Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (72)
  • English  (72)
  • Safari Tech Books Online  (72)
  • Indianapolis, Ind. : New Riders  (48)
  • Upper Saddle River, NJ : Addison-Wesley  (24)
Datasource
Material
Language
  • English  (72)
Years
  • 1
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/465
    Keywords: Macintosh (Computer) ; Software ; Operating systems (Computers) ; Software ; Electronic books ; local
    Abstract: A Step-by-Step Guide to the Xcode Mac OS Development Environment Every copy of Mac OS X comes with Xcode, the powerful development suite that Apple uses to build applications ranging from Safari to iTunes. But because Xcode is complex and subtle, even experienced Mac programmers rarely take full advantage of it. Now, Mac developer Fritz Anderson has written the definitive introduction and guide to using Xcode to build applications with any Macintosh technology or language. Anderson helps you master Xcode's powerful text editor, industry-standard gcc compiler, graphical interactive debugger, mature UI layout and object linkage editor, and exceptional optimization tools. One step at a time, you'll develop a command-line utility, then use Xcode tools to evolve it into a full-fledged Cocoa application. Anderson provides expert guidance on development frameworks, source code management, Core Data modeling, localization, and much more. Coverage includes Understanding Xcode workflow and the Mac OS X application lifecycle Porting established legacy projects into Xcode Using the Model-View-Controller design pattern to build robust graphical applications Building static libraries and working with Xcode's build system Making the most of bundles and package directories Creating applications compatible with older versions of Mac OS X Creating universal binaries to run on both Intel and PowerPC Macintoshes Adding Spotlight searchability to data files Leveraging Xcode's built-in support for unit testing Using Xcode on makefile-based UNIX development projects Step Into Xcode 's breadth, depth, and practical focus make it indispensable to every Mac developer: current Xcode users upgrading to Xcode 2.1, experienced Mac programmers migrating from CodeWarrior, UNIX/Linux programmers moving to Mac OS X, and even novices writing their first programs or scripts.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: "When it comes to software security, the devil is in the details. This book tackles the details." --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies "McGraw's book shows you how to make the 'culture of security' part of your development lifecycle." --Howard A. Schmidt, Former White House Cyber Security Advisor "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the lunchroom wall." --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book's methods without radically changing the way you work. Inside you'll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development lifecycle with the touchpoints described in this book. Let this expert author show you how to build more secure software by building security in.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Microsoft Windows (Computer file) ; Computer software ; Development ; Microsoft .NET ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: "Brian Noyes' writing style easily captures your attention as he elaborates on all aspects of data binding in his book. He has a refreshingly clear and crisp delivery as he starts each chapter with a simple tour of each topic, and then leads you into practical concerns for sound practices and extensibility opportunities. Most importantly, as Brian explains approaches to data-binding architecture, patterns of usage, the value of data sets, binding controls and the rest, he always describes how he reaches his recommendations on the topic. This book is perfect for newcomers to .NET 2.0, but also for those that have some experience. Anyone who cares about data in their applications (okay, that should be almost everyone) is guaranteed to learn something new and useful by reading Brian's book." -Michele Leroux Bustamante, IDesign chief architect, Microsoft regional director, and MVP "Brian has saved me a lot of time. I'm writing The Hitchhiker's Guide to Visual Studio and SQL Server 2005 (7th Edition) and I'm not going to have to cover data binding nearly as deeply because Brian has done it for me. His book gets right to the meat of the subject and makes data binding look easy. I was also pleased to see that the book focuses on the misunderstood and under-applied Windows Forms architecture. It's a must-read for anyone trying to make their application more interactive and to leverage the new Visual Studio 2005 technology. I'm planning to point my readers to this resource when they need an in-depth treatment of data binding." -William Vaughn, president, Beta V Corporation "Data binding has finally come of age in Windows applications. Back in the Visual Studio 6.0 days, I ignored data binding completely and wrote my own repetitive code to encapsulate my business logic. With Visual Studio 2005, we finally have a robust and compelling data-binding technology. To ignore it today would make you inefficient and put you behind the curve. Brian delivers a clear and concise discussion of a core topic of development for Windows today. A combination of an easy-to-follow conversational yet technical tone, excellent examples, and solid explanations make this a must-read for any developer writing for Windows or learning to write for Windows." -Stephen Forte, chief technical officer, Corzen Inc. "This book provides a clear, readable, and in-depth treatment of data binding, with detailed discussions of best practices in the presentation and use of data. Brian c...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 006.6/86
    Keywords: OpenGL ; Computer graphics ; Electronic books ; local
    Abstract: "As the 'Red Book' is known to be the gold standard for OpenGL, the 'Orange Book' is considered to be the gold standard for the OpenGL Shading Language. With Randi's extensive knowledge of OpenGL and GLSL, you can be assured you will be learning from a graphics industry veteran. Within the pages of the second edition you can find topics from beginning shader development to advanced topics such as the spherical harmonic lighting model and more." -David Tommeraasen, CEO/Programmer, Plasma Software "This will be the definitive guide for OpenGL shaders; no other book goes into this detail. Rost has done an excellent job at setting the stage for shader development, what the purpose is, how to do it, and how it all fits together. The book includes great examples and details, and good additional coverage of 2.0 changes!" -Jeffery Galinovsky, Director of Emerging Market Platform Development, Intel Corporation "The coverage in this new edition of the book is pitched just right to help many new shader-writers get started, but with enough deep information for the 'old hands.'" -Marc Olano, Assistant Professor, University of Maryland "This is a really great book on GLSL-well written and organized, very accessible, and with good real-world examples and sample code. The topics flow naturally and easily, explanatory code fragments are inserted in very logical places to illustrate concepts, and all in all, this book makes an excellent tutorial as well as a reference." -John Carey, Chief Technology Officer, C.O.R.E. Feature Animation OpenGL® Shading Language, Second Edition , extensively updated for OpenGL 2.0, is the experienced application programmer's guide to writing shaders. Part reference, part tutorial, this book thoroughly explains the shift from fixed-functionality graphics hardware to the new era of programmable graphics hardware and the additions to the OpenGL API that support this programmability. With OpenGL and shaders written in the OpenGL Shading Language, applications can perform better, achieving stunning graphics effects by using the capabilities of both the visual processing unit and the central processing unit. In this book, you will find a detailed introduction to the OpenGL Shading Language (GLSL) and the new OpenGL function calls that support it. The text begins by describing the syntax and semantics of this high-level programming language. Once this foundation has been established, the book explores the creation and manipulation of sha...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 004.6/2
    Keywords: IS-IS (Computer network protocol) ; Open Shortest Path First (Computer network protocol) ; Electronic books ; local
    Abstract: The practical guide to large-scale networking with OSPF and IS-IS This is the definitive guide to using OSPF and IS-IS protocols in large-scale IP enterprise, carrier, and service provider networks. Well-known network designer Jeff Doyle draws on his consulting experience, offering realistic advice and straight answers on every aspect of working with link-state protocols-from scalability, reliability, and security to area design and database synchronization. This book is organized to help network engineers and architects compare OSPF and IS-IS. One feature at a time, Doyle first demonstrates how a topic or feature is implemented in OSPF, and then walks through a similar implementation using IS-IS. Professionals who are relatively new to large-scale networking will welcome his practical introduction to the concepts, goals, and history of link state protocols. Coverage includes Understanding message types, encapsulation, architecture, LSAs, and LSPs Optimizing addressing, neighbor discovery, adjacencies, and router designation Improving scalability: controlling the scope of flooding, link state database size, SPF calculation efficiency, and much more Designing and operating large-scale networks for maximum security and reliability Hardening networks to thwart attacks against routing protocols Comparing OSPF and IS-IS extensibility Utilizing extensions for MPLS-based traffic engineering, IPv6, and multi-topology routing Troubleshooting OSPF and IS-IS log entries, debug output, and LS databases Doyle's thorough explanations, end-of-chapter review questions, and many wide-ranging examples for both Cisco's IOS and Juniper's JUNOS also make this book an exceptional resource for anyone pursuing a CCIE or JNCIE certification. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxv, 367 p. , ill. ; , 24 cm
    DDC: 005.446
    Keywords: Mac OS ; Electronic books ; local
    Abstract: Tips rule! Have you ever noticed that in just about every Mac book, the author will include a couple of tips in each chapter (you'll usually find them in the sidebar, or at the bottom of the page in a tinted box). Sometimes it's a shortcut, a faster way to do something, or a clever workaround that just makes your life easier. People really love those tips, but there's only one problem--there's never enough of them. That's why Scott Kelby, bestselling author and Editor-in-Chief of Mac Design magazine came up with the idea to create a book that's nothing but "sidebar" tips. That's right--this entire book, cover-to-cover is packed with nothing but those cool inside secrets, slick workarounds, undocumented shortcuts, and sneaky little tricks that will make you faster, better, and have more fun using Mac OS 10.4 (Tiger). Nothing but the tips! You're not going to find complicated descriptions on how to configure a network, how to partition a hard drive, or lines and lines of scary-looking UNIX code--instead this book is nothing but cool tips--and it's all written in Scott's casual, plain English style so you can start using these tips today. Plus, this book does the standard "sidebar tip" one better by including a clear screen capture with nearly every tip, so you can see exactly how it's all done. Not just tips. Killer tips! To be in this book, every tip has got to be a "Killer Tip" (the kind of tip that makes you nod and smile, then call all your Mac buddies to tune them up with your new-found power). Scott's a total "hip hound" (in fact, it was Scott who created the entire smash-bestselling "Killer Tips" book series), and he doesn't hold anything back--it's all here from the man who literally "wrote the book" on cool productivity tips.If you like doing things the easy way, if you like getting twice the work done in half the time, and if you get a kick out of knowing all the "inside secrets and undocumented shortcuts" that will wow your friends and coworkers, you're absolutely going to love this book.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Apache (Computer file : Apache Group) ; Web servers ; Computer programs ; Web sites ; Security measures ; Computer programs ; Electronic books ; local
