Unisciti a noi in un viaggio nel mondo dei libri!
Aggiungi questo libro allo scaffale
Grey
Scrivi un nuovo commento Default profile 50px
Grey
Iscriviti per leggere l'intero libro o leggi le prime pagine gratuitamente!
All characters reduced
Rocky Linux 9 Essentials - Learn to Install Administer and Deploy Rocky Linux 9 Systems - cover

Rocky Linux 9 Essentials - Learn to Install Administer and Deploy Rocky Linux 9 Systems

Neil Smyth

Casa editrice: Payload Media, Inc.

  • 0
  • 0
  • 0

Sinossi

Rocky Linux 9 Essentials is designed to provide detailed information on the installation, use, and administration of the Rocky Linux 9 distribution. For beginners, the book covers topics such as operating system installation, the basics of the GNOME desktop environment, configuring email and web servers, and installing packages and system updates. Additional installation topics, such as dual booting with Microsoft Windows, are also covered, together with all important security topics, such as configuring a firewall and user and group administration.
 
For the experienced user, topics such as remote desktop access, the Cockpit web interface, logical volume management (LVM), disk partitioning, swap management, KVM virtualization, Secure Shell (SSH), Linux Containers, and file sharing using both Samba and NFS are covered in detail to provide a thorough overview of this enterprise class operating system.
Disponibile da: 27/04/2023.
Lunghezza di stampa: 294 pagine.

Altri libri che potrebbero interessarti

  • Nikola Tesla and Thomas Edison - (2 Books in 1) The Rival Inventors Who Powered the Modern Era - cover

    Nikola Tesla and Thomas Edison -...

    Michael W. Simmons

    • 0
    • 0
    • 0
    "Nikola Tesla and Thomas Edison: The Rival Inventors Who Powered the Modern Era" is an enthralling two-in-one volume that unites the remarkable stories of two of history's most extraordinary inventors. Authored by Michael W. Simmons, this composite work weaves together the parallel narratives of Tesla and Edison, whose innovations and rivalry forged the path of the technological age. 
    The first section, derived from "Nikola Tesla: Prophet of The Modern Technological Age," immerses readers in the mysterious and groundbreaking world of Nikola Tesla. Renowned for inventions like the induction motor and contributions to electrical engineering, Tesla's life was filled with achievements that bordered on the magical. This book takes readers from Tesla's extraordinary childhood experiences in Croatia, through his fierce competition with Edison, to his ambitious projects that revolutionized technology and occasionally, like in New York, almost literally shook the world. Relationships with key figures such as Mark Twain, J.P. Morgan, and Albert Einstein are explored, revealing the depth of Tesla's impact in various spheres. 
    Transitioning to "Thomas Edison: American Inventor," the second section of the book, readers encounter the quintessential story of American innovation. Edison's journey from conducting experiments in his youth to inventing the phonograph and the incandescent light bulb is a testament to his inventive genius. Through Edison’s personal writings and contemporary accounts, the book vividly brings to life the experience of witnessing Edison's inventions for the first time. His friendships with notable individuals like Henry Ford and his wartime efforts offer a comprehensive view of a man whose inventions illuminated the world. 
    Together, these stories form "Nikola Tesla and Thomas Edison a compelling narrative. 
    Mostra libro
  • Social Distancing - cover

    Social Distancing

    Introbooks Team

    • 0
    • 0
    • 0
    Social distancing is a term used for such measures that Health authorities take to discourage or delay the spread of a highly infectious disease. The Health Official has the legislative power to introduce steps to isolate society as these initiatives would have a direct effect on our society. Any effort to implement social distancing initiatives must be orchestrated with local authorities such as communities, police forces, and education centers, as well as with state and federal stakeholders. The statutory health bodies are responsible for collecting information on social distancing to physically separate the public from society. 
    This knowledge is provided to help people understand what might be expected to do if social distancing strategies are put into action by the Health Advisor. What are the steps to separate people from society? Social distancing measures are taken to limit when and where the spread of communicable diseases can be prevented or decelerated. 
    Mostra libro
  • Hacking and Network Protocols - cover

