Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (7)
  • BVB
  • 2000-2004  (7)
  • Safari Tech Books Online  (7)
  • Grimm, Jacob
  • Grimm, Wilhelm
  • Upper Saddle River, NJ : Prentice Hall PTR  (7)
  • Computer software ; Development  (3)
  • Computer security  (2)
  • Object-oriented methods (Computer science)  (2)
Datasource
  • MPI Ethno. Forsch.  (7)
  • BVB
Material
Language
Years
Year
Author, Corporation
  • 1
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 647 p. , ill. ; , 23 cm
    Series Statement: Prentice Hall series in computer networking and distributed systems
    DDC: 005.8
    Keywords: Computer crimes ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to come "This is a truly outstanding book-enormous technical wealth and beautifully written." -Warwick Ford "Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!" -Harlan Carvey, CISSP "This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." -Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it! This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes: Solutions and examples that cover both UNIX® and Windows® Practical, time-tested, real-world actions you can take to secure your systems Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly! Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home compu...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 252 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Biometric identification ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application. In Biometrics for Network Security , biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes: An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
    Note: Includes bibliographical references (p. 239-241) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 249 p. , ill. ; , 24 cm
    Series Statement: Robert C. Martin series
    DDC: 005.13/3
    Keywords: Computer software ; Development ; Java (Computer program language) ; UML (Computer science) ; Electronic books ; local
    Abstract: UML for Java Programmers Robert C. Martin All the UML Java developers need to know You don't use UML in a vacuum: you use it to build software with a specific programming language. If that language is Java, you need UML for Java Programmers . In this book, one of the world's leading object design experts becomes your personal coach on UML 1&2 techniques and best practices for the Java environment. Robert C. Martin illuminates every UML 1&2 feature and concept directly relevant to writing better Java software--and ignores features irrelevant to Java developers. He explains what problems UML can and can't solve, how Java and UML map to each other, and exactly how and when to apply those mappings. Pragmatic coverage of UML as a working tool for Java developers Shows Java code alongside corresponding UML diagrams Covers every UML diagram relevant to Java programmers, including class, object, sequence, collaboration, and state diagrams Introduces dX, a lightweight, powerfully productive RUP & XP-derived process for successful software modeling Includes a detailed, start-to-finish case study: remote service client, server, sockets, and tests
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 458 p. , ill. ; , 25 cm
    DDC: 658.4/032
    Keywords: Object-oriented methods (Computer science) ; System analysis ; Electronic books ; local
    Abstract: The complete guide to requirements analysis for every system analyst and project team member. Thousands of software projects are doomed from the start because they're based on a faulty understanding of the business problem that must be solved. The solution is effective requirements analysis. In Requirements Analysis: From Business Views to Architecture , David C. Hay gives you a comprehensive overview of the world's best requirements analysis practices, organized coherently to help you choose and execute the best approach for every project. In addition, he guides you through the process of defining an architecture-from gaining a full understanding of what business people need to the creation of a complete enterprise architecture. Practical solutions will help you: Focus more clearly on the goals of requirements analysis Represent the fundamental structures and systems environment of any enterprise more accurately Identify key information processing gaps and discover which information technologies can best address them Clarify the goals of your new system and reflect them more accurately in your models Understand crucial people-related issues that impact requirements Plan smooth transitions to new systems Requirements Analysis: From Business Views to Architecture provides the complete process of defining an architecture-so that you can build a rock-solid foundation for your next software project.
    Note: Includes bibliographical references (p. 443-448) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxv, 623 p. , ill. ; , 24 cm
    DDC: 005.2/768
    Keywords: C# (Computer program language) ; Computer software ; Development ; System design ; Electronic books ; local
    Abstract: Build industrial-strength .NET applications with C#! Practical, useful information on the .NET Framework, the Common Language Runtime, ADO.NET, ASP.NET, Web Services, security, interoperability, and more Running case study: see how concepts work together when you build .NET applications Experienced C++, Java, and Visual Basic programmers: become effective with .NET! This book gives experienced developers all the practical insight they need to build enterprise applications for Microsoft's .NET platform using C#. Using extensive code examples and a running case study, the authors illuminate the .NET concepts and technologies that offer the greatest power and value. They cover the entire process of constructing a .NET application: creating a monolithic C# console application; enhancing it with a Windows Forms interface; isolating functionality inside components, adding database access and security; and finally, delivering functionality through ASP.NET and Web Services. .NET Framework and Common Language Runtime fundamentals for experienced programmers Key .NET features: interfaces, attributes, collections, threading, remoting, assemblies, and more Hands-on coverage of ADO.NET, ASP.NET, Web Services, and user interface programming Component deployment and versioning Ensuring interoperability with diverse and legacy systems Includes a self-contained C# overview for those new to the language Part of The Integrated .NET series from Object Innovations.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxi, 627 p. , ill. ; , 26 cm
    Edition: 2nd ed.
    DDC: 005.1/17
    Keywords: Object-oriented methods (Computer science) ; System analysis ; System design ; UML (Computer science) ; Electronic books ; local
    Abstract: "People often ask me which is the best book to introduce them to the world of OO design. Ever since I came across it Applying UML and Patterns has been my unreserved choice." - Martin Fowler , author, UML Distilled and Refactoring The first edition of Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design quickly emerged as the leading OOA/D introduction; it has been translated into seven languages and adopted in universities and businesses worldwide. In this second edition, well-known object technology and iterative methods leader Craig Larman refines and expands this text for developers and students new to OOA/D, the UML, patterns, use cases, iterative development, and related topics. Put simply, the book shows newcomers to OOA/D how to "think in objects." It does so by presenting three iterations of a single, cohesive case study, incrementally introducing the requirements and OOA/D activities, principles, and patterns that are most critical to success. It introduces the most frequently used UML diagramming notation, while emphasizing that OOA/D is much more than knowing UML notation. All case study iterations and skills are presented in the context of an "agile" version of the Unified Process -- a popular, modern iterative approach to software development. Throughout, Larman presents the topics in a fashion designed for learning and comprehension. Among the topics introduced in Applying UML and Patterns are: * requirements and use cases, * domain object modeling, * core UML, * designing objects with responsibilities, * "Gang of Four" and other design patterns, * mapping designs to code (using Java as an example), * layered architectures, * architectural analysis, * package design, * iterative development, and * the Unified Process. For a more detailed list of topics, please see the accompanying table of contents. Foreword by Philippe Kruchten, the lead architect of the Rational Unified Process. "Too few people have a knack for explaining things. Fewer still have a handle on software analysis and design. Craig Larman has both." - John Vlissides , author, Design Patterns and Pattern Hatching "This edition contains Larman's usual accurate and thoughtful writing. It is a very good book made even better." - Alistair Cockburn , author, Writing Effective Use Cases and Surviving OO Projects
    Note: Includes bibliographical references (p. 609-613) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: ix, 208 p. , ill. ; , 23 cm. +
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: Software planning and specification development: no fluff-just results! Create better specifications-with less complexity, and less work! Best practices that work with any language or development environment CD-ROM exclusive: Software Blueprinter, a powerful software application for real-world specification development For all software team members: developers, architects, managers, clients, and software quality specialists Planning Smarter demystifies software planning, cuts out to the chase, and shows exactly how to create higher quality, more useful specifications with less complexity and less work! Tyson Gill presents a complete blueprint for improving the quality of your software specifications, reducing errors and omissions, simplifying planning, and establishing a rock-solid foundation for any software development project. Coverage includes: Understanding the planning process-and why it so often fails Getting the planning process "just right" and identifying the best lifecycle approach Optimizing the communication that is critical to successful planning 13 powerful strategies for more effective requirements development Planning in the context of leading software process models: CMM, MSF, UML, and RUP Recognizing and making effective use of planning metadata Planning Smarter is an invaluable resource for every member of the software development project team. It will help executives and clients understand the key factors associated with success-and it will give planners, developers, architects, and team leaders the proven techniques they need to build specifications that work. CD-ROM INCLUDED The accompanying CD-ROM contains Software Blueprinter, a powerful specification development application that embodies the key principles in this book.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...