Honeypots look like victim systems waiting or searching for malware and other nefarious attacks, registering the enemy's practices in high-resolution gory, blood-ridden detail. Virtualization allows one system to act as a network of disparate victim OS’s and services. Security experts can observe attacks live or stored for detailed analysis, learn the methodology of Dr Evil and generate statistics for internet wide attacks.
MySQL is one of the dominant players in the database market—a solid pillar in the Linux, Apache, MySQL and PHP or LAMP stack. SQL for MySQL Developers, written by Rick F. van der Lans and published by Addison Wesley covers all significant topics of SQL with specific references to the MySQL dialect.
OpenOffice.org is a fantastic office suite, finally undermining Microsoft’s monopoly on Office-like software (word processing, presentations, etc.). Out of all of the OpenOffice.org programs, Writer is by far the most used: writing a document, a letter, or anything else is definitely more common than writing a presentation. This book is all about OpenOffice.org’s Writer.