Running Linux, 5th EditionYou may be contemplating your first Linux installation. Or you may have been using Linux for years and need to know more about adding a network printer or setting up an FTP server. Running Linux, now in its fifth edition, is the book you'll want on hand in either case. Widely recognized in the Linux community as the ultimate getting-started and problem-solving book, it answers the questions and tackles the configuration issues that frequently plague users, but are seldom addressed in other books.
This fifth edition of Running Linux is greatly expanded, reflecting the maturity of the operating system and the teeming wealth of software available for it. Hot consumer topics suchas audio and video playback applications, groupware functionality, and spam filtering are covered, along with the basics in configuration and management that always have made the book popular. ...
Linux FirewallsSystem administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.
Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop. ...
Active Directory, 4th EditionTo help you take full advantage of Active Directory, this fourth edition of this bestselling book gives you a thorough grounding in Microsoft's network directory service. With Active Directory, you'll learn how to design, manage, and maintain an AD infrastructure, whether it's for a small business network or a multinational enterprise with thousands of resources, services, and users.
This detailed and highly accurate volume covers Active Directory from its origins in Windows 2000 through Windows Server 2008. But unlike typical dry references, Active Directory presents concepts in an easy-to-understand, narrative style.
With this book, you will:Get a complete review of all the new Windows 2008 featuresLearn how Active Directory works with Exchange and PowerShellTake advantage of the updated scripting and programming chapters to automate AD tasksLearn how to be more efficient with command-line toolsGrasp concepts easily with the help of nume ...
VoIP For DummiesSee how to get started with VoIP, how it works, and why it saves you money
VoIP is techspeak for "voice over Internet protocol," but it could spell "saving big bucks" for your business! Here's where to get the scoop in plain English. Find out how VoIP can save you money, how voice communication travels online, and how to choose the best way to integrate your phone system with your network at home or at the office. ...
Google+ For Dummies, Portable EditionGoogle+ is Google's new social network and from day one it has had the social media world abuzz with excitement. Early fans claim it's easier to use than Facebook and Twitter and has a wealth of creative new features. If you want to learn how to navigate this new social neighborhood, take along Google+ For Dummies as your guide. Early Google+ adopter and social media consultant Jesse Stay shows you how to get started, create a profile, set up privacy settings, chat, post, control who sees what, and much more. ...
Visio 2003 BibleProviding comprehensive coverage of Visio's large feature set for technical and engineering professionals, the book begins with a quick introduction to the intuitive interface. This book quickly moves into the specialized stencils, shapes, and templates used in software and network design and documentation, engineering disciplines, and project management. Features strong coverage of Visio's tight integration with other Microsoft Office products and as well as its interoperability with related products from other vendors, including AutoCad. ...
Advanced Penetration Testing for Highly-Secured EnvironmentsAdvanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environments that have been secured using IDS/IPS, firewalls, network segmentation, hardened system configurations and more. The stages of a penetration test are clearly defined and addressed using step-by-step instructions that you can follow on your own virtual lab.
You'll learn how to clean up and compile proof of concept, exploit code from the web, advanced web application testing techniques, client side attacks, post exploitation strategies, detection avoidance methods, generation of well defined reports and metrics, and setting up a penetration testing virtual lab that mimics a secured environment. ...
70-411 Administering Windows Server 2012This 70-411 Administering Windows Server 2012 textbook covers the second of three exams required for Microsoft Certified Solutions Associate (MCSA): Windows Server 2012 certification. This course will help validate the skills and knowledge necessary to administer a Windows Server 2012 Infrastructure in an enterprise environment. The three MCSA exams collectively validate the skills and knowledge necessary for implementing, managing, maintaining, and provisioning services and infrastructure in a Windows Server 2012 environment. This Microsoft Official Academic Course is mapped to the 70-411 Administering Windows Server 2012 exam objectives. This textbook focuses on real skills for real jobs and prepares students to prove mastery of core services such as user and group management, network access, and data security. ...
Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT and L7-filterImplementing Packet filtering, NAT, bandwidth shaping, packet prioritization using netfilter/iptables, iproute2, Class Based Queuing (CBQ) and Hierarchical Token Bucket (HTB); Designing and implementing 5 real-world firewalls and QoS scenarios ranging from small SOHO offices to a large scale ISP network that spans many cities; Building intelligent networks by marking, queuing, and prioritizing different types of traffic. ...
Juniper SRX SeriesThis complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper's SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based on their extensive field experience.
While their earlier book, Junos Security, covered the SRX platform, this book focuses on the SRX Series devices themselves. You'll learn how to use SRX gateways to address an array of network requirements—including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Along with case studies and troubleshooting tips, each chapter provides study questions and lots of useful illustrations. ...