Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (64)
  • 2005-2009  (64)
  • Boston, Mass. :Safari Books Online,  (63)
  • [Place of publication not identified] : Apress
  • Electronic books  (64)
  • Education
Datasource
  • MPI Ethno. Forsch.  (64)
Material
Language
Years
Year
Subjects(RVK)
  • 1
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Series Statement: The expert's voice in .NET
    Keywords: Windows presentation foundation ; Microsoft .NET Framework ; Charts, diagrams, etc ; Computer programs ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Creating 2D and 3D charts is one of the most common uses of computer graphics. Such charts can have wide applications in representing mathematical, physical, and economic functions in your daily life. Whether you are an engineer, a quantitative analyst, a teacher, or a student, you will end up dealing with charting applications to some degree. Windows Presentation Foundation (WPF) is a next-generation graphics platform that enables you to build advanced user interfaces incorporating documents, media, 2D and 3D graphics, and animations. It is an ideal development tool that allows you to not only generate data, but also easily represent data graphically. Practical WPF Charts and Graphics provides all the tools you will need to develop professional chart and graphics applications in WPF and C#. This book will be useful for WPF and C# programmers of all skill levels, providing a complete and comprehensive explanation of WPF's graphics capability and the creation of various charts, and paying special attention to the details of code implementation.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed March 26, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier/Morgan Kaufmann | Boston, Mass. :Safari Books Online,
    ISBN: 9780123742254 , 0123742250
    Language: English
    Pages: xxv, 274 p , ill. , 24 cm
    Keywords: Management information systems ; Database management ; Data warehousing ; Business intelligence ; Electronic books ; local ; Electronic books
    Abstract: The key to a successful MDM initiative isn't technology or methods, it's people: the stakeholders in the organization and their complex ownership of the data that the initiative will affect. Master Data Management equips you with a deeply practical, business-focused way of thinking about MDM-an understanding that will greatly enhance your ability to communicate with stakeholders and win their support. Moreover, it will help you deserve their support: you'll master all the details involved in planning and executing an MDM project that leads to measurable improvements in business productivity and effectiveness. * Presents a comprehensive roadmap that you can adapt to any MDM project. * Emphasizes the critical goal of maintaining and improving data quality. * Provides guidelines for determining which data to "master. * Examines special issues relating to master data metadata. * Considers a range of MDM architectural styles. * Covers the synchronization of master data across the application infrastructure.
    Note: Includes bibliographical references (p.259) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [United States] : IBM | Boston, Mass. :Safari Books Online,
    ISBN: 0738433179 , 9780738433172
    Language: English
    Pages: xvi, 232 p , ill.
    Series Statement: IBM redbooks
    Parallel Title: Erscheint auch als
    DDC: 658.4038/076
    Keywords: IBM Maximo asset management (Computer file) Study guides Examinations ; Business enterprises Study guides Computer programs ; Examinations ; Electronic data processing personnel Certification ; IBM Maximo asset management (Computer file) ; Industrial management ; Computer programs ; Business ; Computer programs ; Electronic books ; local ; Electronic books ; Electronic data processing personnel ; Certification ; Examinations ; Entreprises ; Logiciels ; Examens ; Guides de l'étudiant ; Study guides
    Abstract: This IBM® Redbooks® publication is a study guide for IBM Maximo® Asset Management V7.1 and is aimed at individuals who want to get an IBM Professional Certification for this product. The IBM Maximo Asset Management V7.1 certification exam, offered through the Professional Certification Program from IBM, is designed to validate the skills required of technical professionals who work in the implementation and configuration of the IBM Maximo Asset Management V7.1 product. This publication does not replace practical experience, and is not designed to be a stand-alone guide for any subject. Instead, it is an effective tool that, when combined with educational activities and experience, can be an extremely useful preparation guide for the exam. For your convenience, we structure the chapters based on the sections of the Test 000-015: IBM Maximo Asset Management V7.1 Implementation, such as Assets, Inventory, and so on, so studying each chapter will help you prepare for one section of the exam. Note that Test 000-017: Foundations of Tivoli Process Automation Engine is a prerequisite for the IBM Certified Deployment Professional - Maximo Asset Management V7.1 certification. To prepare for that test, refer to the IBM Redbooks publication Certification Study Guide Series: Foundations of Tivoli Process Automation Engine, SG24-7763.
    Note: Title from resource description page. - Includes bibliographical references (p. 221) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Amsterdam ; : Focal Press/Elsevier | Boston, Mass. :Safari Books Online,
    ISBN: 9780240521343 , 024052134X
    Language: English
    Pages: xii, 422 p , col. ill. , 25 cm
    Parallel Title: Erscheint auch als
    Keywords: Adobe Photoshop ; Computer graphics ; Image processing ; Digital techniques ; Electronic books ; local ; Electronic books
    Abstract: If you are a digital artist, illustrator, cartoonist, graphic artist, designer, or serious hobbyist looking for new and interesting ways to use Photoshop, this is the book for you! You already know how to use Photoshop as an image editing tool; now, challenge yourself and discover the more artistic aspects of the program with one of the world's best teachers by your side. In addition to four brand new chapters on real world projects, this new edition of award-winning digital artist Derek Lea's bestselling Creative Photoshop contains several brand new features such as "What you'll learn in this chapter summaries, so you can quickly find projects using the specific tools you'd like to focus on, and supplementary information at the end of each chapter, containing useful resources and additional gallery images to provide further study and inspiration. As you work through Derek's fantastic artistic methods, be sure to visit www.creativephotoshopthebook.com for more information, including the project files for each chapter, available for download for you to work with, a reader forum, and more.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress ; | Boston, Mass. :Safari Books Online,
    ISBN: 9781597494199 , 1597494194
    Language: English
    Pages: vii, 593 p
    Keywords: Citrix MetaFrame ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Study guides ; Client/server computing ; Examinations ; Study guides ; Electronic books ; local ; Electronic books
    Abstract: The Citrix Certified Administrator (CCA) credential is the first tier of Citrix certification. The CCA is most often sought out by IT professionals whose networks employ Citrix virtualization technology, and for those IT professionals who are seeking a broad base of general network expertise. The number of CCAs is estimated at between 65 and 70K, up from 45,000 in 2003. Citrix recently released a new version of its most popular product, XenApp (formerly Presentation Server). This new version is fully compatible with Windows Server 2008. To retain their CCA credential, all current CCAs will need to upgrade to the new software. This will be particularly important to those companies enrolled in Citrix partner programs, as current certification is a requirement of the program. When packaged with practice exams, this prep kit will offer an affordable, effective solution for CCA certification and re-certification. Complete exam-prep package includes full coverage of new XenApp 5.0 objectives Authored by a Citrix expert with hundreds of implementations to his credit This preparation kit can also be used as a reference guide for administrators who need to integrate XenApp 5.0 with their networks
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9781597494212 , 1597494216
    Language: English
    Pages: xvi, 613 p , ill. , 24 cm
    Keywords: SQL server ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Study guides ; Microsoft software ; Examinations ; Study guides ; Electronic books ; local ; Electronic books
    Abstract: SQL Server 2008 is the latest update to Microsoft's flagship database management system. This is the largest update since SQL Server 2005, and it brings increased ability to deliver data across more platforms, and thus many different types of devices. New functionality also allows for easy storage and retrieval of digitized images and video. These attributes address the recent explosion in the popularity of web-based video and server and desktop virtualization. The Real MCTS SQL Server 2008 Exam 70-433 Prep Kit prepares readers for the Microsoft Certified Technology Specialist exam: SQL Server 2008, Database Development. This is a new exam in the SQL Server product family, and is comprised of some objectives from exam 70-431 from SQL Server 2005, and covers new, expanded query capabilities in SQL Server 2008. According to Microsoft: Exam 70-431 for SQL Server 2005 was passed by over 35,000 people. ~ 150,000 people passed a similar exam for SQL Server 2000. Additionally, this exam is a pre-requisite for those going on to obtain the MCITP: Database Developer 2008: Successful candidates for the SQL Server 2005 MCITP ~ 2,500. This is The 'Real' Microsoft Exam Prep Kit, and provides the reader with independent and unbiased exam tips and warnings everything they need to know to ensure certification success. Authored by Mark Horninger, a nationally recognized leader in SQL Server with over 50 Microsoft certifications to his credit; Mark knows what it takes to successfully navigate Microsoft exams.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Burlington, Mass. : Butterworth-Heinemann/Syngress Pub. | Boston, Mass. :Safari Books Online,
    ISBN: 9780080949536 , 0080949533
    Language: English
    Pages: xxvii, 285 p , ill. , 24 cm
    Keywords: Crime laboratories ; Forensic sciences ; Data processing ; Electronic books ; local ; Electronic books
    Abstract: The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the investigations themselves. This includes a great need for information on how to cost-effectively establish and manage a computer forensics laboratory. This book meets that need: a clearly written, non-technical book on the topic of computer forensics with emphasis on the establishment and management of a computer forensics laboratory and its subsequent support to successfully conducting computer-related crime investigations. Provides guidance on creating and managing a computer forensics lab Covers the regulatory and legislative environment in the US and Europe Meets the needs of IT professionals and law enforcement as well as consultants
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597492997 , 159749299X
    Language: English
    Pages: xxxi, 1038 p , ill. , 25 cm. + 1DVD (4 3/4 in)
    Keywords: Computer hackers ; Fiction ; Computer security ; Fiction ; Cyberterrorism ; Fiction ; Short stories, American ; 21st century ; Electronic books ; local ; Electronic books
    Abstract: "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one." - from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black Hat, Inc. and Founder of DEFCON For the very first time the complete Stealing the Network epic is available in an enormous, over 1000 page volume complete with the final chapter of the saga and a DVD filled with behind the scenes video footage! These groundbreaking books created a fictional world of hacker superheroes and villains based on real world technology, tools, and tactics. It is almost as if the authors peered into the future as many of the techniques and scenarios in these books have come to pass. This book contains all of the material from each of the four books in the Stealing the Network series. All of the stories and tech from: How to Own the Box How to Own a Continent How to Own an Identity How to Own a Shadow Plus: Finally - find out how the story ends! The final chapter is here! A DVD full of behind the scenes stories and insider info about the making of these cult classics! * Now for the first time the entire series is one 1000+ page book * The DVD contains 20 minutes of behind the scenes footage * Readers will finally learn the fate of "Knuth" in the much anticipated Final Chapter
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly Media | Boston, Mass. :Safari Books Online,
    ISBN: 9780596804862 , 0596804865
    Language: English
    Pages: 1 v. (unpaged) , ill.
