This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...
This second edition of Foundations of Python Network Programming targets Python 2.5 through Python 2.7, the most popular production versions of the language. Python has made great strides since Apress released the first edition of this book back in the days of Python 2.3. The advances required new chapters to be written from the ground up,...
This is the industry’s most comprehensive, realistic, and useful guide to Microsoft Lync Server 2010. It brings together “in-the-trenches” guidance for all facets of planning, integration, deployment, and administration, from expert consultants who’ve spent years implementing Microsoft Unified...
Over the years as power costs have soared and data center space has become scarce and expensive
to acquire, enterprises and small businesses have been looking for ways to decrease their data center
footprints as well as reduce the overall costs of operating an IT infrastructure. As the number of
different applications being deployed in...
Active Directory is a common repository for information about objects that reside on
the network, such as users, groups, computers, printers, applications, and files. The
default Active Directory schema supports numerous attributes for each object class that
can be used to store a variety of information. Access Control Lists (ACLs) are...
Thanks for buying the Windows Server 2008 Portable Command Guide: MCTS 70-640,
70-642, 70-643, and MCITP 70-646, 70-647 . I’d love to say that this book was my idea,
but the real credit goes to Scott Empson who originally developed the vision of this
book with Cisco certifications. I’ve worked with Scott and Pearson...
The book is full of immediately-usable task-based recipes for managing and maintaining your Microsoft Exchange 2010 environment with Windows PowerShell 2.0 and the Exchange Management Shell. The focus of this book is to show you how to automate routine tasks and solve common problems. While the Exchange Management Shell provides hundreds of...
This book is all about wrangling a herd of network computers so that all
display the correct time. This may seem like a really narrow business,
but the issues go far beyond winding the clock on your display taskbar.
Carefully coordinated, reliable, and accurate time is vital for traffic control
in the air and on the ground, buying and...
pfSense is an open source distribution of FreeBSD-based firewall which provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options which, compared to other offerings, makes determining requirements a little more difficult and a lot more important....
Welcome to Windows Server 2012 Inside Out. As the author of many popular technology books, I’ve been writing professionally about Windows and Windows Server since 1994. Over the years, I’ve gained a unique perspective—the kind of perspective you can gain only after working with technologies for many years. The...
Automating server tasks allows administrators to repeatedly perform the same, or similar, tasks over and over again. With PowerShell scripts, you can automate server tasks and reduce manual input, allowing you to focus on more important tasks.
Windows Server 2012 Automation with PowerShell will show several ways for a Windows...