Linux information safe and practical tutorial
CHEN YIN // TANG YUN TING
Sold by liu xing, Nanjing, JS, China
AbeBooks Seller since April 7, 2009
New - Soft cover
Condition: New
Ships from China to U.S.A.
Quantity: 10 available
Add to basketSold by liu xing, Nanjing, JS, China
AbeBooks Seller since April 7, 2009
Condition: New
Quantity: 10 available
Add to basketShip out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 14222 Publisher: Science Press Pub. Date :2007-09. The book according to the authors many years of development and teaching experience. combined with the large number of examples. a systematic introduction to information security in the Linux system in a major knowledge points and security configuration. so that the reader through the book to learn. quick to grasp the Linux system security settings in the methods and techniques. and with Linux system information security capabilities. The main contents include the BIOS settings. Linux boot loader. commonly used commands and security settings. system process management. logging security management. remote access. firewall configuration. security settings. system services and common use of security tools. This book is an open source University Promotion Alliance Linux security administrator vocational qualification certification exam Zhidingyongshu is designed to provide quick information security management system security management skills to master the Linux ways and means to enable them to engage in online games server maintenance. or large enterprises online trading platform maintenance and management. telecommunications. finance. trade. shopping malls. hotels. restaurants. security of computer systems maintenance and security of confidential documents management. This book is suitable as institutions of higher learning computer science. information security professionals. information management. and other electronics and automatic control class students textbooks or reference books for information security. but also for all kinds of information security training courses. More Contents: Chapter 1 Overview 1.1 Safety of several factors that affect computer security 1.2 Countermeasures to prevent information security and the security settings in Chapter 2 experiments first off 2.1 Introduction 2.2 bios physical security Security Settings 2.2.2 Security Settings 2.2.1awardbios amibios Security Settings 2.2.3 phoenixbios An umbrella set 2.3 bios error messages and solutions to common thinking and experimental procedures in Chapter 3 set 3.1 linux linux boot bootloader basic concepts 3.3 3.2 bootloader menu interface to set the password for the boot process 3.3.1 Direct In the grub configuration file secretFour Satisfaction guaranteed,or money back.
Seller Inventory # J49319
"About this title" may belong to another edition of this title.
We guarantee the condition of every book as it's described on the Abebooks web sites. If you're dissatisfied with your purchase (Incorrect Book/Not as Described/Damaged) or if the order hasn't arrived, you're eligible for a refund within 30 days of the estimated delivery date. If you've changed your mind about a book that you've ordered, please use the Ask bookseller a question link to contact us and we'll respond within 2 business days. Please Note:We don't sell any international Edition to you...
Most orders are shipped within 24 hours. We will delivery these items to you by AIRMAIL, EUB, EMS, TNT etc.
| Order quantity | 16 to 30 business days | 8 to 16 business days |
|---|---|---|
| First item | US$ 18.00 | US$ 30.00 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.