Linux users can quickly filter and protect their Internet connections from attackers by following the steps in this guide, which covers Linux firewall implementation, configuration and troubleshooting. Users are pointed to a Web site with software that will assist in implementation.
Read More
Linux users can quickly filter and protect their Internet connections from attackers by following the steps in this guide, which covers Linux firewall implementation, configuration and troubleshooting. Users are pointed to a Web site with software that will assist in implementation.
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Very Good. Very Good condition. 2nd edition. A copy that may have a few cosmetic defects. May also contain light spine creasing or a few markings such as an owner's name, short gifter's inscription or light stamp. Bundled media such as CDs, DVDs, floppy disks or access codes may not be included.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Good condition. 2nd edition. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. Bundled media such as CDs, DVDs, floppy disks or access codes may not be included.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Good condition. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains.