Welcome to SearchEnterpriseLinux.com's library for IT professionals. Here you'll find links to our most popular chapter downloads. Sneak a peak at the books. Then, if you liked what you read check out the companion tips and author interviews. If there's something missing that you'd like to see, let us know in an email.
|Beginning Databases with PostgreSQL
|PostgreSQL vs. SQL Server, Oracle: Enterprise-ready and able to compete
Why pay licensing costs and maintenance fees for proprietary databases when you can get open source RDBMS PostgreSQL for free? Discover the drawbacks and advantages to using PostgreSQL over Oracle or SQL Server.
Open source databases place pressure on Oracle, SQL Server
Open source RDBMS PostgreSQL is making its way into business' software portfolios. Find out where PostgreSQL is best put to use and why businesses prefer a big name product.
|User Mode Linux
|User Mode Linux: Maximizing performance, jailing attackers
In this interview, User Mode Linux author and project architect Jeff Dike gives security tips on UML and discusses why, in some ways, UML is better than Xen and VMware.
Virtual operating systems, virtual machines
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
|Red Hat Fedora 5 Unleashed
|Fedora Core 5: Virtualization-capable and ready to go
If you're into paravirtualization and Xen capabilities, then Fedora Core 5 is preferable to CentOS and the latest release of RHEL, says Paul Hudson, co-author of Red Hat Fedora 5.
Fedora Core 5: Driver and installation dos and don'ts
In this tip, discover how to avoid hardware drivers that could upset your Fedora Core 5 installation and how to maximize your use of Yum.
|Pro Nagios 2.0
|Nagios offers open source option for network monitoring
IT shops using HP or BMC monitoring tools might want to take Nagios for a test-drive. Pro Nagios 2.0 author James Turnbull explains why.
|PGP & GPG: Email for the Practical Paranoid
|E-mail privacy with PGP
Using PGP and GPG for e-mail encryption, decryption and digital signatures can give you the keys to digital security and keep your IT shop safe from spoofing and hacking.
IT Managers: PGP is easy
Save yourself a security headache and adopt the easy to use, comprehensive e-mail encryption tool known as PGP. Learn just what it has to offer your IT shop.
|Phish tales: Worse on Linux or Windows?
Phishing expert Lance James differentiates between media hype and legitimate security concerns. He exposes Windows and Linux flaws.
Phish tales: Flawed and fishy defenses
Phishing expert Lance James describes the failures of some IT security defenses against phishing.
Download Chapter 5, The dark side of the Web, of Phishing Exposed
|Test Driving Linux: From Windows to Linux in 60 Seconds
|The case for Konqueror over IE and Windows file managers
The author of the new book Test Driving Linux: From Windows to Linux in 60 Seconds explains how open source Konqueror compares to Internet Explorer and Firefox.
|Peter van der Linden's Guide to Linux
|Why Linux isn't too fat & Microsoft hurts customers
The author of the new book Peter van der Linden's Guide to Linux talks about the progress of desktop Linux, GNOME vs. KDE, and 'dirt' on Microsoft's desktop plans.