eBooks-it.org Logo
eBooks-IT.org Inner Image

How To eBooks Page 4

Download free How To eBooks Page 4

Network Backup with Bacula How-to

Network Backup with Bacula How-to Image
Create an autonomous backup solution for your computer network using practical, hands-on recipes Overview Set up Bacula infrastructure. Back up data and directories Work with multiple-storage systems In Detail In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks. "Network Backup with Bacula" is a practical guide to setting up the Bacula backup system using a number of sequential recipes, ranging from the simplest to intricate ones, which will give you knowledge needed to build a self-contained backup infrastructure. "Network Backup with Bacula" contain...

How to Cheat at VoIP Security

How to Cheat at VoIP Security Image
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Understand why. * What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network?Find out the issues associated with quality of service, emergency 911 service, and the major be...

Linux in the Workplace

How to Use Linux in Your Workplace
Linux in the Workplace Image
Linux in the Workplace introduces Linux users to the desktop capabilities of Linux and the K Desktop Environment (KDE) graphical user interface, a powerful Open Source graphical desktop environment for UNIX workstations. Includes information on how to use email and surf the Internet; perform general office-related tasks; work with the command line; and much more....

C How to Program

C How to Program Image
7th Edition
For introductory courses in C Programming. Also for courses in Programming for Engineers, Programming for Business, and Programming for Technology. The Deitels' How to Program series offers unparalleled breadth and depth of object-oriented programming concepts and intermediate-level topics for further study. Using the Deitels' signature 'Live-Code Approach,' this complete, authoritative introduction to C programming introduces fundamentals of structured programming, and covers relevant features of C language's C-201X standard. It also includes an updated treatment of C++ for those who want to transition to object-oriented concepts. Finally, new materia...

Stealing the Network

How to Own a Shadow
Stealing the Network Image
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.Stealing the Network: How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at h...



2007 - 2017 © eBooks-IT.org