    Edition: 1st. ed.
    Keywords: Electronic books ; Selling ; Books ; Publishers and publishing ; Booksellers and bookselling ; Electronic books ; local
    Abstract: Book publishers have long used free content as part of their marketing and selling efforts, with the vast majority of free content distributed in printed form. Digital distribution of free material, either intentional or via unauthorized availability through peer-to-peer sites and other Web outlets, offers a fast and expansive connection to consumers, but content can also be copied and disseminated without publishers' control. Some publishers are torn between the efficiencies digital distribution provides and concerns over piracy and print-sale cannibalization. This research report is part of an ongoing effort by O'Reilly Media Inc. and Random House to test assumptions about free distribution, P2P availability and their potential impact on book sales.
    Note: Title from resource description page (viewed June 1, 2009)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780080956909 , 0080956904
    Language: English
    Pages: xvi, 613 p , ill. , 24 cm
    Keywords: SQL server ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Study guides ; Microsoft software ; Examinations ; Study guides ; Electronic books ; local ; Electronic books
    Abstract: SQL Server 2008 is the latest update to Microsoft's flagship database management system. This is the largest update since SQL Server 2005. SQL Server 2008 is a much more significant update than SQL Server 2005, because it brings increased ability to deliver data across more platforms, and thus many different types of devices. New functionality also allows for easy storage and retrieval of digitized images and video. These attributes address the recent explosion in the popularity of web-based video and server and desktop virtualization. The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit prepares readers for the Microsoft Certified Technology Specialist exam: SQL Server 2008, Implementation and Maintenance. This is The 'Real' Microsoft Exam Prep Kit, and provides the reader with independent and unbiased exam tips and warnings everything they need to know to ensure certification success. Authored by Mark Horninger, a nationally recognized leader in SQL Server with over 50 Microsoft certifications to his credit; Mark knows what it takes to successfully navigate Microsoft exams.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Amsterdam ; : Morgan Kaufmann Publishers/Elsevier | Boston, Mass. :Safari Books Online,
    ISBN: 9780123746306 , 0123746302
    Language: English
    Pages: xiv, 349 p , ill. , 25 cm
    Keywords: Database design ; Electronic books ; local ; Electronic books
    Abstract: This book brings all of the elements of database design together in a single volume, saving the reader the time and expense of making multiple purchases. It consolidates both introductory and advanced topics, thereby covering the gamut of database design methodology ? from ER and UML techniques, to conceptual data modeling and table transformation, to storing XML and querying moving objects databases. The proposed book expertly combines the finest database design material from the Morgan Kaufmann portfolio. Individual chapters are derived from a select group of MK books authored by the best and brightest in the field. These chapters are combined into one comprehensive volume in a way that allows it to be used as a reference work for those interested in new and developing aspects of database design. This book represents a quick and efficient way to unite valuable content from leading database design experts, thereby creating a definitive, one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources. Chapters contributed by various recognized experts in the field let the reader remain up to date and fully informed from multiple viewpoints. Details multiple relational models and modeling languages, enhancing the reader's technical expertise and familiarity with design-related requirements specification. Coverage of both theory and practice brings all of the elements of database design together in a single volume, saving the reader the time and expense of making multiple purchases.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [United States?] : Que | Boston, Mass. :Safari Books Online,
    ISBN: 9780768694352 , 0768694353
    Language: English
    Pages: 77 p , ill.
    Parallel Title: Erscheint auch als
    Keywords: Electronic books ; Electronic books ; local
    Abstract: Introducing Using Kindle . Meticulously researched and painstakingly written to be the one Kindle resource you can't live without, Using Kindle is a thorough guide covering all aspects of the Kindle, including the new Kindle 2 and DX models, and is designed to teach you everything you need to know. Using Kindle was written for all Kindle users, even those who have absolutely no technical expertise and are inexperienced in using a computer. Here are just a few of the many things you'll learn in this book: -- Tips and tricks to help make your basic Kindle reading experience more enjoyable. -- Coverage of Kindle DX's native PDF support and accelerometer - it will automatically switch from portrait to landscape when you turn it! -- Details on Amazon's WhisperSync service for owners of multiple Kindles, an iPhone, or an iPod touch. -- Details on where you can locate free books as well as tips on how you can search for hard-to-find free books. -- How you can use free software to convert books and edit author name, title, and other information. -- The best ways to take advantage of the Kindle's built-in Web browser, including how to use email, blog readers, eBay, social networking, and even manage your Netflix movie queue. -- How to listen to music while you read. -- How to listen to podcasts on your Kindle (and how to make the Kindle automatically remember your current place in your favorite podcast.) -- A comprehensive FAQ on the Kindle using carefully researched questions asked by Kindle users. -- Innovative ideas on using the Kindle for an information-storage device. -- Much, much more! Buy Using Kindle today and spend more time reading what you want and less time trying to figure out the Kindle.
    Note: "Coverage of Kindle DX.". - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier/Focal Press | Boston, Mass. :Safari Books Online,
    ISBN: 9780080927138 , 0080927130
    Language: English
    Pages: xvi, 365 p , col. ill. , 25 cm
    Parallel Title: Erscheint auch als
    DDC: 006.6/96 22
    Keywords: Adobe Photoshop lightroom ; Photography Handbooks, manuals, etc Digital techniques ; Computer programs ; Photography ; Digital techniques ; Computer programs ; Handbooks, manuals, etc ; Electronic books ; local ; Adobe Photoshop lightroom ; Electronic books ; Photographie numérique ; Logiciels ; Guides, manuels, etc ; Handbooks and manuals
    Abstract: Adobe Photoshop Lightroom has taken the photography world by storm! Let two industry experts, Dave Huss and David Plotkin, help you get up to speed fast with the all-new version 2. This complete reference for all users of Lightroom starts out with the basics, covering each available tool found in Lightroom with step-by-step clarity. The book then moves on to more in-depth discussions of the most often used tools and techniques, so you can customize a workflow that best suits your own needs. Start at the beginning to develop a complete set of Lightroom skills, or skip ahead to the sections that delve deeper into the tools you want to use immediately. Learn how to work smarter, faster, and more creatively to improve the overall quality of your work so you can spend less time in front of the computer and more time behind your camera!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [United States?] : IBM, International Technical Support Organization | Boston, Mass. :Safari Books Online,
    ISBN: 0738485780 , 9780738485782
    Language: English
    Pages: xvi, 308 p , ill.
    DDC: 004.6
    Keywords: Storage area networks (Computer networks) ; Electronic data processing Backup processing alternatives ; Virtual storage (Computer science) ; Electronic books ; local ; Storage area networks (Computer networks) ; Virtual storage (Computer science) ; Electronic data processing ; Backup processing alternatives ; Electronic books ; Réseaux de stockage (Informatique) ; Sauvegarde (Informatique) ; Ordinateurs ; Mémoires virtuelles
    Abstract: This IBM® Redbook captures some of the best practices based on field experience and details the performance gains that can be achieved by implementing the IBM System Storage™ SAN Volume Controller. This book is intended for very experienced storage, SAN, and SVC administrators and technicians. Readers are expected to have an advanced knowledge of the SVC and SAN environment, and we recommend these books as background reading: IBM System Storage SAN Volume Controller, SG24-6423 Introduction to Storage Area Networks, SG24-5470 Using the SVC for Business Continuity, SG24-7371
    Note: "SG24-7521-00.". - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9781597492553 , 1597492558
    Language: English
    Pages: xx, 357 p , ill. , 24 cm
    Keywords: Business intelligence ; Intellectual property ; Economic aspects ; Intellectual capital ; Management ; Electronic books ; local ; Electronic books
    Abstract: The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year. Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge. • It's Not "Someone Else's Problem: Your Enterprise is at Risk Identify the dangers associated with intellectual property theft and economic espionage • The Threat Comes from Many Sources Describes the types of attackers, threat vectors, and modes of attack • The Threat is Real Explore case studies of real-world incidents in stark relief • How to Defend Your Enterprise Identify all aspects of a comprehensive program to tackle such threats and risks • How to Deliver the Message: Awareness and Education Adaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    San Jose, Calif. : AdobePress | Boston, Mass. :Safari Books Online,
    ISBN: 9780321618337 , 0321618335
    Language: English
    Pages: iii, 465 p , ill.
    Series Statement: Classroom in a book
    Parallel Title: Erscheint auch als
    Keywords: Adobe Illustrator (Computer file) ; Computer graphics ; Electronic books ; local ; Electronic books
    Abstract: The fastest, easiest, most comprehensive way to learn Adobe Illustrator CS4 Adobe Illustrator CS4 Classroom in a Book contains 15 lessons. The book covers the basics of learning Illustrator and provides countless tips and techniques to help you become more productive with the program. You can follow the book from start to finish or choose only those lessons that interest you. Learn how to create artwork for illustrations, logos, stationery, page layouts, posters, and integrate with Adobe Flash® movies, Adobe InDesign® layouts, and more! "The Classroom in a Book series is by far the best training material on the market. Everything you need to master the software is included: clear explanations of each lesson, step-by-step instructions, and the project files for the students." -Barbara Binder, Adobe Certified Instructor, Rocky Mountain Training Classroom in a Book®, the best-selling series of hands-on software training workbooks, helps you learn the features of Adobe software quickly and easily. Classroom in a Book offers what no other book or training program does-an official training series from Adobe Systems Incorporated, developed with the support of Adobe product experts.
    Note: "The official training workbook from Adobe Systems."--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597492089 , 1597492086
    Language: English
    Pages: xiv, 433 p , ill. , 24 cm
    Edition: 2nd ed.
    Keywords: Internet ; Security measures ; Computer networks ; Security measures ; Computer security ; Risk assessment ; Electronic books ; local ; Electronic books
    Abstract: The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access. Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins. Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus. Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed. Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors. Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests. Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL). Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues. Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times. The first edition is still the only book available on the product. Written by the world's premier Nessus developers and featuring a foreword by the creator of Nessus, Renaud Deraison.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Amsterdam ; : Morgan Kaufmann/Elsevier | Boston, Mass. :Safari Books Online,
    ISBN: 9780123743190 , 0123743192
    Language: English
    Pages: xxi, 371 p , ill. , 24 cm
    Series Statement: Morgan Kaufmann series in data management systems
    Keywords: Data warehousing ; Electronic books ; local ; Electronic books
    Abstract: DW 2.0: The Architecture for the Next Generation of Data Warehousing is the first book on the new generation of data warehouse architecture, DW 2.0, by the father of the data warehouse. The book describes the future of data warehousing that is technologically possible today, at both an architectural level and technology level. The perspective of the book is from the top down: looking at the overall architecture and then delving into the issues underlying the components. This allows people who are building or using a data warehouse to see what lies ahead and determine what new technology to buy, how to plan extensions to the data warehouse, what can be salvaged from the current system, and how to justify the expense at the most practical level. This book gives experienced data warehouse professionals everything they need in order to implement the new generation DW 2.0. It is designed for professionals in the IT organization, including data architects, DBAs, systems design and development professionals, as well as data warehouse and knowledge management professionals. * First book on the new generation of data warehouse architecture, DW 2.0. * Written by the "father of the data warehouse", Bill Inmon, a columnist and newsletter editor of The Bill Inmon Channel on the Business Intelligence Network. * Long overdue comprehensive coverage of the implementation of technology and tools that enable the new generation of the DW: metadata, temporal data, ETL, unstructured data, and data quality control.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier/Morgan Kaufmann Publishers | Boston, Mass. :Safari Books Online,
    ISBN: 9780123706430 , 0123706432
    Language: English
    Pages: xiii, 407 p , ill. , 24 cm
    Edition: Updated and rev.
    Series Statement: The Morgan Kaufmann series in interactive technologies
    Keywords: Graphical user interfaces (Computer systems) ; Electronic books ; local ; Electronic books
    Abstract: GUI Bloopers 2.0, Second Edition , is the completely updated and revised version of GUI Bloopers . It looks at user interface design bloopers from commercial software, Web sites, Web applications, and information appliances, explaining how intelligent, well-intentioned professionals make these mistakes - and how you can avoid them. GUI expert Jeff Johnson presents the reality of interface design in an entertaining, anecdotal, and instructive way while equipping readers with the minimum of theory. This updated version reflects the bloopers that are common today, incorporating many comments and suggestions from first edition readers. It covers bloopers in a wide range of categories including GUI controls, graphic design and layout, text messages, interaction strategies, Web site design - including search, link, and navigation, responsiveness issues, and management decision-making. Organized and formatted so information needed is quickly found, the new edition features call-outs for the examples and informative captions to enhance quick knowledge building. This book is recommended for software engineers, web designers, web application developers, and interaction designers working on all kinds of products. Updated to reflect the bloopers that are common today, incorporating many comments and suggestions from first edition readers Takes a learn-by-example approach that teaches how to avoid common errors Covers bloopers in a wide range of categories: GUI controls, graphic design and layout, text messages, interaction strategies, Web site design -- including search, link, and navigation, responsiveness issues, and management decision-making Organized and formatted so information needed is quickly found, the new edition features call-outs for the examples and informative captions to enhance quick knowledge building Hundreds of illustrations: both the DOs and the DON'Ts for each topic covered, with checklists and additional bloopers on www.gui-bloopers.com
    Note: Originally published: San Francisco : Morgan Kaufmann Publishers, under title: GUI bloopers, 2000. - Includes bibliographical references (p. 389-395) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Amsterdam ; : Morgan Kaufmann Publishers/Elsevier | Boston, Mass. :Safari Books Online,
    ISBN: 9780080879260 , 0080879268
    Language: English
    Pages: xix, 684 p , ill. (chiefly col.) , 24 cm. +
    Edition: 2nd ed.
    Keywords: Computer graphics ; Image processing ; Digital techniques ; Electronic books ; local ; Electronic books
    Abstract: *The classic reference, with over 25,000 copies in print, has been massively expanded and thoroughly updated to include state-of-the-art methods and 400+ all-new full color images! At ILM, compositing is one of the most important tools we use. If you want to learn more, this excellent 2nd-edition is detailed with hundreds of secrets that will help make your comps seamless. For beginners or experts, Ron walks you through the processes of analysis and workflows - linear thinking which will help you become deft and successfully tackle any shot. - Dennis Muren ASC, Senior Visual Effects Supervisor, Industrial Light & Magic Ron Brinkman's book is the definitive work on digital compositing and we have depended on this book as a critical part of our in-house training program at Imageworks since the 1999 Edition. We use this book as a daily textbook and reference for our lighters, compositors and anyone working with digital imagery. It is wonderful to see a new edition being released and it will certainly be required reading for all our digital artists here at Imageworks. - Sande Scoredos, Executive Director of Training & Artist Development, Sony Pictures Imageworks The Art and Science of Digital Compositing is the only complete overview of the technical and artistic nature of digital compositing. It covers a wide range of topics from basic image creation, representation and manipulation, to a look at the visual cues that are necessary to create a believable composite. Designed as an introduction to the field, as well as an authoritative technical reference, this book provides essential information for novices and professionals alike. *17 new case-studies provide in-depth looks at the compositing work done on films such as Chronicles of Narnia: The Lion, the Witch and the Wardrobe, The Golden Compass, The Incredibles, King Kong, The Lord of the Rings: The Return of the King, Sin City, Spider-Man 2, Wallace and Gromit: The Curse of the Were-Rabbit, and Star Wars: Episode 3 - Revenge of the Sith. *Includes new sections on 3D compositing, High Dynamic Range (HDR) imaging, Rotoscoping, and much more! All disc-based content for this title is now available on the Web. *17 new case-studies provide in-depth looks at the compositing work done on films such as Chronicles of Narnia: The Lion, the Witch and the Wardrobe, The Golden Compass, The Incredibles, King Kong, The Lord of the Rings: The Return of the King, Sin City, Spider-Man 2, Wallace and Grom...
    Note: Includes bibliographical references (p. [627]-630) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress ; | Boston, Mass. :Safari Books Online,
    ISBN: 9781597492737 , 1597492736
    Language: English
    Pages: xxiii, 796 p , ill. , 24 cm
    Edition: 2nd ed.
    Keywords: Microsoft Windows server ; Electronic books ; local ; Electronic books
    Abstract: Best Damn Windows Server 2008 Book Period, Second Edition is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller. Web server management with Internet Information Services 7.0 Virtualize multiple operating systems on a single server Hardening Security, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller
    Note: "Everything you need to know about managing a Windows Server 2008 Enterprise" --Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Amsterdam ; : Newnes/Elsevier | Boston, Mass. :Safari Books Online,
    ISBN: 9780750686112 , 0750686111
    Language: English
    Pages: xiv, 544 p , ill. , 24 cm. +
    Keywords: Programmable controllers ; C (Computer program language) ; Electronic books ; local ; Electronic books
    Abstract: This book is ideal for the engineer, technician, hobbyist and student who have knowledge of the basic principles of PIC microcontrollers and want to develop more advanced applications using the 18F series. The architecture of the PIC 18FXXX series as well as typical oscillator, reset, memory, and input-output circuits is completely detailed. After giving an introduction to programming in C, the book describes the project development cycle in full, giving details of the process of editing, compilation, error handling, programming and the use of specific development tools. The bulk of the book gives full details of tried and tested hands-on projects, such as the 12C BUS, USB BUS, CAN BUS, SPI BUS and real-time operating systems. A clear introduction to the PIC 18FXXX microcontroller's architecture 20 projects, including developing wireless and sensor network applications, using I2C BUS, USB BUS, CAN BUS and the SPI BUS, which give the block and circuit diagram, program description in PDL, program listing and program description Numerous examples of using developmental tools: simulators, in-circuit debuggers (especially ICD2) and emulators
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Amsterdam ; : Morgan Kaufmann/Elsevier | Boston, Mass. :Safari Books Online,
    ISBN: 9780080920061 , 0080920063
    Language: English
    Pages: xvii, 453 p , ill. , 24 cm
    Series Statement: The Morgan Kaufmann series in computer graphics
    Parallel Title: Erscheint auch als
    Keywords: Processing (Computer program language) ; Interactive multimedia ; Electronic books ; local ; Electronic books
    Abstract: The free, open-source Processing programming language environment was created at MIT for people who want to develop images, animation, and sound. Based on the ubiquitous Java, it provides an alternative to daunting languages and expensive proprietary software. This book gives graphic designers, artists and illustrators of all stripes a jump start to working with processing by providing detailed information on the basic principles of programming with the language, followed by careful, step-by-step explanations of select advanced techniques. The author teaches computer graphics at NYU's Tisch School of the Arts, and his book has been developed with a supportive learning experience at its core. From algorithms and data mining to rendering and debugging, it teaches object-oriented programming from the ground up within the fascinating context of interactive visual media. Previously announced as "Pixels, Patterns, and Processing" *A guided journey from the very basics of computer programming through to creating custom interactive 3D graphics *Step-by-step examples, approachable language, exercises, and LOTS of sample code support the reader's learning curve *Includes lessons on how to program live video, animated images and interactive sound
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9781597492348 , 1597492345
    Language: English
    Pages: xxxvii, 1050 p , ill.
    Keywords: Microsoft Windows server ; Client/server computing ; Electronic data processing personnel ; Certification ; Microsoft software ; Examinations ; Study guides ; Electronic books ; local ; Electronic books
    Abstract: This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSE skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640, 70-642, and 70-643. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet. * THE independent source of exam day tips, techniques, and warnings not available from Microsoft * Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives * Interactive FastTrack e-learning modules help simplify difficult exam topics * Two full-function ExamDay practice exams guarantee double coverage of all exam objectives * Free download of audio FastTracks for use with iPods or other MP3 players * 1000 page "DRILL DOWN" reference for comprehensive topic review
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Burlington, Mass. : Morgan Kaufmann | Boston, Mass. :Safari Books Online,
    ISBN: 9780123744456 , 0123744458
    Language: English
    Pages: xxiii, 306 p , ill. , 24 cm
    Keywords: Information resources management ; Management information systems ; Agile software development ; Electronic books ; local ; Electronic books
    Abstract: In the last ten years IT has brought fundamental changes to the way the world works. Not only has it increased the speed of operations and communications, but it has also undermined basic assumptions of traditional business models and increased the number of variables. Today, the survival of major corporations is challenged by a world-wide marketplace, international operations, outsourcing, global communities, a changing workforce, security threats, business continuity, web visibility, and customer expectations. Enterprises must constantly adapt or they will be unable to compete. Fred Cummins, an EDS Fellow, presents IT as a key enabler of the agile enterprise. He demonstrates how the convergence of key technologies-including SOA, BPM and emerging enterprise and data models-can be harnessed to transform the enterprise. Cummins mines his 25 years experience to provide IT leaders, as well as enterprise architects and management consultants, with the critical information, skills, and insights they need to partner with management and redesign the enterprise for continuous change. No other book puts IT at the center of this transformation, nor integrates these technologies for this purpose. Shows how to integrate and deploy critical technologies to foster agility Details how to design an enterprise architecture that takes full advantage of SOA, BPM, business rules, enterprise information management, business models, and governance Outlines IT's critical mission in providing an integration infrastructure and key services, while optimizing technology adoption throughout the enterprise Illustrates concepts with examples and cases from large and small commercial enterprises Shows how to create systems that recognize and respond to the need for change Identifies the unique security issues that arise with SOA and shows how to deploy a framework of technologies and processes that address them
    Note: Includes bibliographical references (p. 287-288) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Amsterdam ; : Morgan Kaufman | Boston, Mass. :Safari Books Online,
    ISBN: 9780123735683 , 0123735688
    Language: English
    Pages: xxvi, 943 p , ill. , 24 cm
    Edition: 2nd ed.
    Series Statement: The Morgan Kaufmann series in data management systems
    Parallel Title: Erscheint auch als
    Keywords: Database design ; Relational databases ; Electronic books ; local ; Electronic books
    Abstract: Information Modeling and Relational Databases, Second Edition , provides an introduction to ORM (Object-Role Modeling)and much more. In fact, it is the only book to go beyond introductory coverage and provide all of the in-depth instruction you need to transform knowledge from domain experts into a sound database design. This book is intended for anyone with a stake in the accuracy and efficacy of databases: systems analysts, information modelers, database designers and administrators, and programmers. Terry Halpin, a pioneer in the development of ORM, blends conceptual information with practical instruction that will let you begin using ORM effectively as soon as possible. Supported by examples, exercises, and useful background information, his step-by-step approach teaches you to develop a natural-language-based ORM model, and then, where needed, abstract ER and UML models from it. This book will quickly make you proficient in the modeling technique that is proving vital to the development of accurate and efficient databases that best meet real business objectives. Presents the most indepth coverage of Object-Role Modeling available anywhere, including a thorough update of the book for ORM2, as well as UML2 and E-R (Entity-Relationship) modeling Includes clear coverage of relational database concepts, and the latest developments in SQL and XML, including a new chapter on the impact of XML on information modeling, exchange and transformation New and improved case studies and exercises are provided for many topics
    Note: Includes bibliographical references, useful Web sites (p. 911-924) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress ; | Boston, Mass. :Safari Books Online,
    ISBN: 9781597492393 , 1597492396
    Language: English
    Pages: xviii, 293 p , 24 cm
    Keywords: Computer security ; Emergency management ; Data protection ; Electronic books ; local ; Electronic books
    Abstract: Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes. *Addresses a very topical subject of great concern to security, general IT and business management *Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data. *Gathers in a single place all information about this critical issue, including legal, public relations and regulatory issues
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress Publishing | Boston, Mass. :Safari Books Online,
    ISBN: 9781597492690 , 1597492698
    Language: English
    Pages: x, 236 p , ill. , 24 cm. +
    Keywords: UNIX (Computer file) ; Linux ; Computer crimes ; Investigation ; Forensic sciences ; Operating systems (Computers) ; Electronic books ; local ; Electronic books
    Abstract: This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed to any significant depth largely due to a lack of understanding on the part of the investigator, an understanding and knowledge base that has been achieved by the attacker. The book begins with a chapter to describe why and how the book was written, and for whom, and then immediately begins addressing the issues of live response (volatile) data collection and analysis. The book continues by addressing issues of collecting and analyzing the contents of physical memory (i.e., RAM). The following chapters address /proc analysis, revealing the wealth of significant evidence, and analysis of files created by or on UNIX systems. Then the book addresses the underground world of UNIX hacking and reveals methods and techniques used by hackers, malware coders, and anti-forensic developers. The book then illustrates to the investigator how to analyze these files and extract the information they need to perform a comprehensive forensic analysis. The final chapter includes a detailed discussion of loadable kernel Modules and malware. Throughout the book the author provides a wealth of unique information, providing tools, techniques and information that won't be found anywhere else. This book contains information about UNIX forensic analysis that is not available anywhere else. Much of the information is a result of the author's own unique research and work. The authors have the combined experience of law enforcement, military, and corporate forensics. This unique perspective makes this book attractive to all forensic investigators.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier/Morgan Kaufmann | Boston, Mass. :Safari Books Online,
    ISBN: 9780123705914 , 0123705916
    Language: English
    Pages: xx, 508 p , ill. , 24 cm
    Keywords: Multiprogramming (Electronic computers) ; Multiprocessors ; Electronic books ; local ; Electronic books
    Abstract: The Art of Multiprocessor Programming promises to be the first comprehensive presentation of the principles and tools available for programming multiprocessor machines. As the computer industry changes from single-processor to multiprocessor architectures, this revolution requires a fundamental change in how programs are written. To leverage the performance and power of multiprocessor programming, also known as multicore programming, programmers need to learn the new principles, algorithms, and tools. The book will be of immediate use to programmers working with the new architectures. For example, the next generation of computer game consoles will all be multiprocessor-based, and the game industry is currently struggling to understand how to address the programming challenges presented by these machines. This change in the industry is so fundamental that it is certain to require a significant response by universities, and courses on multicore programming will become a staple of computer science curriculums. This book includes fully-developed Java examples detailing data structures, synchronization techniques, transactional memory, and more. Students in multiprocessor and multicore programming courses and engineers working with multiprocessor and multicore systems will find this book quite useful. The book on multicore programming, the new paradigm of computer science Written by the world's most revered experts in multiprocessor programming and performance Includes examples, models, exercises, PowerPoint slides, and sample Java programs
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Burlington, Mass. : Morgan Kaufmann/Elsevier | Boston, Mass. :Safari Books Online,
    ISBN: 9780123735560 , 0123735564
    Language: English
    Pages: xvii, 330 p , ill. , 24 cm
    Keywords: Web site development ; Metadata ; Semantic Web ; Electronic books ; local ; Electronic books
    Abstract: The promise of the Semantic Web to provide a universal medium to exchange data information and knowledge has been well publicized. There are many sources too for basic information on the extensions to the WWW that permit content to be expressed in natural language yet used by software agents to easily find, share and integrate information. Until now individuals engaged in creating ontologies-- formal descriptions of the concepts, terms, and relationships within a given knowledge domain-- have had no sources beyond the technical standards documents. Semantic Web for the Working Ontologist transforms this information into the practical knowledge that programmers and subject domain experts need. Authors Allemang and Hendler begin with solutions to the basic problems, but don't stop there: they demonstrate how to develop your own solutions to problems of increasing complexity and ensure that your skills will keep pace with the continued evolution of the Semantic Web. • Provides practical information for all programmers and subject matter experts engaged in modeling data to fit the requirements of the Semantic Web. • De-emphasizes algorithms and proofs, focusing instead on real-world problems, creative solutions, and highly illustrative examples. • Presents detailed, ready-to-apply "recipes for use in many specific situations. • Shows how to create new recipes from RDF, RDFS, and OWL constructs.
