Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
EUR 2,60
Anzahl: 4 verfügbar
In den WarenkorbPaperback. Zustand: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
EUR 5,94
Anzahl: 1 verfügbar
In den WarenkorbZustand: Very Good. 1st Edition. Former library copy. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Zustand: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present.
EUR 7,38
Anzahl: 1 verfügbar
In den WarenkorbSoft Cover. Zustand: As New. Book in as new unread condition. 470pp. How to protect a Linux system intruders, for all including non-security experts. We do not use stock photos, the picture displayed is of the actual book for sale. Every one of our books is in stock in the UK ready for immediate delivery. Size: 9 x 7 inches.
Zustand: Good. Cover leicht verschmutzt.
Paperback. Zustand: New. An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a small non-enterprise business user might take to protect themselves when dealing with what the attacker may gain and what a victim may lose. These steps include packet-level firewall filtering, IP masquerading, proxies, tcp wrappers, system integrity checking, and system security monitoring with an overall emphasis on filtering and protection. This book will provide a description of the need for security measures and solutions. The goal is to help people get their Internet security measures in place quickly, without the need to become an expert in security or firewalls.