    Abstract: "Ryan Barnett has raised the bar in terms of running Apache securely. If you run Apache, stop right now and leaf through this book; you need this information." -Stephen Northcutt, The SANS Institute The only end-to-end guide to securing Apache Web servers and Web applications Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications. Firewalls and SSL won't protect you: you must systematically harden your Web application environment. Preventing Web Attacks with Apache brings together all the information you'll need to do that: step-by-step guidance, hands-on examples, and tested configuration files. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against. Exploits discussed include: buffer overflows, denial of service, attacks on vulnerable scripts and programs, credential sniffing and spoofing, client parameter manipulation, brute force attacks, web defacements, and more. Barnett introduces the Center for Internet Security Apache Benchmarks, a set of best-practice Apache security configuration actions and settings he helped to create. He addresses issues related to IT processes and your underlying OS; Apache downloading, installation, and configuration; application hardening; monitoring, and more. He also presents a chapter-length case study using actual Web attack logs and data captured "in the wild." For every sysadmin, Web professional, and security specialist responsible for Apache or Web application security. With this book, you will learn to Address the OS-related flaws most likely to compromise Web server security Perform security-related tasks needed to safely download, configure, and install Apache Lock down your Apache httpd.conf file and install essential Apache security modules Test security with the CIS Apache Benchmark Scoring Tool Use the WASC Web Security Threat Classification to identify and mitigate application threats Test Apache mitigation settings against the Buggy Bank Web application Analyze an Open Web Proxy Honeypot to gather crucial intelligence about attackers Master advanced techniques for detecting and preventing intrusions
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: "It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding." --Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible." --Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight. "Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine. "Understanding the ultimate attacker's tool provides ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 444 p. , ill. ; , 24 cm
    DDC: 004.6/5
    Keywords: Computer network architectures ; Web services ; Electronic books ; local
    Abstract: Praise for Understanding SOA with Web Services "This book does the best job of describing not only "where we are" in the timeline of enterprise integration efforts, but also providing strategic guidance for where we need to be. The authors have worked diligently to break down the integration problem into functional areas, and send you down the path of strategic integration utilizing XML Web Services and Service-Oriented Architecture as the vehicle of choice. You will love this book!" - Daniel Edgar, Architect, Portland General Electric "E-Government needs a comprehensive guide to SOA with Web Services standards and best practices for implementation to get from the current "as is" to the future "to be" architecture. This book meets that need superbly." - Brand Niemann, Ph.D., Co-Chair, Semantic (Web Services) Interoperability Community of Practice, U.S. Federal CIO Council. "There are many books on SOA available today, but Understanding SOA with Web Services stands out from the pack because of its thorough, outstanding coverage of transactions, reliability, and process. Where most SOA books focus on integration and architecture basics, Lomow and Newcomer fearlessly dive into these more advanced, yet critical, topics, and provide a depth of treatment unavailable anywhere else." - Jason Bloomberg, Senior Analyst, ZapThink LLC "This book provides a wealth of content on Web Services and SOA not found elsewhere. Although the book is technical in nature, it is surprisingly easy to read and digest. Managers who would like to keep up with the most effective technical strategies will find this book required reading." - Hari Mailvaganam, University of British Columbia, Vancouver "I have been teaching companies and lecturing on SOA and XML Web Services for years and sort of felt at home with these technologies. I didn't think anyone else could teach me anything more significant about either of them. This book surprised me. If a person teaching SOA and Web Services can learn something from this book, you can too. This book is a must-read for all architects, senior developers, and concerned CTOs." - Sayed Y. Hashimi, SOA Consultant "Newcomer and Lomow are no doubt the industry luminaries on the topics of Web Services, Service-Oriented Architecture, and integration. This book is sure to be a must-have for developers and architects looking to take advantage of the coming wave of standards-based, loosely coupled integration." - Ronald Schmelzer, Senior Analyst...
    Note: Includes bibliographical references (p. 421-430) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xviii, 439 p. , col. ill. ; , 26 cm
    DDC: 775
    Keywords: Adobe Photoshop elements ; Image processing ; Digital techniques ; Photography ; Digital techniques ; Electronic books ; local
    Abstract: Are you ready for an Elements book that breaks all the rules-again? Like the best-selling former edition, The Photoshop Elements 4 Book for Digital Photographers breaks new ground by doing something for digital photographers that's rarely done-it cuts through the bull and shows you exactly "how to do it." It's not a bunch of theory; it doesn't challenge you to come up with your own settings or figure things out on your own. Instead, it does something that virtually no other Elements book has ever done-it tells you flat-out which settings to use, when to use them, and why. If you're looking for one of those "tell-me-everything-about-the-Unsharp-Mask-filter" books, this isn't it. You can grab any other Elements book on the shelf, because they all do that. Instead, this book gives you the inside tips and tricks of the trade for correcting, editing, sharpening, retouching, and presenting your photos like a pro. You'll be absolutely amazed at how easy and effective these techniques are-once you know the secrets. Newly updated to cover Photoshop Elements 4, this full-color, easy-to-follow guide includes new tips that take advantage of Elements 4's hottest new features, including the Magic Selection Brush, which offers a quick way to make accurate selections in your photos; Magic Extractor, which lets you select an image and instantly remove the background; Auto Red Eye and Auto Skin tone tools; cool slideshow effects (text, graphics, narration, pans and zooms, and more); online sharing service; and more! This book is for Windows users only.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 004.67/8
    Keywords: Extranets (Computer networks) ; IPSec (Computer network protocol) ; Electronic books ; local
    Abstract: Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." By learning to read and interpret various network traces, such as those produced by tcpdump, readers will be able to better understand and troubleshoot VPN and network behavior. Specific topics covered include: Block and stream symmetric ciphers, such as AES and RC4; and asymmetric ciphers, such as RSA and EIGamal Message authentication codes, including HMACs Tunneling technologies based on gtunnel SSL protocol for building network-to-network VPNs SSH protocols as drop-in replacements for telnet, ftp, and the BSD r-commands Lightweight VPNs, including VTun, CIPE, tinc, and OpenVPN IPsec, including its Authentication Header (AH) protocol, Encapsulating Security Payload (ESP), and IKE (the key management protocol) Packed with details, the text can be used as a handbook describing the functions of the protocols and the message formats that they use. Source code is available for download, and an appendix covers publicly available software that can be used to build tunnels and analyze traffic flow. VPNs Illustrated gives you the knowledge of tunneling and VPN technology you need to understand existing VPN implementations and successfully create your own.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxi, 793 p. , ill. (some col.) ; , 24 cm. +
    DDC: 006.696
    Keywords: Maya (Computer file) ; Computer animation ; Three-dimensional display systems ; Electronic books ; local
    Abstract: If you thought Angelina Jolie was responsible for Lara Croft's curves, think again! Long before the Hollywood actress brought the Tomb Raider heroine to life, Alias' 3D modeling software Maya was used to create the lovely Lara; Ms. Jolie simply filled in her curves! When you're ready to start creating equally compelling characters of your own, you need this comprehensive volume! In these pages, gaming-industry veteran Antony Ward uses a combination of informative narrative, hands-on tutorials, and a slew of illustrations and screen shots to show you how to use Maya to address the most complex element of game creation-developing great characters! As you follow along, Antony uses the development of two diverse characters-a female figure and a fantastical character with outrageous proportions, wings, and a demon-like face-to demonstrate the techniques involved in modeling detailing, optimizing, texturing, rigging, binding, and animating characters with Maya. The companion CD includes lesson files, scripts, an automatic rigging tool, demo software, and more!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 250 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: "We live in a time when, perhaps surprisingly, the best printed works on C++ are just now emerging. This is one of those works. Although C++ has been at the forefront of innovation and productivity in software development for more than two decades, it is only now being fully understood and utilized. This book is one of those rare contributions that can bear repeated study by practitioners and experts alike. It is not a treatise on the arcane or academic-rather it completes your understanding of things you think you know but will bite you sooner or later until you really learn them. Few people have mastered C++ and software design as well as Steve has; almost no one has such a level head as he when it comes to software development. He knows what you need to know, believe me. When he speaks, I always listen-closely. I invite you to do the same. You (and your customers) will be glad you did." -Chuck Allison, editor, The C++ Source "Steve taught me C++. This was back in 1982 or 1983, I think-he had just returned from an internship sitting with Bjarne Stroustrup inventor of C++ at Bell Labs. Steve is one of the unsung heroes of the early days, and anything Steve writes is on my A-list of things to read. This book is an easy read and collects a great deal of Steve's extensive knowledge and experience. It is highly recommended." -Stan Lippman, coauthor of C++ Primer, Fourth Edition "I welcome the self-consciously non-Dummies approach of a short, smart book." -Matthew P. Johnson, Columbia University "I agree with the author's assessment of the types of programmers. I have encountered the same types in my experience as a developer and a book like this will go far to help bridge their knowledge gap.... I think this book complements other books, like Effective C++ by Scott Meyers. It presents everything in a concise and easy-to-read style." -Moataz Kamel, senior software designer, Motorola Canada "Dewhurst has written yet another very good book. This book should be required reading for people who are using C++ (and think that they already know everything in C++)." -Clovis Tondo, coauthor of C++ Primer Answer Book What Every Professional C++ Programmer Needs to Know-Pared to Its Essentials So It Can Be Efficiently and Accurately Absorbed C++ is a large, complex language, and learning it is never entirely easy. But some concepts and techniques must be thoroughly mastered if programmers are ever to do professional-quality work. This book cut...