    Note: Includes bibliographical references (p. 317-320) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Amsterdam ; : Morgan Kaufmann | Boston, Mass. :Safari Books Online,
    ISBN: 9780123705228 , 0123705223
    Language: English
    Pages: xxix, 908 p , ill. , 25 cm
    Series Statement: The Morgan Kaufmann series in systems on silicon
    Parallel Title: Erscheint auch als
    DDC: 621.39/5
    Keywords: Adaptive computing systems ; Field programmable gate arrays ; Electronic books ; local ; Electronic books ; Aufsatzsammlung
    Abstract: Reconfigurable Computing marks a revolutionary and hot topic that bridges the gap between the separate worlds of hardware and software design- the key feature of reconfigurable computing is its groundbreaking ability to perform computations in hardware to increase performance while retaining the flexibility of a software solution. Reconfigurable computers serve as affordable, fast, and accurate tools for developing designs ranging from single chip architectures to multi-chip and embedded systems. Scott Hauck and Andre DeHon have assembled a group of the key experts in the fields of both hardware and software computing to provide an introduction to the entire range of issues relating to reconfigurable computing. FPGAs (field programmable gate arrays) act as the "computing vehicles to implement this powerful technology. Readers will be guided into adopting a completely new way of handling existing design concerns and be able to make use of the vast opportunities possible with reconfigurable logic in this rapidly evolving field. Designed for both hardware and software programmers Views of reconfigurable programming beyond standard programming languages Broad set of case studies demonstrating how to use FPGAs in novel and efficient ways
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier/Morgan Kaufmann | Boston, Mass. :Safari Books Online,
    ISBN: 9780123742490 , 0123742498
    Language: English
    Pages: x, 244 p , 24 cm
    Series Statement: The Morgan Kaufmann series in systems on silicon
    Parallel Title: Erscheint auch als
    DDC: 621.39/2
    RVK:
    Keywords: VHDL (Computer hardware description language) ; Electronic books ; local ; Electronic books ; Patentschrift ; Patentschrift
    Abstract: VHDL-2008: Just the New Stuff, as its title says, introduces the new features added to the latest revision of the IEEE standard for the VHDL hardware description language. Written by the Chair and Technical Editor of the IEEE working group, the book is an authoritative guide to how the new features work and how to use them to improve design productivity. It will be invaluable for early adopters of the new language version, for tool implementers, and for those just curious about where VHDL is headed. * First in the market describing the new features of VHDL 2008; * Just the new features, so existing users and implementers can focus on what's new; * Helps readers to learn the new features soon, rather than waiting for new editions of complete VHDL reference books. * Authoritative, written by experts in the area; * Tutorial style, making it more accessible than the VHDL Standard Language Reference Manual.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Oxford : Newnes | Boston, Mass. :Safari Books Online,
    ISBN: 9780750685979 , 0750685972
    Language: English
    Pages: xvi, 245 p , ill. , 24 cm
    Keywords: Wireless LANs ; Electronic books ; local ; Electronic books
    Abstract: ZigBee is a standard based on the IEEE 802.15.4 standard for wireless personal networks. This standard allows for the creation of very lost cost and low power networks - these applications run for years rather than months. These networks are created from sensors and actuators and can wireless control many electrical products such as remote controls, medical, industrial, and security sensors. Hundreds of companies are creating applications including Mitsubishi, Motorola, Freescale, and Siemens. This book is written for engineers who plan to develop ZigBee applications and networks, to understand how they work, and to evaluate this technology to see if it is appropriate to a particular project. This book does not simply state facts but explains what ZigBee can do through detailed code examples. *Details how to plan and develop applications and networks *Zigbee sensors have many applications including industrial automation, medical sensing, remote controls, and security *Hot topic for today's electrical engineer because it is low cost and low power
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress ; | Boston, Mass. :Safari Books Online,
    ISBN: 9781597490559 , 1597490555
    Language: English
    Pages: xvi, 257 p , ill. , 23 cm
    Keywords: Google Talk (Computer file) ; Instant messaging ; Internet telephony ; Electronic books ; local ; Electronic books
    Abstract: Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool. Google Talking takes communication to the next level, combining the awesome power of Text and Voice! This book teaches readers how to blow the lid off of Instant Messaging and Phone calls over the Internet. This book will cover the program "Google Talk in its entirety. From detailed information about each of its features, to a deep-down analysis of how it works. Also, we will cover real techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things. Google has 41% of the search engine market making it by far the most commonly used search engine The Instant Messaging market has 250 million users world wide Google Talking will be the first book to hit the streets about Google Talk
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress Pub. | Boston, Mass. :Safari Books Online,
    ISBN: 9781597492133 , 1597492132
    Language: English
    Pages: v. 〈2- 〉 , ill. , 24 cm. +
    Keywords: Computers ; Access control ; Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms. • Perform Network Reconnaissance Master the objectives, methodology, and tools of the least understood aspect of a penetration test. • Demystify Enumeration and Scanning Identify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services. • Hack Database Services Understand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system. • Test Web Servers and Applications Compromise the Web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications. • Test Wireless Networks and Devices Understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools. • Examine Vulnerabilities on Network Routers and Switches Use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices. • Customize BackTrack 2 Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations. • Perform Forensic Discovery and Analysis with BackTrack 2 Use BackTrack in the field for forensic analysis, image acquisition, and file carving. • Build Your Own PenTesting Lab Everything you need to build your own fully functional attack lab.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Burlington, Mass. : Morgan Kaufmann | Boston, Mass. :Safari Books Online,
    ISBN: 9780123742742 , 0123742749
    Language: English
    Pages: xi, 307 p , ill. , 24 cm
    Keywords: Systems engineering ; SysML (Computer science) ; UML (Computer science) ; Electronic books ; local ; Electronic books
    Abstract: UML, the Universal Modeling Language, was the first programming language designed to fulfill the requirement for "universality." However, it is a software-specific language, and does not support the needs of engineers designing from the broader systems-based perspective. Therefore, SysML was created. It has been steadily gaining popularity, and many companies, especially in the heavily-regulated Defense, Automotive, Aerospace, Medical Device and Telecomms industries, are already using SysML, or are plannning to switch over to it in the near future. However, little information is currently available on the market regarding SysML. Its use is just on the crest of becoming a widespread phenomenon, and so thousands of software engineers are now beginning to look for training and resources. This book will serve as the one-stop, definitive guide that provide an introduction to SysML, and instruction on how to implement it, for all these new users. *SysML is the latest emerging programming language--250,000 estimated software systems engineers are using it in the US alone! *The first available book on SysML in English *Insider information! The author is a member of the SysML working group and has written sections of the specification *Special focus comparing SysML and UML, and explaining how both can work together
    Note: Includes bibliographical references (p. 295-297) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier/Morgan Kaufmann | Boston, Mass. :Safari Books Online,
    ISBN: 9780080466514 , 0080466516
    Language: English
    Pages: xxi, 294 p , ill. , 24 cm
    Series Statement: Morgan Kaufmann OMG Press
    Keywords: Electronic data processing personnel ; Certification ; Computer software ; Development ; Examinations ; Study guides ; UML (Computer science) ; Examinations ; Study guides ; Electronic books ; local ; Electronic books
    Abstract: The popular Unified Modeling Language (UML) is both a language and notation developed by the Object Management Group (OMG) used to design and create specifications for software systems. With the recent release of version 2.0 UML, the OMG has started the OMG-Certified UML Professional Program to provide an objective measure of UML knowledge. As a certified UML professional a developer has an important credential to present to employers and clients. Certification also benefits companies looking for skilled UML practitioners by giving them a basis for making hiring and promotion decisions. UML 2 Certification Guide is the only official study guide to passing the new UML exams. This book systematically covers all of the topics covered in the exams, and has been carefully reviewed by the OMG. The book begins by assuming only a basic knowledge of UML and then progresses far enough to allow a reader to pass both the fundamental and the intermediate level exams. Along the way the book also covers topics that are not in introductory books on UML but that are necessary to pass the exams. Tim Weilkiens is considered one of the top ten experts on UML, and both authors have extensive experience training developers to successfully take the exams. The official certification resource Assumes a basic knowledge of UML so that you can focus immediately on the exams Written by two authors known for their skill as trainers, consultants, and developers Developed systematically to enable you to master all exam topics-without exception Covers the use of UML for applications, as required by the exams, both inside and outside of the realm of software development Includes a practice exam, glossary, list of books, and website information
    Note: Includes bibliographical references (p. 283) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597492096 , 1597492094
    Language: English
    Pages: xv, 460 p , ill. , 24 cm
    Keywords: Application software ; Security measures ; Computer security ; Electronic books ; local ; Electronic books
    Abstract: In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications. Learn to defend Web-based applications developed with AJAX, SOAP, XMLPRC, and more. See why Cross Site Scripting attacks can be so devastating.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress Pub. | Boston, Mass. :Safari Books Online,
    ISBN: 9781597491945 , 1597491942
    Language: English
    Pages: xvii, 372 p , ill. , 24 cm
    Keywords: VMware ; Operating systems (Computers) ; Virtual computer systems ; Electronic books ; local ; Electronic books
    Abstract: This book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine templates. Best practices for securing and backing up your virtual environment are also provided. The book concludes with a series of handy, time-saving command and configuration for: bash shell keystrokes, Linux commands, configuration files, common/proc files, VMware ESX commands, and troubleshooting. *Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't *Gartner has stated that if companies have not begun or have planned to begin a virtualization effort; they are quickly falling behind the mainstream for IT organizations *Currently, VMware has 2.5 million users and more than 5,500 enterprise server customers for their products.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress ; | Boston, Mass. :Safari Books Online,
    ISBN: 9781597490733 , 1597490733
    Language: English
    Pages: xxi, 540 p , ill. , 24 cm. +
    Series Statement: Jay Beale's open source security series
    Keywords: Computer networks ; Maintenance and repair ; Computer networks ; Management ; Electronic books ; local ; Electronic books
    Abstract: Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress' best-selling book Ethereal Packet Sniffing. Wireshark & Ethereal Network Protocol Analyzer Toolkit provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available today and see the benefits of using Ethereal. Readers will then learn to install Ethereal in multiple environments including Windows, Unix and Mac OS X as well as building Ethereal from source and will also be guided through Ethereal's graphical user interface. The following sections will teach readers to use command-line options of Ethereal as well as using Tethereal to capture live packets from the wire or to read saved capture files. This section also details how to import and export files between Ethereal and WinDump, Snort, Snoop, Microsoft Network Monitor, and EtherPeek. The book then teaches the reader to master advanced tasks such as creating sub-trees, displaying bitfields in a graphical view, tracking requests and reply packet pairs as well as exclusive coverage of MATE, Ethereal's brand new configurable upper level analysis engine. The final section to the book teaches readers to enable Ethereal to read new Data sources, program their own protocol dissectors, and to create and customize Ethereal reports. Ethereal is the #2 most popular open source security tool, according to a recent study conducted by insecure.org Syngress' first Ethereal book has consistently been one of the best selling security books for the past 2 years
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597492270 , 1597492272
    Language: English
    Pages: xliii, 914 p , ill. , 24 cm
    Keywords: Computer security ; Electronic books ; local ; Electronic books
    Abstract: The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and security professionals and is an ideal resource for those dealing with a changing daily workload. Coverage includes Business Continuity, Disaster Recovery, Risk Assessment, Protection Assets, Project Management, Security Operations, and Security Management, and Security Design & Integration. Compiled from the best of the Syngress and Butterworth Heinemann libraries and authored by business continuity expert Susan Snedaker, this volume is an indispensable addition to a serious security professional's toolkit. * An all encompassing book, covering general security management issues and providing specific guidelines and checklists * Anyone studying for a security specific certification or ASIS certification will find this a valuable resource * The only book to cover all major IT and security management issues in one place: disaster recovery, project management, operations management, and risk assessment
    Note: Title from resource description page (viewed June 8, 2009). - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress Publishing | Boston, Mass. :Safari Books Online,
    ISBN: 9781597491990 , 1597491993
    Language: English
    Pages: xxxiii, 637 p , ill. , 24 cm
    Keywords: Microsoft ISA server ; Firewalls (Computer security) ; Internet ; Security measures ; Systems migration ; Electronic books ; local ; Electronic books
    Abstract: Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ. * Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006. * Learn to Publish Exchange Server 2007 Using ISA Server 2006. * Create a DMZ using ISA Server 2006. Dr. Tom Shinder's previous two books on configuring ISA Server have sold more than 50,000 units worldwide. Dr. Tom Shinder is a Microsoft Most Valuable Professional (MVP) for ISA Server and a member of the ISA Server beta testing team.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597491730 , 159749173X
    Language: English
    Pages: xxiii, 197 p , ill. , 24 cm
    Keywords: Microsoft Windows (Computer file) ; Perl (Computer program language) ; Object-oriented programming (Computer science) ; Computer security ; Electronic books ; local ; Electronic books
    Abstract: I decided to write this book for a couple of reasons. One was that I've now written a couple of books that have to do with incident response and forensic analysis on Windows systems, and I used a lot of Perl in both books. Okay...I'll come clean...I used nothing but Perl in both books! What I've seen as a result of this is that many readers want to use the tools, but don't know how...they simply aren't familiar with Perl, with interpreted (or scripting) languages in general, and may not be entirely comfortable with running tools at the command line. This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). My hope is that not only will consultants (such as myself) find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics. *Perl Scripting for Live Response Using Perl, there's a great deal of information you can retrieve from systems, locally or remotely, as part of troubleshooting or investigating an issue. Perl scripts can be run from a central management point, reaching out to remote systems in order to collect information, or they can be "compiled" into standalone executables using PAR, PerlApp, or Perl2Exe so that they can be run on systems that do not have ActiveState's Perl distribution (or any other Perl distribution) installed. *Perl Scripting for Computer Forensic Analysis Perl is an extremely useful and powerful tool for performing computer forensic analysis. While there are applications available that let an examiner access acquired images and perform some modicum of visualization, there are relatively few tools that meet the specific needs of a specific examiner working on a specific case. This is where the use of Perl really shines through and becomes apparent. *Perl Scripting for Application Monitoring Working with enterprise-level Windows applications requires a great d...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597491723 , 1597491721
    Language: English
    Pages: xxiv, 456 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Business ; Data processing ; Security measures ; Electronic data processing departments ; Security measures ; Crisis management ; Computer networks ; Security measures ; Management information systems ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, it's difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially. That is what Business Continuity Planning (BCP) is: a methodology used to create a plan for how an organization will recover after a disaster of various types. It takes into account both security and corporate risk management tatics. There is a lot of movement around this initiative in the industry: the British Standards Institute is releasing a new standard for BCP this year. Trade shows are popping up covering the topic. * Complete coverage of the 3 categories of disaster: natural hazards, human-caused hazards, and accidental and technical hazards. * Only published source of information on the new BCI standards and government requirements. * Up dated information on recovery from cyber attacks, rioting, protests, product tampering, bombs, explosions, and terrorism.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597491655 , 1597491659
    Language: English
    Pages: xxii, 329 p , ill. , 24 cm
    Keywords: Information technology ; Computer security ; Computer networks ; Data protection ; Data protection ; Standards ; Credit cards ; Liability for credit information ; Computer networks ; Security measures ; Computer security ; Management ; Information technology ; Security measures ; Data protection ; Electronic books ; local ; Electronic books
    Abstract: Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. PCI Data Security standards apply to every company globally that processes or transmits credit card transaction data Information to develop and implement an effective security strategy to keep infrastructures compliant Well known authors have extensive information security backgrounds
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    New York : Alpha Books | Boston, Mass. :Safari Books Online,
    ISBN: 9781592575947 , 1592575943
    Language: English
    Pages: xxii, 362 p , ill.
    Series Statement: Complete idiot's guide
    Keywords: Six sigma (Quality control standard) ; Quality control ; Total quality management ; Organizational effectiveness ; Electronic books ; local ; Electronic books
    Abstract: The perfect prescription for any organization Increasingly popular with large and mid-sized companies around the world, Lean Six Sigma is the new hybridization of Six Sigma and Lean methodologies, and there is no better approach for achieving operational excellence in an organization. But how do you implement Lean Six Sigma, and what does it entaill? The Complete Idiot's Guide to Lean Six Sigma answers this question with unprecedented clarity and turnkey elegance. Part one gives you all the background you need to understand Lean Six Sigma - what it is, where it came from, what it has done for so many organizations and what it can do for you and your company. Parts two and three of the book give you a prescribed yet flexible roadmap to follow in selecting, enacting and realizing improvements from Lean Six Sigma projects. Within this step-by-step structure, the authors demonstrate when and how to use the many Lean Six Sigma statistics and 'tools', packing the pages with diagrams, real-life examples, templates, tips and advice. If you are a Green Belt or a Black Belt, or trainee, these two parts will be invaluable to you. The Complete Idiot's Guide to Lean Six Sigma is the first book of its kind to integrate the Lean Six Sigma tools within a clear stepwise progression, so readers know when and how to actually apply them in their jobs. As such, this book is superior as a companion to any corporate or organizational Lean Six Sigma 'deployment'. No more complex hodgepodge. Other books about Lean and/or Six Sigma tend to provide a lot of good information, tools and statistics, but mostly in a disconnected way, not in a way that is straightforward and user friendly. This makes an already complex subject seem still complex to the neophyte reader. On the other hand, the structure and progression of this book unfolds Lean Six Sigma in a way that a reader can easily become a user, and move more quickly from knowledge to application.Therefore, using Th e Complete Idiot's Guide to Lean Six Sigma , you know why the statistics are important and where to use them, because this is made clear. You know how and when to use a Pareto Chart, or do a Stakeholder Analysis, or conduct a Failure Mode and Effects Analysis (FMEA). You not only get fully primed on all the parts and parcels of Lean Six Sigma, but you truly learn enough to become dangerous - in a good way! In a way that makes you more valuable to your organization. Also for Lean Six Sigma leaders, not just ...
