Postfix: The Definitive GuidePostfix is a Mail Transfer Agent (MTA): software that mail servers use to route email. Postfix is highly respected by experts for its secure design and tremendous reliability. And new users like it because it's so simple to configure. In fact, Postfix has been adopted as the default MTA on Mac OS X. It is also compatible with sendmail, so that existing scripts and programs continue to work seamlesslyafter it is installed.
Postfix was written by well-known security expert Wietse Venema, who reviewed this book intensively during its entire development. Author Kyle Dent covers a wide range of Postfix tasks, from virtual hosting to controls for unsolicited commercial email. ...
Linux Network Administrator's Guide, 3rd EditionThe Linux Network Administrator's Guide, 3rd Edition dispenses all the practical advice you need to join a network. Along with some hardware considerations, this highly acclaimed guide takes an in-depth look at all of the essential networking software that comes with the operating system - including basic infrastructure (TCP/IP, wireless networking, firewalling) and the most popular services on Linux systems. But as the follow-up to a classic, the third edition of the Linux Network Administrator's Guide does more than just spruce up the basics. ...
Linux FirewallsSystem administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.
Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop. ...
Master Your MacOS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.
If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security, author Matt Cone will show you how to tweak, customize, and control your Mac. And since many of the best tools for unlocking your Mac's potential don't come with OS X, you'll discover the best apps to fix those everyday Apple annoyances and make your computer do things your way. ...
Starting an Online Business For Dummies, 6th EditionIs there a fortune in your future? Start your own online business and see what happens. Whether you're adding an online component to your current bricks-and-mortar or hoping to strike it rich with your own online startup, the sixth edition of this popular and practical guide can help.
Find out how to identify a market need, handle promotion, choose Web hosting services, set up strong security, pop up prominently in search engine rankings, and more. The book explores the hottest business phenomenon today - social media marketing - with full coverage of Twitter, Facebook, blogs, and other technologies that are now firmly part of the online business landscape. ...
Programming GrailsDig deeper into Grails architecture and discover how this application framework works its magic. Written by a core developer on the Grails team, this practical guide takes you behind the curtain to reveal the inner workings of its 2.0 feature set. You'll learn best practices for building and deploying Grails applications, including performance, security, scaling, tuning, debugging, and monitoring.
Understand how Grails integrates with Groovy, Spring, Hibernate, and other JVM technologies, and learn how to create and use plugins to augment your application's functionality. Once you know how Grails adds behavior by convention, you can solve problems more easily and develop applications more intuitively. ...
Third-Party JavaScriptThere's an art to writing third-party JavaScript - embeddable scripts that can plug into any website. They must adapt easily to unknown host environments, coexist with other applications, and manage the tricky security vulnerabilities you get when code and asset files are served from remote web addresses. Get it right and you have unlimited options for distributing your apps. This unique book shows you how.
Third-Party JavaScript guides you through the ins and outs of building full-featured third-party JavaScript applications. ...
Linux BibleThis completely revamped edition covers the familiar Linux flavors as well as some exciting new distributions-Ubuntu, Mepis, Arch Linux, and four others.
Ideal for users planning the transition to Linux who want to sample different distributions to see which one best meets their needs.
Includes new sections on practical uses for Linux, cool multimedia apps, instant messaging, BitTorrent, and improved security techniques.
Valuable information for system administrators who need to set up secure, fully functioning Linux servers. ...
Flash and PHP BibleThe demand for rich Internet applications (RIAs) such as complete storefronts and interactive surveys is skyrocketing, as is the pressure to create these dynamic apps overnight and at low cost. This in-depth Bible provides the step-by-step instructions you need to quickly create RIAs in Flash using cost-effective, open-source PHP programming tools. You'll learn how PHP works, when you should use it in Flash, and above all, vital security techniques for keeping your interactive sites secure. ...
Practical Intrusion AnalysisRecently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field's leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers. ...