Senin, 12 September 2011

5 new posts


5 new posts

Link to Wow! eBook - Blog

Apache Cookbook, 2nd Edition

Posted: 12 Sep 2011 02:28 AM PDT

Apache Cookbook, 2nd Edition

Book Description

There’s plenty of documentation on installing and configuring the Apache web server, but where do you find help for the day-to-day stuff, like adding common modules or fine-tuning your activity logging? That’s easy. The new edition of the Apache Cookbook offers you updated solutions to the problems you’re likely to encounter with the new versions of Apache.

Written by members of the Apache Software Foundation, and thoroughly revised for Apache versions 2.0 and 2.2, recipes in this book range from simple tasks, such installing the server on Red Hat Linux or Windows, to more complex tasks, such as setting up name-based virtual hosts or securing and managing your proxy server. Altogether, you get more than 200 timesaving recipes for solving a crisis or other deadline conundrums, with topics including:

  • Security
  • Aliases, Redirecting, and Rewriting
  • CGI Scripts, the suexec Wrapper, and other dynamic content techniques
  • Error Handling
  • SSL
  • Performance

This book tackles everything from beginner problems to those faced by experienced users. For every problem addressed in the book, you will find a worked-out solution that includes short, focused pieces of code you can use immediately. You also get explanations of how and why the code works, so you can adapt the problem-solving techniques to similar situations.

Instead of poking around mailing lists, online documentation, and other sources, rely on the Apache Cookbook for quick solutions when you need them. Then you can spend your time and energy where it matters most.

Book Details

  • Paperback: 320 pages
  • Publisher: O’Reilly Media; 2nd Edition (December 2007)
  • Language: English
  • ISBN-10: 0596529945
  • ISBN-13: 978-0596529949
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts

BGP

Posted: 12 Sep 2011 02:24 AM PDT

BGP

Book Description

Border Gateway Protocol (BGP) is the routing protocol used to exchange routing information across the Internet. It makes it possible for ISPs to connect to each other and for end-users to connect to more than one ISP. BGP is the only protocol that is designed to deal with a network of the Internet’s size, and the only protocol that can deal well with having multiple connections to unrelated routing domains.

This book is a guide to all aspects of BGP: the protocol, its configuration and operation in an Internet environment, and how to troubleshooting it. The book also describes how to secure BGP, and how BGP can be used as a tool in combating Distributed Denial of Service (DDoS) attacks. Although the examples throughout this book are for Cisco routers, the techniques discussed can be applied to any BGP-capable router.

The topics include:

  • Requesting an AS number and IP addresses
  • Route filtering by remote ISPs and how to avoid this
  • Configuring the initial BGP setup
  • Balancing the available incoming or outgoing traffic over the available connections
  • Securing and troubleshooting BGP
  • BGP in larger networks: interaction with internal routing protocols, scalability issues
  • BGP in Internet Service Provider networks

The book is filled with numerous configuration examples with more complex case studies at the end of the book to strengthen your understanding. BGP is for anyone interested in creating reliable connectivity to the Internet.

Book Details

  • Paperback: 304 pages
  • Publisher: O’Reilly Media (September 2002)
  • Language: English
  • ISBN-10: 0596002548
  • ISBN-13: 978-0596002541
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts

Internet Core Protocols: The Definitive Guide

Posted: 12 Sep 2011 02:20 AM PDT

Internet Core Protocols: The Definitive Guide

Book Description

If you’ve ever been responsible for a network, you know that sinkingfeeling: your pager has gone off at 2 a.m., the network is broken, and you can’t figure out why by using a dial-in connection from home. You drive into the office, dig out your protocol analyzer, and spend the next fourhours trying to put things back together before the staff shows up for work.

When this happens, you often find yourself looking at the low-level guts of the Internet protocols: you’re deciphering individual packets, trying to figure out what is (or isn’t) happening. Until now, the only real guide to the protocols has been the Internet RFCs–and they’re hardlywhat you want to be reading late at night when your network is down. There hasn’t been a good book on the fundamentals of IP networking aimed at network administrators–until now.

Internet Core Protocols: The Definitive Guide contains all the information you need for low-level network debugging. It provides thorough coverage of the fundamental protocols in the TCP/IP suite: IP, TCP, UDP, ICMP, ARP (in its many variations), and IGMP. (The companion volume, Internet Application Protocols: The Definitive Guide,provides detailed information about the commonly used application protocols, including HTTP, FTP, DNS, POP3, and many others). It includes many packet captures, showing you what to look for and how to interpret all the fields. It has been brought up to date with the latest developments in real-world IP networking.

The CD-ROM included with the book contains Shomiti’s “Surveyor Lite,” a packet analyzer that runs on Win32 systems, plus the original RFCs, should you need them for reference. Together, this package includes everything you need to troubleshoot your network–except coffee.

“This book moves beyond the older O’Reilly book TCP/IP Network Administration, and covers the protocols in much more depth. It will be a useful book to refer to, but I suspect will be one which lives mostly upon the bookshelf, only coming out occasionally during a troubleshooting session.”- Joel Smith, news@UK, June 2000

“…the author does make the point that this book is not intended for absolute TCP/IP newcomers. If you don’t know what a subnet mask is, or how it relates to the maximum number on a particular network, then you should probably read something else first. But if you understand a little about TCP/IP and you want to deepen your understanding and appreciation of how the PCs in a network communicate with one another, then you will find this book a fascinating read.”- Dave Jewell, Developers Review, June 2000.

Book Details

  • Paperback: 472 pages
  • Publisher: O’Reilly Media (February 2000)
  • Language: English
  • ISBN-10: 1565925726
  • ISBN-13: 978-1565925724
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts

Secure Programming Cookbook for C and C++

Posted: 12 Sep 2011 02:12 AM PDT

Secure Programming Cookbook for C and C++

Book Description

Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today’s computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today’s developers need help figuring out how to write code that attackers won’t be able to exploit. But writing such code is surprisingly difficult.

Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code. It contains a wealth of solutions to problems faced by those who care about the security of their applications. It covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering. The rich set of code samples provided in the book’s more than 200 recipes will help programmers secure the C and C++ programs they write for both Unix® (including Linux®) and Windows® environments. Readers will learn:

  • How to avoid common programming errors, such as buffer overflows, race conditions, and format string problems
  • How to properly SSL-enable applications
  • How to create secure channels for client-server communication without SSL
  • How to integrate Public Key Infrastructure (PKI) into applications
  • Best practices for using cryptography properly
  • Techniques and strategies for properly validating input to programs
  • How to launch programs securely
  • How to use file access mechanisms properly
  • Techniques for protecting applications from reverse engineering

The book’s web site supplements the book by providing a place to post new recipes, including those written in additional languages like Perl, Java, and Python. Monthly prizes will reward the best recipes submitted by readers.

Secure Programming Cookbook for C and C++ is destined to become an essential part of any developer’s library, a code companion developers will turn to again and again as they seek to protect their systems from attackers and reduce the risks they face in today’s dangerous world.

Book Details

  • Paperback: 792 pages
  • Publisher: O’Reilly Media (July 2003)
  • Language: English
  • ISBN-10: 0596003943
  • ISBN-13: 978-0596003944
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts

Ajax: The Definitive Guide

Posted: 12 Sep 2011 02:05 AM PDT

Ajax: The Definitive Guide

Book Description

Is Ajax a new technology, or the same old stuff web developers have been using for years? Both, actually. This book demonstrates not only how tried-and-true web standards make Ajax possible, but how these older technologies allow you to give sites a decidedly modern Web 2.0 feel.

Ajax: The Definitive Guide explains how to use standards like JavaScript, XML, CSS, and XHTML, along with the XMLHttpRequest object, to build browser-based web applications that function like desktop programs. You get a complete background on what goes into today’s web sites and applications, and learn to leverage these tools along with Ajax for advanced browser searching, web services, mashups, and more. You discover how to turn a web browser and web site into a true application, and why developing with Ajax is faster, easier and cheaper.

The book also explains:

  • How to connect server-side backend components to user interfaces in the browser
  • Loading and manipulating XML documents, and how to replace XML with JSON
  • Manipulating the Document Object Model (DOM)
  • Designing Ajax interfaces for usability, functionality, visualization, and accessibility
  • Site navigation layout, including issues with Ajax and the browser’s back button
  • Adding life to tables & lists, navigation boxes and windows
  • Animation creation, interactive forms, and data validation
  • Search, web services and mash-ups
  • Applying Ajax to business communications, and creating Internet games without plug-ins
  • The advantages of modular coding, ways to optimize Ajax applications, and more

This book also provides references to XML and XSLT, popular JavaScript Frameworks, Libraries, and Toolkits, and various Web Service APIs. By offering web developers a much broader set of tools and options, Ajax gives developers a new way to create content on the Web, while throwing off the constraints of the past. Ajax: The Definitive Guide describes the contents of this unique toolbox in exhaustive detail, and explains how to get the most out of it.

Book Details

  • Paperback: 980 pages
  • Publisher: O’Reilly Media (January 2008)
  • Language: English
  • ISBN-10: 0596528388
  • ISBN-13: 978-0596528386
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts

Tidak ada komentar:

Posting Komentar