Author: Alan Schwartz
Publisher: "O'Reilly Media, Inc."
ISBN: 0596007078
Category : Computers
Languages : en
Pages : 222
Book Description
This text explains how to integrate anti-spam technology into a network, as well as demonstrating configuration details for individual email systems.
SpamAssassin
Author: Alan Schwartz
Publisher: "O'Reilly Media, Inc."
ISBN: 0596007078
Category : Computers
Languages : en
Pages : 222
Book Description
This text explains how to integrate anti-spam technology into a network, as well as demonstrating configuration details for individual email systems.
Publisher: "O'Reilly Media, Inc."
ISBN: 0596007078
Category : Computers
Languages : en
Pages : 222
Book Description
This text explains how to integrate anti-spam technology into a network, as well as demonstrating configuration details for individual email systems.
Spamassassin
Author: Alistair McDonald
Publisher: Packt Publishing Ltd
ISBN: 1847190065
Category : Computers
Languages : en
Pages : 409
Book Description
Annotation In depth guide to implementing antispam solutions using SpamAssassin .Implement the right antispam solution for your network and your business requirements .Learn how to detect and prevent spam .Optimize SpamAssassin for all major mail servers and clients .Discover how to use SpamAssassin as a service Free to use, flexible, and effective, SpamAssassin has become the most popular Open Source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network. As a system administrator, it's down to you to implement, configure and adapt SpamAssassin to fight the Spam War. Fortunately, in SpamAssassin you chose well. Its power and flexibility make it a potent tool. However you also know that any flexible application is only as good as how it's set up and configured. This book is a comprehensive guide to the features, options and implementation strategies you need to get the most of out SpamAssassin. This comprehensive and detailed guide answers all your SpamAssassin questions. You will learn about: .Spam detection and prevention .Installing and running SpamAssassin .Using Bayesian Filtering .Configuring mail clients .Rewriting spam messages .Integrating SpamAssassin with external services .Blacklisting and whitelisting .Increasing Performance .Using SpamAssassin as a service .Using SpamAssassin with Fetchmail, postfix, sendmail, Exim, Qmail, procmail .SpamAssassin rules.
Publisher: Packt Publishing Ltd
ISBN: 1847190065
Category : Computers
Languages : en
Pages : 409
Book Description
Annotation In depth guide to implementing antispam solutions using SpamAssassin .Implement the right antispam solution for your network and your business requirements .Learn how to detect and prevent spam .Optimize SpamAssassin for all major mail servers and clients .Discover how to use SpamAssassin as a service Free to use, flexible, and effective, SpamAssassin has become the most popular Open Source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network. As a system administrator, it's down to you to implement, configure and adapt SpamAssassin to fight the Spam War. Fortunately, in SpamAssassin you chose well. Its power and flexibility make it a potent tool. However you also know that any flexible application is only as good as how it's set up and configured. This book is a comprehensive guide to the features, options and implementation strategies you need to get the most of out SpamAssassin. This comprehensive and detailed guide answers all your SpamAssassin questions. You will learn about: .Spam detection and prevention .Installing and running SpamAssassin .Using Bayesian Filtering .Configuring mail clients .Rewriting spam messages .Integrating SpamAssassin with external services .Blacklisting and whitelisting .Increasing Performance .Using SpamAssassin as a service .Using SpamAssassin with Fetchmail, postfix, sendmail, Exim, Qmail, procmail .SpamAssassin rules.
Fedora 11 and Red Hat Enterprise Linux Bible
Author: Christopher Negus
Publisher: John Wiley & Sons
ISBN: 0470543493
Category : Computers
Languages : en
Pages : 1132
Book Description
The leading Fedora book-over a quarter of a million copies sold of previous editions! What better way to learn Fedora 11 than with the leading Fedora book from the best-selling Linux author, Christopher Negus with Eric Foster Johnson? Whether you're new to Linux or an advanced user, this power-packed guide is loaded with what you need. Install, run, and manage the latest version of Fedora and Red Hat Enterprise Linux-then polish your system administration skills and get up to speed on the very latest in networking, desktop, and server enhancements. Master the Linux shell, file system, and text editor; how to set up users and automate system tasks; and much more in over a thousand pages of step-by-step instruction. Boot the full DVD of Fedora 11, including almost all binary code packages, or do a Live Install of the CD for rescuing, troubleshooting, or installing Fedora. Fedora is a free, open source Linux operating system sponsored by Red Hat as an open source community project; the technological innovations from the Fedora Project are then implemented in Red Hat's commercial offering, Red Hat Enterprise Linux Covers step-by-step instructions for making Linux installation simple and painless; how to take advantage of the desktop interface (including coverage of AIGLX); and how to use the Linux shell, file system, and text editor Also covers setting up users; automating system tasks; backing up and restoring files; dealing with the latest security issues and threats; using and customizing the desktop menus, icons, window manager, and xterm; and how to create and publish formatted documents with Linux applications The DVD and CD that come with the book include Fedora Linux 11 and an official Fedora 11 LiveCD (bootable and installable) This is the book you need to succeed with Fedora 11 and Red Hat Enterprise Linux. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Publisher: John Wiley & Sons
ISBN: 0470543493
Category : Computers
Languages : en
Pages : 1132
Book Description
The leading Fedora book-over a quarter of a million copies sold of previous editions! What better way to learn Fedora 11 than with the leading Fedora book from the best-selling Linux author, Christopher Negus with Eric Foster Johnson? Whether you're new to Linux or an advanced user, this power-packed guide is loaded with what you need. Install, run, and manage the latest version of Fedora and Red Hat Enterprise Linux-then polish your system administration skills and get up to speed on the very latest in networking, desktop, and server enhancements. Master the Linux shell, file system, and text editor; how to set up users and automate system tasks; and much more in over a thousand pages of step-by-step instruction. Boot the full DVD of Fedora 11, including almost all binary code packages, or do a Live Install of the CD for rescuing, troubleshooting, or installing Fedora. Fedora is a free, open source Linux operating system sponsored by Red Hat as an open source community project; the technological innovations from the Fedora Project are then implemented in Red Hat's commercial offering, Red Hat Enterprise Linux Covers step-by-step instructions for making Linux installation simple and painless; how to take advantage of the desktop interface (including coverage of AIGLX); and how to use the Linux shell, file system, and text editor Also covers setting up users; automating system tasks; backing up and restoring files; dealing with the latest security issues and threats; using and customizing the desktop menus, icons, window manager, and xterm; and how to create and publish formatted documents with Linux applications The DVD and CD that come with the book include Fedora Linux 11 and an official Fedora 11 LiveCD (bootable and installable) This is the book you need to succeed with Fedora 11 and Red Hat Enterprise Linux. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
InfoWorld
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 72
Book Description
InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.
Publisher:
ISBN:
Category :
Languages : en
Pages : 72
Book Description
InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.
Pro Linux System Administration
Author: Dennis Matotek
Publisher: Apress
ISBN: 1484220080
Category : Computers
Languages : en
Pages : 1008
Book Description
Implement a SOHO or SMB Linux infrastructure to expand your business and associated IT capabilities. Backed by the expertise and experienced guidance of the authors, this book provides everything you need to move your business forward. Pro Linux System Administration makes it easy for small- to medium–sized businesses to enter the world of zero–cost software running on Linux and covers all the distros you might want to use, including Red Hat, Ubuntu, Debian, and CentOS. Pro Linux System Administration takes a layered, component–based approach to open source business systems, while training system administrators as the builders of business infrastructure. Completely updated for this second edition, Dennis Matotek takes you through an infrastructure-as-code approach, seamlessly taking you through steps along the journey of Linux administration with all you need to master complex systems. This edition now includes Jenkins, Ansible, Logstash and more. What You'll Learn: Understand Linux architecture Build, back up, and recover Linux servers Create basic networks and network services with Linux Build and implement Linux infrastructure and services including mail, web, databases, and file and print Implement Linux security Resolve Linux performance and capacity planning issues Who This Book Is For: Small to medium–sized business owners looking to run their own IT, system administrators considering migrating to Linux, and IT systems integrators looking for an extensible Linux infrastructure management approach.
Publisher: Apress
ISBN: 1484220080
Category : Computers
Languages : en
Pages : 1008
Book Description
Implement a SOHO or SMB Linux infrastructure to expand your business and associated IT capabilities. Backed by the expertise and experienced guidance of the authors, this book provides everything you need to move your business forward. Pro Linux System Administration makes it easy for small- to medium–sized businesses to enter the world of zero–cost software running on Linux and covers all the distros you might want to use, including Red Hat, Ubuntu, Debian, and CentOS. Pro Linux System Administration takes a layered, component–based approach to open source business systems, while training system administrators as the builders of business infrastructure. Completely updated for this second edition, Dennis Matotek takes you through an infrastructure-as-code approach, seamlessly taking you through steps along the journey of Linux administration with all you need to master complex systems. This edition now includes Jenkins, Ansible, Logstash and more. What You'll Learn: Understand Linux architecture Build, back up, and recover Linux servers Create basic networks and network services with Linux Build and implement Linux infrastructure and services including mail, web, databases, and file and print Implement Linux security Resolve Linux performance and capacity planning issues Who This Book Is For: Small to medium–sized business owners looking to run their own IT, system administrators considering migrating to Linux, and IT systems integrators looking for an extensible Linux infrastructure management approach.
A Practical Guide to Ubuntu Linux
Author: Mark G. Sobell
Publisher: Pearson Education
ISBN: 0133927318
Category : Computers
Languages : en
Pages : 1402
Book Description
Mark Sobell presents a comprehensive start-to-finish reference for installing, configuring, and working with Ubuntu Linux desktop and servers.
Publisher: Pearson Education
ISBN: 0133927318
Category : Computers
Languages : en
Pages : 1402
Book Description
Mark Sobell presents a comprehensive start-to-finish reference for installing, configuring, and working with Ubuntu Linux desktop and servers.
Mastering FreeBSD and OpenBSD Security
Author: Yanek Korff
Publisher: "O'Reilly Media, Inc."
ISBN: 1449369588
Category : Computers
Languages : en
Pages : 466
Book Description
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure.FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems.Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate.Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
Publisher: "O'Reilly Media, Inc."
ISBN: 1449369588
Category : Computers
Languages : en
Pages : 466
Book Description
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure.FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems.Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate.Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
Windows to Linux Migration Toolkit
Author: David Allen
Publisher: Elsevier
ISBN: 0080481760
Category : Computers
Languages : en
Pages : 529
Book Description
This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals who wish to maximize the value of their Windows to Linux migration services will find this book valuable. The book will help them fine-tune their migration services to make them more efficient, thorough, feature-enhanced, and cost-effective by utilizing migration scripts and best practices gleaned from the author's many years of real-world migrations in large and small companies.* The book and fully functioning scripts on the CD-ROM work for migrations from Windows NT or Windows 2000 to any Linux distribution. * David Allen has done over 25,000 user migrations from Windows to Linux. * Microsoft will stop supporting Windows NT in December 2004 forcing over 2 million enterprise customers to migrate from Windows NT to a new sever operating system. Both IBM and Dell are offering enterprise servers running Linux which will allow customers to realize a 50% reduction in TCO. In 2003 Linux servers represented the largest growth segment in the Server market, and all the major research groups indicate this trend will continue through t least 2007.
Publisher: Elsevier
ISBN: 0080481760
Category : Computers
Languages : en
Pages : 529
Book Description
This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals who wish to maximize the value of their Windows to Linux migration services will find this book valuable. The book will help them fine-tune their migration services to make them more efficient, thorough, feature-enhanced, and cost-effective by utilizing migration scripts and best practices gleaned from the author's many years of real-world migrations in large and small companies.* The book and fully functioning scripts on the CD-ROM work for migrations from Windows NT or Windows 2000 to any Linux distribution. * David Allen has done over 25,000 user migrations from Windows to Linux. * Microsoft will stop supporting Windows NT in December 2004 forcing over 2 million enterprise customers to migrate from Windows NT to a new sever operating system. Both IBM and Dell are offering enterprise servers running Linux which will allow customers to realize a 50% reduction in TCO. In 2003 Linux servers represented the largest growth segment in the Server market, and all the major research groups indicate this trend will continue through t least 2007.
Security Power Tools
Author: Bryan Burns
Publisher: "O'Reilly Media, Inc."
ISBN: 0596554818
Category : Computers
Languages : en
Pages : 858
Book Description
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. Designed to be browsed, Security Power Tools offers you multiple approaches to network security via 23 cross-referenced chapters that review the best security tools on the planet for both black hat techniques and white hat defense tactics. It's a must-have reference for network administrators, engineers and consultants with tips, tricks, and how-to advice for an assortment of freeware and commercial tools, ranging from intermediate level command-line operations to advanced programming of self-hiding exploits. Security Power Tools details best practices for: Reconnaissance -- including tools for network scanning such as nmap; vulnerability scanning tools for Windows and Linux; LAN reconnaissance; tools to help with wireless reconnaissance; and custom packet generation Penetration -- such as the Metasploit framework for automated penetration of remote computers; tools to find wireless networks; exploitation framework applications; and tricks and tools to manipulate shellcodes Control -- including the configuration of several tools for use as backdoors; and a review of known rootkits for Windows and Linux Defense -- including host-based firewalls; host hardening for Windows and Linux networks; communication security with ssh; email security and anti-malware; and device security testing Monitoring -- such as tools to capture, and analyze packets; network monitoring with Honeyd and snort; and host monitoring of production servers for file changes Discovery -- including The Forensic Toolkit, SysInternals and other popular forensic tools; application fuzzer and fuzzing techniques; and the art of binary reverse engineering using tools like Interactive Disassembler and Ollydbg A practical and timely network security ethics chapter written by a Stanford University professor of law completes the suite of topics and makes this book a goldmine of security information. Save yourself a ton of headaches and be prepared for any network security dilemma with Security Power Tools.
