Protect your network with Snort: the high-performance, open source IDS
Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...
If you are a web developer who has already realized the power of Ruby on Rails but wants to take your Rails knowledge further, this book will be invaluable to you. Practical Rails Projects assumes you know the basics of using the framework, concentrating instead on taking you through the creation of a multitude of practical real-world...
Domain-Specific Modeling (DSM) is the latest approach to software development, promising to greatly increase the speed and ease of software creation. Early adopters of DSM have been enjoying productivity increases of 500–1000% in production for over a decade. This book introduces DSM and offers examples from various fields to illustrate to...
The Intel CPU architecture has evolved over 3 decades from a 1 6 bit
CPU with no memory protection, through a period with 32 bit processors
with sophisticated architectures into the current series of processors which
support all the old modes of operation in addition to a greatly expanded
64 bit mode of operation. Assembly...
Learning how to write C/C++ code is only the first step. To be a serious programmer, you need to understand the structure and purpose of the binary files produced by the compiler: object files, static libraries, shared libraries, and, of course, executables.
Advanced C and C++ Compiling explains the build process in...
If you are pretty handy with PHP, this book is the perfect way to access and understand the features of Zend Framework 2. You can dip into the recipes as you wish and learn at your own pace.
Overview
Recipes to help you create, test, and optimize your applications
Apache, MySQL, PHP3, and IMP the pieces exist. Each piece has been described ad nauseam. What does not exist is a guide to the marriage of these software technologies into a useful book, until now. This book puts together information on installing, setting up, and troubleshooting each of these technologies into one complete...
I discovered Gaim in the AOL Instant Messenger (AIM) user profile of a friend about five years ago. I didn’t know a lot about Linux then. I knew that it was a free implementation of UNIX with publicly available source code, but my previous experiences with UNIX comprised staring at a shell prompt, trying to type cryptic...
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment
Overview
Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing
The Definitive Guide to SUSE Linux Enterprise Server 12 is a task-oriented book designed for self-study as well as classroom environments, which will also serve you as a reference guide. The book covers all skills that system administrators typically need to posses to administer SUSE Linux Enterprise Server in corporate environments....