• Information security book excerpts and reviews

    Visit the Information Security Bookshelf for book reviews and free chapter downloads.

    ITKE351,905 pointsBadges:
  • Book excerpt: Effective MySQL Backup and Recovery

    As a DBA, you need to create an effective strategy. How? Read this excerpt from Ronald Bradford's 'Effective MySQL: Backup and Recovery' to find out.

    ITKE351,905 pointsBadges:
  • Linux commands: Using Linux Survival Commands

    Use these Linux commands with VMware ESX Server, as described in this excerpt from Virtualization: From the Desktop to the Enterprise.

    ITKE351,905 pointsBadges:
  • Hacking For Dummies: Chapter 7 — Passwords

    In his latest book, "Hacking For Dummies," Kevin Beaver takes the reader into the mindset of a hacker in order to help admins fend off vulnerabilities and attacks.

    ITKE351,905 pointsBadges:
  • Working with ABAP date and time data types

    In this book chapter excerpt, you'll find an introduction to SAP ABAP date and time data types. You'll also learn how to create calculations using the built-in date and time data.

    ITKE351,905 pointsBadges:
  • IT pros pick their favorite books

    IT pros offer book recommendations ranging from mainstream to super geeky.

    Bridget Botelho3,260 pointsBadges:
  • Chapter 15 — Handling file uploads — of ‘Beginning PHP and MySQL 5′

    Chapter 15 -- Handling file uploads -- of 'Beginning PHP and MySQL 5' describes role of PHP's file-upload functions <is_uploaded_file() and move_uploaded_file() in the upload process. File-upload configuration directives, actual examples and code are offered, as well.

    ITKE351,905 pointsBadges:
  • Comparing Windows to Linux in Chapter 1 of “Linux Administration: A Beginner’s Guide”

    Read Chapter 1, "Technical Summary of Linux Distributions and Windows 2003," which deals with a history of Linux, explains the kernel and general terminology of Linux.

    ITKE351,905 pointsBadges:
  • Understanding logging, log monitoring in ‘Hardening Linux’

    In Chapter 5, "Understanding Logging and Monitoring," Turnbull compares the syslog daemon to its more powerful and more secure successor, syslog-NG. He also shows readers the Simple Event Correlation tool for highlighting events in logs.

    JTurnbull490 pointsBadges:
  • Must-read information technology books for the IT strategist and admin

    Whether you're a CIO or a system administrator, a good IT book will help your career. The SearchDataCenter Advisory Board shares their favorites.

    ITKE351,905 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following