Monday, October 31, 2011

Red Hat® Linux® 8: The Complete Reference DVD Edition

Red Hat® Linux® 8: The Complete Reference DVD Edition Review



This guide takes the reader through how to install, configure and manage Red Hat 8. Each section focuses on the different ways Red Hat presents its distribution: as a desktop workstation, network workstation, server, and development platform.


Security Engineering: A Guide to Building Dependable Distributed Systems

Security Engineering: A Guide to Building Dependable Distributed Systems Review



The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.


Sunday, October 30, 2011

Red Hat Linux 6.0 Administration Tools

Red Hat Linux 6.0 Administration Tools Review



In the UNIX TOOLS series, a quick start guide and a quick fix guide to provide answers to the most common problems faced by UNIX administrators. The CD-ROM contains the latest version of the operating system along with software tools and utilities to build reports on the usage of the server.


Saturday, October 29, 2011

PROTEGRITY OFFERS SECURE.DATA FOR RED HAT ENTERPRISE LINUX.: An article from: UNIX Update

PROTEGRITY OFFERS SECURE.DATA FOR RED HAT ENTERPRISE LINUX.: An article from: UNIX Update Review



This digital document is an article from UNIX Update, published by Thomson Gale on December 1, 2005. The length of the article is 546 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.

Citation Details
Title: PROTEGRITY OFFERS SECURE.DATA FOR RED HAT ENTERPRISE LINUX.
Publication:UNIX Update (Newsletter)
Date: December 1, 2005
Publisher: Thomson Gale
Volume: 16 Issue: 12 Page: NA

Distributed by Thomson Gale


Friday, October 28, 2011

In Search of Stupidity: Over Twenty Years of High Tech Marketing Disasters

In Search of Stupidity: Over Twenty Years of High Tech Marketing Disasters Review



This second edition of In Search of Stupidity includes new chapters on Google, Knowing How to Avoid Stupidity, and other topics, plus extensive analyses of all chapters in the first edition.

This book is National Lampoon meets Peter Drucker. It's a funny and well-written business book that takes a look at some of the most influential marketing and business philosophies of the last 20 years and, through the dark glass of hindsight, provides an educational and vastly entertaining examination of why they didn't work for many of the countries largest and best-known high-tech companies. Make no mistake: most of them did not work.


Thursday, October 27, 2011

Voice over Ip (VoIp): High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

Voice over Ip (VoIp): High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors Review



Voice over Internet Protocol (Voice over Ip, VoIp) is one of a family of internet technologies, communication protocols, and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (Ip) networks, such as the Internet. Other terms frequently encountered and often used synonymously with VoIp are Ip telephony, Internet telephony, voice over broadband (VoBb), broadband telephony, and broadband phone.

This book is your ultimate resource for VoIp. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about VoIp right away, covering: Voice over Ip, 1legcall, Voice Funnel, Arbinet, Call-recording software, Generic Access Network, International gateway, Internet telephony service provider, Iobi, VoIp phone, Ip-Dect, Media phone, Mobile VoIp, MoIp, One Source Networks, Peer-to-peer Sip, Purple minutes, Sip connection, Sip provider, Telephone VoIp Adapter, Uma Today, VoAtm, Voice engine, Voice over Wlan, VoIp recording, VoIp Vpn, Web-based VoIp, 8x8, Aastra Technologies, Aculab, Apex Internet, Apptix, At&T CallVantage, AudioCodes, Avst, BabyTel, Bandwidth.com, BlueFace, Bond Wireless, Brekeke Pbx, Brekeke Sip Server, BroadVoice, Broadvox Communications, Callware, Clearwire, Com Hem, Comcast, Covad, Damovo, Deltathree, Dialogic Corporation, Dreamtilt, EarthLink, Eicon, Engin Limited, Eventis, FaktorTel, Fastweb (telecommunications company), Fibernetics Corporation, Free World Dialup, Freephoneline.ca, Freshtel, Gizmo5, GlobalRoam, Grasshopper (company), HipVoice, IconnectHere, Inphonex, Internode (Isp), Ipdrum, Ipkall, Iristel, Jajah, Jaxtr, Lingo (VoIp Service operator), Mind Cti, Mitel, Mkc Networks, Mobivox, Morodo, Nec Unified Solutions, NetTalk, NextGenTel, Nokia Siemens Networks,


Red Hat Enterprise Linux 5 Administration Unleashed

Red Hat Enterprise Linux 5 Administration Unleashed Review



This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and deployment through maintenance and troubleshooting. Fox shows how to maximize your efficiency and effectiveness by automating day-to-day maintenance through scripting, deploying security updates via Red Hat Network, implementing central identity management services, and providing shared data with NFS and Samba.

