BOOKS - OS AND DB - Расширенное администрирование OS Unix (Linux)...
Расширенное администрирование OS Unix (Linux) - Крюков А.А. 2006 PDF МГТУ им. Баумана BOOKS OS AND DB
ECO~22 kg CO²

3 TON

Views
57267

Telegram
 
Расширенное администрирование OS Unix (Linux)
Author: Крюков А.А.
Year: 2006
Format: PDF
File size: 17 MB
Language: RU



Pay with Telegram STARS
''

You may also be interested in:

Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, Second Edition (Final Release)
Linux Advanced for SysAdmin Become a proficient system administrator to manage networks, database, system health, automation and Kubernetes
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, Second Edition (4th Early Release)
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, 2nd Edition (Early Release)
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, Second Edition (4th Early Release)
Computer Hacking Beginners Guide: How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack
Hacking with Kali Linux A Complete Guide for Beginners to Study Basic Hacking, Cybersecurity, Wireless Networks, and Penetration Testing
Kali Linux A Comprehensive Step by Step Beginner|s Guide to Learn the Basics of Cybersecurity and Ethical Computer Hacking
Tor and the Dark Art of Anonymity (deep web, kali linux, hacking, bitcoins) FREE: Network Security for the Rest of Us (FREE)
RHCSA RHCE Red Hat Linux Certification Study Guide (Exams EX200 and EX300), 6th Edition (Certification Press)
Kali Linux for Beginners A Practical Guide to Learn the Operating System Installation and configuration, including Networks, Ethical Hacking and the Main Tools Explanation for an Easy Everyday Use
CODING LANGUAGES SQL, Linux, Python, machine learning. The step-by-step guide for beginners to learn computer programming in a crash course + exercises
Foundations of Linux Debugging, Disassembling, and Reversing: Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C C++ Code with Intel x64
Hacking 4 Books in 1- Hacking for Beginners, Hacker Basic Security, Networking Hacking, Kali Linux for Hackers
Accelerated Linux Core Dump Analysis: Training Course Transcript with GDB Practice Exercises (Pattern-Oriented Software Diagnostics, Forensics, Prognostics, Root Cause Analysis, Debugging Courses)
Ethical Hacking Bible Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux
Computer Programming 4 Books in 1 Data Science, Hacking with Kali Linux, Computer Networking for Beginners, Python Programming
LPIC-1 Linux Professional Institute Certification Study Guide Exam 101-500 and Exam 102-500 Fifth Edition
CompTIA Linux+ Portable Command Guide All the commands for the CompTIA XK0-004 exam in one compact, portable resource (Second Edition)
Hands-On Penetration Testing on Windows Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
CompTIA Linux+ Certification Guide: A comprehensive guide to achieving LX0-103 and LX0-104 certifications with mock exams
Hacking With Kali Linux The Step-By-Step Beginner|s Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing
Running ESXi on a Raspberry Pi: Installing VMware ESXi on Raspberry Pi 4 to run Linux virtual machines
Red Hat Enterprise Linux 6 Administration Real World Skills for Red Hat Administrators
Networking Hacking 2 books in 1 Networking for Beginners, Hacking with Kali Linux Easy Guide to Learn Cybersecurity, Wireless, LTE, Networks, and Penetration Testing
Hacking With Kali Linux A Step By Step Guide To Ethical Hacking, Tools For Computer, And Protect Your Family And Business From Cyber Attacks Using The Basics Of Cybersecurity
Hacking with Kali Linux A Step by Step Guide for you to Learn the Basics of CyberSecurity and Hacking
Red Hat Enterprise Linux 8.0 (RH294) - Red Hat System Administration III
Practical Binary Analysis Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
Hacking Networking and Security (2 Books in 1 Hacking with Kali Linux & Networking for Beginners)
Hacking with Kali Linux A Step by Step Guide with Tips and Tricks to Help You Become an Expert Hacker, to Create Your Key Logger, to Create a Man in the Middle Attack and Map Out Your Own Attacks
Red Hat Enterprise Linux 8.0 (RH124) - Red Hat System Administration I
Red Hat Enterprise Linux 8.0 (RH134) - Red Hat System Administration II
Linux command line Advanced guide to understand the basics of command line, administration and security for hackers. Quick study for hacking and networking. Including the essentials, tips and exercise
Shell Scripting Learn Linux Shell Programming Step-By-Step
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner|s Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing
Ultimate SQL Server and Azure SQL for Data Management and Modernization Full Spectrum Expert Solutions for Deploying, Securing, and Optimizing SQL Server in Linux, Cloud, and Hybrid Environments with
Ultimate SQL Server and Azure SQL for Data Management and Modernization Full Spectrum Expert Solutions for Deploying, Securing, and Optimizing SQL Server in Linux, Cloud, and Hybrid Environments with
Linux на примерах. Практика практика и только практика