    Note: Includes bibliographical references (p. 235) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 1142 p. , ill. ; , 24 cm
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!" James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker Jamesaccusource.net "Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003." Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com "Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security." Bob Reinsch bob.reinsch@fosstraining.com " Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information." Richard Siddaway, MCSE rsiddaw@hotmail.com "Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security." Michael VonTungeln, MCSE, CTT mvontung@yahoo.com "I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it. Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all." Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net "R...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 582 p. , ill. ; , 24 cm. +
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Open source software ; Electronic books ; local
    Abstract: "If you're a Java developer interested in leveraging open source tools to build multitier applications, Larne Pekowsky can help--this book will walk you all the way through development, build, testing, and deployment. This soup-to-nuts coverage is a rare find." --Angela Yochem, author of J2EE Applications and BEA WebLogic Server, Second Edition (Prentice Hall, 2004) The Jakarta project consists of many powerful open source tools for the Java platform, but most lack tutorials or clear online help documentation. Apache Jakarta and Beyond is the definitive guide to using Jakarta and other Java open source tools to develop Web applications more efficiently and effectively. In this example-packed book, readers will find An introduction to the philosophy behind the Jakarta project Details on many ready-to-use Java toolkits, including Ant, JUnit, Cactus, Log4J, POI, Tomcat, James, Struts, and more In-depth guidelines on how to develop with multiple toolkits A guide to splitting work along lines of "what is available" and "what must be written" Best practices for development, such as the model/view/controller paradigm Numerous examples that can serve as templates for readers' own projects The accompanying CD-ROM contains templates and complete code examples from the book. Whether you are developing client applications, Web applications, or Web services, Apache Jakarta and Beyond will help you use existing code to simplify the task at hand.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 397 p. , ill. ; , 25 cm
    DDC: 005.1/068/5
    Keywords: Capability maturity model (Computer software) ; Electronic books ; local
    Abstract: Use Assessments to Drive Process Improvements in Software, Systems, Human Resources, and Beyond Pioneered by the world's leading innovators in software engineering, assessments have evolved into a remarkably powerful tool for process improvement in areas ranging from systems to services, hardware to human resources. Unlike audits, assessments are conducted from the inside. When handled correctly, assessments can help transform technical and managerial culture, dramatically improving both quality and profitability. In CMMI Assessments: Motivating Positive Change , two of the field's most respected leaders show exactly how to use them for maximum business advantage. Writing for executives, managers, technical professionals, and assessors themselves, Marilyn Bush and Donna Dunaway illuminate every phase of the assessment process-from planning through post-assessment follow-up. The authors begin with an expert overview of what assessments entail, when they make sense, how to set achievable goals for them, and how to lead them to success. Next, they "drill down" into each stage of the process, presenting step-by-step instructions and defining the roles and responsibilities of every participant. Coverage includes creating and training assessment teams; identifying assessment products; consolidating interview data and other onsite activities; presenting results; and using those results productively. Drawing on their unsurpassed experience leading assessments and mentoring assessors, they offer deep insights into the real-world challenges and obstacles you'll face-and proven solutions. They also present an extended case study showing how a real software development organization drove continuous improvement through four years of iterative assessments-moving from CMM Level 2 to elite Level 5 status, and driving dramatic business benefits along the way. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 375-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 4th ed.
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: " C++ Primer is well known as one of the best books for learning C++ and is useful for C++ programmers of all skill levels. This Fourth Edition not only keeps this tradition alive, it actually improves on it." --Steve Vinoski, Chief Engineer, Product Innovation, IONA Technologies " The Primer really brings this large and complex language down to size." --Justin Shaw, Senior Member of Technical Staff, Electronic Programs Division, The Aerospace Corporation "It not only gets novices up and running early, but gets them to do so using good programming practices." --Nevin ":-)" Liber, Senior Principal Engineer (C++ developer since 1988) This popular tutorial introduction to standard C++ has been completely updated, reorganized, and rewritten to help programmers learn the language faster and use it in a more modern, effective way. Just as C++ has evolved since the last edition, so has the authors' approach to teaching it. They now introduce the C++ standard library from the beginning, giving readers the means to write useful programs without first having to master every language detail. Highlighting today's best practices, they show how to write programs that are safe, can be built quickly, and yet offer outstanding performance. Examples that take advantage of the library, and explain the features of C++, also show how to make the best use of the language. As in its previous editions, the book's authoritative discussion of fundamental C++ concepts and techniques makes it a valuable resource even for more experienced programmers. Program Faster and More Effectively with This Rewritten Classic Restructured for quicker learning, using the C++ standard library Updated to teach the most current programming styles and program design techniques Filled with new learning aids that emphasize important points, warn about common pitfalls, suggest good programming practices, and provide general usage tips Complete with exercises that reinforce skills learned Authoritative and comprehensive in its coverage The source code for the book's extended examples is available on the Web at the address below. www.awprofessional.com/cpp_primer
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 342 p. , ill. ; , 24 cm
    DDC: 005.74/068
    Keywords: Business ; Data processing ; Data warehousing ; Database management ; Electronic books ; local
    Abstract: The definitive best-practices guide to enterprise data-management strategy. You can no longer manage enterprise data "piecemeal." To maximize the business value of your data assets, you must define a coherent, enterprise-wide data strategy that reflects all the ways you capture, store, manage, and use information. In this book, three renowned data management experts walk you through creating the optimal data strategy for your organization. Using their proven techniques, you can reduce hardware and maintenance costs, and rein in out-of-control data spending. You can build new systems with less risk, higher quality, and improve data access. Best of all, you can learn how to integrate new applications that support your key business objectives. Drawing on real enterprise case studies and proven best practices, the author team covers everything from goal-setting through managing security and performance. You'll learn how to: Identify the real risks and bottlenecks you face in delivering data-and the right solutions Integrate enterprise data and improve its quality, so it can be used more widely and effectively Systematically secure enterprise data and protect customer privacy Model data more effectively and take full advantage of metadata Choose the DBMS and data storage products that fit best into your overall plan Smoothly accommodate new Business Intelligence (BI) and unstructured data applications Improve the performance of your enterprise database applications Revamp your organization to streamline day-to-day data management and reduce cost Data Strategy is indispensable for everyone who needs to manage enterprise data more efficiently-from database architects to DBAs, technical staff to senior IT decision-makers. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. [317]-321) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvi, 316 p. , ill. ; , 24 cm
    DDC: 006.74
    Keywords: HTML (Document markup language) ; Electronic books ; local
    Abstract: The fastest route to true HTML/CSS mastery! Need to build a web site? Or update one? Or just create some effective new web content? Maybe you just need to update your skills, do the job better. Welcome. This book's for you. We'll leverage what you already know about the web, so you'll go further, faster than you ever expected. You'll master today's best practices: the real nuts and bolts, not theory or hooey. You'll learn through dozens of focused HTML, XHTML, and CSS examples: crafted for simplicity and easy to adapt for your own projects. Need specific solutions? This book's modular, visual, high-efficiency format delivers them instantly . Molly E. Holzschlag draws on her unparalleled experience teaching Web design and development. No other HTML/CSS guide covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with HTML, XHTML, and CSS in real-world projects Learn how to build web pages that'll work in any environment, on virtually any contemporary browser Construct templates that simplify every page you develop Structure and tag text so it's easy to work with and manage Add images, media, and scripts-quickly and reliably Discover the right ways to use HTML tables Build easy-to-use forms and validate your users' input Use CSS to take total control over your site's look and feel Master core CSS techniques: color, images, text styles, link effects, lists, navigation, and more Control margins, borders, padding, positioning, floats, even Z-index Design efficient, compatible, easy-to-manage CSS layouts Includes concise XHTML and CSS annotated references: quick help for every language element Spring Into... is a new series of fast-paced tutorials from Addison-Wesley. Each book in the series is designed to bring you up to speed quickly. Complex topics and technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working...now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Direct from the creators of the Java™ programming language, the completely revised fourth edition of The Java™ Programming Language is an indispensable resource for novice and advanced programmers alike. Developers around the world have used previous editions to quickly gain a deep understanding of the Java programming language, its design goals, and how to use it most effectively in real-world development. Now, Ken Arnold, James Gosling, and David Holmes have updated this classic to reflect the major enhancements in Java™ 2 Standard Edition 5.0 (J2SE™ 5.0). The authors systematically cover most classes in Java's main packages, java.lang.* , java.util, and java.io, presenting in-depth explanations of why these classes work as they do, with informative examples. Several new chapters and major sections have been added, and every chapter has been updated to reflect today's best practices for building robust, efficient, and maintainable Java software. Key changes in this edition include New chapters on generics, enums, and annotations, the most powerful new language features introduced in J2SE 5.0 Changes to classes and methods throughout to reflect the addition of generics Major new sections on assertions and regular expressions Coverage of all the new language features, from autoboxing and variable argument methods to the enhanced for-loop and covariant return types Coverage of key new classes, such as Formatter and Scanner The Java™ Programming Language, Fourth Edition, is the definitive tutorial introduction to the Java language and essential libraries and an indispensable reference for all programmers, including those with extensive experience. It brings together insights you can only get from the creators of Java: insights that will help you write software of exceptional quality.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xiv, 282 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: "Every programming language has its quirks. This lively book reveals oddities of the Java programming language through entertaining and thought-provoking programming puzzles." --Guy Steele, Sun Fellow and coauthor of The Java™ Language Specification "I laughed, I cried, I threw up (my hands in admiration)." --Tim Peierls, president, Prior Artisans LLC, and member of the JSR 166 Expert Group How well do you really know Java? Are you a code sleuth? Have you ever spent days chasing a bug caused by a trap or pitfall in Java or its libraries? Do you like brainteasers? Then this is the book for you! In the tradition of Effective Java™ , Bloch and Gafter dive deep into the subtleties of the Java programming language and its core libraries. Illustrated with visually stunning optical illusions, Java™ Puzzlers features 95 diabolical puzzles that educate and entertain. Anyone with a working knowledge of Java will understand the puzzles, but even the most seasoned veteran will find them challenging. Most of the puzzles take the form of a short program whose behavior isn't what it seems. Can you figure out what it does? Puzzles are grouped loosely according to the features they use, and detailed solutions follow each puzzle. The solutions go well beyond a simple explanation of the program's behavior--they show you how to avoid the underlying traps and pitfalls for good. A handy catalog of traps and pitfalls at the back of the book provides a concise taxonomy for future reference. Solve these puzzles and you'll never again fall prey to the counterintuitive or obscure behaviors that can fool even the most experienced programmers.
