Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Based on the Linux 2.6 kernel, this title reveals Linux attacks, countermeasures, and case studies. It helps to learn how to secure any version of Linux that you are running.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.