Chapter 11Installation, Customization, and Security
“The great successful men of the world have used their imaginations, they think ahead and create their mental picture, and then go to work materializing that picture in all its details, filling in here, adding a little there, altering this a bit and that a bit, but steadily building, steadily building.
— Robert Collier, motivational author
Once you have decided which software you want to use, it has to be installed and, if desired, it has to be customized. You also need to set all applicable security options.
It is impossible for us to include detailed installation and customization instructions for all the tools that we have referenced (or even a fraction of them). Instead, we have included ...