A Secure and Easy-to-Use MTA for UNIX

Book Description:

at call for a certain amount of study. This book, with careful background explanations and generous examples, eases readers from the basic configuration to the full power of Postfix. It discusses the Postfix interfaces to various tools that round out a fully scalable and highly secure email system. These tools include POP, IMAP, LDAP, MySQL, Simple Authentication and Security Layer (SASL), and Transport Layer Security (TLS, an upgrade of SSL). A reference section for Postfix configuration parameters and an installation guide are included.Topics include:

  • Basic installation and configuration
  • DNS configuration for email
  • Working with POP/IMAP servers
  • Hosting multiple domains (virtual hosting)
  • Mailing lists
  • Handling unsolicited email (spam blocking)
  • Security through SASL and TLS

From compiling and installing Postfix to troubleshooting, Postfix: The Definitive Guide offers system administrators and anyone who deals with Postfix an all-in-one, comprehensive tutorial and reference to this MTA.

A Guide to Planning, Organizing, and Troubleshooting

Book Description:

Organize a Civic Apps Competition (CAC) in your city. This practical guide provides best practices for each phase of the process, based largely on the authors’ firsthand experience planning and managing Apps for Metro Chicago (A4MC). You’ll learn everything from setting goals and creating a budget to running the competition and measuring the outcome.

CACs provide software programmers with platforms for building effective apps, using open government data as a way to foster community involvement and make government more transparent. This handbook helps you address serious questions about the process and shows you what’s required for making your competition successful.

  • Gain insights from the authors’ survey of 15 CACs in the US and Canada
  • Get guidelines for establishing specific goals, and evaluate results with reliable metrics
  • Understand major costs involved and build a budget around partners and sponsors
  • Determine participation incentives, prize categories, and judging
  • Avoid unstructured data sets by being selective when choosing public datasets
  • Learn how the authors handled roadblocks during the A4MC competition
  • Discover ways to sustain lasting community interest once the CAC is over

Wi-Fi Above 100 Mbps

Book Description:

Wireless has finally come of age. With a significant jump in throughput over previous standards, 802.11n is the first wireless technology that doesn’t trade speed for mobility, and users have stormed onto wireless networks with a passion. In this concise guide, Matthew Gast—chair of the IEEE group that produced revision 802.11-2012—shows you why wireless has become the default method of connecting to a network, and provides technical details you need to plan, design, and deploy 802.11n today.

Building a network for the multitude of new devices is now a strategic decision for network engineers everywhere. This book gives you an in-depth look at key parts of 802.11n, and shows you how to achieve an Ethernet-free wireless office.

  • Learn how MIMO’s multiple data streams greatly increase wireless speed
  • Discover how 802.11n modifications improve MAC efficiency
  • Examine advanced PHY features such as beanforming and space-time code block
  • Use advanced MAC features to maintain interoperability with older devices
  • Plan an 802.11n network by determining traffic demand, key applications, power requirements, and security
  • Choose the architecture, select hardware, and plan coverage to design and build your network

SKIP

Book Description:

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will end by building your own web applications servers, including WordPress and Joomla!. Systems from 2011 through 2017 are covered, including Windows 7, Windows 8, Windows 10, Windows Server 2012, and Windows Server 2016 as well as a range of Linux distributions, including Ubuntu, CentOS, Mint, and OpenSUSE.

Key defensive techniques are integrated throughout and you will develop situational awareness of your network and build a complete defensive infrastructure, including log servers, network firewalls, web application firewalls, and intrusion detection systems.

Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways. You will learn about Metasploit, browser attacks, privilege escalation, pass-the-hash attacks, malware, man-in-the-middle attacks, database attacks, and web application attacks.

What You’ll Learn

  • Construct a testing laboratory to experiment with software and attack techniques
  • Build realistic networks that include active directory, file servers, databases, web servers, and web applications such as WordPress and Joomla!
  • Manage networks remotely with tools, including PowerShell, WMI, and WinRM
  • Use offensive tools such as Metasploit, Mimikatz, Veil, Burp Suite, and John the Ripper
  • Exploit networks starting from malware and initial intrusion to privilege escalation through password cracking and persistence mechanisms
  • Defend networks by developing operational awareness using auditd and Sysmon to analyze logs, and deploying defensive tools such as the Snort intrusion detection system, IPFire firewalls, and ModSecurity web application firewalls

Who This Book Is For

This study guide is intended for everyone involved in or interested in cybersecurity operations (e.g., cybersecurity professionals, IT professionals, business professionals, and students)

Engage your audience visually with stunning Prezi presentation designs and be the envy of your colleagues who use PowerPoint with this book and ebook

Book Description:

Prezi is a tool for delivering presentations in a linear or non-linear format. This cloud-based software enables users to structure presentations on an infinite canvas in a way that is more engaging and visually stimulating to the audience.