    Note: Includes bibliographical references (p. 359-361) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597492164 , 1597492167
    Language: English
    Pages: xx, 445 p , ill. , 24 cm. +
    Edition: 2nd ed.
    Keywords: United States ; Sarbanes-Oxley Act of 2002 ; Auditing, Internal ; Data processing ; Information technology ; Management ; Open source software ; Electronic books ; local ; Electronic books
    Abstract: The Sarbanes-Oxley Act (officially titled the Public Company Accounting Reform and Investor Protection Act of 2002), signed into law on 30 July 2002 by President Bush, is considered the most significant change to federal securities laws in the United States since the New Deal. It came in the wake of a series of corporate financial scandals, including those affecting Enron, Arthur Andersen, and WorldCom. The law is named after Senator Paul Sarbanes and Representative Michael G. Oxley. It was approved by the House by a vote of 423-3 and by the Senate 99-0. This book illustrates the many Open Source cost-saving opportunities that public companies can explore in their IT enterprise to meet mandatory compliance requirements of the Sarbanes-Oxley act. This book will also demonstrate by example and technical reference both the infrastructure components for Open Source that can be made compliant, and the Open Source tools that can aid in the journey of compliance. Although many books and reference material have been authored on the financial and business side of Sox compliance, very little material is available that directly address the information technology considerations, even less so on how Open Source fits into that discussion. The format of the book will begin each chapter with the IT business and executive considerations of Open Source and SOX compliance. The remaining chapter verbiage will include specific examinations of Open Source applications and tools which relate to the given subject matter. * Only book that shows companies how to use Open Source tools to achieve SOX compliance, which dramatically lowers the cost of using proprietary, commercial applications. * Only SOX compliance book specifically detailing steps to achieve SOX compliance for IT Professionals.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597492003 , 1597492000
    Language: English
    Pages: xxvi, 577 p , ill. , 24 cm
    Keywords: Juniper Networks, Inc ; Extranets (Computer networks) ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform. Complete coverage of the Juniper Networks Secure Access SSL VPN line including the 700, 2000, 4000, 6000, and 6000 SP. Learn to scale your appliances to meet the demands of remote workers and offices. Use the NEW coordinated threat control with Juniper Networks IDP to manage the security of your entire enterprise.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597492300 , 1597492302
    Language: English
    Pages: xviii, 343 p , ill. , 24 cm
    Keywords: Radio frequency identification systems ; Business logistics ; Electronic books ; local ; Electronic books
    Abstract: RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books. Major companies and countries around the world are adopting or considering whether to adopt RFID technologies. Visa and Wells Fargo are currently running tests with RFID, airports around the world are using RFID to track cargo and run customs departments, universities such as Slippery Rock are providing RFID-enabled cell phones for students to use for campus charges. According to the July 9 CNET article, RFID Tags: Big Brother in Small Packages?, "You should become familiar with RFID technology because you'll be hearing much more about it soon. Retailers adore the concept, and CNET News.com's own Alorie Gilbert wrote last week about how Wal-Mart and the U.K.-based grocery chain Tesco are starting to install "smart shelves" with networked RFID readers. In what will become the largest test of the technology, consumer goods giant Gillette recently said it would purchase 500 million RFID tags from Alien Technology of Morgan Hill, CA." For security professionals needing to get up and running fast with the topic of RFID, this How to Cheat approach to the topic is the perfect "just what you need to know" book! * For most business organizations, adopting RFID is a matter of when * The RFID services market is expected to reach $4 billion by 2008 * Covers vulnerabilities and personal privacy--topics identified by major companies as key RFID issues
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier/Morgan Kaufmann | Boston, Mass. :Safari Books Online,
    ISBN: 9780123742100 , 0123742102
    Language: English
    Pages: xvii, 244 p , ill. , 24 cm
    Series Statement: Systems on silicon
    Parallel Title: Erscheint auch als
    DDC: 005.1/17
    Keywords: Aspect-oriented programming ; Electronic books ; local ; Electronic books
    Abstract: What's this AOP thing anyway, really-when you get right down to it-and can someone please explain what an aspect actually is? Aspect-Oriented Programming with the e Verification Language takes a pragmatic, example based, and fun approach to unraveling the mysteries of AOP. In this book, you'll learn how to: • Use AOP to organize your code in a way that makes it easy to deal with the things you really care about in your verification environments. Forget about organizing by classes, and start organizing by functionality, layers, components, protocols, functional coverage, checking, or anything that you decide is important to you • Easily create flexible code that eases your development burden, and gives your users the power to quickly do what they need to do with your code • Truly create a plug-and-play environment that allows you to add and remove functionality without modifying your code. Examples include how to use AOP to create pluggable debug modules, and a pluggable module that lets you check that your testbench is still working before you begin a regression • Utilize AOP to sidestep those productivity roadblocks that seem to plague all projects at the most inconvenient of times • Discover why "return is evil, and some other "gotchas with the AOP features of e All of the methodologies, tips, and techniques described in this book have been developed and tested on real projects, with real people, real schedules and all of the associated problems that come with these. Only the ones that worked, and worked well, have made it in, so by following the advice given in this book, you'll gain access to the true power of AOP while neatly avoiding the effort of working it all out yourself. • Use AOP to organize your code in a way that makes it easy to deal with the things you really care about in your verification environments. Forget about organizing by classes, and start organizing by functionality, layers, components, protocols, functional coverage, checking, or anything that you decide is important to you • Easily create flexible code that eases your development burden, and gives your users the power to quickly do what they need to do with your code • Truly create a plug-and-play environment that allows you to add and remove functionality without modifying your code. Examples include how to use AOP to create pluggable debug modules, and a pluggable module that lets you check that your testbench is still working before you begin a regression • ...
