- Table View
- List View
If you use Linux in your day-to-day work, this popular pocket guide is the perfect on-the-job reference. The second edition has expanded from Fedora-only coverage to distro-neutral, with practical information on a wider range of commands requested by readers. Linux Pocket Guide provides an organized learning path for Linux use, rather than Linux programming and system administration. You'll find options for the most useful commands, grouped by functionality. For novices who need to get up to speed on Linux use, and experienced users who want a concise and functional reference, this guide provides quick answers.
If you use Linux in your day-to-day work, this popular pocket guide is the perfect on-the-job reference. The third edition features new commands for processing image files and audio files, running and killing programs, reading and modifying the system clipboard, and manipulating PDF files, as well as other commands requested by readers. You'll also find powerful command-line idioms you might not be familiar with, such as process substitution and piping into bash.Linux Pocket Guide provides an organized learning path to help you gain mastery of the most useful and important commands. Whether you're a novice who needs to get up to speed on Linux or an experienced user who wants a concise and functional reference, this guide provides quick answers.Selected topics include:The filesystem and shellFile creation and editingText manipulation and pipelinesBackups and remote storageViewing and controlling processesUser account managementBecoming the superuserNetwork connectionsAudio and videoInstalling softwareProgramming with shell scripts
The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax.
<p>The <i>Linux Security Cookbook</i> includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax.</p>
Unlock the secrets of the Terminal and discover how this powerful tool solves problems the Finder can't handle. With this handy guide, you'll learn commands for a variety of tasks, such as killing programs that refuse to quit, renaming a large batch of files in seconds, or running jobs in the background while you do other work. Get started with an easy-to-understand overview of the Terminal and its partner, the shell. Then dive into commands neatly arranged into two dozen categories, including directory operations, file comparisons, and network connections. Each command includes a concise description of its purpose and features. Log into your Mac from remote locations Search and modify files in powerful ways Schedule jobs for particular days and times Let several people use one Mac at the same time Compress and uncompress files in a variety of formats View and manipulate Mac OS X processes Combine multiple commands to perform complex operations Download and install additional commands from the Internet
"A good book! It's a nice overview of wiki editing and administration, with pointers to handy extensions and further online documentation." -Brion Vibber, Chief Technical Officer, Wikimedia Foundation "This book is filled with practical knowledge based on experience. It's not just spouting some party line." -Rob Church, a developer of MediaWiki MediaWiki is the world's most popular wiki platform, the software that runs Wikipedia and thousands of other websites. Though it appears simple to use at first glance, MediaWiki has extraordinarily powerful and deep capabilities for managing and organizing knowledge. In corporate environments, MediaWiki can transform the way teams write and collaborate. This comprehensive book covers MediaWiki's rich (and sometimes subtle) features, helping you become a wiki expert in no time. You'll learn how to:Find your way around by effective searching and browsing Create and edit articles, categories, and user preferences Use advanced features for authors, such as templates, dynamic lists, logical parser functions, and RSS, to organize and maintain large numbers of articles Install and run your own wiki, and configure its look and behavior Develop custom wiki features, called extensions, with the PHP programming language and MySQL database This book also provides special guidance for creating successful corporate wikis. For beginners who want to create or work on collaborative, community-driven websites with this platform, MediaWiki is the essential one-stop guide. "I was a MediaWiki newbie before reading this book. Now, many aspects of the platform that were murky before are crystal clear." -JP Vossen, author of O'Reilly's Bash Cookbook
SSH (Secure Shell) is a popular, robust, TCP/IP-based product for network security and privacy, supporting strong encryption and authentication. This book covers Unix, Windows, and Macintosh implementations of SSH. It shows both system administrators and end users how to install, maintain, and troubleshoot SSH; configure servers and clients in simple and complex ways; apply SSH to practical problems; and protect other TCP applications through forwarding (tunneling).
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide . This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
<p>SSH is a popular protocol for securing your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. Everything you want to know about SSH is in our second edition of <i>SSH, The Secure Shell: The Definitive Guide</i>. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users.</p>
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivonas Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.