    Note: Includes bibliographical references (p. 265-269) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 369 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Linux ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: Covers Red Hat and SUSE When something goes wrong with your Linux firewall, you need to fix it-right now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes: Troubleshooting Linux® Firewalls . Authors Michael Shinn and Scott Shinn are among the world's leading firewall experts; they've even been hired to protect computer security at the White House. In this book, they cover every area where Linux firewalls can go wrong: rules and filtering problems, Layer 2/3/4 issues, trouble with individual services, DNS/DHCP failures, even misconfigured VPNs. They also present an easy, start-to-finish troubleshooting methodology that'll help you identify even the newest or most obscure firewall problem fast-and solve it! Inside, you will find in-depth information on the following areas: What you must know about iptables and netfilter to troubleshoot and avoid problems Using loggers, sniffers, and other tools to diagnose even the most obscure firewall problems Making sure your firewall rules work the way they're supposed to Resolving problems with Network Address Translation and IP Forwarding Troubleshooting SMTP, Apache, Squid, NFS, FTP, instant messaging, and other Web-based services Finding and fixing common problems with IPsec VPN configuration Making your firewalls more failure-resistant: recommendations from the experts If you depend on a Linux firewall, what will you do if it goes down? With Troubleshooting Linux® Firewalls , you can be confident that the solutions are right at hand-so you can sleep at night! © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 713 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." -Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code-and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: 360 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The fastest route to true Linux mastery! You know your way around Windows (or maybe a Mac, or even UNIX). Now, you're ready for Linux. And you don't have a minute to waste. Welcome. This book's for you . Janet Valade has spent thirteen years helping new users master Linux and related technologies. She knows the "magic words" that'll help you get the job done, fast. (And she knows exactly how to keep you out of trouble, too!) You'll learn Linux through dozens of focused, bite-size examples, each one carefully designed to build on what you've learned before. Need specific solutions? This book's carefully crafted, high-efficiency format delivers them... instantly . Working on Fedora? Mandrake? SuSE? No matter. This book is for you. No other introduction to Linux covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with Linux- without the hassles! Choose the best Linux distribution for your personal or business needs Get Linux installed quickly and running reliably Handle your day-to-day tasks and efficiently manage your files Master KDE, GNOME, and the Linux command line Write documents and build spreadsheets with OpenOffice.org Set up Web access, email, and instant messaging Work with powerful Linux multimedia and graphics software Find, install, and run new Linux software Set up your printer to work with Linux Supercharge Linux with shell scripts and customized configuration files Includes concise Linux command reference and quick guide to building powerful Regular Expressions Spring Into ... is a new series of fast-paced tutorials from Addison-Wesley Professional Publishers. Each book in the series is designed to bring you up-to-speed quickly. Complex technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working... now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 396 p. , ill. ; , 23 cm
    DDC: 004.692
    Keywords: Spam (Electronic mail) ; Spam filtering (Electronic mail) ; Electronic books ; local
    Abstract: Real Anti-Spam Help for System Administrators In Slamming Spam , two spam fighters show you how to fight back-and win. Unlike most spam books, this one is written specifically for in-the-trenches system administrators: professionals who need hands-on solutions for detecting, managing, and deterring spam in Unix/Linux and/or Microsoft Windows environments. The authors offer deep, administrator-focused coverage of the most valuable open-source tools for reducing spam's impact in the enterprise-especially SpamAssassin. Drawing on their extensive experience in developing and implementing anti-spam tools, the authors present expert insights into every leading approach to fighting spam, including Bayesian filtering, distributed checksum filtering, and email client filtering. Coverage includes Step-by-step junk mail filtering with Procmail Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse McAfee SpamKiller for Lotus Domino McAfee SpamKiller for Microsoft Exchange Implementing and managing SpamAssassin Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords Sender verification techniques, including challenge/response, special use addresses, and sender compute Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs-IT staff time, network/computing resources, and user productivity. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 363-374) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.5/7
    Keywords: Microsoft Outlook ; Electronic mail systems ; Computer programs ; Personal information management ; Computer programs ; Time management ; Computer programs ; Electronic books ; local
    Abstract: Discover many useful customizations you can do with Outlook to improve efficiency both at home and on the job. Get more out of Outlook! The Outlook Answer Book brings together hundreds of bite-size tips and tricks for saving time, using Outlook more efficiently, uncovering its hidden power, and overcoming its quirks and pitfalls. With this book's fast-paced Q&A format, you can find new ideas and better solutions fast. From Favorite Folders to the Journal, you'll learn how to take advantage of Outlook features you've never used-or even noticed! You'll master simple techniques for automating routine tasks...customizations that make Outlook far more powerful...easy backup and troubleshooting solutions...even new ways to protect your privacy and security. Bite-size, useful items include FAQ 1.5 How Can I Get Outlook to Start Automatically? FAQ 1.8 Can I Add Shortcuts to the Quick Launch Bar for Specific Outlook Tasks? FAQ 4.54 How Can I Open Blocked E-mail Attachments? FAQ 6.33 How Do I Share My Notes with Others? FAQ 7.1 What Is the Difference Between Journaling and Other Outlook Features Such As Notes and Tasks? FAQ 9.15 What Is the Research Service? FAQ 10.10 How Do I Customize a Default Outlook Form? FAQ 14.1 What Is Outlook Web Access (OWA)? FAQ 14.39 How Can I Get a Map Showing the Location of a Contact's Address? FAQ 16.26 How Do I Recover Items from a Backup? © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    ISBN: 0321267974
    Language: English
    Pages: xviii, 475 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    Series Statement: The Addison-Wesley object technology series
    Parallel Title: Erscheint auch als
    DDC: 005.1
    Keywords: Computer software Development ; UML (Computer science) ; Electronic books ; local ; Computer software ; Development ; UML (Computer science) ; UML (Informatique) ; Engenharia de software ; Uml
    Abstract: For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the artifacts of a software-intensive system. As the de facto standard modeling language, the UML facilitates communication and reduces confusion among project stakeholders. The recent standardization of UML 2.0 has further extended the language's scope and viability. Its inherent expressiveness allows users to model everything from enterprise information systems and distributed Web-based applications to real-time embedded systems. In this eagerly anticipated revision of the best-selling and definitive guide to the use of the UML, the creators of the language provide a tutorial to its core aspects in a two-color format designed to facilitate learning. Starting with an overview of the UML, the book explains the language gradually by introducing a few concepts and notations in each chapter. It also illustrates the application of the UML to complex modeling problems across a variety of application domains. The in-depth coverage and example-driven approach that made the first edition of The Unified Modeling Language User Guide an indispensable resource remain unchanged. However, content has been thoroughly updated to reflect changes to notation and usage required by UML 2.0. Highlights include: A new chapter on components and internal structure, including significant new capabilities for building encapsulated designs New details and updated coverage of provided and required interfaces, collaborations, and UML profiles Additions and changes to discussions of sequence diagrams, activity diagrams, and more Coverage of many other changes introduced by the UML 2.0 specification With this essential guide, you will quickly get up to speed on the latest features of the industry standard modeling language and be able to apply them to your next software project.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxv, 271 p. , col. ill. ; , 26 cm
    Edition: 1st ed.
