1
by Buchanan, Cameron
Published 2014
Packt Pub.
Table of Contents: ...Exploitation guides -- Scenario 1 -- smashing Samba -- Scenario 2 -- exploiting XAMPP -- Scenario 3...

2
by Blum, Richard
Published 2009
Wiley
Table of Contents: ... and graphics -- Playing with Google gadgets -- Adding software to Linux -- Working without the GUI -- Basic...

3
by Watters, Paul A.
Published 2002
O'Reilly
Table of Contents: ...; System Accounts; Choosing Passwords; Superuser; User Cleanup Procedures; The Groups File; Software...

4
by LeBlanc, Dee-Ann
Published 2007
Wiley
Table of Contents: ... software to Linux -- Ch. 17. Basic system administration -- Ch. 18. A secure Linux box is a happy Linux box...

5
by Boyce, Gregory
Published 2016
Packt Publishing
... with how to set up a Linux server and how to install additional software on them....

6
by Carter, Gerald
Published 2003
O'Reilly
Table of Contents: ...8.3. User Authentication with Samba8.3.2. Adding and Using a sambaAccount; 8.4. FreeRadius; 8.5...

7
by McNab, Chris
Published 2007
O'Reilly
Table of Contents: ... Software -- Operating Systems -- Reconnaissance Tools -- Network Scanning Tools -- Exploitation Frameworks...

8
by Chapple, Mike, Seidl, David
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ...Credential Testing Tools 22 -- Debuggers and Software Testing Tools 22 -- Network Testing 23...