This book covers all of the technical elements of the software, whilst also looking at the practicalities of using Prezi in a business environment. It teaches the reader how to think for Prezi, and approach their design in the best way. This is an essential resource for people who want to use Prezi seriously. Apart from covering best practices for inserting images, sound, and video, this book also covers topics for business users such as collaborating and sharing Prezis online, using Prezi at a meeting to brainstorm with overseas colleagues, and how to “Prezify” PowerPoint or Keynote slides. This book will escalate you from Prezi user to Prezi master with ease.

A detailed and practical guide to DNS implementation, configuration, and administration

Book Description:

What This Book Covers

Chapter 1 begins to explain basic DNS principles. It introduces essential names, for example,domain and zone, explaining the difference between them. It describes the iteration principle by which the DNS translates names to IP addresses. It presents a configuration of a resolver both for UNIX and for Windows. The end of the chapter explains name server principles and describes various name server types.
Chapter 2 is fully focused on the most basic DNS procedure, the DNS query. Through this procedure, the DNS translates names to IP addresses. In the very beginning, however, this chapter describes in detail the Resource Record structure. At the end of this chapter, many practical examples of DNS exchanges are listed.
Chapter 3 deals with other DNS procedures (DNS Extensions), i.e., DNS Update, DNS Notify, incremental zone transfer, negative caching, IPv6 Extensions, IPsec, and TSIG.
Chapter 4 talks about the DNS implementation. It is derived from its historical evolution. From the historical point of view, the oldest DNS implementation that is still sometimes used is BIND version 4. This implementation is very simple so it is suitable to describe basic principles with it. Next, the new generations of BIND are discussed followed by the Windows 2000 implementation.
Chapter 5 discusses the tools for debugging DNS such as nslookup, dnswalk, and dig, how to control a name server using the rndc program, and the common errors that might occur while configuring DNS.
Chapter 6 deals with the creation of DNS domains (domain delegation) and with the procedure of domain registration.

Using AWS Lambda and Claudia.js

Book Description:

Serverless Applications with Node.js walks you through building serverless apps on AWS using JavaScript. Inside, you’ll discover what Claudia.js brings to the table as you build and deploy a scalable event-based serverless application, based around a pizzeria that’s fully integrated with AWS services, including Lambda and API Gateway. Each chapter is filled with exercises, examples, tips, and more to make sure you’re ready to bring what you’ve learned into your own work.

Leverage powerful branch and user access control with Git for your own private collaborative repositories

Book Description:

If you’re responsible for securing a Git server where lots of developers work with lots of repositories, you have a problem on your hands. You probably want to implement security restrictions and authorization for certain repositories. You will love the simplicity and power of Gitolite’s access control language and model. Gitolite allows you to set up Git hosting on a central server with very fine-grained access control and many powerful features.

You’ll start with a brief introduction to Gitolite. The very first chapter tells you how to create a test setup so you can play with Gitolite—something that is very important when learning about a powerful tool with lots of features. You’ll go from there, at an easy pace, through the most important aspects of Gitolite.

Basic access control is easy and obvious. With this book, you will learn how to restrict access to critical files, allowing users to create their own repositories and manage their own access control, but within the limits you set. You will also learn how to extend Gitolite to do very useful things with very little code, and how to fall back on a mirror in case disaster strikes your main server. All this and more is packed within this concise and practical book with easy-to-follow, real-world examples.

A Distributed Real-Time Search and Analytics Engine

Book Description:

Whether you need full-text search or real-time analytics of structured data—or both—the Elasticsearch distributed search engine is an ideal way to put your data to work. This practical guide not only shows you how to search, analyze, and explore data with Elasticsearch, but also helps you deal with the complexities of human language, geolocation, and relationships.

If you’re a newcomer to both search and distributed systems, you’ll quickly learn how to integrate Elasticsearch into your application. More experienced users will pick up lots of advanced techniques. Throughout the book, you’ll follow a problem-based approach to learn why, when, and how to use Elasticsearch features.