    DDC: 005.7/2
    Keywords: Cascading style sheets ; Web publishing ; Web sites ; Design ; Electronic books ; local
    Abstract: Ready to commit to using more CSS on your sites? If you are a hands-on learner who has been toying with CSS and want to experiment with real-world projects that will enable you to see how CSS can help resolve design issues, this book is written just for you! CSS master Eric A. Meyer has picked up where Eric Meyer on CSS: Mastering the Language of Web Design left off. He has compiled 10 new, highly useful projects designed to encourage you to incorporate CSS into your sites and take advantage of the design flexibility, increased accessibility, decreased page weight, and cool visual effects CSS offers. Each project is laid out in an easy-to-follow, full color format complete with notes, warnings, and sidebars to help you learn through example rather than theory. Some of the concepts covered include: • Converting an HTML-based design to a pure positioning layout • Styling a photo gallery • Using background images to achieve cross-browser translucency effects • Using lists of links to create tabs and drop down menus without the use of JavaScript • Styling weblog entries, and placing them in a full-page design • Creating a design for the CSS Zen Garden
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 539 p. , ill. (some col.) ; , 26 cm
    DDC: 794.8/1526
    Keywords: Computer games ; Design ; Computer games ; Programming ; Computer graphics ; Electronic books ; local
    Abstract: David Freeman brings you the inside scoop on how to apply the Emotioneering™ techniques he's so well known for. These powerful techniques create a breadth and depth of emotion in a game, and induce a player to identify with the role he or she is playing. Mr. Freeman's techniques are so highly sought after because they're the key to mass market success in today's competitive game market. The over 300 distinct Emotioneering techniques in this book include (to name but a few): ways to give emotional depth to an NPC (non-player character), even if the NPC has just one line of dialogue; techniques to bond a player to a game's NPCs; and techniques to transform a game into an intense emotional journey. In a warm and crystal-clear style, Mr. Freeman provides examples which demonstrate exactly how to apply the techniques. He also shows how some of these techniques were utilized in, and contributed greatly to the success of such games as "Grand Theft Auto: Vice City"; "Deus Ex"; and "Thief" I & II, among others. The book is packed with striking art by some of today's top concept artists and illustrators, including an eight-page color section and a four-color, fold-out cover. When you've finished this book, you'll be equipped to apply Mr. Freeman's powerful Emotioneering techniques to artfully create emotion in the games you design, build, or produce.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxi, 405 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 004.692
    Keywords: Electronic mail systems ; Java (Computer program language) ; Telecommunication ; Message processing ; Electronic books ; local
    Abstract: The authoritative guide to JMS for enterprise developers. JMS API is gaining important popularity for Enterprise applications and there is no adequate documentation for JMS for the J2EE platform. This book covers not only the concepts, but also present simple examples to explain the concepts and real sample applications to show how to use those concepts and techniques. J2EE is commonly used for enterprise applications. The Java(tm) Message Service (JMS) API has been developed by Sun working in close cooperation with the leading enterprise messaging vendors. Enterprise messaging is now recognized as an essential tool for building enterprise applications. By combining Java technology with enterprise messaging, the JMS API provides a new, powerful tool for solving enterprise computing problems. Enterprise messaging provides a reliable, flexible service for the asynchronous exchange of critical business data and events throughout an enterprise. The JMS API adds to this a common API and provider framework that enables the development of portable, message based applications in the Java programming language.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxii, 835 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/8
    Keywords: ColdFusion ; Database design ; Web databases ; Electronic books ; local
    Abstract: The most comprehensive guide to learning and maximizing the latest version of ColdFusion. Inside ColdFusion MX begins with a discussion of ColdFusion MX and how it differs from previous versions of ColdFusion. The authors discuss the new ColdFusion Administration/Administration, integration with existing IDE's, recent language extensions, and the planning and development of ColdFusion applications under the new CF architecture. The book delves into a detailed discussion of the CFML language, the heart-and-soul of ColdFusion application development, including real-world example code and discussion on how to solve common problems. Coverage includes advanced application development topics, such as exception handling, interacting with other application/server resources, and extending ColdFusion MX with other technologies. The book discusses complex topics in an easy-to-follow and easy-to-understand way, focusing on the questions developers will ask when using the book for problem-solving.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xix, 910 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.4/465
    Keywords: Solaris (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Inside Solaris 9 gives administrators the information they'll need to upgrade to Solaris 9 and maximize the new features. Author Bill Calkins begins by laying the foundations of Solaris, then explains how to get set up with Solaris 9 (including any potential pitfalls). Next, system maintenance issues are covered such as setting up user accounts, managing file systems and processes, system security, monitoring and tuning, and backup and recovery. Solaris networking and service management issues round out the book, along with some excellent resources and a glossary.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xv, 265 p. , ill. ; , 23 cm
    DDC: 005.4/4769
    Keywords: Linux ; Application software ; Development ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux Clustering: Building and Maintaining Linux Clusters provides Linux users with information about building their own Linux cluster from the ground up. It gives best practices, helpful hints, and guidelines about building one server or hundreds of servers at a level that administrators at any experience level can understand. From installation of the air conditioning and power in the data center, to alternative file systems to the final production run, this book provides you with everything that you need to know. Linux Clustering: Building and Maintaining Linux Clusters walks you through the initial design and selection of the best possible types of clusters, as well as covering monitoring tools and providing for disaster recovery. Not only does this book provide information on parallel and Beowulf type clusters, Charles Bookman goes into depth on high availability clusters, load balancing, and provides advice for writing your own distributing applications as well. Incorporating best practices and cutting-edge approaches, Bookman provides step-by-step and tried-and-true methods of bringing up a Linux cluster to production level.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxii, 565 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 658.4/038/011
    Keywords: Business enterprises ; Data processing ; Management ; Business records ; Management ; Database management ; Information resources management ; Information technology ; Management ; Knowledge management ; Management information systems ; Web sites ; Design ; Electronic books ; local
    Abstract: Today's businesses are overwhelmed with the need to create more content, faster, cutomized for more customers, and for more media than ever before. Managing Enterprise Content: A Unified Content Strategy provides the concepts, strategies, guidelines, processes, and technological options that will prepare enterprise content managers and authors to meet the increasing demands of creating, managing, and distributing content. Author Ann Rockley, along with the Rockley Group team, provides techniques that will help you define your content management requirements, build your vision, design your content architecture, pick the right tools, and overcome the hurdles of managing enterprise content. This book will help you visualize the broad spectrum of enterprise content, the requirements for effectively creating, managing, and delivering content, and the value of developing a unified content strategy for your organization.
    Note: Includes bibliographical references (p. [445]-448) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xx, 551 p. , ill. ; , 23 cm
    DDC: 005.2/76
    Keywords: Globalization ; Internet marketing ; Web site development ; World Wide Web ; Electronic books ; local
    Abstract: Companies know that globalizing their web sites will produce exponential revenue growth - Web Globalization Strategies: Beyond Borders tells web developers how to do it. By 2003, the US will account for less than one-third of the worldwide Internet user-base of 602 million. This book illustrates step-by-step measures to take to globalize any web site for almost any country in the world, while presenting spotlights on real companies who have globalized their sites and the benefits they've received. Most executives know they want to reach a global market but have no idea what obstacles they face. The web globalization process is complex, constantly evolving, and the languages themselves can be highly intimidating. This book will provide the reader with the understanding and "best practices" necessary to successfully manage a Web globalization strategy. Crammed with useful facts, tips, and ideas, this book will offer step-by-step advance on every aspect of web development, both technical and non-technical. Offers practical, in-depth information on such hard-to-research topics as online revenue models, online marketing options, site traffic analyses, usability testing, community building, legal issues, cost projections, and project management.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xi, 476 p. , ill. ; , 24 cm
    DDC: 794.8/1526
    Keywords: Computer games ; Design ; Computer games ; Programming ; Electronic books ; local
    Abstract: Chris Crawford on Game Design is all about the foundational skills behind the design and architecture of a game. Without these skills, designers and developers lack the understanding to work with the tools and techniques used in the industry today. Chris Crawford, the most highly sought after expert in this area, brings an intense opinion piece full of personality and flare like no other person in this industry can. He explains the foundational and fundamental concepts needed to get the most out of game development today. An exceptional precursor to the two books soon to be published by New Riders with author Andrew Rollings, this book teaches key lessons; including, what you can learn from the history of game play and historical games, necessity of challenge in game play, applying dimensions of conflict, understanding low and high interactivity designs, watching for the inclusion of creativity, and understanding the importance of storytelling. In addition, Chris brings you the wish list of games he'd like to build and tells you how to do it. Game developers and designers will kill for this information!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: 349 p. , ill. (some col.) ; , 24 cm
    DDC: 006.6/96
    Keywords: Maya (Computer file) ; Computer animation ; Three-dimensional display systems ; Electronic books ; local
    Abstract: A unique, in-depth approach to creating realistic characters in Maya. Maya Character Creation: Modeling and Animation Controls' author, Chris Maraffi, has expertise in the field and in the classroom that translates to the knowledge and solid teaching skills needed to make this book a "must-have"! The current trend in computer graphics is greater organic realism. Many of the top-grossing movies today, such as Spiderman, Lord of the Rings, Jurassic Park 3 , and Star Wars Episode 2, all feature realistic 3D characters. There is a major need in the 3D community for educational material that demonstrates detailed techniques for achieving this organic reality. Maya is one of the main packages used on such cutting-edge films, and has an established toolset for creating believable 3D characters. Maya Character Creation: Modeling and Animation Controls is designed to take you through the process of designing, modeling, and setting up animation controls for complex 3D characters. The concepts, techniques, and Maya tools used for each step in the process are presented in each chapter, followed by many hands-on exercises. NURBS, polygon, and subdivision surface modeling techniques are shown for creating the character's skin, and skeleton-based animation controls are covered in detail. You will learn how a character's skin should deform when the skeletal joints and muscles move. Advanced MEL scripted animation controls are also covered extensively.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvi, 388 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.2/76
    Keywords: Web site development ; Electronic books ; local
    Abstract: The Unusually Useful Web Book is the only book you need to find out everything you need to know about web sites. In fact, it's 2 books in 1. You can skim the sidebars and checklists for tips and techniques you can use right away. Or you can follow along with the main text for a detailed discussion of planning, designing, building, and maintaining your web site. The Unusually Useful Web Book is jam-packed with: Do-it-yourself worksheets. 20 worksheets walk you through essential tasks such as increasing traffic, improving site speed, writing a product plan, and making your site cross-compatible. Behind-the-scenes info. 25 special Lessons from the Trenches show you how sites such as MSN.com and BabyCenter.com deal with day-to-day challenges such as naming site sections or sending effective emails. Advice from leading experts. More than 50 experts - from the father of the ad banner to the founder of BlackPlanet.com - openly share the lessons they've learned on everything from making money to working with engineers. Includes expert interviews with Adam Berliant (Group Manager at Microsoft), Greg Dotson (Chief Information Office for www.guru.com), Randi Shade (founder of www.CharityGift.com), Emily Simas (former product manager for www.BabyCenter.com), Srinija Srinivasan (VP and Editor in Chief of Yahoo!), and Evany Thomas (managing editor for Webmonkey). Jargon-free explanations. Step-by-step instructions-covering everything from acquiring a domain name to preparing images for the web-are written in language you can understand. But don't just take our word for it. Read what others are saying about The Unusually Useful Web Book : "This book definitely stands out. Most books of this nature are stuffed with irrelevant and non-substantive information that only add confusion to an already complex process. This book delivers an overwhelming amount of information but presents it in a way that is both approachable and useful. There was a lot of information that I could immediately apply to current projects." Garo Green, Director of Publications, lynda.com "The coverage is practical and comprehensive. I'm not aware of other titles that take this comprehensive approach to web building, addressing the entire life cycle of web design and development as well as the roles required in each phase." Laura McCabe, co-author of Special Edition Using Flash MX "Anyone that has a passion for web design, both novices and professionals, will enjoy this book. For the novic...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xx, 335 p. , ill. ; , 23 cm
    DDC: 778.5/235/0285
    Keywords: Adobe Premiere ; Digital video ; Editing ; Data processing ; Motion pictures ; Editing ; Data processing ; Electronic books ; local
    Abstract: Push the envelope with the book that covers all the basics and branches through the more complex techniques of video and audio editing. This book is laid out in a way that focuses on some very specific topics within Premiere. Users can utilize this book as a quick reference, jumping in and getting the immediate answers. There are a few sections that apply more of a basic overtone: The reason for this is that with a program as powerful and dynamic as Premiere, with the ability to incorporate so many different media types, users need to understand how to put together and use these examples and understand how to produce a complete package, from start to finish. By analyzing the examples in this book and formulating their own versions when creating projects, users will begin to expand the capabilities they can offer clients and pick from a multitude of tools to incorporate into their next Premiere projects.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 621 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 794.8/1536
    Keywords: Computer games ; Design ; Computer games ; Programming ; Electronic books ; local
    Abstract: How often have you heard "anyone can design a game?" While it seems likean easy job, game ideas are cheap and plentiful. Advancing those ideasinto games that people want to play is one of the hardest, and mostunder-appreciated, tasks in the game development cycle. Andrew Rollingsand Ernest Adams on Game Design introduces both students and experienced developers to the craft of designing computer and video games for the retail market. The first half of the book is a detailed analysis of thekey game design elements: examining game concepts and worlds,storytelling, character and user interface design, core mechanics andbalance. The second half discusses each of the major game genres(action, adventure, role-playing, strategy, puzzle, and so on) andidentifies the design patterns and unique creative challenges thatcharacterize them. Filled with examples and worksheets, this book takesan accessible, practical approach to creating fun, innovative, andhighly playable games.
    Note: Includes bibliographical references (p. [589]-593) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 422 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 006.7/6
    Keywords: ColdFusion ; Fusebox ; Application software ; Development ; Internet programming ; Electronic books ; local
    Abstract: Developers face a constant struggle to launch projects on time and under budget, especially without pulling all-nighters. Fusebox helps ensure successful projects by providing a framework that serves as a base for applications. It's a standard process that makes projects more manageable and simplifies maintenance and requests for change during development. With this book, you'll learn to make ColdFusion applications reliably successful by following a standardized system. In addition, relying on the Fusebox framework to help plan and organize your ColdFusion code will allow you to write increasingly complex and specialized applications. Jeff Peters and Nat Papovich , both members of the Fusebox Council, share their extensive experience in this book. They'll teach you to use Fusebox with your ColdFusion applications and develop a set of best practices for managing web projects. Read this book if you want to eliminate frustrations and roadblocks in your projects, such as unmanageable complexity, wasteful redundancy of effort, time-consuming code maintenance, and slow development speed.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xx, 385 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Mac OS ; Computer networks ; Security measures ; Computer security ; Macintosh (Computer) ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.
    Note: Includes bibliographical references (p. 361-369) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 1072 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: JavaScript (Computer program language) ; Electronic books ; local
    Abstract: The only comprehensive book available that covers the latest technology, such as Internet Explorer 6 and JavaScript 1.5, and JScript 5.6. Packed full of hands-on examples, this book integrates JavaScript with .NET, XML, XSLT, Java, CSS, HTML, Cookies, Security, and much more. Written for beginning to intermediate readers looking to learn how to work with JavaScript and how best to use it with other web technologies. Inside JavaSript fills a void between the very beginning and high level books available in bookstores today. It's a book readers want primarily for two reasons: re-usable code and up-to-date browser information. Books currently out on the shelf are not up to the latest in browser technology; thus, frustrating readers because everything done in JavaScript is dependent on browser capabilities. The web site will contain all the source code used in the book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xviii, 377 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.7/2
    Keywords: Perl (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Abstract: If you are a Perl programmer looking to explore Perl's XML capabilities or an XML developer with a basic understanding of Perl, this book will provide you with all the tools required for XML processing with Perl. XML and Perl teaches you to create portable, powerful, and extensible applications when you use XML and Perl together. You'll also learn to customize your XML processing facilities to accomplish unique tasks. Authors Mark Riehl and Ilya Sterin, who have written Perl XML modules and administer the official Perl XML web site (www.perlxml.net), have filled this book with practical code samples and exercises that will help you test drive your new knowledge. With this book, you'll quickly see the advantages of using XML and Perl together, and you'll be able to perform even complicated tasks more easily with powerful Perl XML modules.
    Note: Includes bibliographical references (p. [351]-352) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xliv, 544 p. , ill. ; , 23 cm
    Keywords: Computer graphics ; SVG (Document markup language) ; Web sites ; Design ; Electronic books ; local
    Abstract: Using a heavily illustrated, step-by-step style, Watt aims to ease designers into a more analytical, programming approach to graphics without losing the appeal of form and design. The change in mindset required of graphic designers in exploiting "visual components" is explained clearly and practically. While presenting real-world examples of design tasks (such as creating a logo, navigation bar, or a full web page), Watt embeds sidebars, notes, and tips to convey the strict programming portion of the process. This makes it easier for the reader to balance the formality of the SVG code with the functionality of the design. The book assumes no prior knowledge of SVG and provides the foundational information for the reader to grasp the key concepts. In addition, and importantly, it contains source code for all of the SVG images and animations created in the book. This educates the readers in how SVG works and lays a foundation for their own experiments.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvii, 624 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/76
    Keywords: Active server pages ; Web sites ; Design ; Electronic books ; local
    Abstract: Teaching ASP.NET in a non-linear format that creative thinkers can easily grasp and understand without the typical programming jargon. Provides clear and concise, hands-on, real-world examples right from the beginning of the book. The book contains a natural progression by providing foundational information in the opening chapters. Content will be presented with "hands-on" examples so the opening chapters will also be laying the groundwork for more advanced subjects by not only presenting the information but by writing code as well. The middle section of the book covers the key cast members on the .NET stage including HTML Controls, Web Controls and List Controls. The third and final section of the book covers more advanced issues in ASP.NET including data access and security issues.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvi, 529 p. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Perl (Computer program language) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: MySQL and Perl for the Web provides a much-needed handbook for database and Web developers seeking an extensive and detailed guide for using the combination of MySQL and Perl to build dynamic and interactive database-backed Web sites. It shows how to use Perl's DBI database access module, pairing it with with the CGI.pm module that allows Web pages and forms to be generated and processed easily. These tools provide developers with a solid foundation for creating applications that incorporate database content to create dynamic, up-to-date Web sites. The book employs a practical learn-by-doing approach that demonstrates development techniques by building complete applications, not just fragmentary pieces. It shows what to do at each step of the way during the process of building live, working examples. Applications are fully explained so you can understand how they work and apply the techniques they illustrate to your own projects.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvii, 328 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/4769
    Keywords: Linux ; Operating systems (Computers) ; Routers (Computer networks) ; Electronic books ; local
    Abstract: Linux Routing explains and demonstrates routing solutions for common network types, namely LANs, WANs, and VPNs, using various types of hardware, and then explores the inner workings of the daemons and commands used for routing in Linux. The second half of the book revolves around specialized issues. These include building micro-kernels that provide additional routing speed and security; how routing is handled in a list of popular Linux distributions; security issues; traffic monitoring and control; and finally a variety of hardware and software packages available to those running or wanting to run Linux routers. Whether you need routing for a small, subnetted network or a larger scale project, Linux Routing will help you to understand the complexities that come with setting up dynamic routing for complex network configurations on a Linux box. Along the way you'll learn about some of the more popular protocols available and when they are best used, how to configure key routing daemons and what else is available, and how to set up routing and related services in a wide variety of situations.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xv, 507 p. , ill. ; , 24 cm
    Keywords: Authorship ; English language ; Composition and exercises ; Web site development ; Web sites ; Design ; Electronic books ; local
    Abstract: Attention, Web writers! This book will show you how to craft prose that grabs your guests' attention, changes their attitudes, and convinces them to act. You'll learn how to make your style fast, tight, and scannable. You'll cook up links that people love to click, menus that mean something, and pages of text that search engines rank high. You'll learn how to write great Web help, FAQs, responses to customers, marketing copy, press releases, news articles, e-mail newsletters, Webzine raves, or your own Web resume. Case studies show real-life examples you can follow. No matter what you write on the Web, you'll see how to personalize, build communities, and burst out of the conventional with your own honest style.
    Note: Includes bibliographical references (p. 481-492) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: 412 p. , ill. ; , 24 cm
    DDC: 686.2/25445369
    Keywords: Adobe FrameMaker ; Desktop publishing ; Electronic books ; local
    Abstract: Framemaker 6: Beyond the Basics discusses holistic approaches that save time, solve problems globally, and make creative uses of FrameMaker's features. Since FrameMaker is intended for large document creation, this approach is advantageous, even critical. Through real-world scenarios, the book explores typical tasks technical document creators perform daily. Each chapter provides principles and techniques needed to perform each task, along with tips on best practices and how to achieve repeatable outcomes. Rather than covering everything about the software, the book focuses on the challenges FrameMaker users face, helping them apply efficient, innovative solutions.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 466 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Jython (Computer program language) ; Electronic books ; local
    Abstract: This book will help Java developers to increase application development and deployment, thus optimizing their overall efficiency. A brief introduction is provided that shows the differences between Java and Jython, important to include so that the reader will have a better understanding of why their union is beneficial. The remainder of the book teaches, through examples, how to use Jython. Intended for an experienced Java developer, this book assumes you understand the fundamentals to programming (i.e. loop statements, if.then, etc.). So, page space is focused on utilizing Jython with Java by covering the following: extending Python with java classes, modules, compiling, interpreters, design integration, etc. www.newriders.com contains all code and applications developed in the book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xviii, 216 p. , ill. ; , 23 cm
    Keywords: Computer security ; Management ; Data protection ; Electronic books ; local
    Abstract: Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management is told of the necessity of the policy document, and they support its development. A manager or administrator is assigned to the task and told to come up with something, and fast! Once security policies are written, they must be treated as living documents. As technology and business requirements change, the policy must be updated to reflect the new environment--at least one review per year. Additionally, policies must include provisions for security awareness and enforcement while not impeding corporate goals. This book serves as a guide to writing and maintaining these all-important security policies.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvii, 358 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.7/2
    Keywords: PHP (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Abstract: XML and PHP is designed to introduce PHP developers to the synergies that become visible when their favorite web-scripting language is combined with one of the most talked about technologies of recent times, XML. XML and PHP teaches PHP developers how to use PHP's XML functions to develop and maintain XML-based web applications and sites, and it demonstrates the power inherent in the XML/PHP combination. This book provides information on all hte major XML technologies supported in PHP, demonstrating how the XML/PHP combination can be used to deliver cutting-edge web applications through practical examples and real-world case studies. XML and PHP serves as both an implementation guide to the topic and a handy desktop reference for quick lookups-combining all the information that developers need into a single, focused package.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvi, 411 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: C (Computer program language) ; Perl (Computer program language) ; Electronic books ; local
    Abstract: The Perl book written for the C and C++ programmer. Perl for C Programmers teaches what's similar and different between Perl and C/C++ and how to then utilize Perl to the fullest. 80% of the people who start using Perl for the first time come with a background in the C or C++ programming language. This book is written for those people. Perl is becoming one of the most common languages used in web development because of its powerful ability for text manipulation. There is a large need for Perl books that clearly explain how to use Perl in terms the reader can understand. The primary audience coming to learn Perl is C and C++ programmers.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xiv, 460 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.2/762
    Keywords: Internet programming ; JavaScript (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: JavaScript Design shows designers how to create interactive JavaScript applications for the web. It provides detailed descriptions of JavaScript structures, statements and objects, using JavaScript to create different elements of a web page,controlling a page's overall design and function with JavaScript, passing data and variables between clients and servers. Also covered are advanced topics server-side languages: PHP, Perl, ASP, CGI, XML, connections to Java and Cold Fusion. The line between developers and designers is fading. Designers are challenged with projects that require them to have a strong knowledge of the server side issues traditionally fielded by a web developer. Designers are looking for books that teach them the web developer knowledge in a language in which they are accustomed.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxii, 485 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: SQL server ; Client/server computing ; Data transmission systems ; Electronic books ; local
    Abstract: This book appeals to both developers and database administrators who are faced with the common situation of having to migrate or integrate data from one location into another. While the first section of the book is designed for the beginner to DTS, it is assumed that the reader has at least basic database and programming experience. The second section is extensive coding, and is best used by someone with intermediate to advanced programming skills. The third section contains a mix of examples that will be useful to all levels of database administrators and programmers. For the readers who have been using DTS this section can be used as a reference section and help with DTS designs and usage. Unlike other resources available, this book covers data transformation in both SQL Server 7 and 2000.
    Note: "This book mainly covers information on SQL 2000, but it also provides some comparisons to SQL 7.0"-- p. xxi. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvii, 778 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer hackers ; Computer security ; Electronic books ; local
    Abstract: Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xv, 480 p. , ill. ; , 23 cm. +
    Edition: 1st ed.
