Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
sendmail Performance Tuning
sendmail Performance Tuning

"This book is great. Nick covers a wide range of materials--everything from how to architect the mail system and what disks to buy to how to configure your router. This book should be a basic reference for anyone who needs to get down into the guts of a sendmail-based system and make it shine."-Eric Allman, the...

HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Hardening Linux
Hardening Linux

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as...

Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Learn the skills to complete the full installation, configuration, and maintenance of an enterprise class internet server, no matter what Unix-like operating system you prefer. This book will rapidly guide you towards real system administration, with clear explanations along the way.

After a chapter explaining the most...

Secure Messaging with Microsoft  Exchange Server 2003
Secure Messaging with Microsoft Exchange Server 2003

Get expert guidance to assess and help improve the security of your Exchange Server 2003 messaging systems. From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange...

Professional PHP Programming
Professional PHP Programming
This book covers middle-tier programming with PHP.

PHP is a server-side, HTML-embedded scripting language. It is an open source technology, rapidly gaining popularity as a scripting language for people running dynamic websites. One of its major attractions over Perl, JavaScript and other scripting languages is that PHP has a built-in
...
Mastering XPages: A Step-by-Step Guide to XPages Application Development and the XSP Language
Mastering XPages: A Step-by-Step Guide to XPages Application Development and the XSP Language

I never got a chance to meet the inventors of Notes®, but these guys were true visionaries. Their concepts and ideas of 20 years ago still feed today’s buzz. They invented a robust “NO SQL” data store, provided a social platform with collaboration features, and made the deployment and replication of applications...

Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services

Manage complex systems with ease and equip yourself for a new career. This book builds upon the skills you learned in Volumes 1 and 2 of this course and it depends upon the virtual network and virtual machine you created there. 

However, more experienced Linux users can begin with this volume and download an...

Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
JavaMail API
JavaMail API
Email was the Internet’s first killer app. One of the most frequently asked questions about Java is how to send email from a Java applet or application. While it’s certainly possible to write a Java program that uses sockets to communicate with mail servers, this requires detailed knowledge of some fairly...
Setting Up LAMP: Getting Linux, Apache, MySQL, and PHP Working Together
Setting Up LAMP: Getting Linux, Apache, MySQL, and PHP Working Together
You could think of Setting Up LAMP as four books in one, but it's actually something much more valuable: a single volume that presents the open-source technologies known collectively as LAMP— Linux, Apache, MySQL, and PHP—as tightly dovetailed components of today’s most affordable and effective platform...
unlimited object storage image
Result Page: 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy