Debian GNU Linux
Ce livre sur Debian GNU/Linux s'adresse aux intégrateurs, responsables de socles techniques et administrateurs de systèmes d'exploitation disposant de bonnes connaissances sur cette distribution. Le livre, au travers d'exemples d'attaques et de vulnérabilités possibles présente différentes solutions à appliquer sur des serveurs fonctionnant avec la distribution Debian (en version 4 au moment de la rédaction du livre) pour assurer la sécurité des données, la sécurité du système et la sécurité des applications. Le lecteur y trouvera également les actions à entreprendre pour installer un pare-feu, des outils de chiffrement et d'authentification. Sont également détaillés (installation, paramétrage...) les meilleurs outils de diagnostics et de surveillance à mettre en place pour assurer la sécurité d'un parc informatique. Retrouvez sur notre espace Livres (www.eni-livres.com) tous les ouvrages sur Linux.
GNU Linux Fedora
Ce livre s'adresse aux intégrateurs, responsables de socles techniques et administrateurs de systèmes d'exploitation disposant de bonnes connaissances sur GNU/Linux. Après une description d'attaques possibles et d'exemples de vulnérabilité, le livre présente différentes solutions à appliquer sur des serveurs fonctionnant avec la distribution Linux Fedora (à partir de la distribution Fedora Core 4) pour assurer la sécurité des données, la sécurité du système et la sécurité des applications. Le lecteur y trouvera également les actions à entreprendre pour installer un pare-feu, des outils de chiffrement et d'authentification. Sont également détaillés (installation, paramétrage...) les meilleurs outils de diagnostic et de surveillance à mettre en place pour assurer la sécurité d'un parc informatique.
*Imparts good security doctrine, methodology, and strategies *Each application-focused chapter will be able to be used as a stand-alone HOW-TO for that particular application. *Offers users a selection of resources (websites, mailing lists, and books) to further their knowledge.
The Debian Administrator s Handbook
Debian GNU/Linux, a very popular non-commercial Linux distribution, is known for its reliability and richness. Built and maintained by an impressive network of thousands of developers throughout the world, the Debian project is cemented by its social contract. This foundation text defines the project's objective: fulfilling the needs of users with a 100% free operating system. The success of Debian and of its ecosystem of derivative distributions (with Ubuntu at the forefront) means that an increasing number of administrators are exposed to Debian's technologies. This Debian Administrator's Handbook, which has been entirely updated for Debian 8 “Jessie”, builds on the success of its 6 previous editions. Accessible to all, this book teaches the essentials to anyone who wants to become an effective and independent Debian GNU/Linux administrator. It covers all the topics that a competent Linux administrator should master, from installation to updating the system, creating packages and compiling the kernel, but also monitoring, backup and migration, without forgetting advanced topics such as setting up SELinux or AppArmor to secure services, automated installations, or virtualization with Xen, KVM or LXC. This book is not only designed for professional system administrators. Anyone who uses Debian or Ubuntu on their own computer is de facto an administrator and will find tremendous value in knowing more about how their system works. Being able to understand and resolve problems will save you invaluable time. Learn more about the book on its official website: debian-handbook.info
Building Wireless Community Networks
Building Wireless Community Networks is about getting people online using wireless network technology. The 802.11b standard (also known as WiFi) makes it possible to network towns, schools, neighborhoods, small business, and almost any kind of organization. All that's required is a willingness to cooperate and share resources. The first edition of this book helped thousands of people engage in community networking activities. At the time, it was impossible to predict how quickly and thoroughly WiFi would penetrate the marketplace. Today, with WiFi-enabled computers almost as common as Ethernet, it makes even more sense to take the next step and network your community using nothing but freely available radio spectrum. This book has showed many people how to make their network available, even from the park bench, how to extend high-speed Internet access into the many areas not served by DSL and cable providers, and how to build working communities and a shared though intangible network. All that's required to create an access point for high-speed Internet connection is a gateway or base station. Once that is set up, any computer with a wireless card can log onto the network and share its resources. Rob Flickenger built such a network in northern California, and continues to participate in network-building efforts. His nuts-and-bolts guide covers: Selecting the appropriate equipment Finding antenna sites, and building and installing antennas Protecting your network from inappropriate access New network monitoring tools and techniques (new) Regulations affecting wireless deployment (new) IP network administration, including DNS and IP Tunneling (new) His expertise, as well as his sense of humor and enthusiasm for the topic, makes Building Wireless Community Networks a very useful and readable book for anyone interested in wireless connectivity.