Publisher: "O'Reilly Media, Inc."
ISBN: 0596554818
Category : Computers
Languages : en
Pages : 858
Book Description
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. Designed to be browsed, Security Power Tools offers you multiple approaches to network security via 23 cross-referenced chapters that review the best security tools on the planet for both black hat techniques and white hat defense tactics. It's a must-have reference for network administrators, engineers and consultants with tips, tricks, and how-to advice for an assortment of freeware and commercial tools, ranging from intermediate level command-line operations to advanced programming of self-hiding exploits. Security Power Tools details best practices for: Reconnaissance -- including tools for network scanning such as nmap; vulnerability scanning tools for Windows and Linux; LAN reconnaissance; tools to help with wireless reconnaissance; and custom packet generation Penetration -- such as the Metasploit framework for automated penetration of remote computers; tools to find wireless networks; exploitation framework applications; and tricks and tools to manipulate shellcodes Control -- including the configuration of several tools for use as backdoors; and a review of known rootkits for Windows and Linux Defense -- including host-based firewalls; host hardening for Windows and Linux networks; communication security with ssh; email security and anti-malware; and device security testing Monitoring -- such as tools to capture, and analyze packets; network monitoring with Honeyd and snort; and host monitoring of production servers for file changes Discovery -- including The Forensic Toolkit, SysInternals and other popular forensic tools; application fuzzer and fuzzing techniques; and the art of binary reverse engineering using tools like Interactive Disassembler and Ollydbg A practical and timely network security ethics chapter written by a Stanford University professor of law completes the suite of topics and makes this book a goldmine of security information. Save yourself a ton of headaches and be prepared for any network security dilemma with Security Power Tools.
Professional Red Hat Enterprise Linux 3
Author: Kapil Sharma
Publisher: John Wiley & Sons
ISBN: 0764578596
Category : Computers
Languages : en
Pages : 745
Book Description
What is this book about? Professional Red Hat Enterprise Linux 3 is a complete professional guide to setting up, configuring, and deploying Red Hat Enterprise Linux in the corporate production environment. The book focuses on Enterprise Server and Advanced Server features, including the key areas of high availability with the Red Hat Cluster Suite, Red Hat Network Control Center, and Red Hat Enterprise applications such as the Content Management System and portal server. Other key unique features include kernel tuning for various performance profiles; advanced Apache configuration; Tux installation/maintenance; building high-performance FTP servers; building high-performance mail servers (which means replacing Sendmail); Mailing list management; how to efficiently add, remove, or modify 100 users at the same time; and a discussion of disk quota management and monitoring. What does this book cover? The key features of the book include the following: How to install and setup RHEL 3 How to deploy RHEL 3 in production environment How to manage an RHEL system using Perl and shell scripting Advanced administration tools How to use Red Hat network service Details on installation and setup of security tools Ability to use and deploy High Availability solutions provided with RHEL 3 Performance tuning How to use monitoring tools Ability to use RHEL to provide scalable infrastructure solutions.
Publisher: John Wiley & Sons
ISBN: 0764578596
Category : Computers
Languages : en
Pages : 745
Book Description
What is this book about? Professional Red Hat Enterprise Linux 3 is a complete professional guide to setting up, configuring, and deploying Red Hat Enterprise Linux in the corporate production environment. The book focuses on Enterprise Server and Advanced Server features, including the key areas of high availability with the Red Hat Cluster Suite, Red Hat Network Control Center, and Red Hat Enterprise applications such as the Content Management System and portal server. Other key unique features include kernel tuning for various performance profiles; advanced Apache configuration; Tux installation/maintenance; building high-performance FTP servers; building high-performance mail servers (which means replacing Sendmail); Mailing list management; how to efficiently add, remove, or modify 100 users at the same time; and a discussion of disk quota management and monitoring. What does this book cover? The key features of the book include the following: How to install and setup RHEL 3 How to deploy RHEL 3 in production environment How to manage an RHEL system using Perl and shell scripting Advanced administration tools How to use Red Hat network service Details on installation and setup of security tools Ability to use and deploy High Availability solutions provided with RHEL 3 Performance tuning How to use monitoring tools Ability to use RHEL to provide scalable infrastructure solutions.