 

Red Hat Enterprise Linux 5 Administration Unleashed contains extensive coverage of network and web services, from the Apache HTTP server and Sendmail email services to remote login with OpenSSH. Fox also describes Red Hat’s most valuable tools for monitoring and optimization and presents thorough coverage of security—including a detailed introduction to Security-Enhanced Linux (SELinux).

 

  • Streamline deployment with Kickstart
  • Find, install, update, remove, and verify software
  • Detect, analyze, and manage hardware
  • Manage storage with LVM, RAID, ACLs, and quotas
  • Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systems
  • Administer users and groups more efficiently and securely
  • Ensure trustworthy backup and rapid recovery
  • Script and schedule tasks to run automatically
  • Provide unified identity management services
  • Configure Apache, BIND, Samba, and Sendmail
  • Monitor and tune the kernel and individual applications
  • Protect against intruders with SELinux and ExecShield
  • Set up firewalls with iptables
  • Enable the Linux Auditing System
  • Use virtualization to run multiple operating systems concurrently

 

Part I     Installation and Configuration

Chapter 1 Installing Red Hat Enterprise Linux

Chapter 2 Post-Installation Configuration

Chapter 3 Operating System Updates

 

Part II Operating System Core Concepts

Chapter 4 Understanding Linux Concepts 

Chapter 5 Working with RPM Software

Chapter 6 Analyzing Hardware

Chapter 7 Managing Storage

Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors


Part III System Administration

Chapter 9 Managing Users and Groups

Chapter 10 Techniques for Backup and Recovery

Chapter 11 Automating Tasks with Scripts

 

Part IV Network Services

Chapter 12 Identity Management

Chapter 13 Network File Sharing

Chapter 14 Granting Network Connectivity with DHCP

Chapter 15 Creating a Web Server with the Apache HTTP Server  

Chapter 16 Hostname Resolution with BIND

Chapter 17 Securing Remote Logins with OpenSSH

Chapter 18 Setting Up an Email Server with Sendmail

Chapter 19 Explaining Other Common Network Services

Part V Monitoring and Tuning

Chapter 20 Monitoring System Resources  

Chapter 21 Monitoring and Tuning the Kernel

Chapter 22 Monitoring and Tuning Applications  

Chapter 23 Protecting Against Intruders with Security-Enhanced Linux  

Chapter 24 Configuring a Firewall

Chapter 25 Linux Auditing System

Appendixes

Appendix A Installing Proprietary Kernel Modules 

Appendix B Creating Virtual Machines  

Appendix C Preventing Security Breaches with ExecShield

Appendix D Troubleshooting



Tammy Fox served as technical leader of Red Hat’s documentation group, where she wrote and revised The Red Hat Enterprise Linux System Administration Guide. She was founding editor of Red Hat Magazine, now an online publication reaching more than 800,000 system administrators and others interested in Linux and open source. She wrote Red Hat’s LogViewer tool and has written and contributed to several Red Hat configuration tools. Fox is also the founding leader of the Fedora Docs Project.

 

Register your book at www.samspublishing.com/register for convenient access to updates and to download example scripts presented in this book.

 

Category: Linux/Networking

Covers: Red Hat Enterprise Linux 5

User Level: Intermediate–Advanced

 


Wednesday, October 26, 2011

The Comingled Code: Open Source and Economic Development

The Comingled Code: Open Source and Economic Development Review



The Comingled Code: Open Source and Economic Development Feature

  • ISBN13: 9780262014632
  • Condition: New
  • Notes: BRAND NEW FROM PUBLISHER! 100% Satisfaction Guarantee. Tracking provided on most orders. Buy with Confidence! Millions of books sold!

Discussions of the economic impact of open source software often generate more heat than light. Advocates passionately assert the benefits of open source while critics decry its effects. Missing from the debate is rigorous economic analysis and systematic economic evidence of the impact of open source on consumers, firms, and economic development in general. This book fills that gap. In The Comingled Code, Josh Lerner and Mark Schankerman, drawing on a new, large-scale database, show that open source and proprietary software interact in sometimes unexpected ways, and discuss the policy implications of these findings. The new data (from a range of countries in varying stages of development) documents the mixing of open source and proprietary software: firms sell proprietary software while contributing to open source, and users extensively mix and match the two. Lerner and Schankerman examine the ways in which software differs from other technologies in promoting economic development, what motivates individuals and firms to contribute to open source projects, how developers and users view the trade-offs between the two kinds of software, and how government policies can ensure that open source competes effectively with proprietary software and contributes to economic development.


Tuesday, October 25, 2011

Samba for Dummies (With CD-ROM)

Samba for Dummies (With CD-ROM) Review



This guide shows administrators how they can use Samba to share files, printers and other devices over a mixed-platform network without installing new software on the Windows client.


Monday, October 24, 2011

Implementing SugarCRM 5.x

Implementing SugarCRM 5.x Review



The book works from the SugarCRM basics right up to advanced features in a clear and friendly way. It follows a combination of theoretical discussions relating to varying business needs and the manner in which CRM technology can address them. By helping you clarify your business goals the book enables you to build a CRM system to support your business needs. If you are a small-medium business owner/manager with reasonable IT skills, a system implementer, or a system administrator who wants to implement SugarCRM for yourself either as a first CRM or as a replacement for existing solutions, this book is for you. Existing SugarCRM users who want to broaden their understanding of the topic will find this book valuable too. No programming knowledge is required to use this book to implement, customize, and use SugarCRM.


Sunday, October 23, 2011

Open Innovation: Researching a New Paradigm

Open Innovation: Researching a New Paradigm Review



Open Innovation describes an emergent model of innovation in which firms draw on research and development that may lie outside their own boundaries. In some cases, such as open source software, this research and development can take place in a non-proprietary manner.

Henry Chesbrough and his collaborators investigate this phenomenon, linking the practice of innovation to the established body of innovation research, showing what's new and what's familiar in the process. Offering theoretical explanations for the use (and limits) of open innovation, the book examines the applicability of the concept, implications for the boundaries of firms, the potential of open innovation to prove successful, and implications for intellectual property policies and practices.

The book will be key reading for academics, researchers, and graduate students of innovation and technology management.


The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server

The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server Review



Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot.

Virtualization allows you to consolidate many servers onto a single physical server reducing hardware, electrical, cooling, and administrative costs. These virtual servers run completely independent of each other so if one crashes the other are not affected. Planning and implementing a server consolidation is a complex process. This book details the requirements for such a project, includes sample forms and templates, and delivers several physical to virtual migration strategies which will save both time and costs. Readers of this book will easily be able to plan and deploy VMware, Microsoft Virtual Server, and Xen.



Key Features:

* Create a virtual network to exchange information or provide a service to other virtual machines or computers.

* Use virtualization to support removable media such as CD or DVD optical disks

* Reduce server costs, administration overhead, and complexity


Saturday, October 22, 2011

Red Hat Linux 7.3 Secrets

Red Hat Linux 7.3 Secrets Review



Following the model of the 7.1 edition, this book is divided into five parts: "Setting Up Red Hat Linux"; "Exploring Red Hat Linux"; "Internetworking Red Hat Linux"; "Managing Red Hat Linux"; and "Programming Red Hat Linux". A key feature of this book is that it includes chapters that explain how to configure and use various types of PC hardware in Red Hat Linux: video cards, monitors, and X Window system; SCSI and IDE devices; CD-ROM drives and sound; printers; modems and terminals; networks; and laptops and PC card. This book provides administrators and power users with hidden techniques so that they might improve the performance from the Red Hat distribution. Undocumented, hard-to-find features are revealed, turning readers into experts. The other topics that are covered are: installation, GNU utilities; Linux applications and utilities; text editing; Internet connection setup; Web, Mail, news, and FTP servers; Samba and NFS; basic and advanced system administration; software installation and upgrade; kernel reconfiguration and upgrade; system and network security; shell and Perl scriping; and Tcl/Tk scripting. This book has the 3-CD version of the Red Hat Linux distribution.


Friday, October 21, 2011

MySQL Bible with CDROM

MySQL Bible with CDROM Review



  • Organization: The book is divided into five parts: Getting Starated with MySQL and Relational Databases; Understanding SQL Through MySQL; MySQL Administration; MySQL Developer Guide; and Advanced and Specialized MySQL Topics.
  • Comprehensive coverage: This Bible covers both beginning-level and advanced topics. Topics covered include: introduction to relational database management; installing and configuring MySQL on the Linux, Windows 2000, and Mac OS X operating systems; MySQL security; debugging and repairing MySQL databases and servers; MySQL performance tuning; and developing MySQL applications with Perl and PHP.
  • Coverage of NuSphere MySQL: Due to the growing popularity of the NuSphere MySQL package, this book covers its enhancements and how to install and develop with NuSphere MySQL.
  • Running database application: This book builds an e-commerce sample database application throughout to demonstrate concepts and topics.

ABOUT THE CD-ROM:
What's on the CD-ROM: The CD-ROM includes the latest version of MySQL (either Version 4.0 or 4.1); sample database application and code in the book; and PHP and Perl.


Thursday, October 20, 2011

Ubuntu Linux Bible

Ubuntu Linux Bible Review



Everything you need to know—and then some!

It's the fastest-growing, coolest Linux distribution out there, and now you can join the excitement with this information-packed guide. Want to edit graphics? Create a spreadsheet? Manage groups? Set up an NFS server? You'll learn it all and more with the expert guidance, tips, and techniques in this first-ever soup-to-nuts book on Ubuntu. From the basics for newcomers to enterprise management for system administrators, it's what you need to succeed with Ubuntu.

