Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (31)
  • 2005-2009  (31)
  • 2000-2004
  • 2007  (31)
  • Upper Saddle River, N.J. : Addison-Wesley  (31)
  • Electronic books ; local  (31)
  • Konferenzschrift
Datasource
  • MPI Ethno. Forsch.  (31)
Material
Language
Years
  • 2005-2009  (31)
  • 2000-2004
Year
  • 1
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321508911 , 0321508912
    Language: English
    Keywords: Computer architecture ; Computer network architectures ; Business enterprises ; Computer networks ; Management ; Electronic books ; local
    Abstract: "Like so many acronyms in public currency, SOA means many different things to different people. Paul Brown deftly avoids getting caught in the trap of overstating the case for SOA. Instead, he brings the topic skillfully into focus, zeroing in on the concepts that must be understood in order to be effective. Paul's purpose, as I've found so often in his presentations and conversations, is to get to the core of real-world architectural issues that make the difference between success and failure. Paul doesn't sit in an ivory tower pontificating; he gets right down to the critical issues in order to develop effective real-life strategies." --From the Foreword by Jonathan Mack, Senior Technical Architect, Guardian Life Insurance Company "As Paul Brown explains in this fine book, there is more to software development than just writing code. Successful software requires deep thought and strategy. It requires the coordination and marshalling of the resources and intellect of the entire company, both business and IT. I learned much from reading his manuscript and heartily endorse the finished book." --Dr. Michael Blaha, author and industrial consultant "Paul Brown has provided a practical and actionable guide that will illuminate the way for Business and IT Leaders involved in IT strategy, planning, architecture, and project management. A successful adoption of SOA will touch every aspect of the business and change the way IT does business. This book does a good job of describing the organizational challenges and risks and providing suggestions to manage them. It also dives deeply into the architectural techniques that can be employed in order to align the service architecture with the business, thus providing maximum benefit and continued funding for your SOA transformation." --Maja Tibbling, Lead Enterprise Architect, Con-way Enterprise Services " Succeeding with SOA achieves where most books on service-oriented architectures fail. It accurately describes what practitioners are seeing, as well as why, and gives them practical examples through case studies and instruction. Most useful both for those about to take the plunge and those who are already soaking." --Charly Paelinck, Vice President, Development and Architecture, Harrah's Entertainment "This book is a must-read for architects and SOA practitioners. It provides an important foundation for a SOA strategy. Brown emphasizes the importance of aligning services with their business processes, buil...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321434838 , 0321434838
    Language: English
    Keywords: Computer security ; System design ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: "I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how to improve the security of software systems by improving hardware. Bottom line, this book should be required reading for all who plan to call themselves security practitioners, and an invaluable part of every university's computer science curriculum." --Edward Bonver, CISSP, Senior Software QA Engineer, Product Security, Symantec Corporation "Here's to a fun, exciting read: a unique book chock-full of practical examples of the uses and the misuses of computer security. I expect that it will motivate a good number of college students to want to learn more about the field, at the same time that it will satisfy the more experienced professional." --L. Felipe Perrone, Department of Computer Science, Bucknell University Whether you're a security practitioner, developer, manager, or administrator, this book will give you the deep understanding necessary to meet today's security challenges--and anticipate tomorrow's. Unlike most books, The Craft of System Security doesn't just review the modern security practitioner's toolkit: It explains why each tool exists, and discusses how to use it to solve real problems. After quickly reviewing the history of computer security, the authors move on to discuss the modern landscape, showing how security challenges and responses have evolved, and offering a coherent framework for understanding today's systems and vulnerabilities. Next, they systematically introduce the basic building blocks for securing contemporary systems, apply those building blocks to today's applications, and consider important emerging trends such as hardware-based security. After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures--with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a s...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321398208 , 0321398203
    Language: English
    Keywords: Microsoft Visual studio ; Computer software ; Development ; Electronic books ; local
    Abstract: Domain-Specific Languages (DSLs)--languages geared to specific vertical or horizontal areas of interest--are generating growing excitement from software engineers and architects. DSLs bring new agility to the creation and evolution of software, allowing selected design aspects to be expressed in terms much closer to the system requirements than standard program code, significantly reducing development costs in large-scale projects and product lines. In this breakthrough book, four leading experts reveal exactly how DSLs work, and how you can make the most of them in your environment. With Domain-Specific Development with Visual Studio DSL Tools , you'll begin by mastering DSL concepts and techniques that apply to all platforms. Next, you'll discover how to create and use DSLs with the powerful new Microsoft DSL Tools--a toolset designed by this book's authors. Learn how the DSL Tools integrate into Visual Studio--and how to define DSLs and generate Visual Designers using Visual Studio's built-in modeling technology. In-depth coverage includes Determining whether DSLs will work for you Comparing DSLs with other approaches to model-driven development Defining, tuning, and evolving DSLs: models, presentation, creation, updates, serialization, constraints, validation, and more Creating Visual Designers for new DSLs with little or no coding Multiplying productivity by generating application code from your models with easy-to-use text templates Automatically generating configuration files, resources, and other artifacts Deploying Visual Designers across the organization, quickly and easily Customizing Visual Designers for specialized process needs List of Figures List of Tables Foreword Preface About the Authors Chapter 1 Domain-Specific Development Chapter 2 Creating and Using DSLs Chapter 3 Domain Model Definition Chapter 4 Presentation Chapter 5 Creation, Deletion, and Update Behavior Chapter 6 Serialization Chapter 7 Constraints and Validation Chapter 8 Generating Artifacts Chapter 9 Deploying a DSL Chapter 10 Advanced DSL Customization Chapter 11 Designing a DSL Index
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780201895513 , 020189551X
    Language: English
    Edition: 3rd ed.