  • Understand how Elasticsearch interprets data in your documents
  • Index and query your data to take advantage of search concepts such as relevance and word proximity
  • Handle human language through the effective use of analyzers and queries
  • Summarize and group data to show overall trends, with aggregations and analytics
  • Use geo-points and geo-shapes—Elasticsearch’s approaches to geolocation
  • Model your data to take advantage of Elasticsearch’s horizontal scalability
  • Learn how to configure and monitor your cluster in production

Book Description:

Apache Solr is one of the most popular open source search servers available on the web. However, simply setting up Apache Solr is not enough to ensure the success of your web product. To maximize efficiency, you need to use techniques to boost Solr performance in order to return relevant results faster. You need to implement robust techniques that focus on optimizing the performance of your Solr instances and also troubleshoot issues that are prone to arise while maintaining Solr.

Apache Solr High Performance is a practical guide that will help you explore and take full advantage of the robust nature of Apache Solr so as to achieve optimized Solr instances, especially in terms of performance.

You will learn everything you need to know in order to achieve a high performing Solr instance or set of instances, as well as how to troubleshoot the common problems you are prone to face while working with single or multiple Solr servers.

This book offers you an introduction by explaining the prerequisites of Apache Solr and installing it, while also integrating it with the required additional components, and gradually progresses into features that make Solr flexible enough to achieve high performance ratings in various circumstances. Moving forward, the book will cover several clear and highly practical concepts that will help you further optimize your Solr instances’ performance both on single as well as multiple servers, and learn how to troubleshoot common problems that are prone to arise while using your Solr instance. By the end of the book you will also learn how to set up, configure, and deploy ZooKeeper along with learning more about other applications of ZooKeeper.

You will also learn how to handle data in multiple server environments, searches based on specific geographical co-ordinates, different caching techniques, and various algorithms and formulae that enable better performance; and many more.

Master HBase configuration and administration for optimum database performance

Book Description:

As an Open Source distributed big data store, HBase scales to billions of rows, with millions of columns and sits on top of the clusters of commodity machines. If you are looking for a way to store and access a huge amount of data in real-time, then look no further than HBase.

HBase Administration Cookbook provides practical examples and simple step-by-step instructions for you to administrate HBase with ease. The recipes cover a wide range of processes for managing a fully distributed, highly available HBase cluster on the cloud. Working with such a huge amount of data means that an organized and manageable process is key and this book will help you to achieve that.

The recipes in this practical cookbook start from setting up a fully distributed HBase cluster and moving data into it. You will learn how to use all of the tools for day-to-day administration tasks as well as for efficiently managing and monitoring the cluster to achieve the best performance possible. Understanding the relationship between Hadoop and HBase will allow you to get the best out of HBase so the book will show you how to set up Hadoop clusters, configure Hadoop to cooperate with HBase, and tune its performance.

What you will learn from this book

  • Set up a fully distributed, highly available HBase cluster and load data into it using the normal client API or your own MapReduce job
  • Access data in HBase via HBase Shell or Hive using its SQL-like query language
  • Backup and restore HBase table, along with its data distribution, and move or replicate data between different HBase clusters
  • Gather metrics then show them in graphs, monitor the cluster’s status, and get notified if thresholds are exceeded
  • Tune your kernel settings with JVM GC, Hadoop, and HBase configuration to maximize the performance
  • Discover troubleshooting tools and tips in order to avoid the most commonly-found problems with HBase
  • Gain optimum performance with data compression, region splits, and by manually managing compaction
  • Learn advanced configuration and tuning for read and write-heavy clusters

Approach

As part of Packt’s cookbook series, each recipe offers a practical, step-by-step solution to common problems found in HBase administration.

Who this book is written for

This book is for HBase administrators, developers, and will even help Hadoop administrators. You are not required to have HBase experience, but are expected to have a basic understanding of Hadoop and MapReduce.

Book Description:

Discover new and interesting online content based on your interests!

StumbleUpon helps you discover new and interesting content on the Internet based on your specific interests. With this helpful For Dummies guide, you will learn to complete a profile that alerts StumbleUpon what topics interest you and assists in making your online perusing interesting and productive. Coverage explains how the Stumble button allows StumbleUpon to learn more about you and what type of content you like to view and it also helps that particular piece of content turn up higher in other users’ searches.

  • Gets you started with setting up a profile, using the site and mobile app, and installing the browser
  • Offers guidance for Stumbling and sharing content on other social networks
  • Explains how to create a channel and use Paid Discovery
  • Shows you how to install a Stumble button on your site to encourage people to Stumble your content

With StumbleUpon For Dummies, you’ve stumbled upon the ideal guide to get you started with this exciting engine!

