of Hommorphic Encryption Schemes in Securing Wireless Sensor Networks

“Performance, Feasibility & Scalibility of Hommorphic Encryption Schemes in Securing Wireless Sensor Networks

立即下载
Hacking and Securing Ios Applications

Jonathan Zdziarski作品 Hacking and Securing Ios Applications电子书

立即下载
Hacking and Securing iOS Applications

Chapter 1. Everything You Know Is Wrong Part I: Hacking Chapter 2. The Basics of Compromising iOS Chapter 3. Stealing the Filesystem Chapter 4. Forensic Trace and Data Leakage Chapter 5. Defeating Encryption Chapter 6. Unobliterating Files Chapter 7. Manipulating the Runtime Chapter 8. Abusing the R

立即下载
Securing.Docker.1785888854

Key Features Gain confidence in using Docker for containerization without compromising on security This book covers different techniques to help you develop your container security skills It is loaded with practical examples and real-world scenarios to secure your container-based applications Book D

立即下载
Securing DevOps--2018

Securing DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. By the end of this book, readers will be ready to build security controls at all layers, monitor and respond to attacks on cloud services, and add security organization-wide th

立即下载
Securing PHP Apps pdf 0分

Securing PHP Apps 英文版

立即下载
思科PPT:Securing Web Applications

思科PPT:Securing Web Applications 目录:  Secure Data Center Transformation  Application Security Trends and Concerns  Web Application Attack  Introducing Cisco Web Application Firewall WAF  Q&A

立即下载
html+css+js制作的一个动态的新年贺卡

该代码是http://blog.csdn.net/qq_29656961/article/details/78155792博客里面的代码,代码里面有要用到的图片资源和音乐资源。

立即下载
Camtasia 9安装及破解方法绝对有效

附件中注册方法亲测有效,加以整理与大家共享。 由于附件大于60m传不上去,另附Camtasia 9百度云下载地址。免费自取 链接:http://pan.baidu.com/s/1kVABnhH 密码:xees

立即下载