    Keywords: Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: Object-Oriented Design with Applications has long been the essential reference to object-oriented technology, which, in turn, has evolved to join the mainstream of industrial-strength software development. In this third edition--the first revision in 13 years--readers can learn to apply object-oriented methods using new paradigms such as Java, the Unified Modeling Language (UML) 2.0, and .NET. The authors draw upon their rich and varied experience to offer improved methods for object development and numerous examples that tackle the complex problems faced by software engineers, including systems architecture, data acquisition, cryptoanalysis, control systems, and Web development. They illustrate essential concepts, explain the method, and show successful applications in a variety of fields. You'll also find pragmatic advice on a host of issues, including classification, implementation strategies, and cost-effective project management. New to this new edition are An introduction to the new UML 2.0, from the notation's most fundamental and advanced elements with an emphasis on key changes New domains and contexts A greatly enhanced focus on modeling--as eagerly requested by readers--with five chapters that each delve into one phase of the overall development lifecycle. Fresh approaches to reasoning about complex systems An examination of the conceptual foundation of the widely misunderstood fundamental elements of the object model, such as abstraction, encapsulation, modularity, and hierarchy How to allocate the resources of a team of developers and mange the risks associated with developing complex software systems An appendix on object-oriented programming languages This is the seminal text for anyone who wishes to use object-oriented technology to manage the complexity inherent in many kinds of systems. Sidebars Preface Acknowledgments About the Authors Section I: Concepts Chapter 1: Complexity Chapter 2: The Object Model Chapter 3: Classes and Objects Chapter 4: Classification Section II: Method Chapter 5: Notation Chapter 6: Process Chapter 7: Pragmatics Chapter 8: System Architecture: Satellite-Based Navigation Chapter 9: Control System: Traffic Management Chapter 10: Artificial Intelligence: Cryptanalysis Chapter 11: Data Acquisition: Weather Monitoring Station Chapter 12: Web Application: Vacation Tracking System Appendix A: Object-Oriented Programming Languages Appendix B: Further Reading Notes Glossary Classified Bibliography Index
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780132271912 , 0132271915
    Language: English
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: "Imagine trying to play defense in football without ever studying offense. You would not know when a run was coming, how to defend pass patterns, nor when to blitz. In computer systems, as in football, a defender must be able to think like an attacker. I say it in my class every semester, you don't want to be the last person to attack your own system--you should be the first. "The world is quickly going online. While I caution against online voting, it is clear that online gaming is taking the Internet by storm. In our new age where virtual items carry real dollar value, and fortunes are won and lost over items that do not really exist, the new threats to the intrepid gamer are all too real. To protect against these hazards, you must understand them, and this groundbreaking book is the only comprehensive source of information on how to exploit computer games. Every White Hat should read it. It's their only hope of staying only one step behind the bad guys." --Aviel D. Rubin, Ph.D. Professor, Computer Science Technical Director, Information Security Institute Johns Hopkins University "Everyone's talking about virtual worlds. But no one's talking about virtual-world security. Greg Hoglund and Gary McGraw are the perfect pair to show just how vulnerable these online games can be." --Cade Metz Senior Editor PC Magazine "If we're going to improve our security practices, frank discussions like the ones in this book are the only way forward. Or as the authors of this book might say, when you're facing off against Heinous Demons of Insecurity, you need experienced companions, not to mention a Vorpal Sword of Security Knowledge." --Edward W. Felten, Ph.D. Professor of Computer Science and Public Affairs Director, Center for Information Technology Policy Princeton University "Historically, games have been used by warfighters to develop new capabilities and to hone existing skills--especially in the Air Force. The authors turn this simple concept on itself, making games themselves the subject and target of the 'hacking game,' and along the way creating a masterly publication that is as meaningful to the gamer as it is to the serious security system professional. "Massively distributed systems will define the software field of play for at least the next quarter century. Understanding how they work is important, but understanding how they can be manipulated is essential for the security professional. This book provides the cornerstone for that knowledge." ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 0321320492 , 9780321320490
    Language: English
    Keywords: Microsoft Visual BASIC ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: " Doing Objects in Visual Basic 2005 is one of the few books that I've seen that lays the proper object-oriented foundation to make new Visual Basic.NET developers as well as VB6 veterans successful in moving to the .NET Framework." -Paul Ballard, President, Rochester Consulting Partnership, Inc. "Deborah Kurata's Doing Objects in Visual Basic 2005 is salvation for every programmer beached on the forbidding isle of .NET object-oriented programming. 'Right this way,' she says, leading you confidently into that vaguely menacing interior. Step follows step. Suddenly the daunting and unfamiliar become doable and commonplace. You're productive again. My goodness, you're actually enjoying yourself!" -Ward Bell, V.P., Product Management, IdeaBlade, Inc. "When is comes to advice on programming objects in Visual Basic, nobody could be better qualified than Deborah Kurata. She's been doing Doing Objects since VB4, and she doesn't let us down as we move our classic VB code to the Microsoft.NET platform. From initial analysis and design, through to the final implementation, you'll find everything you need here to take on the Visual Basic 2005 development environment. This book is a must have for every VB.NET developer!" -Kel Good, MCT, MCITP, MCPD, Custom Software Development Inc., (www.customsoftware.ca) "I've long been frustrated that I couldn't recommend a book on object-oriented fundamentals in .NET. Sure, there were plenty of books on OO syntax. But what good is explanation of syntax if you don't already understand the concepts? At last, we have the successor to the Doing Objects series for classic VB, from which so many of us learned how to think about objects and object design, completely rewritten for .NET. If you're a VB 2005 developer who needs to add object orientation to your skill set, this is the book you need." -Billy Hollis, author/consultant, Next Version Systems "Deborah Kurata does her Doing Objects thing again! This is the newest book from Deborah which has been completely rewritten from the ground up for the Visual Basic .Net 2005 developer. Anyone needing a solid foundation in object technology, Visual Basic .Net 2005, and Visual Studio .Net 2005 should read this book. Deborah's presentation of core topics such as class design, object state management, exception handling, events, data binding, validation, data access techniques, and many others is clear, concise, and direct. The clarity of the content, coupled with the hands-on examp...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321477149 , 0321477146
    Language: English
    Keywords: Microcomputers ; Computer systems ; Management ; Business ; Data processing ; Electronic books ; local
    Abstract: BETTER SUPPORT, LOWER COSTS: OPTIMIZE YOUR PC HARDWARE LIFECYCLE, FROM ACQUISITION TO DISPOSAL It typically costs four times as much to support a PC as it does to purchase it--often, even more. The solution: Closed Loop Lifecycle Planning® , Bruce Michelson's comprehensive, proven, best-practice methodology for managing client hardware. Drawing on decades of experience working with Hewlett-Packard's largest and most complex clients, Michelson shows how to monitor and manage lifecycle tasks systematically and coherently-improving efficiency and driving out cost at every phase of your hardware lifecycle, no matter what that hardware is. Michelson shows IT managers how to segment users to provide the right equipment and support at the lowest cost and offers in-depth guidance on controlling the cost of change. His pragmatic approach fully reflects IT's business context and addresses crucial related issues, ranging from service delivery to security and risk management. Coverage includes: The core concepts of closed loop lifecycle planning and transitioning to lifecycle management for the first time Effectively managing all three client lifecycle management "suites": commodity, value, and economic Addressing the business and political challenges associated with PC lifecycle management Optimizing upfront tasks: hardware/software acquisition, interoperability, prototyping, staging, integration, image management, and installation Managing deployed PCs: moves, adds, changes; warranty/maintenance; asset management; help desks; networking; and program management Refreshing technology and securely disposing of hardware at end-of-life Minimizing user downtime and ensuring business continuity Reducing existing costs, avoiding new costs, and learning the broader lessons of closed loop lifecycle planning Register your book and download extra chapters at http://www.awprofessional.com/bookstore/register.asp. Introduction 1 Part I Lifecycle Management 1 Closed Loop Lifecycle Planning Methodology 7 2 Overview of Closed Loop Lifecycle Planning 21 3 Acquiring Hardware 37 4 Acquiring Software 51 5 Staging and Integration 71 6 Installation 85 7 Moves, Adds, and Changes (MACs) 95 8 Warranty and Maintenance 105 9 Asset Management 119 10 The Help Desk 139 11 Program Management 159 12 Disposing of Client Devices at the End of Life 171 13 Technology Refresh 187 14 Service-Delivery Strategies 207 15 Security and Risk 233 16 Global Lifecycle 249 17 Disaster Rec...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321498823 , 0321498828
    Language: English
    Edition: 4th ed.
    Keywords: OpenGL ; Computer graphics ; Electronic books ; local
    Abstract: OpenGL ® SuperBible, Fourth Edition , begins by illuminating the core techniques of "classic" OpenGL graphics programming, from drawing in space to geometric transformations, from lighting to texture mapping. The authors cover newer OpenGL capabilities, including OpenGL 2.1's powerful programmable pipeline, vertex and fragment shaders, and advanced buffers. They also present thorough, up-to-date introductions to OpenGL implementations on multiple platforms, including Windows, Mac OS X, GNU/Linux, UNIX, and embedded systems. Coverage includes · An entirely new chapter on OpenGL ES programming for handhelds · Completely rewritten chapters on OpenGL for Mac OS X and GNU/Linux · Up-to-the-minute coverage of OpenGL on Windows Vista · New material on floating-point color buffers and off-screen rendering · In-depth introductions to 3D modeling and object composition · Expert techniques for utilizing OpenGL's programmable shading language · Thorough coverage of curves, surfaces, interactive graphics, textures, shadows, and much more · A fully updated API reference, and an all-new section of full-color images You'll rely on this book constantly-whether you're learning OpenGL for the first time, deepening your graphics programming expertise, upgrading from older versions of OpenGL, or porting applications from other environments. Now part of the OpenGL Technical Library-The official knowledge resource for OpenGL developers The OpenGL Technical Library provides tutorial and reference books for OpenGL. The Library enables programmers to gain a practical understanding of OpenGL and shows them how to unlock its full potential. Originally developed by SGI, the Library continues to evolve under the auspices of the OpenGL Architecture Review Board (ARB) Steering Group (now part of the Khronos Group), an industry consortium responsible for guiding the evolution of OpenGL and related technologies. Contents Preface xxvii About the Authors xxxv Introduction 1 Part I: The Old Testament Chapter 1 Introduction to 3D Graphics and OpenGL 9 Chapter 2 Using OpenGL 33 Chapter 3 Drawing in Space: Geometric Primitives and Buffers 73 Chapter 4 Geometric Transformations: The Pipeline 127 Chapter 5 Color, Materials, and Lighting: The Basics 173 Chapter 6 More on Colors and Materials 229 Chapter 7 Imaging with OpenGL 251 Chapter 8 Texture Mapping: The Basics 303 Chapter 9 ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321477170 , 0321477170
    Language: English
    Keywords: Capability maturity model (Computer software) ; Software engineering ; Contracting out ; Electronic books ; local
    Abstract: "By following the guidance contained in [the CMMI-ACQ and this book], you'll be able to build an organic acquisition capability that will position your organization to successfully set the scope of engagements with suppliers, keep suppliers and in-house users focused on a common picture of success, and deliver capabilities that will position your organization as a leader in your market or mission for years to come." --From the Foreword by Brian Gallagher Director, Acquisition Program, Software Engineering Institute Increasingly, both commercial and government organizations are acquiring key software, systems, and IT functions instead of building them. Yet all too often, the technology solutions they purchase cannot be sustained successfully. Now there is a comprehensive solution: the CMMI for Acquisition (CMMI-ACQ) model, which connects the widely adopted CMMI 1.2 framework with established industry best practices for acquisition and outsourcing. This book is a practical introduction to the initial CMMI-ACQ and its use in all phases of technology acquisition. Developed under the leadership of the Software Engineering Institute (SEI) and General Motors (GM), the CMMI-ACQ combines CMMI's successful process discipline with techniques proven to work in GM's own extensive outsourcing program. Reflecting the unique insights of key players in the development and early implementation of the CMMI-ACQ, the book covers the entire acquisition project lifecycle, presenting real-world stories as they might occur in your own organizations, insider experiences, tips, tricks, and pitfalls to avoid. The topics discussed here include: determining when outsourcing is and is not appropriate; developing acquisition strategies and aligning organizational structure with them; capturing accurate requirements; specifying realistic design constraints; writing effective RFPs; selecting, managing, and collaborating with suppliers; negotiating contracts; managing risk; and "measuring for success." CMMI for Outsourcing ® will be valuable to any organization that wants to achieve better results from technology acquisition. It will be especially helpful to organizations already involved with CMMI-related process improvement and to companies that partner with them. Foreword Preface Chapter 1: Introduction to the CMMI-ACQ Chapter 2: Getting Started Chapter 3: Engineering Solutions Chapter 4: Delivering Solutions Chapter 5: Accelerating Acquisition Improvement Appendix: Overview...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321321930 , 0321321936
    Language: English
    Keywords: Java (Computer program language) ; Programming languages (Electronic computers) ; Electronic books ; local
    Abstract: Groovy and Beyond: Leverage the Full Power of Scripting on the Java TM Platform! Using the Java TM platform's new scripting support, you can improve efficiency, streamline your development processes, and solve problems ranging from prototyping to Web application programming. In Scripting in Java , Dejan Bosanac covers key aspects of scripting with Java, from the exciting new Groovy scripting language to Java's new Scripting and Web Scripting APIs. Bosanac begins by reviewing the role and value of scripting languages, and then systematically introduces today's best scripting solutions for the Java platform. He introduces Java scripting frameworks, identifies proven patterns for integrating scripting into Java applications, and presents practical techniques for everything from unit testing to project builds. He supports key concepts with extensive code examples that demonstrate scripting at work in real-world Java projects. Coverage includes · Why scripting languages offer surprising value to Java programmers · Scripting languages that run inside the JVM: BeanShell, JavaScript, and Python · Groovy in depth: installation, configuration, Java-like syntax, Java integration, security, and more · Groovy extensions: accessing databases, working with XML, and building simple Web applications and Swing-based UIs · Bean Scripting Framework: implementation, basic abstractions, and usage examples · Traditional and new patterns for Java-based scripting · JSR 223 Scripting API: language bindings, discovery mechanisms, threading, pluggable namespaces, and more · JSR 223 Web Scripting Framework: scripting the generation of Web content within servlet containers About the Web Site All code examples are available for download at this book's companion Web site.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321437341 , 0321437349
    Language: English
    Keywords: Internet telephony ; Security measures ; Electronic books ; local
    Abstract: In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users. 1 Introduction 2 VoIP Architectures and Protocols 3 Threats and Attacks 4 VoIP Vulnerabilites 5 Signaling Protection Mechanisms 6 Media Protection Mechanisms 7 Key Management Mechanisms 8 VoIP and Network Security Controls 9 A Security Framework for Enterprise VoIP Networks 10 Provider Architectures and Security 11 Enterprise Architectures and Security
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321336385 , 0321336380
    Language: English
    Keywords: Computer software ; Quality control ; Computer software ; Testing ; Computer software ; Reliability ; Electronic books ; local
    Abstract: For any software developer who has spent days in "integration hell," cobbling together myriad software components, Continuous Integration: Improving Software Quality and Reducing Risk illustrates how to transform integration from a necessary evil into an everyday part of the development process. The key, as the authors show, is to integrate regularly and often using continuous integration (CI) practices and techniques. The authors first examine the concept of CI and its practices from the ground up and then move on to explore other effective processes performed by CI systems, such as database integration, testing, inspection, deployment, and feedback. Through more than forty CI-related practices using application examples in different languages, readers learn that CI leads to more rapid software development, produces deployable software at every step in the development lifecycle, and reduces the time between defect introduction and detection, saving time and lowering costs. With successful implementation of CI, developers reduce risks and repetitive manual processes, and teams receive better project visibility. The book covers How to make integration a "non-event" on your software development projects How to reduce the amount of repetitive processes you perform when building your software Practices and techniques for using CI effectively with your teams Reducing the risks of late defect discovery, low-quality software, lack of visibility, and lack of deployable software Assessments of different CI servers and related tools on the market The book's companion Web site, www.integratebutton.com, provides updates and code examples.
    Note: "A Martin Fowler signature book"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780131495050 , 0131495054
    Language: English
    Keywords: Software patterns ; Computer software ; Testing ; Electronic books ; local
    Abstract: Automated testing is a cornerstone of agile development. An effective testing strategy will deliver new functionality more aggressively, accelerate user feedback, and improve quality. However, for many developers, creating effective automated tests is a unique and unfamiliar challenge. xUnit Test Patterns is the definitive guide to writing automated tests using xUnit, the most popular unit testing framework in use today. Agile coach and test automation expert Gerard Meszaros describes 68 proven patterns for making tests easier to write, understand, and maintain. He then shows you how to make them more robust and repeatable--and far more cost-effective. Loaded with information, this book feels like three books in one. The first part is a detailed tutorial on test automation that covers everything from test strategy to in-depth test coding. The second part, a catalog of 18 frequently encountered "test smells," provides trouble-shooting guidelines to help you determine the root cause of problems and the most applicable patterns. The third part contains detailed descriptions of each pattern, including refactoring instructions illustrated by extensive code samples in multiple programming languages. Topics covered include Writing better tests--and writing them faster The four phases of automated tests: fixture setup, exercising the system under test, result verification, and fixture teardown Improving test coverage by isolating software from its environment using Test Stubs and Mock Objects Designing software for greater testability Using test "smells" (including code smells, behavior smells, and project smells) to spot problems and know when and how to eliminate them Refactoring tests for greater simplicity, robustness, and execution speed This book will benefit developers, managers, and testers working with any agile or conventional development process, whether doing test-driven development or writing the tests last. While the patterns and smells are especially applicable to all members of the xUnit family, they also apply to next-generation behavior-driven development frameworks such as RSpec and JBehave and to other kinds of test automation tools, including recorded test tools and data-driven test tools such as Fit and FitNesse. Visual Summary of the Pattern Language Foreword Preface Acknowledgments Introduction Refactoring a Test PART I: The Narratives Chapter 1 A Brief Tour Chapter 2 Test Smells Chapter 3 Goals of Test Automation Chapter 4 Phi...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321444431 , 0321444434
    Language: English
    Edition: 2nd ed.
    Keywords: SQL (Computer program language) ; Database searching ; Electronic books ; local
    Abstract: Unless you are working at a very advanced level, this is the only SQL book you will ever need. The authors have taken the mystery out of complex queries and explained principles and techniques with such clarity that a "Mere Mortal" will indeed be empowered to perform the superhuman. Do not walk past this book! --Graham Mandeno, Database Consultant SQL Queries for Mere Mortals provides a step-by-step, easy-to-read introduction to writing SQL queries. It includes hundreds of examples with detailed explanations. This book provides the tools you need to understand, modify, and create SQL queries --Keith W. Hare, Convenor, ISO/IEC JTC1 SC32 WG3--the International SQL Standards Committee I learned SQL primarily from the first edition of this book, and I am pleased to see a second edition of this book so that others can continue to benefit from its organized presentation of the language. Starting from how to design your tables so that SQL can be effective (a common problem for database beginners), and then continuing through the various aspects of SQL construction and capabilities, the reader can become a moderate expert upon completing the book and its samples. Learning how to convert a question in English into a meaningful SQL statement will greatly facilitate your mastery of the language. Numerous examples from real life will help you visualize how to use SQL to answer the questions about the data in your database. Just one of the "watch out for this trap" items will save you more than the cost of the book when you avoid that problem when writing your queries. I highly recommend this book if you want to tap the full potential of your database. --Kenneth D. Snell, Ph.D., Database Designer/Programmer I don't think they do this in public schools any more, and it is a shame, but do you remember in the seventh and eighth grades when you learned to diagram a sentence? Those of you who do may no longer remember how you did it, but all of you do write better sentences because of it. John Viescas and Mike Hernandez must have remembered because they take everyday English queries and literally translate them into SQL. This is an important book for all database designers. It takes the complexity of mathematical Set Theory and of First Order Predicate Logic, as outlined in E. F. Codd's original treatise on relational database design, and makes it easy for anyone to understand. If you want an elementary- through intermediate-level course on SQL, this is the one...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321424778 , 0321424778
    Language: English
    Keywords: Computer security ; Debugging in computer science ; Computer software ; Quality control ; Electronic books ; local
    Abstract: The First Expert Guide to Static Analysis for Software Security! Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there's a complete guide to static analysis: how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most common types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how static analysis can rapidly uncover similar mistakes. This book is for everyone concerned with building more secure software: developers, security engineers, analysts, and testers. Coverage includes: Why conventional bug-catching often misses security problems How static analysis can help programmers get security right The critical attributes and algorithms that make or break a static analysis tool 36 techniques for making static analysis more effective on your code More than 70 types of serious security vulnerabilities, with specific solutions Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more Techniques for handling untrusted input Eliminating buffer overflows: tactical and strategic approaches Avoiding errors specific to Web applications, Web services, and Ajax Security-aware logging, debugging, and error/exception handling Creating, maintaining, and sharing secrets and confidential information Detailed tutorials that walk you through the static analysis process "We designed Java so that it could be analyzed statically. This book shows you how to apply advanced static analysis techniques to create more secure, more reliable software." - Bill Joy, Co-founder of Sun Microsystems, co-inventor of the Java programming language "'Secure Programming with Static Analysis' is a great primer on static analysis for security-minded developers and security practitioners. Well-written, easy to read, tells you what you need to know." - David Wagner, Associate Professor, University of California Berkeley "Software develope...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321336323 , 0321336321
    Language: English
    Keywords: Computer security ; Electronic books ; local
    Abstract: Praise for Virtual Honeypots "A power-packed resource of technical, insightful information that unveils the world of honeypots in front of the reader's eyes." -Lenny Zeltser, Information Security Practice Leader at Gemini Systems "This is one of the must-read security books of the year." -Cyrus Peikari, CEO, Airscanner Mobile Security, author, security warrior "This book clearly ranks as one of the most authoritative in the field of honeypots. It is comprehensive and well written. The authors provide us with an insider's look at virtual honeypots and even help us in setting up and understanding an otherwise very complex technology." -Stefan Kelm, Secorvo Security Consulting "Virtual Honeypots is the best reference for honeypots today. Security experts Niels Provos and Thorsten Holz cover a large breadth of cutting-edge topics, from low-interaction honeypots to botnets and malware. If you want to learn about the latest types of honeypots, how they work, and what they can do for you, this is the resource you need." -Lance Spitzner, Founder, Honeynet Project "Whether gathering intelligence for research and defense, quarantining malware outbreaks within the enterprise, or tending hacker ant farms at home for fun, you'll find many practical techniques in the black art of deception detailed in this book. Honeypot magic revealed!" -Doug Song, Chief Security Architect, Arbor Networks "Seeking the safest paths through the unknown sunny islands called honeypots? Trying to avoid greedy pirates catching treasures deeper and deeper beyond your ports? With this book, any reader will definitely get the right map to handle current cyber-threats. Designed by two famous white hats, Niels Provos and Thorsten Holz, it carefully teaches everything from the concepts to practical real-life examples with virtual honeypots. The main strength of this book relies in how it covers so many uses of honeypots: improving intrusion detection systems, slowing down and following incoming attackers, catching and analyzing 0-days or malwares or botnets, and so on. Sailing the high seas of our cyber-society or surfing the Net, from students to experts, it's a must-read for people really aware of computer security, who would like to fight against black-hats flags with advanced modern tools like honeypots." -Laurent Oudot, Computer Security Expert, CEA "Provos and Holz have written the book that the bad guys don't want you to read. This detailed and comprehensive look at honeypots p...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780131497351 , 0131497359