An Authoritative Guide to Building Microservices, Web and Enterprise Applications, and Best Practices

Book Description:

Quickly and productively develop complex Spring applications and microservices out of the box, with minimal concern over things like configurations. This revised book will show you how to fully leverage the Spring Boot 2 technology and how to apply it to create enterprise ready applications that just work.  It will also cover what’s been added to the new Spring Boot 2 release, including Spring Framework 5 features like WebFlux, Security, Actuator and the new way to expose Metrics through Micrometer framework, and more.

This book is your authoritative hands-on practical guide for increasing your enterprise Java and cloud application productivity while decreasing development time. It’s a no nonsense guide with case studies of increasing complexity throughout the book. The author, a senior solutions architect and Principal Technical instructor with Pivotal, the company behind the Spring Framework, shares his experience, insights and first-hand knowledge about how Spring Boot technology works and best practices.

Pro Spring Boot 2 is an essential book for your Spring learning and reference library.

What You Will Learn

  • Configure and use Spring Boot
  • Use non-functional requirements with Spring Boot Actuator
  • Carry out web development with Spring Boot
  • Persistence with JDBC, JPA and NoSQL Databases
  • Messaging with JMS, RabbitMQ and WebSockets
  • Test and deploy with Spring Boot
  • A quick look at the Spring Cloud projects
  • Microservices and deployment to the Cloud
  • Extend Spring Boot by creating your own Spring Boot Starter and @Enable feature

Who This Book Is For

Experienced Spring and Java developers seeking increased productivity gains and decreased complexity and development time in their applications and software services.

Deploying Identity and Access Management with Free Open Source Software

Book Description:

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, effective access control is the best investment you can make. Financially, it’s more valuable to prevent than to detect a security breach. That’s why Identity and Access Management (IAM) is a critical component of an organization’s security infrastructure. In the past, IAM software has been available only from large enterprise software vendors. Commercial IAM offerings are bundled as “suites” because IAM is not just one component. It’s a number of components working together, including web, authentication, authorization, cryptographic, and persistence services.

Securing the Perimeter documents a recipe to take advantage of open standards to build an enterprise-class IAM service using free open source software. This recipe can be adapted to meet the needs of both small and large organizations. While not a comprehensive guide for every application, this book provides the key concepts and patterns to help administrators and developers leverage a central security infrastructure.

Cloud IAM service providers would have you believe that managing an IAM is too hard. Anything unfamiliar is hard, but with the right road map, it can be mastered. You may find SaaS identity solutions too rigid or too expensive. Or perhaps you don’t like the idea of a third party holding the credentials of your users―the keys to your kingdom. Open source IAM provides an alternative. Take control of your IAM infrastructure if digital services are key to your organization’s success.

What You’ll Learn

  • Understand why you should deploy a centralized authentication and policy management infrastructure
  • Use the SAML or Open ID Standards for web or single sign-on, and OAuth for API Access Management
  • Synchronize data from existing identity repositories such as Active Directory
  • Deploy two-factor authentication services

Who This Book Is For

Security architects (CISO, CSO), system engineers/administrators, and software developers

Book Description:

Many successful project managers are beginning to utilize Microsoft SharePoint to drive their projects and operational initiatives. SharePoint Server provides teams with a centralized location for project information and facilitates collaboration between project team members. The intention of this book is to provide a hands-on case study that you can follow to create a complete project management information system (PMIS) using SharePoint Server 2010.

Each chapter is focused on a typical project management activity and demonstrates techniques that can be used to facilitate that activity. The book covers all project phases from managing requirements, implementation, testing and post production support. By the end of the book you’ll have a toolbox full of solutions and plenty of working examples. With these you’ll be able to build your own PMIS uniquely suited to your organization.

Book Description:

Linux can be configured as a networked workstation, a DNS server, a mail server, a firewall, a gateway router, and many other things. These are all part of administration tasks, hence network administration is one of the main tasks of Linux system administration. By knowing how to configure system network interfaces in a reliable and optimal manner, Linux administrators can deploy and configure several network services including file, web, mail, and servers while working in large enterprise environments.

Starting with a simple Linux router that passes traffic between two private networks, you will see how to enable NAT on the router in order to allow Internet access from the network, and will also enable DHCP on the network to ease configuration of client systems. You will then move on to configuring your own DNS server on your local network using bind9 and tying it into your DHCP server to allow automatic configuration of local hostnames. You will then future enable your network by setting up IPv6 via tunnel providers.

