• Information security book excerpts and reviews

    Visit the Information Security Bookshelf for book reviews and free chapter downloads.

    ITKE440,755 pointsBadges:
  • Must-read information technology books for the IT strategist and admin

    Whether you're a CIO or a system administrator, a good IT book will help your career. The SearchDataCenter Advisory Board shares their favorites.

    ITKE440,755 pointsBadges:
  • Comparing Windows to Linux in “Linux Administration: A Beginner’s Guide”

    Read Chapter 1, "Technical Summary of Linux Distributions and Windows 2003," which deals with a history of Linux, explains the kernel and general terminology of Linux.

    ITKE440,755 pointsBadges:
  • IT pros pick their favorite books

    IT pros offer book recommendations ranging from mainstream to super geeky.

    Bridget Botelho3,680 pointsBadges:
  • Working with ABAP date and time data types

    In this book chapter excerpt, you'll find an introduction to SAP ABAP date and time data types. You'll also learn how to create calculations using the built-in date and time data.

    searchsap560 pointsBadges:
  • Book excerpt: Effective MySQL Backup and Recovery

    As a DBA, you need to create an effective strategy. How? Read this excerpt from Ronald Bradford's 'Effective MySQL: Backup and Recovery' to find out.

    ITKE440,755 pointsBadges:
  • Linux commands: Using Linux Survival Commands

    Use these Linux commands with VMware ESX Server, as described in this excerpt from Virtualization: From the Desktop to the Enterprise.

    ITKE440,755 pointsBadges:
  • Hacking For Dummies: Chapter 7 — Passwords

    In his latest book, "Hacking For Dummies," Kevin Beaver takes the reader into the mindset of a hacker in order to help admins fend off vulnerabilities and attacks.

    ITKE440,755 pointsBadges:
  • Chapter 15 — Handling file uploads — of ‘Beginning PHP and MySQL 5’

    Chapter 15 -- Handling file uploads -- of 'Beginning PHP and MySQL 5' describes role of PHP's file-upload functions <is_uploaded_file() and move_uploaded_file() in the upload process. File-upload configuration directives, actual examples and code are offered, as well.

    ITKE440,755 pointsBadges:
  • Understanding logging, log monitoring in ‘Hardening Linux’

    In Chapter 5, "Understanding Logging and Monitoring," Turnbull compares the syslog daemon to its more powerful and more secure successor, syslog-NG. He also shows readers the Simple Event Correlation tool for highlighting events in logs.

    JTurnbull490 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.