|
|
| M1 |
Network Security Profiles: A Collection (Hodgepodge) of Stuff Hackers Know About You |
| M2 |
Building Linux Applications NEW |
| M3 |
Advanced Topics in Perl Programming |
| M4 |
Topics for System Administrators, 1 NEW |
| M5 |
Sendmail Configuration and Operation (Updated for Sendmail 8.12) |
| M6 |
Blueprints for High Availability: Designing Resilient Distributed Systems |
| M7 |
Exploring the Potential of LDAP NEW |
| M8 |
Large Heterogeneous Networks: Planning, Building, and Maintaining Them While Staying Sane NEW |
| M9 |
Communicating in Difficult Situations NEW |
| M10 |
Wireless Networking Fundamentals: WANs, LANs, and PANs NEW |
|
|
| T1 |
Internet Security for UNIX & Linux System Administrators |
| T2 |
Perl for System AdministrationThe Power and the Praxis NEW |
| T3 |
Advanced CGI Techniques Using Perl |
| T4 |
UNIX Network Programming Topics NEW |
| T5 |
Cryptography Decrypted NEW |
| T6 |
Network Design for High Availability NEW |
| T7 |
Advanced Solaris Systems Administration Topics |
| T8 |
Forensic Computer Investigations: Principles and Procedures NEW |
| T9 |
Basic Management Techniques NEW |
| T10 |
Practical Wireless IP Security and Connectivity: How to Use It Safely NEW |
|
|
| W1 |
Running Web Servers Securely NEW |
| W2 |
Hacking Exposed: LIVE! |
| W3 |
Inside the Linux Kernel |
| W4 |
Network Programming with Perl NEW |
| W5 |
Cryptographic Algorithms Revealed |
| W6 |
System and Network Performance Tuning |
| W7 |
Configuring and Administering Samba Servers |
| W8 |
Computer Crime: Investigating Computer-Based Evidence NEW |
| W9 |
Solaris Internals: Architecture, Tips, and Tidbits |
| W10 |
Panning for Gold: What System Logs Tell You About Your Network Security NEW |