    Hacking and Network Protocols

    James Ferry

    • 0
    • 0
    • 0
    "Hacking and Network Protocols: Strategies for Protection and Penetration in Networking" is an essential guide that bridges the gap between network defense and offensive tactics, providing readers with a comprehensive understanding of the underlying principles that drive both protection and penetration in modern networks. 
    This book dives deep into the architecture of network protocols, uncovering the mechanics that govern their operation and how they can be both a target for hackers and a line of defense for network administrators. Readers will learn about the various types of attacks that can be carried out against network protocols, from man-in-the-middle attacks to denial of service (DoS) disruptions, and how such vulnerabilities can be exploited by malicious actors. 
    But more than just understanding attacks, this book focuses heavily on defense mechanisms. It outlines strategic approaches to securing networks, from deploying advanced encryption practices to setting up comprehensive intrusion detection systems. Each chapter presents real-world scenarios and case studies, allowing readers to explore the consequences of both weak and robust network defenses. 
    Expert interviews and commentary provide insights into the evolving landscape of network security, offering foresight into future challenges and the technologies being developed to counter them. Whether you are a cybersecurity professional aiming to enhance your tactical skills or a network administrator seeking to fortify your infrastructure, "Hacking and Network Protocols" offers the knowledge and strategies needed to understand and manipulate the framework of network security effectively. 
     
    Mostra libro
  • The Real Business of IT - How CIOs Create and Communicate Value - cover

    The Real Business of IT - How...

    George Westerman, Richard Hunter

    • 0
    • 0
    • 0
    If you're a general manager or CFO, do you feel you're spending too much on IT or wishing you could get better returns from your IT investments? If so, it's time to examine what's behind this IT-as-cost mind-set. 
     
     
     
    In The Real Business of IT, Richard Hunter and George Westerman reveal that the cost mind-set stems from IT leaders' inability to communicate about the business value they create—so CIOs get stuck discussing budgets rather than their contributions to the organization. 
     
     
     
    The authors explain how IT leaders can combat this mind-set by first using information technology to generate three forms of value important to leaders throughout the organization: 
     
     
     
    ● Value for money when your IT department operates efficiently and effectively 
     
     
     
    ● An investment in business performance evidenced when IT helps divisions, units, and departments boost profitability 
     
     
     
    ● Personal value of CIOs as leaders whose contributions to their enterprise go well beyond their area of specialization 
     
     
     
    The authors show how to communicate about these forms of value with non-IT leaders—so they understand how your firm is benefiting and see IT as the strategic powerhouse it truly is.
    Mostra libro
  • Deep Sleep Hypnosis - The Most Effective Affirmations and Self-Hypnosis - cover

    Deep Sleep Hypnosis - The Most...

    David Jenkins

    • 0
    • 0
    • 0
    Do you spend most of your nights staring at the ceiling and wake up with no energy? If yes, this is the right audio-book for you. 
    Hypnosis is a technique that can be used to promote better sleep by inducing a state of deep relaxation and heightened suggestibility. 
    Here’s how it works:relaxation: the process typically begins with the individual being guided into a relaxed state, often through deep breathing and progressive muscle relaxation. This helps reduce stress and tension;focused attention: once relaxed, the hypnotist or the individual focuses on calming imagery or soothing words. This concentration helps to quiet the mind and block out distractions;positive suggestions: in this relaxed state, positive suggestions related to sleep are introduced. These might include affirmations like "I am relaxed and ready for sleep" or visualizations of a peaceful sleeping environment;reinforcement: the suggestions can be repeated or reinforced during the session, helping to create a mental association between the relaxed state and the ability to fall asleep easily;awakening: after the session, the individual is gently brought back to full awareness, often feeling refreshed and more open to the suggestions made during hypnosis. 
    By incorporating these techniques, hypnosis can help alleviate insomnia, reduce anxiety, and promote a more restful sleep. 
    This book deals with:The Importance of SleepingInsomnia and its TreatmentBenefits of Hypnosis 
    ...And much more! 
    If you want to change your life, you need to focus on thoughts and strengthen your mind.  
    Hypnosis, dreams, subconscious, and the right tools give power to the brain!
    Mostra libro
  • The Cyber-Elephant In The Boardroom - Cyber-Accountability With The Five Pillars Of Security Framework - cover

    The Cyber-Elephant In The...

    Mathieu Gorge

    • 0
    • 0
    • 0
    We’ve all read the cybersecurity horror stories: a prominent company exposes the private information of their customers only to scramble after the fact to apologize and safeguard the data. Cybersecurity is often an afterthought, a much lower priority than profit—until a data breach threatens the bottom line anyway. 
     
    In The Cyber-Elephant in the Boardroom, data security expert and CEO Mathieu Gorge, along with a host of guests, shows why protecting a company’s data should be top of mind for C-suites and corporate boards. With the innovative 5 Pillars of Security Framework, any C-level executive can understand their organization’s cyber risk and the steps they need to take to protect their information. There’s a cyber-elephant in the boardroom and it needs to be addressed!
    Mostra libro