Search Results for - Narrowed by: Computer Security - Linux. - Systèmes d'exploitation (Ordinateurs)SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bSecurity$002509Computer$002bSecurity$0026qf$003dSUBJECT$002509Subject$002509Linux.$002509Linux.$0026qf$003dSUBJECT$002509Subject$002509Syst$0025C3$0025A8mes$002bd$002527exploitation$002b$002528Ordinateurs$002529$002509Syst$0025C3$0025A8mes$002bd$002527exploitation$002b$002528Ordinateurs$002529$0026ps$003d300?2024-06-21T01:10:29ZLinux annoyances for geeksent://SD_ILS/0/SD_ILS:22821662024-06-21T01:10:29Z2024-06-21T01:10:29Zby Jang, Michael H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0596008015/?ar">https://go.oreilly.com/library-access/library/view/-/0596008015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008015/?ar">https://learning.oreilly.com/library/view/~/0596008015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0596008015">https://learning.oreilly.com/library/view/~/0596008015</a><br/>Format: Electronic Resources<br/>Maximum Linux security : a hacker's guide to protecting your Linux server and workstationent://SD_ILS/0/SD_ILS:22811372024-06-21T01:10:29Z2024-06-21T01:10:29Z<a href="https://learning.oreilly.com/library/view/~/0672316706/?ar">https://learning.oreilly.com/library/view/~/0672316706/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0672316706/?ar">https://go.oreilly.com/library-access/library/view/-/0672316706/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0672316706">https://learning.oreilly.com/library/view/~/0672316706</a><br/>Format: Electronic Resources<br/>