Apache Cookbook, 2nd EditionThere's plenty of documentation on installing and configuring the Apache web server, but where do you find help for the day-to-day stuff, like adding common modules or fine-tuning your activity logging? That's easy. The new edition of the Apache Cookbook offers you updated solutions to the problems you're likely to encounter with the new versions of Apache.
Written by members of the Apache Software Foundation, and thoroughly revised for Apache versions 2.0 and 2.2, recipes in this book range from simple tasks, such installing the server on Red Hat Linux or Windows, to more complex tasks, such as setting up name-based virtual hosts or securing and managing your proxy server. ...
FileMaker Pro 13: The Missing ManualYou don't need a technical background to build powerful databases with FileMaker Pro 13. This crystal-clear guide covers all new FileMaker Pro 13 features, such as its improved layout tools and enhanced mobile support. Whether you're running a business, printing a catalog, or planning a wedding, you'll learn how to customize your database to run on a PC, Mac, Web browser, or iOS device. ...
Linux Thin Client Networks Design and DeploymentA thin client network is a client-server architecture where client computers depend primarily on a central server for processing activities. The client machines (thin clients) mainly focus on passing user input to remote services and receiving and displaying the output; thin clients aren't as much about the hardware or software as about the design.
This book has all the information you need to easily set up your own Linux thin client network. It will help you evaluate how a thin client network fits into your organization and make informed choices on the hardware and software needed for your deployment, discusses design issues, and guides you with building, configuring, and supporting the network. ...
Metasploit Penetration Testing CookbookMetasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.
Metasploit Penetration Testing Cookbook targets both professionals and beginners to the framework. The chapters of the book are logically arranged with an increasing level of complexity and cover Metasploit aspects ranging from pre-exploitation to the post-exploitation phase thoroughly. The recipe structure of the book provides a good mix of both theoretical understanding and practical implementation. ...
VMware Workstation - No Experience NecessaryVMware Workstation runs on Linux as well as Windows hosts and handles different virtual machine formats, which allows you to share your work with users of other virtualization platforms, including VirtualBox, VMware Player, and VMware vSphere environments.
VMware Workstation - No Experience Necessary helps you in getting started with VMware Workstation. You'll learn how to install VMware Workstation in any circumstance, and how to create virtual machines and keep different configurations for each virtual machine, which helps in setting up extensive test environments. You'll also learn how to share these virtual machines with users of other virtualization products as well as the cloud. ...
Reporting with Microsoft SQL Server 2012Starting with the difference between standard and self- service reporting, this book covers the main features and functionality offered in SQL Server Reporting Services 2012 including a breakdown of the report components, development experience, extensibility, and security. You will also learn to set up and use Power View within Excel and SharePoint and connect to a tabular model as well as a multidimensional model. The book provides real-life reporting scenarios that help to clarify when those scenarios are discussing standard reporting, in which case SSRS is the best choice, and when they are discussing self-service reporting, in which case Power View is the best choice. ...
Blender Compositing and Post ProcessingBlender Compositing allows you to assemble and enhance an image (or movie). Using Composition nodes, you can glue two pieces of footage together and colorize the whole sequence all at once. You can enhance the colors of a single image or an entire movie clip in a static manner or in a dynamic way that changes over time (as the clip progresses).
Blender Compositing and Post Processing enables you to attain a firm grounding in order to arrive at a desired look of the film, with more ease and efficiency. You will also learn how to create and manage compositing flows that are effective and productive in meeting project deadlines. ...
Implementing SugarCRMSugarCRM is a popular customer relationship management system. It is available in both free open source and commercial versions, making it an ideal way for small-medium business to try out a CRM system without committing large sums of money. Although SugarCRM is carefully designed for ease of use, attaining measurable business gains requires careful planning and research. This book distils hard won SugarCRM experienced into an easy to follow guide to implementing the full power of SugarCRM. SugarCRM is an extensive PHP/MySQL based application but with its rich administration interfaces no programming is required to get the most of it. ...
Clojure High Performance ProgrammingClojure is a young, dynamic, functional programming language that runs on the Java Virtual Machine. It is built with performance, pragmatism, and simplicity in mind. Like most general purpose languages, Clojure's features have different performance characteristics that one should know in order to write high performance code.
Clojure High Performance Programming is a practical, to-the-point guide that shows you how to evaluate the performance implications of different Clojure abstractions, learn about their underpinnings, and apply the right approach for optimum performance in real-world programs. ...
Learning Nessus for Penetration TestingIT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most important and commonly performed security activities across organizations today. The Nessus tool gives the end user the ability to perform these kinds of security tests quickly and effectively.
Nessus is a widely used tool for vulnerability assessment, and Learning Nessus for Penetration Testing gives you a comprehensive insight into the use of this tool. This book is a step-by-step guide that will teach you about the various options available in the Nessus vulnerability scanner tool so you can conduct a vulnerability assessment that helps to identify exposures in IT infrastructure quickly and efficiently. This book will also give you an insight into penetration testing and how to conduct compliance checks using Nessus. ...