A guide to Ubuntu covers such topics as installation, configuration, the filesystem, the command line, system maintenance and security, networking, using OpenOffice.org, Web browsing, and playing games.
Linux Pocket Guide
O'Reilly's Pocket Guides have earned a reputation as inexpensive, comprehensive, and compact guides that have the stuff but not the fluff. Every page of Linux Pocket Guide lives up to this billing. It clearly explains how to get up to speed quickly on day-to-day Linux use. Once you're up and running, Linux Pocket Guide provides an easy-to-use reference that you can keep by your keyboard for those times when you want a fast, useful answer, not hours in the man pages.Linux Pocket Guide is organized the way you use Linux: by function, not just alphabetically. It's not the 'bible of Linux; it's a practical and concise guide to the options and commands you need most. It starts with general concepts like files and directories, the shell, and X windows, and then presents detailed overviews of the most essential commands, with clear examples. You'll learn each command's purpose, usage, options, location on disk, and even the RPM package that installed it.The Linux Pocket Guide is tailored to Fedora Linux--the latest spin-off of Red Hat Linux--but most of the information applies to any Linux system.Throw in a host of valuable power user tips and a friendly and accessible style, and you'll quickly find this practical, to-the-point book a small but mighty resource for Linux users.
Writing Information Security Policies
Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast! Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment--at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies.
DNS and BIND on IPv6
If you're preparing to roll out IPv6 on your network, this concise book provides the essentials you need to support this protocol with DNS. You'll learn how DNS was extended to accommodate IPv6 addresses, and how you can configure a BIND name server to run on the network. This book also features methods for troubleshooting problems with IPv6 forward- and reverse-mapping, and techniques for helping islands of IPv6 clients communicate with IPv4 resources. Topics include: DNS and IPv6—Learn the structure and representation of IPv6 addresses, and the syntaxes of AAAA and PTR records in the ip6.arpa IPv6 reverse-mapping zone BIND on IPv6—Use IPv6 addresses and networks in ACLs, and register and delegate to IPv6-speaking name servers Resolver Configuration—Configure popular stub resolvers (Linux/Unix, MacOS X, and Windows) to query IPv6-speaking name servers DNS64—Learn about the transition technology that allows clients with IPv6-only network stacks to communicate with IPv4 servers Troubleshooting—Use the nslookup and dig troubleshooting tools to look up the IPv6 addresses of a domain name, or reverse-map an IPv6 address to a domain name
PHP and MySQL by Example
Quickly master dynamic, database-driven Web development–no experience necessary! Even if you’re completely new to PHP, MySQL, and Web database development, this book will guide you through every step of building powerful, database-driven, dynamic Web sites. Direct from the world’s top scripting instructor, Ellie Quigley, PHP and MySQL by Example illuminates every concept with tested code examples, screen shots showing program output, and clear, line-by-line explanations. Classroom-tested in Ellie Quigley’s Silicon Valley training courses and at Marko Gargenta’s Marakana training company in San Francisco, this book takes you from the simplest PHP scripting and SQL querying techniques all the way to dynamic, database driven Web site construction with PHP and MySQL. From simple fill-in forms to program security and debugging, it’s the only PHP/MySQL book you’ll ever need! This book covers Complete PHP fundamentals, including operators, strings, conditionals, loops, arrays, functions, and more PHP QuickStart for more advanced readers–makes you productive with PHP in the space of just fifteen book pages Essential Web development techniques, from file handling to validating user input with regular expressions Powerful PHP features, including user-defined functions and self-processing PHP Forms Day-to-day MySQL administration A complete SQL tutorial for creating queries, retrieving data, and writing data with MySQL Session management and cookies Object Oriented PHP Best practices for using PHP and MySQL together Nearly 100,000 professionals and power users have relied on Ellie Quigley’s books to master scripting languages. With PHP and MySQL by Example, you can, too. And once you’ve become an expert, you’ll turn to this book constantly as your go-to source for reliable answers, solutions, and code. Lab Solutions Solutions to the end-of-chapter labs are available at www.prenhallprofessional.com/title/0131875086.