• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Red Hat Linux security and optimization /

پدید آورنده
Mohammed J. Kabir

موضوع
Linux,Computer security,Operating systems (Computers)

رده
QA76
.
76
.
O63
K3148
2002

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0764547542
(Number (ISBN
9780764547546

NATIONAL BIBLIOGRAPHY NUMBER

Number
b525595

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Red Hat Linux security and optimization /
General Material Designation
[Book]
First Statement of Responsibility
Mohammed J. Kabir

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
New York :
Name of Publisher, Distributor, etc.
Hungry Minds,
Date of Publication, Distribution, etc.
[2002]
Date of Publication, Distribution, etc.
©2002

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
xxii, 690 pages :
Other Physical Details
illustrations ;
Dimensions
24 cm +
Accompanying Material
1 CD-ROM (4 3/4 in.)

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index

CONTENTS NOTE

Text of Note
pt. I. System Performance -- Ch. 1. Performance Basics -- Ch. 2. Kernel Tuning -- Ch. 3. Filesystem Tuning -- pt. II. Network and Service Performance -- Ch. 4. Network Performance -- Ch. 5. Web Server Performance -- Ch. 6. E-Mail Server Performance -- Ch. 7. NFS and Samba Server Performance -- pt. III. System Security -- Ch. 8. Kernel Security -- Ch. 9. Securing Files and Filesystems -- Ch. 10. PAM -- Ch. 11. OpenSSL -- Ch. 12. Shadow Passwords and OpenSSH -- Ch. 13. Secure Remote Passwords -- Ch. 14. xinetd -- pt. IV. Network Service Security -- Ch. 15. Web Server Security -- Ch. 16. DNS Server Security -- Ch. 17. E-Mail Server Security -- Ch. 18. FTP Server Security -- Ch. 19. Samba and NFS Server Security -- pt. V. Firewalls -- Ch. 20. Firewalls, VPNs, and SSL Tunnels -- Ch. 21. Firewell Security Tools -- App. A. IP Network Address Classification -- App. B. Common Linux Commands -- App. C. Internet Resources -- App. D. Dealing with Compromised Systems
0

SUMMARY OR ABSTRACT

Text of Note
CD-ROM contains: Book chapters in searchable PDF format -- Sample book scripts in text format -- Security tools

TITLE USED AS SUBJECT

Linux

TOPICAL NAME USED AS SUBJECT

Computer security
Operating systems (Computers)

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
21

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
76
.
O63
Book number
K3148
2002

PERSONAL NAME - PRIMARY RESPONSIBILITY

Kabir, Mohammed J.,1971-

ORIGINATING SOURCE

Date of Transaction
20160712070740.0

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival