Pro OpenSSH


Book Description

* Authored by two Fortune 100 system administrators responsible for the architecture and deployment of OpenSSH across several hundred corporate servers. * Covers commonplace yet often confusing deployment scenarios that come up daily in enterprise environments, large and small. * Focuses upon the worlds most prevalent SSH implementation, OpenSSH.




Cisco Security Professional's Guide to Secure Intrusion Detection Systems


Book Description

Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades having happened in February of 2003. Cisco Security Professional's Guide to Secure Intrusion Detection Systems is a comprehensive, up-to-date guide to the hardware and software that comprise the Cisco IDS. Cisco Security Professional's Guide to Secure Intrusion Detection Systems does more than show network engineers how to set up and manage this line of best selling products ... it walks them step by step through all the objectives of the Cisco Secure Intrusion Detection System course (and corresponding exam) that network engineers must pass on their way to achieving sought-after CCSP certification. - Offers complete coverage of the Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100) for CCSPs




SSH, The Secure Shell


Book Description

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.




PHP Objects, Patterns, and Practice


Book Description

PHP Objects Patterns and Practice, Fourth Edition is revised and updated throughout. The book begins by covering PHP's object-oriented features. It introduces key topics including class declaration, inheritance, reflection and much more. These provide the fundamentals of the PHP's support for objects. It also introduces some principles of design. This edition introduces new object relevant features such as traits, reflection extension additions, callable type hinting, improvements to exception handling, and many smaller language enhancements. The next section is devoted to design patterns. These describe common problems and their solutions. The section describes the design principles that make patterns powerful. It covers many of the classic design patterns and includes chapters on enterprise and database patterns. The last segment of the book covers the tools and practices that can help turn great code into a successful project. The section shows how to manage multiple developers and releases with git, how to build and install using Phing and PEAR. It also explores strategies for automated testing and build. In addition to discussing the latest developments in build, test, and continuous integration, this section keeps pace with best practice in version control by focusing on Git, increasingly the developer's system of choice. Taken together these three elements: object fundamentals, design principles, and best practice will help the reader develop elegant and rock solid systems. PHP Objects and Patterns: Describes and demonstrates PHP's built-in object-oriented features Breaks down the principles of object-oriented design, explaining key design patterns using practical examples. Discusses the tools and practices necessary for developing, testing and deploying exemplary applications.




Mac OS X Snow Leopard for Power Users


Book Description

Mac OS X Snow Leopard for Power Users: Advanced Capabilities and Techniques is for Mac OS X users who want to go beyond the obvious, the standard, and the easy. If want to dig deeper into Mac OS X and maximize your skills and productivity using the world's slickest and most elegant operating system, then this is the book for you. Written by Scott Granneman, an experienced teacher, developer, and consultant, Mac OS X for Power Users helps you push Mac OS X to the max, unveiling advanced techniques and options that you may have not known even existed. Create custom workflows and apps with Automator, run Windows programs and even Windows itself without dual-booting, and sync data on your hard drive, on your phone, and in the cloud—learn all of these techniques and more. This is not a book that talks down to you; Mac OS X for Power Users is an essential book for experienced Mac users who are smart enough to know there is more to be known, and are ready to become power users.




A Practical Guide to Ubuntu Linux


Book Description

The Most Complete, Easy-to-Follow Guide to Ubuntu Linux The #1 Ubuntu server resource, fully updated for Ubuntu 10.4 (Lucid Lynx)-the Long Term Support (LTS) release many companies will rely on for years! Updated JumpStarts help you set up Samba, Apache, Mail, FTP, NIS, OpenSSH, DNS, and other complex servers in minutes Hundreds of up-to-date examples, plus comprehensive indexes that deliver instant access to answers you can trust Mark Sobell's A Practical Guide to Ubuntu Linux®, Third Edition, is the most thorough and up-to-date reference to installing, configuring, and working with Ubuntu, and also offers comprehensive coverage of servers--critical for anybody interested in unleashing the full power of Ubuntu. This edition has been fully updated for Ubuntu 10.04 (Lucid Lynx), a milestone Long Term Support (LTS) release, which Canonical will support on desktops until 2013 and on servers until 2015. Sobell walks you through every essential feature and technique, from installing Ubuntu to working with GNOME, Samba, exim4, Apache, DNS, NIS, LDAP, g ufw, firestarter, iptables, even Perl scripting. His exceptionally clear explanations demystify everything from networking to security. You'll find full chapters on running Ubuntu from the command line and desktop (GUI), administrating systems, setting up networks and Internet servers, and much more. Fully updated JumpStart sections help you get complex servers running--often in as little as five minutes. Sobell draws on his immense Linux knowledge to explain both the "hows" and the "whys" of Ubuntu. He's taught hundreds of thousands of readers and never forgets what it's like to be new to Linux. Whether you're a user, administrator, or programmer, you'll find everything you need here--now, and for many years to come. The world's most practical Ubuntu Linux book is now even more useful! This book delivers Hundreds of easy-to-use Ubuntu examples Important networking coverage, including DNS, NFS, and Cacti Coverage of crucial Ubuntu topics such as sudo and the Upstart init daemon More detailed, usable coverage of Internet server configuration, including Apache (Web) and exim4 (email) servers State-of-the-art security techniques, including up-to-date firewall setup techniques using gufw and iptables, and a full chapter on OpenSSH A complete introduction to Perl scripting for automated administration Deeper coverage of essential admin tasks-from managing users to CUPS printing, configuring LANs to building a kernel Complete instructions on keeping Ubuntu systems up-to-date using aptitude, Synaptic, and the Software Sources window And much more...including a 500+ term glossary Includes DVD! Get the full version of Lucid Lynx, the latest Ubuntu LTS release!




Pro PHP Security


Book Description

* One of the first books devoted solely to PHP security * Covers a wide swath of both defensive and proactive security measures, showing readers how to create captchas, validate email, fend off SQL injection attacks, and more * Methods discussed are compatible with PHP 3, 4, and 5




Pro OpenSSH


Book Description

SSH, or Secure Shell, is the de facto standard among users and administrators who wish to establish secure communication between disparate networks. This book is authored by a Fortune 100 system administrator, who will provide you with a highly practical reference for configuring and deploying OpenSSH in your own environment. Some of the topics covered in this book include: OpenSSH installation and configuration, key management, secure logging, client/server architectures, and digital certificates. The author also provides you with complete deployment scenarios that arise daily in enterprise environments, both large and small. Table of Contents Legacy Protocols: Why Replace Telnet, FTP, rsh, rcp, and rlogin with SSH? A Quick SSH Implementation The File Structure of OpenSSH The OpenSSH Server The OpenSSH Client Authentication Advanced Topics TCP Forwarding Managing Your OpenSSH Environment Scripting with OpenSSH SSH Tectia Server




Network Security Assessment


Book Description

Covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping you design and deploy networks that are immune to offensive exploits, tools, and scripts. Chapters focus on the components of your network, the different services yourun, and how they can be attacked. Each chapter concludes with advice to network defenders on how to beat the attacks.




Secure Your Network for Free


Book Description

Seagren shows readers how to secure their network from top to bottom without spending a penny on security software using best of breed open source software including Snort, Nessus, and Ethereal.