  • Master the fundamentals for desktop and networks
  • Send e-mail, share files, edit text, and print
  • Download music, watch DVDs, and play games
  • Use Ubuntu on laptops, go wireless, or synch it with your PDA
  • Set up Web, mail, print, DNS, DHCP, and other servers
  • Manage groups and secure your network

What's on the CD-ROM?

Test-drive Ubuntu on your computer without changing a thing using the bootable Ubuntu Desktop Live CD included with this book. If you decide to install it permanently, a simple, easy-to-use installer is provided. Also on the CD, you'll find:

  • Popular open-source software for Microsoft(r) Windows(r), such as AbiWord, Firefox(r), GIMP, and more
  • An easy-to-use application that simplifies installing these programs on your Microsoft Windows system

System Requirements: Please see the "About the CD-ROM Appendix" for details and complete system requirements.

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.


Wednesday, October 19, 2011

Cioturi software: Cioturi Linux, Cioturi legate de jocuri video, Red Hat Linux, SUSE Linux, Debian GNU|Linux, Travian (Romanian Edition)

Cioturi software: Cioturi Linux, Cioturi legate de jocuri video, Red Hat Linux, SUSE Linux, Debian GNU|Linux, Travian (Romanian Edition) Review



Sursă: Wikipedia. Pagini: 108. Capitolele: Cioturi Linux, Cioturi legate de jocuri video, Red Hat Linux, SUSE Linux, Debian GNU/Linux, Travian, Heroes of Might and Magic III, The Sims, FIFA 09, EVE Online, Microsoft Excel, Heroes Chronicles, UEFA Euro 2008, Catia, Syberia, Heroes of Might and Magic III: Armageddon's Blade, Heroes of Might and Magic III: The Shadow of Death, Club Penguin, Lineage II, Doom, StarCraft II, Media player, Fedora, Grand Theft Auto: Vice City, Microsoft Word, FIFA 10, Prince of Persia, Tomb Raider III, S.T.A.L.K.E.R.: Shadow of Chernobyl, The Sims 2, Call of Duty, .hack//Infection, Need for Speed: Most Wanted, Cabal Online, Colonization, Tomb Raider: The Angel of Darkness, Puppy Linux, Unix-like, .hack//Mutation, QuteCom, Might and Magic: The Secret of the Inner Sanctum, Tomb Raider: The Last Revelation, GOS Rocket, Medieval II: Total War, The Longest Journey, Joc de strategie în timp real, Grand Theft Auto: Liberty City Stories, Tomb Raider Chronicles, Emacs, God of War II, Tomb Raider: Legend, Harry Potter și Ordinul Phoenix, Heroes of Might and Magic IV, Heroes of Might and Magic 3½: In the Wake of Gods, Nucleu, Age of Empires II: The Age of Kings, Dezvoltator de jocuri video, Maya, Heroes of Might and Magic V, Civilization IV, Tomb Raider: Underworld, Red Hat Enterprise Linux, Gentoo Linux, Resistance: Fall of Man, Prince of Persia: The Two Thrones, Microsoft SQL Server, Skype, Mozilla Thunderbird, King's Bounty, SOA, FIFA 08, Might and Magic II: Gates to Another World, Might & Magic: Heroes VI, Mario & Luigi: Superstar Saga, NimbleX, The Elder Scrolls V: Skyrim, Microsoft Office 2007, Grand Theft Auto IV: The Lost and Damned, Need for Speed: Hot Pursuit, Heroes of Might and Magic V: Hammers of Fate, Tennis For Two, Metroid, Syberia II, Autodesk 3ds Max, Ice Climber, Joc video de rol pentru calculator, Visual Studio, Notepad, Call of Duty 2, Bluewhite64 Linux, Nintendo DS, Harry Potter și Camera Secretelor, Age of Empires: The Rise ...


CompTIA Security+ All-in-One Exam Guide, Second Edition (Exam SY0-201)

CompTIA Security+ All-in-One Exam Guide, Second Edition (Exam SY0-201) Review



A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One

Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the CompTIA Security+ exam with ease, this definitive volume also serves as an essential on-the-job reference. Get full details on all exam topics, including how to:

  • Combat viruses, Trojan horses, spyware, logic bombs, and worms
  • Defend against DDoS, spoofing, replay, TCP/IP hijacking, and other attacks
  • Apply best practices for access control methods
  • Implement authentication using Kerberos, CHAP, biometrics, and other methods
  • Use cryptography and PKI
  • Secure remote access, wireless, and virtual private networks (VPNs)
  • Harden networks, operating systems, and applications
  • Manage incident response and follow forensic procedures

The CD-ROM features

  • One full practice exam
  • Complete electronic book