Linux FirewallsSystem administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.
Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop. ...
Microsoft Project 2013: The Missing ManualGet up to speed on Microsoft Project 2013 and learn how to manage projects large and small. This crystal-clear book not only guides you step-by-step through Project 2013's new features, it also gives you real-world guidance: how to prep a project before touching your PC, and which Project tools will keep you on target. With this Missing Manual, you'll go from project manager to Project master. ...
VoIP For DummiesSee how to get started with VoIP, how it works, and why it saves you money
VoIP is techspeak for "voice over Internet protocol," but it could spell "saving big bucks" for your business! Here's where to get the scoop in plain English. Find out how VoIP can save you money, how voice communication travels online, and how to choose the best way to integrate your phone system with your network at home or at the office. ...
Linux BibleThis completely revamped edition covers the familiar Linux flavors as well as some exciting new distributions-Ubuntu, Mepis, Arch Linux, and four others.
Ideal for users planning the transition to Linux who want to sample different distributions to see which one best meets their needs.
Includes new sections on practical uses for Linux, cool multimedia apps, instant messaging, BitTorrent, and improved security techniques.
Valuable information for system administrators who need to set up secure, fully functioning Linux servers. ...
Advanced Penetration Testing for Highly-Secured EnvironmentsAdvanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environments that have been secured using IDS/IPS, firewalls, network segmentation, hardened system configurations and more. The stages of a penetration test are clearly defined and addressed using step-by-step instructions that you can follow on your own virtual lab.
You'll learn how to clean up and compile proof of concept, exploit code from the web, advanced web application testing techniques, client side attacks, post exploitation strategies, detection avoidance methods, generation of well defined reports and metrics, and setting up a penetration testing virtual lab that mimics a secured environment. ...
Asterisk: The Definitive Guide, 4th EditionDesign a complete Voice over IP (VoIP) or traditional PBX system with Asterisk, even if you have only basic telecommunications knowledge. This bestselling guide makes it easy, with a detailed roadmap that shows you how to install and configure this open source software, whether you're upgrading your existing phone system or starting from scratch.
Ideal for Linux administrators, developers, and power users, this updated edition shows you how to write a basic dialplan step-by-step, and brings you up to speed on the features in Asterisk 11, the latest long-term support release from Digium. You'll quickly gain working knowledge to build a simple yet inclusive system. ...
MongoDB: The Definitive Guide, 2nd EditionManage the huMONGOus amount of data collected through your web application with MongoDB. This authoritative introduction—written by a core contributor to the project—shows you the many advantages of using document-oriented databases, and demonstrates how this reliable, high-performance system allows for almost infinite horizontal scalability.
This updated second edition provides guidance for database developers, advanced configuration for system administrators, and an overview of the concepts and use cases for other people on your project. Ideal for NoSQL newcomers and experienced MongoDB users alike, this guide provides numerous real-world schema design examples. ...
Mastering Unix Shell ScriptingProvides readers with end-to-end shell scripts that can be used to automate repetitive tasks and solve real-world system administration problems.
Targets the specific command structure for four popular UNIX systems: Solaris, Linux, AIX, and HP-UX.
Illustrates dozens of example tasks, presenting the proper command syntax and analyzing the performance gain or loss using various control structure techniques. ...
Advanced Dynamic-system SimulationLearn the latest techniques in programming sophisticated simulation systems.
This cutting-edge text presents the latest techniques in advanced simulation programming for interactive modeling and simulation of dynamic systems, such as aerospace vehicles, control systems, and biological systems. The author, a leading authority in the field, demonstrates computer software that can handle large simulation studies on standard personal computers. ...
WordPress 3 CookbookUsing the WordPress Content Management System, you can create a beautiful, dynamic, and amazing website. WordPress is a flexible and powerful tool that's ideal for creating both blog and non-blog websites. Are you feeling limited with WordPress, or are you wondering how popular blogs do a certain kind of thing that you can't?
WordPress 3 Cookbook focuses on providing solutions to common WordPress problems so that you can translate your site to one of the best. The author's experience with WordPress enables him to share insights on using WordPress effectively, in a clear and friendly way, giving practical hands-on solutions to WordPress problems, questions, and common tasks - from themes to widgets and from SEO to security. ...