Moving on, we’ll configure Samba to centralize authentication for your network services; we will also configure Linux client to leverage it for authentication, and set up a RADIUS server that uses the directory server for authentication.

Toward the end, you will have a network with a number of services running on it, and will implement monitoring in order to detect problems as they occur.

What you will learn

  • Route an IPv6 netblock to your local network
  • Modify your named instance to support setting hostnames for your IPv6 addresses
  • Use SSH for remote console access
  • Configure NGINX with TLS
  • Secure XMPP with TLS
  • Leverage iptables6 to firewall your IPv6 traffic
  • Configure Samba as an Active Directory compatible directory service

Book Description:

The bestselling guide on running SharePoint, now updated tocover all the new features of SharePoint 2013

SharePoint Portal Server is an essential part of the enterpriseinfrastructure for many businesses. Building on the success ofprevious versions of SharePoint For Dummies, this newedition covers all the latest features of SharePoint 2013 andprovides you with an easy-to-understand resource for making themost of all that this version has to offer. You’ll learn how to geta site up and running, branded, and populated with content,workflow, and management. In addition, this new edition includesessential need-to-know information for administrators, techsumers,and page admins who want to leverage the cloud-hosted featuresonline, either as a standalone product or in conjunction with anexisting SharePoint infrastructure.

  • Walks you through getting a SharePoint site up and runningeffectively and efficiently
  • Explains ongoing site management and offers plenty of advicefor administrators who want to leverage SharePoint and Office 365in various ways
  • Shows how to use SharePoint to leverage data centers andcollaborate with both internal and external customers, includingpartners and clients

SharePoint 2013 For Dummies is essential reading if youwant to make the most of this technology.

Book Description:

Professional LINQ introduces experienced programmers and database developers to LINQ database queries in their native VB and C# languages. Some of the topics covered include:

  • LINQ Queries
  • LINQ and the Standard Query Operators
  • Programming with XLinq
  • Querying XML with XLinq
  • Mixing XML and other data models
  • DLinq and Queries
  • LINQ over datasets
  • Interoperating with ADO.NET
  • LINQ and ASP.NET

Book Description:

A comprehensive guide to the best common practices for Internet service providers

  • Learn the best common practices for configuring routers on the Internet from experts who helped build the Internet
  • Gain specific advice through comprehensive coverage of all Cisco routers and current versions of Cisco IOS Software
  • Understand the Cisco IOS tools essential to building and maintaining reliable networks
  • Increase your knowledge of network security
  • Learn how to prevent problems and improve performance through detailed configuration examples and diagrams

Cisco IOS Software documentation is extensive and detailed and is often too hard for many Internet service providers (ISPs) who simply want to switch on and get going. Cisco ISP Essentials highlights many of the key Cisco IOS features in everyday use in the major ISP backbones of the world to help new network engineers gain understanding of the power of Cisco IOS Software and the richness of features available specifically for them. Cisco ISP Essentials also provides a detailed technical reference for the expert ISP engineer, with descriptions of the various knobs and special features that have been specifically designed for ISPs. The configuration examples and diagrams describe many scenarios, ranging from good operational practices to network security. Finally a whole appendix is dedicated to using the best principles to cover the configuration detail of each router in a small ISP Point of Presence.

Protecting Your Company and Society

Book Description:

The non-technical handbook for cyber security risk management

Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action plan for safeguarding their organizations. Key Risk Indicators reveal vulnerabilities based on organization type, IT infrastructure and existing security measures, while expert discussion from leading cyber risk specialists details practical, real-world methods of risk reduction and mitigation.

By the nature of the business, your organization’s customer database is packed with highly sensitive information that is essentially hacker-bait, and even a minor flaw in security protocol could spell disaster. This book takes you deep into the cyber threat landscape to show you how to keep your data secure.

  • Understand who is carrying out cyber-attacks, and why
  • Identify your organization’s risk of attack and vulnerability to damage
  • Learn the most cost-effective risk reduction measures
  • Adopt a new cyber risk assessment and quantification framework based on techniques used by the insurance industry

By applying risk management principles to cyber security, non-technical leadership gains a greater understanding of the types of threat, level of threat, and level of investment needed to fortify the organization against attack. Just because you have not been hit does not mean your data is safe, and hackers rely on their targets’ complacence to help maximize their haul. Solving Cyber Risk gives you a concrete action plan for implementing top-notch preventative measures before you’re forced to implement damage control.