Since its creation in a Bell Labs attic in 1969, the Unix operating system has spread far beyond anything that its creators could possibly have imag-ined. It has led to the development of much innovative software, inf l uenced myriad programmers,...
Ванг Уоллес Как не стать жертвой хакеров и мошенников в Internet / Ванг Уоллес ; Пер. с англ. М.: ООО «ДиаСофтЮП», 2005. - 400 с.
ISBN 5-93772-156-Х
Книга,...
So who is this book for? This is the book I wish existed when I f i rst started my Information Technology career. It is for penetration testers, red teamers, network defenders (blue teamers), and system administrators.
For penetration testers,...
O'Reilly home
See everything available through O’Reilly online learning and start a free trial. Explore now.
CCNA Routing and Switching Complete Study Guide, 2nd Edition
CCNA Routing and Switching Complete Study Guide, 2nd Edition
by Todd...
Welcome to Mastering Windows Server 2016. This book covers Windows Server 2016 and the core technologies built into the operating system. It has a mix of content ranging from networking, identity and access, storage, and much more. We don’t cover...
Introduction This document describes the information to help you secure your Cisco IOS® system devices, which increases the overall security of your network. Structured around the three planes into which functions of a network device can be...