|
M1
|
Implementing LDAP Directories NEW
|
 |
M2 |
Hacking and Securing Web-Based Applications
NEW |
 |
M3 |
Perl for System Administration: The Networking Power Hours NEW |
 |
M4 |
System and Network Performance Tuning
|
 |
M5 |
Inside the Linux Kernel (updated for version 2.6)
|
 |
M6 |
Network Security Protocols: Theory and Current Standards NEW |
 |
M7 |
Advanced Topics in System Administration and Security NEW |
 |
M8 |
Logging & Security: Building an Enterprise Logging Infrastructure
|
|
T1 |
Advanced Solaris System Administration Topics UPDATED |
 |
T2 |
Managing Samba 2.2 & 3.0 NEW |
 |
T3 |
System and Network Monitoring |
 |
T4 |
Building Internet-Facing Systems NEW |
 |
T5 |
Beyond Shell Scripts: 21st-Century Automation Tools and Techniques NEW |
 |
T6 |
Bridges, Routers, Switches, and Internetworking Protocols NEW |
 |
T7 |
Network Security Profiles: A Collection (Hodgepodge) of Stuff Hackers Know About You
|
 |
T8 |
Linux-Based Firewalls NEW
|
|
W1 |
WiFi Security: The Trials and Tribulations of Designing, Deploying, and Using WiFi Networks Securely NEW |
 |
W2 |
Solaris Internals: Architecture, Tips, and Tidbits
|
 |
W3 |
System and Network Monitoring: Tools in Depth NEW |
 |
W4 |
Building Honey Pots for Intrusion Detection |
 |
W5 |
Advanced Topics in DNS Administration
|
 |
W6 |
But Is It UNIX? A Mac OS X Administrator's Survival Guide NEW |
 |
W7 |
Sendmail Configuration and Operation (updated for Sendmail 8.12)
|
 |
W8 |
Disaster Planning and Recovery: How to Keep Your Company (and Your Job) Alive NEW |