    Keywords: Cocoon (Electronic resource) ; Application software ; Development ; Internet programming ; XML (Document markup language) ; Electronic books ; local
    Abstract: Cocoon: Building XML Applications is the guide to the Apache Cocoon project. The book contains the much needed documentation on the Cocoon project, but it does not limit itself to just being a developer¿s handbook. The book motivates the use of XML and XML software (in particular open source software). It contains everything a beginner needs to get going with Cocoon as well as the detailed information a developer needs to develop new and exciting components to extend the XML publishing framework. Although each chapter builds upon the previous ones, the book is designed so that the chapters can also be read as individual guides to the topics they discuss. Varied "hands-on" examples are used to make the underlying concepts and technologies absolutely clear to anyone starting out with Cocoon. Chapters that detail the author¿s experience in building Internet applications are used to embed Cocoon into the "real world" and complete the picture. mdMatthew Langham and Carsten Ziegeler
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 724 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.13/3
    Keywords: Microsoft Win32 ; Microsoft Windows NT ; Microsoft Windows (Computer file) ; Perl (Computer program language) ; Electronic books ; local
    Abstract: This book is a guide to Perl¿s most common Win32 extensions, grouped by their functionality. The new edition updates coverage from Perl 5.05 to current Perl version 5.6. It also includes new chapters offering critical, badly-needed information regarding security for Win32Perl, the topic most highly requested by reviewers. The appendices have descriptions and syntax of each function in the extensions covered. Each chapter makes extensive use of code segments to illustrate the use of specific functions and real world scenarios in which these functions can be used.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 307 p. , ill. ; , 23 cm
    DDC: 303.48/33
    Keywords: Community ; Electronic discussion groups ; Internet ; Social aspects ; Online chat groups ; Web sites ; Design ; World Wide Web ; Social aspects ; Electronic books ; local
    Abstract: This book is available as an Adobe Reader eBook on the publisher's website:  newriders.com Communities are part of all successful web sites in one way or another. It looks at the different stages that must be understood: Philosophy: Why does your site need community? What are your measures of success? Architecture: How do you set up a site to createpositive experience? How do you coax people out of their shells and get them to share their experiences online? Design: From color choice to HTML, how do you design the look of a community area? Maintenance: This section will contain stories of failed web communities, and what they could have done to stay on track, as well as general maintenance tips and tricks for keeping your community "garden" growing.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xviii, 398 p. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Electronic books ; local
    Abstract: Python Essential Reference, Second Edition, is the definitive guide to the Python programming language. Designed for programmers, it covers the core language, more than 100 modules in the standard library, and the techniques used to extend Python with compiled procedures in C or C++. Coverage expands upon and clarifies existing Python documentation - especially for advanced topics, including operating system interfaces, threads, network programming, and Unicode. Concise, to the point, and extensively indexed, readers will find this volume packed with information not previously available in any other single reference source. Updated for Python 2.1, it is a must-have for any serious programmer wanting to develop advanced Python applications. As a comprehensive reference to the Python programming language, this book will help you: Learn about the features in Python 2.0 and 2.1 Master the details of Python types, operators, and the execution model Discover the details of Unicode and internationalization support Learn the details of operating system interfaces, threads, and network-programming modules Build C/C++ extensions to Python Make effective use of the Python library Find the information you need to start developing advanced Python applications
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xix, 632 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: SQL (Computer program language) ; Electronic books ; local
    Abstract: MySQL: Designing User Interfaces starts by introducing the functionality of GTK+ and how to migrate from Microsoft's Visual Basic. It then introduces MySQL as a simple, fast, reliable database for corporate applications. The book then flows into the how-to of combining GTK+ and MySQL through the coverage of the C API for MySQL because it is the "backend" to a GTK+ application. It then expands its coverage and teaches about heterogeneous network and deployment issues, as well as migration from existing systems to MySQL.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: 1102 p. , ill. ; , 24 cm
    Keywords: XML (Document markup language) ; Electronic books ; local
    Abstract: The XML explosion hardly needs any introduction-it's everywhere and there just seems to be no end to what can be done with XML. While writing to the W3C standards, and keeping up with the pace for corporate implementation, you, the programmer or web developer, will need a comprehensive guide to get you started and show you what XML and its related technologies can do. A thorough guide is imperative to success because you will need to know and understand the full scope of XML from day one in order to work with it successfully. With your time constraints and impossible project schedules, you need a comprehensive guide that fulfills your needs in one complete book. Inside XML is an anchor book that covers both the Microsoft and non-Microsoft approach to XML programming. It covers in detail the hot aspects of XML; such as, DTD's vs. XML Schemas, CSS, XSL, XSLT, Xlinks, Xpointers, XHTML, RDF, CDF, parsing XML in Perl and Java, and much more.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 192 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Embedded Linux provides the reader the information needed to design, develop, and debug an embedded Linux appliance. It explores why Linux is a great choice for an embedded application and what to look for when choosing hardware.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: ix, 292 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Series Statement: Technology series
    DDC: 658/.0546
    Keywords: Business networks ; Computer network architectures ; Electronic books ; local
    Abstract: Policy-based networking is the new frontier in networking. A high-level directive given to the network at a single console, it promises easy management of critical network elements such as security, Quality of Service, and device configuration. The translation of high level policies into the device specific configurations is a complex procedure, requiring detailed knowledge of the topology and routes in the network, and translation-enabling algorithms. This book would take the mystery out of this process, allowing you, the network engineer to build policy support into your network architecture. Only scattered pieces of the solution can currently be found in various IETF and DMTF working groups, or in some research presentations and workshops. In-depth understanding of the algorithms behind policy-based networking is necessary for network engineers/architects who want to create new products/applications that deliver policy features.
    Note: Includes bibliographical references (p. 287-292) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvii, 466 p. , ill. ; , 23 cm
    Edition: 1st. ed.
    DDC: 004/.36
    Keywords: COM (Computer architecture) ; Electronic books ; local
    Abstract: COM+ is Microsoft¿s new version of its COM object-oriented programming framework. Built into Windows 2000, this is an extremely powerful and complex technology that consolidates the features of a number of existing Microsoft tools: OLE, ActiveX, DCOM, Microsoft Message Queue, and Microsoft Transaction Server. By pulling all of these disparate services into one unified technology, COM+ hold the promise of greater efficiency and more diverse capabilities for developers who are creating applications - either enterprise or commercial software -- to run on a Windows 2000 system. The demand for reliable and real-world application-based information on COM+ is huge, and so far greatly exceeds the availability of such documentation. This book will provide a coherent, unified view of the COM+ architecture.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvi, 328 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 004.6/2
    Keywords: Internetworking (Telecommunication) ; Routers (Computer networks) ; TCP/IP (Computer network protocol) ; Electronic books ; local
    Abstract: Cisco Router Configuration and Troubleshooting, 2nd Edition is a reference for you, the network and system administrator who finds yourself having to configure and maintain existing Cisco routers as well as get new hardware up and running. The authors begins by touching on the foundation behind routing technology: networks, protocols and hardware. Then they jump right into router configuration, discussing setup, local and wide area networking, security and monitoring. The troubleshooting section uses a fictitious company to illustrate the differenct scenarios and administrator might encounter. It includes situations that deal with Cisco routers and well as hardware from other companies, mimicking the heterogeneous environment most administrators face. The author also introduces a troubleshooting methodology to help you implement the suggested practices in the book. This section covers the physical and network layer, as well as the protocols involved in routing technologies.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvii, 167 p. , ill. ; , 23 cm
    DDC: 005.7/13769
    Keywords: Microsoft Internet information server ; Web servers ; Administration ; Electronic books ; local
    Abstract: Administrators who know IIS from previous versions need this book to show them in concrete detail how to configure the new protocols, authenticate users with the new Certificate Server, and implement and manage the new e-commerce features. You want to know how to work with the MMC, so that you'll be ready for Windows NT 5.0. This book gives you all of that: a quick read that provides real world solutions, and doubles as a portable reference. Although IIS has been available for several years now, version 4.0 of the Internet Information Server marks a major change in Microsoft's approach to Enterprise Web Service. The brand new feature set in IIS 4.0 reads like a wish list of hot Internet technologies. Administration of IIS has been overhauled by the integration of the Microsoft Management Console and is the first product to use MMC.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 952 p. , ill. ; , 25 cm. +
    Keywords: Directory services (Computer network technology) ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Microsoft software ; Examinations ; Study guides ; Electronic books ; local
    Abstract: Exam 70-219, Designing Windows 2000 Directory Services Infrastructure measures your ability to analyze the business requirements and design a directory service architecture, including: unified directory services such as Active Directory and Windows NT domain; connectivity between and within systems, system components & applications, and data replication such as directory replication and data replication. Keep in mind if you already have MCSE certification on Windows NT 4.0 you can update your certification by just taking two exams-the Accelerated Exam (70-240) and their choice of Designing Directory Services Infrastructure (70-219), Designing Security for a Windows 2000 Network 970-220), or Designing Network Infrastructure (70-221). You must also choose one of the three core electives-ICA Windows 2000 Professional (70-210), ICA Windows 2000 Server (70-215), I & A Windows 2000 Network Infrastructure (70-216), I & A Windows 2000 Directory Services Infrastructure (70-217).
    Note: "Exam 70-219"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xiii, 418 p. , col. ill. ; , 25 cm
    Keywords: User interfaces (Computer systems) ; Web sites ; Design ; Electronic books ; local
    Abstract: Users experience the usability of a web site before they have committed to using it and before making any purchase decisions. The web is the ultimate environment for empowerment, and he or she who clicks the mouse decides everything. Designing Web Usability is the definitive guide to usability from Jakob Nielsen, the world's leading authority. Over 250,000 Internet professionals around the world have turned to this landmark book, in which Nielsen shares the full weight of his wisdom and experience. From content and page design to designing for ease of navigation and users with disabilities, he delivers complete direction on how to connect with any web user, in any situation. Nielsen has arrived at a series of principles that work in support of his findings: 1. That web users want to find what they're after quickly; 2. If they don't know what they're after, they nevertheless want to browse quickly and access information they come across in a logical manner. This book is a must-have for anyone who thinks seriously about the web.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvii, 381 p. , ill. ; , 23 cm
    DDC: 005.7/13769
    Keywords: Microsoft Windows (Computer file) ; Directory services (Computer network technology) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Microsoft's Active Directory is a quantum leap forward in the management, interoperability, and security of your enterprise network. More that just an overview of the new features, Windows 2000 Active Directory helps you get the most out of this new tool's potential. Brovick, Hauger, and Wade will help you obviate pitfalls while giving you detailed solutions and pragmatic advice you won't find anywhere else. Perfect for network architects and implementers, this book describes the intricacies of Active Directory while keeping real-world systems and constraints in mind. If you are charged with planning, implementing, or managing Windows 2000, Windows 2000 Active Directory will help you: learn how to define your organization's business and technical requirements, and couple them with Active Directory's functionality; develop a unified directory strategy that will support enterprise applications now and in the future; and comprehend how Active Directory and DNS can coexist peacefully.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xviii, 384 p. , ill. ; , 23 cm. +
    Edition: 1st ed.
    Keywords: Application software ; Development ; PHP (Computer program language) ; Web site development ; Electronic books ; local
    Abstract: As Web sites and intranets become larger and more complex, static HTML files hit their limits. In the first part of Web Application Development with PHP the authors explain PHP's advanced syntax like classes, recursive functions and variables. They present software development methodologies and coding conventions which are a must-know for industry quality products as well as to help making develop faster and more productive. This part covers also many standard algorithms for tree-structures, string sorting and searching. Part Two focuses on the concept of Web Applications (as opposed to single scripts) and gives much insight into user and session management, e-commerce systems, XML applications and WDDX.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...