Up and Running with Joomla, 2nd EditionNeed to launch a feature-rich website quickly where you have one or more people authoring the content? Want to use a powerful, robust, and scalable Content Management System (CMS) you can trust? This Short Cut will get you up and running with Joomla 1.5, a freely available open source CMS. Learn how to install, configure, customize, and extend your Joomla installation. Also learn the tricks of the trade in how to set up and manage both your content and your users. Joomla can be a challenge to understand at first, so drastically cut your "get up to speed" time by taking the Short Cut! ...
Unix for Oracle DBAs Pocket ReferenceIf you are an Oracle DBA moving to Unix from another environment such as Windows NT or IBM Mainframe, you know that the commands you need to learn are far different from those covered in most beginning Unix books. In this handy pocket-sized book, Don Burleson introduces those Unix commands that you as an Oracle DBA most need to know. ...
Understanding MySQL InternalsAlthough MySQL's source code is open in the sense of being publicly available, it's essentially closed to you if you don't understand it. This book provides a comprehensive tour of MySQL 5 that shows you how to figure out the inner-workings of this powerful database. You'll learn how data structures and convenience functions operate, how to add new storage engines and configuration options, and much more. ...
UML 2.0 in a NutshellThis comprehensive guide has been fully revised to cover UML 2.0, today's standard method for modeling software systems. Packed with concise information, it's been crafted to help IT professionals read, create, and understand system artifacts expressed using UML. Also includes an example-rich tutorial for those who need familiarizing with the system. ...
Ubuntu HacksLike all books in the "Hacks" series, Ubuntu Hacks includes 100 quick tips and tricks for all users of all technical levels. Beginners will appreciate the installation advice and tips on getting the most out of the free applications packaged with the Ubuntu Linux distribution, while intermediate and advanced readers will learn the ins-and-outs of power management, wireless roaming, 3D video acceleration, server configuration, and much more. ...
TapworthySo you've got an idea for an iPhone app -- along with everyone else on the planet. Set your app apart with elegant design, efficient usability, and a healthy dollop of personality. Tapworthy takes you from concept to polished interface design with plain-spoken principles and a rich collection of visual examples for designing exceptional interfaces for the iPhone and iPod Touch. ...
Python for Unix and Linux System AdministrationPython is an ideal language for solving problems, especially for Linux and Unix. With this pragmatic book, administrators can review various tasks that often occur in the management of these systems, and learn how Python can provide a more efficient way to handle them. Once you finish this book, you'll be able to develop your own set of command-line utilities with Python to tackle a wide range of problems. ...
SEO WarriorHow can you make it easier for people to find your website? And how can you convert casual visitors into active users? SEO Warrior shows you how it's done through a collection of tried and true techniques, hacks, and best practices. Learn the nuts and bolts of SEO theory, the importance of keyword strategy, and how to avoid and remedy search engine traps. This book serves as a tutorial, and as a reference guide for implementing effective SEO techniques. ...
Security Power ToolsWhat if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. ...
Security MonitoringHow well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network -- first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. These recommendations will help you select and deploy the very best tools to monitor your own enterprise network. ...