    Language: English
    Keywords: MySQL (Electronic resource) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: The Most Complete and Practical Guide to MySQL Version 5's Powerful SQL Dialect MySQL version 5 offers a SQL dialect with immense power. In SQL for MySQL Developers , Rick F. van der Lans helps you master this version ofSQL and take advantage of its full potential. Using case study examplesand hands-on exercises, van der Lans illuminates every key concept,technique, and statement-including advanced features that make iteasier to create even the most complex statements and programs. Drawing on decades of experience as an SQL standards team member and enterprise consultant, he reveals exactly why MySQL's dialect works as it does-and how to get the most out of it. You'll gain powerful insight into everything from basic queries to stored procedures, transactions to data security. Whether you're a programmer, Web developer, analyst, DBA, or database user, this book can take you from "apprentice" to true SQL expert. If you've used SQL in older versions of MySQL, you'll become dramatically more effective-and if you're migrating from other database platforms, you'll gain practical mastery fast . Coverage includes Writing queries, including joins, functions, and subqueries Updating data Creating tables, views, and other database objects Specifying keys and other integrity constraints Improving efficiency with indexes Enforcing security via passwords and privileges Embedding SQL statements within PHP programs Building stored procedures and triggers Using transactions, locking, rollback, and isolation levels Utilizing MySQL's catalog All of the book's sample programs are available for download from www.r20.nl. About the Author Rick F. van der Lans is author of the classic Introduction to SQL , the definitive SQL guide that database developers have relied on for more than 20 years. He is a consultant, author, and lecturer specializing in database technology, development tools, data warehousing, and XML. As managing director of the Netherlands-based R20/Consultancy, he has advised many large companies on defining their IT architectures. He chairs the European Meta Data Conference, and writes columns for several magazines. Contents About the Author Preface PART I Introduction CHAPTER 1 Introduction to MySQL CHAPTER 2 The Tennis Club Sample Database CHAPTER 3 Installing the Software CHAPTER 4 SQL in a Nutshell PART II Querying and Updating Data CHAPTER 5 SELECT Statement: Common Elements CHAPTER 6 SELECT Statements, Table Expressions, and Subqueries CHAPTER ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 0321458192 , 9780321458193
    Language: English
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: "Companies have been implementing large agile projects for a number of years, but the 'stigma' of 'agile only works for small projects' continues to be a frequent barrier for newcomers and a rallying cry for agile critics. What has been missing from the agile literature is a solid, practical book on the specifics of developing large projects in an agile way. Dean Leffingwell's book Scaling Software Agility fills this gap admirably. It offers a practical guide to large project issues such as architecture, requirements development, multi-level release planning, and team organization. Leffingwell's book is a necessary guide for large projects and large organizations making the transition to agile development." -Jim Highsmith, director, Agile Practice, Cutter Consortium, author of Agile Project Management "There's tension between building software fast and delivering software that lasts, between being ultra-responsive to changes in the market and maintaining a degree of stability. In his latest work, Scaling Software Agility, Dean Leffingwell shows how to achieve a pragmatic balance among these forces. Leffingwell's observations of the problem, his advice on the solution, and his description of the resulting best practices come from experience: he's been there, done that, and has seen what's worked." -Grady Booch, IBM Fellow Agile development practices, while still controversial in some circles, offer undeniable benefits: faster time to market, better responsiveness to changing customer requirements, and higher quality. However, agile practices have been defined and recommended primarily to small teams. In Scaling Software Agility, Dean Leffingwell describes how agile methods can be applied to enterprise-class development. Part I provides an overview of the most common and effective agile methods. Part II describes seven best practices of agility that natively scale to the enterprise level. Part III describes an additional set of seven organizational capabilities that companies can master to achieve the full benefits of software agility on an enterprise scale. This book is invaluable to software developers, testers and QA personnel, managers and team leads, as well as to executives of software organizations whose objective is to increase the quality and productivity of the software development process but who are faced with all the challenges of developing software on an enterprise scale. Foreword Preface Acknowledgments About the Author Part ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321480798 , 0321480791
    Language: English
    Keywords: RailsSpace (Electronic resource) ; Web site development ; Ruby (Computer program language) ; Online social networks ; Electronic books ; local
    Abstract: Ruby on Rails is fast displacing PHP, ASP, and J2EE as the development framework of choice for discriminating programmers, thanks to its elegant design and emphasis on practical results. RailsSpace teaches you to build large-scale projects with Rails by developing a real-world application: a social networking website like MySpace, Facebook, or Friendster. Inside, the authors walk you step by step from the creation of the site's virtually static front page, through user registration and authentication, and into a highly dynamic site, complete with user profiles, image upload, email, blogs, full-text and geographical search, and a friendship request system. In the process, you learn how Rails helps you control code complexity with the model-view-controller (MVC) architecture, abstraction layers, automated testing, and code refactoring, allowing you to scale up to a large project even with a small number of developers. This essential introduction to Rails provides A tutorial approach that allows you to experience Rails as it is actually used A solid foundation for creating any login-based website in Rails Coverage of newer and more advanced Rails features, such as form generators, REST, and Ajax (including RJS) A thorough and integrated introduction to automated testing The book's companion website provides the application source code, a blog with follow-up articles, narrated screencasts, and a working version of the RailSpace social network.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321418500 , 0321418506
    Language: English
    Keywords: Microsoft Visual studio ; Computer software ; Development ; eXtreme programming ; Electronic books ; local
    Abstract: Make the Most of Visual Studio Team System in Real-World Agile Development Visual Studio Team System (VSTS) gives Microsoft development teams a powerful, integrated toolset for Agile development. Visual Studio Team System: Better Software Development for Agile Teams is a comprehensive, start-to-finish guide to making the most of VSTS in real-world Agile environments. Using a book-length case study, the authors show how to use VSTS to improve every aspect of software development, step by step-from project planning through design and from coding through testing and deployment. Agile consultant Will Stott and Microsoft development lead James Newkirk carefully integrate theory and practice, offering hands-on exercises, practical insights into core Extreme Programming (XP) techniques, and much more. Coverage includes Using VSTS to support the transition to Agile values and techniques Forming Agile teams and building effective process frameworks Leveraging Team Foundation Version Control to help teams manage change and share their code effectively Implementing incremental builds and integration with Team Foundation Build Making the most of VSTS tools for Test-Driven Development and refactoring Bringing agility into software modeling and using patterns to model solutions more effectively Using the FIT integrated testing framework to make sure customers are getting what they need Estimating, prioritizing, and planning Agile projects Preface Acknowledgments About the Authors Introduction: Broken Process Section 1: Apply Sharp Tools and Values Chapter 1: Introduction to Visual Studio Team System Chapter 2: Agile Values Review of Section 1: Sharp Tools and Values Section 2: Introduce Agile Development Chapter 3: Overview of Agile Development Chapter 4: Forming an Agile Team Chapter 5: Team Foundation Process Frameworks Chapter 6: Improving Your Process Framework Review of Section 2: Introduce Agile Development Section 3: Use Version Control Chapter 7: Managing Change Chapter 8: Setting Up TFS Version Control Chapter 9: Using TFVC in Your Project Chapter 10: Policing Your Project with TFVC Review of Section 3: Use Version Control Section 4: Build and Integrate Often Chapter 11: Building and Integrating Software Chapter 12: Working with Team Foundation Build Review of Section 4: Build and Integrate Often Section 5: Practice Test-Driven Development Chapter 13: Introduction to TDD Chapter 14: Developing Your First Tests Chapter 15: Learning to Refactor Chapt...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 0321439104 , 9780321439109
    Language: English
    Keywords: Computer software ; Development ; Computer software ; Development ; Estimates ; Electronic books ; local
    Abstract: "A clearly written book that is a useful primer for a very complicated set of topics." --Capers Jones, Chief Scientist Emeritus, Software Productivity Research LLC Practical Software Estimation brings together today's most valuable tips, techniques, and best practices for accurately estimating software project efforts, costs, and schedules. Written by a leading expert in the field, it addresses the full spectrum of real-world challenges faced by those who must develop reliable estimates. M. A. Parthasarathy draws on the immense experience of Infosys, one of the world's largest and most respected providers of IT-enabled business solutions, to bring you the only book with detailed guidance on estimating insourced and outsourced software projects, as well as projects that blend both approaches. He demonstrates how to successfully utilize Function Point (FP) methods, the industry's leading estimation model. Then, using real case studies, he systematically identifies pitfalls that can lead to inaccurate estimates--and offers proven solutions. Coverage includes How to estimate all types of software projects, including "fresh" development, reengineering, and maintenance How to incorporate the impact of core project elements on estimates: scope, environment, experience, and tools FP analysis from start to finish: data and transaction functions, general system characteristics, and more FP methods for any platform or business function Innovative re-estimation methods to track progress How to quote RFPs and prepare contracts: fixed price, time/material, and project execution lifecycle models Alternatives to FP: Delphi, COCOMO II, and COSMIC-FFP How to choose the right estimation tools Practical Software Estimation is the definitive reference for anyone who must estimate software projects accurately: project and IT managers, individual developers, system designers, architects, executives, consultants, and outsourcers alike. List of Figures List of Tables Foreword Preface Acknowledgments Chapter 1: Introduction Chapter 2: Role of Estimation in Software Projects Chapter 3: A Study of Function Point Analysis Chapter 4: Data Functions Chapter 5: Transactional Functions Chapter 6: General System Characteristics Chapter 7: Size, Effort, and Scheduling of Projects Chapter 8: Estimation Flavors Chapter 9: A Sense of Where You Are Chapter 10: Tips, Tricks, and Traps Chapter 11: Insourcing versus Outsourcing Chapter 12: Key Factors in Software Contracts Chapter 13:...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 0321410599 , 9780321410597
    Language: English
    Keywords: Microsoft InfoPath ; Business ; Forms ; Computer programs ; Electronic books ; local
    Abstract: "Microsoft Office InfoPath represents a revolutionary leap in XML technologies and a new paradigm for gathering business-critical information. I am delighted that Scott Roberts and Hagen Green, two distinguished members of the InfoPath product team, decided to share their experience in this book." --From the Foreword by Jean Paoli, cocreator of XML 1.0 and Microsoft Office InfoPath Microsoft Office InfoPath 2007 offers breakthrough tools for gathering, managing, and integrating business-critical information, and creating efficient forms-driven processes. Two longtime members of Microsoft's InfoPath product team have written the first comprehensive, hands-on guide to building successful XML-based solutions with InfoPath 2007. The book opens with a practical primer on the fundamentals of InfoPath form template design for information workers and application developers at all levels of experience. It then moves into advanced techniques for customizing, integrating, and extending form templates--with all the code examples and detail needed by professional developers. Learn how to: Design form templates: create blank form templates, insert and customize controls, use advanced formatting, and construct and lay out views Work with data: start with XML data or schema, manually edit data sources, and understand design-time visuals Add custom business logic to forms, and integrate them with other applications Retrieve and query data from external data sources, including XML files, databases, SharePoint lists, Web services, and ADO.NET DataSets Submit and receive form data using ADO.NET Save, preview, and publish to e-mail, SharePoint, and more Build reusable components with template parts Create workflows with SharePoint and InfoPath E-Mail Forms Administer Forms Services and Web-enabled form templates Build advanced form templates using C# form code, custom controls, add-ins, and the new InfoPath 2007 managed object model Design form templates using Visual Studio Tools for Office (VSTO) Update, secure, and optimize your form templates List of Figures List of Tables Foreword Preface About the Authors PART I: Designing Forms Chapter 1: Introduction to InfoPath 2007 Chapter 2: Basics of InfoPath Form Design Chapter 3: Working with Data Chapter 4: Advanced Controls and Customization Chapter 5: Adding Logic without Code Chapter 6: Retrieving Data from External Sources Chapter 7: Extended Features of Data Connections Chapter 8: Submitting Form Data Chapter 9...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 0321396855 , 9780321396853
    Language: English
    Keywords: Web site development ; Java (Computer program language) ; Internet programming ; Electronic books ; local
    Abstract: Discover WTP, the New End-to-End Toolset for Java-Based Web Development The Eclipse Web Tools Platform (WTP) seamlessly integrates all the tools today's Java Web developer needs. WTP is both an unprecedented Open Source resource for working developers and a powerful foundation for state-of-the-art commercial products. Eclipse Web Tools Platform offers in-depth descriptions of every tool included in WTP, introducing powerful capabilities never before available in Eclipse. The authors cover the entire Web development process-from defining Web application architectures and development processes through testing and beyond. And if you're seeking to extend WTP, this book provides an introduction to the platform's rich APIs. The book also Presents step-by-step coverage of developing persistence, business logic, and presentation tiers with WTP and Java Introduces best practices for multiple styles of Web and Java EE development Demonstrates JDBC database access and configuration Shows how to configure application servers for use with WTP Walks through creating Web service application interfaces Covers automated testing with JUnit and Cactus, and automated builds utilizing Ant, Maven, and CruiseControl Introduces testing and profiling Web applications with the Eclipse Test and Performance Tools Platform (TPTP) project Describes how to extend WTP with new servers, file types, and WSDL extensions Foreword Preface Acknowledgments About the Authors Part I: Getting Started Chapter 1: Introduction Chapter 2: About the Eclipse Web Tools Platform Project Chapter 3: Quick Tour Chapter 4: Setting Up Your Workspace Part II: Java Web Application Development Chapter 5: Web Application Architecture and Design Chapter 6: Organizing Your Development Project Chapter 7: The Presentation Tier Chapter 8: The Business Logic Tier Chapter 9: The Persistence Tier Chapter 10: Web Services Chapter 11: Testing Part III: Extending WTP Chapter 12: Adding New Servers Chapter 13: Supporting New File Types Chapter 14: Creating WSDL Extensions Chapter 15: Customizing Resource Resolution Part IV: Products and Plans Chapter 16: Other Web Tools Based on Eclipse Chapter 17: The Road Ahead Glossary References Index This book is an invaluable resource for every Eclipse and enterprise Java Web developer: both those who use Eclipse to build other Web applications, and those who build Eclipse technologies into their own products. Complete source code examples are available at www.eclipsewt...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321545275 , 0321545273
    Language: English
    Edition: 2nd ed.
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Management ; Computer systems ; Electronic books ; local
    Abstract: The first edition of The Practice of System and Network Administration introduced a generation of system and network administrators to a modern IT methodology. Whether you use Linux, Unix, or Windows, this newly revised edition describes the essential practices previously handed down only from mentor to protégé. This wonderfully lucid, often funny cornucopia of information introduces beginners to advanced frameworks valuable for their entire career, yet is structured to help even the most advanced experts through difficult projects. The book's four major sections build your knowledge with the foundational elements of system administration. These sections guide you through better techniques for upgrades and change management, catalog best practices for IT services, and explore various management topics. Chapters are divided into The Basics and The Icing. When you get the Basics right it makes every other aspect of the job easier--such as automating the right things first. The Icing sections contain all the powerful things that can be done on top of the basics to wow customers and managers. Inside, you'll find advice on topics such as The key elements your networks and systems need in order to make all other services run better Building and running reliable, scalable services, including web, storage, email, printing, and remote access Creating and enforcing security policies Upgrading multiple hosts at one time without creating havoc Planning for and performing flawless scheduled maintenance windows Managing superior helpdesks and customer care Avoiding the "temporary fix" trap Building data centers that improve server uptime Designing networks for speed and reliability Web scaling and security issues Why building a backup system isn't about backups Monitoring what you have and predicting what you will need How technically oriented workers can maintain their job's technical focus (and avoid an unwanted management role) Technical management issues, including morale, organization building, coaching, and maintaining positive visibility Personal skill techniques, including secrets for getting more done each day, ethical dilemmas, managing your boss, and loving your job System administration salary negotiation It's no wonder the first edition received Usenix SAGE's 2005 Outstanding Achievement Award! This eagerly anticipated second edition updates this time-proven classic: Chapters reordered for easier navigation Thousands of updates and clarificatio...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321447739 , 0321447735
    Language: English
    Keywords: User interfaces (Computer systems) ; Electronic books ; local
    Abstract: User Interface Design for Mere Mortals takes the mystery out of designing effective interfaces for both desktop and web applications. It is recommended reading for anyone who wants to provide users of their software with interfaces that are intuitive and easy-to-use. The key to any successful application lies in providing an interface users not only enjoy interacting with but which also saves time, eliminates frustration, and gets the job done with a minimum of effort. Readers will discover the secrets of good interface design by learning how users behave and the expectations that users have of different types of interfaces. Anyone who reads User Interface Design for Mere Mortals will benefit from • Gaining an appreciation of the differences in the "look and feel" of interfaces for a variety of systems and platforms • Learning how to go about designing and creating the most appropriate interface for the application or website being developed • Becoming familiar with all the different components that make up an interface and the important role that each of those components plays in communicating with users • Understanding the business benefits that flow from good interface design such as significantly reduced support costs • Gaining invaluable insights into how users behave, including the seven stages of human interaction with computers • Working through case study based, in-depth analysis of each of the stages involved in designing a user interface • Acquiring practical knowledge about the similarities and differences between designing websites and traditional desktop applications • Learning how to define, conduct, and analyze usability testing Through the use of the proven For Mere Mortals format, User Interface Design for Mere Mortals succeeds in parting the veil of mystery surrounding effective user interface design. Whatever your background, the For Mere Mortals format makes the information easily accessible and usable. Contents Preface Introduction CHAPTER 1 Brief Histories CHAPTER 2 Concepts and Issues CHAPTER 3 Making the Business Case CHAPTER 4 Good Design CHAPTER 5 How User Behave CHAPTER 6 Analyzing Your Users CHAPTER 7 Designing a User Interface CHAPTER 8 Designing a Web Site CHAPTER 9 Usability APPENDIX A Answers to Review Questions APPENDIX B Recommended Reading Glossary References Index
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321436955 , 0321436954
    Language: English
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: A Comprehensive, Proven Approach to Securing All Your Network Endpoints! Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today's newest threats, and prepare yourself for tomorrow's attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to "trusted computing." Unlike traditional "one-size-fits-all" solutions, Kadrich's approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. You'll learn how to: • Recognize dangerous limitations in conventional endpoint security strategies • Identify the best products, tools, and processes to secure your specific devices and infrastructure • Configure new endpoints securely and reconfigure existing endpoints to optimize security • Rapidly identify and remediate compromised endpoint devices • Systematically defend against new endpoint-focused malware and viruses • Improve security at the point of integration between endpoints and your network Whether you're a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you've been searching for: a comprehensive endpoint security strategy that works. Mark Kadrich is President and CEO of The Security Consortium, which performs in-depth testing and evaluation of security products and vendors. As Senior Scientist for Sygate Technologies, he was responsible for developing corporate policies, understanding security trends, managing government certification programs, and evangelization. After Symantec acquired Sygate, Kadrich became Symantec's Senior Manager of Network and Endpoint Security. His 20 years' IT security experience encompasses systems level design, policy generation, endpoint security, risk management, and other key issues. Foreword Preface About the Author Chapter 1 Defini...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321305503 , 0321305507
    Language: English
    Keywords: Standard template library ; C++ (Computer program language) ; Electronic books ; local
    Abstract: "Wilson's menu of STL treatments will no doubt be good eating for generic programming adherents, ardent C programmers just now taking on STL and C++, Java programmers taking a second look at C++, and authors of libraries targeting multiple platforms and languages. Bon appetit!" --George Frazier, Cadence Design Systems, Inc. "A thorough treatment of the details and caveats of STL extension." --Pablo Aguilar, C++ Software Engineer "This book is not just about extending STL, it's also about extending my thinking in C++." --Serge Krynine, C++ Software Engineer, RailCorp Australia "You might not agree 100% with everything Wilson has to say, but as a whole his book is the most valuable, in-depth study of practical STL-like programming." --Thorsten Ottosen, M.C.S., Boost Contributor "Wilson is a master lion tamer, persuading multifarious third-party library beasts to jump through STL hoops. He carefully guides the reader through the design considerations, pointing out the pitfalls and making sure you don't get your head bitten off." --Adi Shavit, Chief Software Architect, EyeTech Co. Ltd "Wilson's book provides more than enough information to change the angst/uncertainty level of extending STL from 'daunting' to 'doable.' " --Garth Lancaster, EDI/Automation Manager, Business Systems Group, MBF Australia "This book will open up your eyes and uncover just how powerful STL's abstractions really are." --Nevin ":-)" Liber, 19-year veteran of C++ "In the canon of C++ there are very few books that extend the craft. Wilson's work consistently pushes the limits, showing what can and cannot be done, and the tradeoffs involved." --John O'Halloran, Head of Software Development, Mediaproxy "Essential concepts and practices to take the working programmer beyond the standard library." --Greg Peet " Extended STL is not just a book about adapting the STL to fit in with your everyday work, it's also an odyssey through software design and concepts, C++ power techniques, and the perils of real-world software development--in other words, it's a Matthew Wilson book. If you're serious about C++, I think you should read it." --Björn Karlsson, Principle Architect, ReadSoft; author of Beyond the C++ Standard Library: An Introduction to Boost In Extended STL , renowned C++ expert Matthew Wilson shows how to go beyond the C++ standard and extend the Standard Template Library into the wider C++ world of APIs and non-standard collections, to write software that is more efficient,...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321446114 , 0321446119
    Language: English
    Keywords: Computer security ; Computer networks ; Security measures ; Computer software ; Development ; Electronic books ; local
    Abstract: FUZZING Master One of Today's Most Powerful Techniques for Revealing Security Flaws! Fuzzing has evolved into one of today's most effective approaches to test software security. To "fuzz," you attach a program's inputs to a source of random data, and then systematically identify the failures that arise. Hackers have relied on fuzzing for years: Now, it's your turn. In this book, renowned fuzzing experts show you how to use fuzzing to reveal weaknesses in your software before someone else does. Fuzzing is the first and only book to cover fuzzing from start to finish, bringing disciplined best practices to a technique that has traditionally been implemented informally. The authors begin by reviewing how fuzzing works and outlining its crucial advantages over other security testing methods. Next, they introduce state-of-the-art fuzzing techniques for finding vulnerabilities in network protocols, file formats, and web applications; demonstrate the use of automated fuzzing tools; and present several insightful case histories showing fuzzing at work. Coverage includes: • Why fuzzing simplifies test design and catches flaws other methods miss • The fuzzing process: from identifying inputs to assessing "exploitability" • Understanding the requirements for effective fuzzing • Comparing mutation-based and generation-based fuzzers • Using and automating environment variable and argument fuzzing • Mastering in-memory fuzzing techniques • Constructing custom fuzzing frameworks and tools • Implementing intelligent fault detection Attackers are already using fuzzing. You should, too. Whether you're a developer, security engineer, tester, or QA specialist, this book teaches you how to build secure software. Foreword xix Preface xxi Acknowledgments xxv About the Author xxvii P ARTI B ACKGROUND 1 Chapter 1 Vulnerability Discovery Methodologies 3 Chapter 2 What Is Fuzzing? 21 Chapter 3 Fuzzing Methods and Fuzzer Types 33 Chapter 4 Data Representation and Analysis 45 Chapter 5 Requirements for Effective Fuzzing 61 P ART II T ARGETS AND A UTOMATION 71 Chapter 6 Automation and Data Generation 73 Chapter 7 Environment Variable and Argument Fuzzing 89 Chapter 8 Environment Variable and Argument Fuzzing: Automation 103 Chapter 9 Web Application and Server Fuzzing 113 Chapter 10 Web Application and Server Fuzzing: Automation 137 Chapter 11 File Format Fuzzing 1...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321349989 , 0321349989
    Language: English
    Keywords: Risk management ; Decision making ; Electronic books ; local
    Abstract: The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: • Replace nonstop crisis response with a systematic approach to security improvement • Understand the differences between "good" and "bad" metrics • Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk • Quantify the effectiveness of security acquisition, implementation, and other program activities • Organize, aggregate, and analyze your data to bring out key insights • Use visualization to understand and communicate security issues more clearly • Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources • Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making- Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780768685930 , 0768685931
    Language: English
    Pages: xxiv, 299 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Production management ; Quality control ; Capability maturity model (Computer software) ; Electronic books ; local
    Abstract: Praise for CMMI® Survival Guide "Traveling down the CMMI road can be difficult and time-consuming. Garcia and Turner have given us a practical roadmap that addresses the key points to learn as well as the many potholes to avoid. Their Survival Guide is a most valuable resource for the journey. It will help immeasurably in achieving the process improvement that you seek." -Dr. Howard Eisner, Distinguished Research Professor, George Washington University "Helps you get to the 'red meat' of the CMMI quickly and with minimum pain." -Donald J. Reifer, President, Reifer Consultants, Inc. "The best words I can offer potential readers is that you must have this book, not on your shelf, but with you for repeated reading to glean new ideas or reinforce old ones you gained from the past readings. If you have ever been directly involved in a process improvement initiative or if you are starting one, this book can only help you to do a better job. And while [the authors] may not have written this book explicitly for experienced consultants, I found it a great reference even for those of us who helped start this industry, because it provides clear and useful answers to those tough questions we are asked all of the time." -Tim Kasse, CEO and Principal Consultant, Kasse Initiatives LLC "This book contains practical (working) tips for the 'getting started' phase of process improvement, which is the hardest one in the road to improving one's processes." -Agapi Svolou, Principal of Alexanna, LLC, and SEI CMMI Transition Partner "The authors have done an outstanding job in providing guidance for process improvement from a practical perspective. Instead of focusing on a single technique or approach, they have provided a variety of methods for process improvement implementation and have framed their discussion with rich context from lessons learned. The concepts described in this book will be useful to both those starting CMMI implementations and to those who are well into their journey but are still looking for ways to lessen the pain and provide value-added improvements. Reading the book is like being in the audience during a live presentation by SuZ and Rich-they wrote the book as they would present the information to a live audience." -Bill Craig, Director, Software Engineering Directorate, AMRDEC, RDECOM "I have been involved in process improvement since the early 90's and many of the mistakes that I made could have been prevented if this book had been availab...
    Note: Includes bibliographical references (p. 273-277) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780132413930 , 0132413930
    Language: English
    Keywords: Object-oriented programming (Computer science) ; Java (Computer program language) ; Electronic books ; local
    Abstract: Filthy Rich Clients refers to ultra-graphically rich applications that ooze cool. They suck the user in from the outset and hang on to them with a death grip of excitement. Filthy Rich Clients: Developing Animated and Graphical Effects for Desktop Java™ Applications shows you how to build better, more effective, cooler desktop applications that intensify the user experience. The keys to Filthy Rich Clients are graphical and animated effects. These kinds of effects provide ways of enhancing the user experience of the application through more attractive GUIs, dynamic effects that give your application a pulse, and animated transitions that keep your user connected to the logical flow of the application. The book also discusses how to do so effectively, making sure to enrich applications in sensible ways. In-depth coverage includes Graphics and GUI fundamentals: Dig deep into the internals of how Swing and Java 2D work together to display GUI applications onscreen. Learn how to maximize the flexibility of these libraries and use them most effectively. Performance: Follow in-depth discussions and tips throughout the book that will help you write high-performing GUI applications. Images: Understand how images are created and used to make better Java applications. Advanced graphics: Learn more about elements of Swing and Java 2D that are of particular benefit to Filthy Rich Clients. Animation: Discover general concepts of animation, as well as how to use the facilities provided in the Java platform. Learn new utility libraries that vastly simplify animations in Java. Effects: Learn how to create, customize, and use static and animated effects-the mainstays of Filthy Rich Clients. Code examples illustrate key concepts, and the book's companion Web site, http://filthyrichclients.org, includes extensive demos, utility libraries, additional information on related technologies, and more. Informal, fun, and, most of all, useful, this book is great for any developer working with Java to build desktop applications.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...