    Note: Includes bibliographical references (p. 239-240) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597492195 , 1597492191
    Language: English
    Pages: xxxiii, 1189 p , ill. , 24 cm
    DDC: 005.71376
    Keywords: Microsoft Internet information server ; SQL server ; Microsoft Exchange server ; Client/server computing ; Electronic books ; local ; Electronic books
    Abstract: Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support "anywhere access" present IT professionals with a steep learning curve. Making certain that these products are configured to meet regulatory compliance requirements adds addtionaly complexity to day-to-day management network management. The Best Damn Exchange, SQL and IIS Book Period delivers an all-in-one reference for Windows System Administrators deploying the 2007 releases of these core Microsoft servers. The coverage is comprehensive, and provides users with just about everything they need to manage a Windows enterprise server. Special Bonus coverage includes how to gather and analyze the many log files generated by these servers. All-in-one coverage includes Exchange, SQL, and IIS Servers Integrated coverage on all key security features Bonus coverage includes analyzing server logs and integrating Communicator 2007
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress ; | Boston, Mass. :Safari Books Online,
    ISBN: 9781597491280 , 1597491284
    Language: English
    Pages: xxii, 292 p , ill. , 23 cm
    DDC: 363.25/968
    Keywords: Computer crimes ; Investigation ; Handbooks, manuals, etc ; Electronic books ; local ; Electronic books
    Abstract: CD and DVD Forensics will take the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corporate and system security in the private sector, the interest in this subject has just begun to blossom. CD and DVD Forensics is a how to book that will give the reader tools to be able to open CDs and DVDs in an effort to identify evidence of a crime. These tools can be applied in both the public and private sectors. Armed with this information, law enforcement, corporate security, and private investigators will be able to be more effective in their evidence related tasks. To accomplish this the book is divided into four basic parts: (a) CD and DVD physics dealing with the history, construction and technology of CD and DVD media, (b) file systems present on CDs and DVDs and how these are different from that which is found on hard disks, floppy disks and other media, (c) considerations for handling CD and DVD evidence to both recover the maximum amount of information present on a disc and to do so without destroying or altering the disc in any way, and (d) using the InfinaDyne product CD/DVD Inspector to examine discs in detail and collect evidence. This is the first book addressing using the CD/DVD Inspector product in a hands-on manner with a complete step-by-step guide for examining evidence discs See how to open CD's and DVD'd and extract all the crucial evidence they may contain
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier/Morgan Kaufmann | Boston, Mass. :Safari Books Online,
    ISBN: 9780123740373 , 0123740371
    Language: English
    Pages: 443 p , ill. (chiefly col.) , 24 cm
    DDC: 658.5/752
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Industrial design ; Electronic books ; local ; Electronic books
    Abstract: Sketching User Experiences approaches design and design thinking as something distinct that needs to be better understood-by both designers and the people with whom they need to work- in order to achieve success with new products and systems. So while the focus is on design, the approach is holistic. Hence, the book speaks to designers, usability specialists, the HCI community, product managers, and business executives. There is an emphasis on balancing the back-end concern with usability and engineering excellence (getting the design right) with an up-front investment in sketching and ideation (getting the right design). Overall, the objective is to build the notion of informed design: molding emerging technology into a form that serves our society and reflects its values. Grounded in both practice and scientific research, Bill Buxton's engaging work aims to spark the imagination while encouraging the use of new techniques, breathing new life into user experience design. Covers sketching and early prototyping design methods suitable for dynamic product capabilities: cell phones that communicate with each other and other embedded systems, "smart" appliances, and things you only imagine in your dreams Thorough coverage of the design sketching method which helps easily build experience prototypes-without the effort of engineering prototypes which are difficult to abandon Reaches out to a range of designers, including user interface designers, industrial designers, software engineers, usability engineers, product managers, and others Full of case studies, examples, exercises, and projects, and access to video clips that demonstrate the principles and methods
    Note: Includes bibliographical references (p. 422-435) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Amsterdam ; : Morgan Kaufmann | Boston, Mass. :Safari Books Online,
    ISBN: 9780123740342 , 0123740347
    Language: English
    Pages: xiv, 353 p , ill., maps , 24 cm
    Parallel Title: Erscheint auch als
    DDC: 004.67/8
    RVK:
    Keywords: Web 2.0 ; Internet ; History ; Interactive computer systems ; Internet ; Social aspects ; Web services ; Electronic books ; local ; Electronic books
    Abstract: The emergence of Web 2.0 is provoking challenging questions for developers: What products and services can our company provide to customers and employees using Rich Internet Applications, mash-ups, Web feeds or Ajax? Which business models are appropriate and how do we implement them? What are best practices and how do we apply them? If you need answers to these and related questions, you need Unleashing Web 2.0 -a comprehensive and reliable resource that guides you into the emerging and unstructured landscape that is Web 2.0. Gottfried Vossen is a professor of Information Systems and Computer Science at the University of Muenster in Germany. He is the European Editor-in-Chief of Elsevier's Information Systems-An International Journal. Stephan Hagemann is a PhD. Student in Gottfried's research group focused on Web technologies. Presents a complete view of Web 2.0 including services and technologies Discusses potential new products and services and the technology and programming ability needed to realize them Offers 'how to' basics presenting development frameworks and best practices Compares and contrasts Web 2.0 with the Semantic Web
    Note: Includes bibliographical references (p. 337-344) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597492287 , 1597492280
    Language: English
    Pages: xxxv, 699 p , ill. , 24 cm
    DDC: 363.25968
    Keywords: Computer crimes ; Investigation ; Electronic discovery (Law) ; Electronic books ; local ; Electronic books
    Abstract: Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market. This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab. * Digital investigation and forensics is a growing industry * Corporate I.T. departments investigating corporate espionage and criminal activities are learning as they go and need a comprehensive guide to e-discovery * Appeals to law enforcement agencies with limited budgets
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Burlington, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597491952 , 1597491950
    Language: English
    Pages: ix, 199 p , ill. , 24 cm
    DDC: 005.8
    Keywords: Computer software ; Testing ; Open source software ; Debugging in computer science ; Electronic books ; local ; Electronic books
    Abstract: Fuzzing is often described as a "black box software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. Such program errors and crashes are indicative of the existence of a security vulnerability, which can later be researched and fixed. Fuzz testing is now making a transition from a hacker-grown tool to a commercial-grade product. There are many different types of applications that can be fuzzed, many different ways they can be fuzzed, and a variety of different problems that can be uncovered. There are also problems that arise during fuzzing; when is enough enough? These issues and many others are fully explored. Fuzzing is a fast-growing field with increasing commercial interest (7 vendors unveiled fuzzing products last year). Vendors today are looking for solutions to the ever increasing threat of vulnerabilities. Fuzzing looks for these vulnerabilities automatically, before they are known, and eliminates them before release. Software developers face an increasing demand to produce secure applications---and they are looking for any information to help them do that.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    San Francisco, Calif. : Morgan Kaufmann | Boston, Mass. :Safari Books Online,
    ISBN: 9780123705938 , 0123705932
    Language: English
    Pages: xxix, 416 p
    Keywords: Information technology ; Information technology ; Management ; Computer network architectures ; Electronic books ; local ; Electronic books
    Abstract: Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children provides an independent examination of developments in Enterprise Resource Planning for Information. Major companies, research firms, and vendors are offering Enterprise Resource Planning for Information Technology, which they label as ERP for IT, IT Resource Planning and related terms. This book presents on-the-ground coverage of enabling IT governance in architectural detail, which can be used to define a strategy for immediate execution. It fills the gap between high-level guidance on IT governance and detailed discussions about specific vendor technologies. It provides a unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole. It presents a field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both process and system architectures. This book is recommended for practitioners and managers engaged in IT support in large companies, particularly those who are information architects, enterprise architects, senior software engineers, program/project managers, and IT managers/directors.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress Pub. | Boston, Mass. :Safari Books Online,
    ISBN: 9781597491013 , 1597491012
    Language: English
    Pages: xxii, 372 p , ill. , 23 cm
    Keywords: Computer security ; Evaluation ; Methodology ; Computer networks ; Security measures ; Electronic books ; local ; Electronic books
    Abstract: This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines of exploit development, vendors' time to patch, and corporate path installations. Next, the differences between security assessment s and penetration tests will be clearly explained along with best practices for conducting both. Next, several case studies from different industries will illustrate the effectiveness of varying vulnerability assessment methodologies. The next several chapters will define the steps of a vulnerability assessment including: defining objectives, identifying and classifying assets, defining rules of engagement, scanning hosts, and identifying operating systems and applications. The next several chapters provide detailed instructions and examples for differentiating vulnerabilities from configuration problems, validating vulnerabilities through penetration testing. The last section of the book provides best practices for vulnerability management and remediation. * Unique coverage detailing both the management and technical skill and tools required to develop an effective vulnerability management system * Vulnerability management is rated the #2 most pressing concern for security professionals in a poll conducted by Information Security Magazine * Covers in the detail the vulnerability management lifecycle from discovery through patch.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597491181 , 1597491187
    Language: English
    Pages: xiii, 743 p , ill. , 24 cm
    Keywords: Computer networks ; Security measures ; Firewalls (Computer security) ; Electronic books ; local ; Electronic books
    Abstract: Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. Configure Juniper's Instant Virtual Extranet (IVE) Install and set up IVE through either the command line interface (CLI) or Web-based console Master the "3 Rs": Realms, Roles, and Resources Realize the potential of the "3Rs" for endpoint security, sign-in policies, and authorization of servers Get Inside both the Windows and Java Versions of Secure Application Manager (SAM) Learn to implement SAM, manage the end-user experience, and troubleshoot SAM in the field Integrate IVE with Terminal Services and Citrix Enable terminal services proxy and configure role options, configure Citrix using a custom ICA, configure terminal services resource policies and profiles, and configure terminal services and Citrix using a hosted Java applet Ensure Endpoint Security Use Host Checker, Cache Cleaner, Secure Virtual Workspace, and IVE/IDP integration to secure your network Manage the Remote Access Needs of Your Organization Configure Web access, file access and telnet/SSH access for remote users and offices Configure Core Networking Components through the System Menu Create clusters, manage virtual systems, and monitor logs, reports, and alerts Create Bullet-Proof Sign-in Policies Create standard and custom sign-in pages for both user and administrator access and Secure Meeting pages Use the IVE for Log-Related Tasks Perform log filtering, log management, syslog exporting, SNMP management, and system resource monitoring and reporting.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Indianapolis, Ind. : Alpha Books | Boston, Mass. :Safari Books Online,
    ISBN: 9781592574605 , 1592574602
    Language: English
    Pages: x, 182 p , 19 cm
    Keywords: Employees ; Rating of ; Performance standards ; Electronic books ; local ; Electronic books
    Abstract: Performance reviews, minus the dread. Nobody likes performance appraisals. To make the most of them, though, managers and supervisors can take advantage of this guide, complete with the phrases and words they need to confidently conduct clear, objective performance reviews. Phrases are given for common behavior and skill categories as well as for common functional areas-and they work, regardless of appraisal type.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597491297 , 1597491292
    Language: English
    Pages: xxii, 262 p , ill. , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computer hackers ; Electronic books ; local ; Electronic books
    Abstract: The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level. Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16-year-old hacker. We are talking about insiders like you and me, trusted employees with access to information - consultants, contractors, partners, visitors, vendors, and cleaning crews. Anyone in an organization's building or networks that possesses some level of trust. * Full coverage of this hot topic for virtually every global 5000 organization, government agency, and individual interested in security. * Brian Contos is the Chief Security Officer for one of the most well known, profitable and respected security software companies in the U.S.-ArcSight.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Amsterdam : Elsevier ; | Boston, Mass. :Safari Books Online,
    ISBN: 9780080470771 , 0080470777
    Language: English
    Pages: xviii, 275 p , ill. , 23 cm
    Edition: 4th ed.
    Keywords: Relational databases ; Database design ; Electronic books ; local ; Electronic books
    Abstract: Database Modeling and Design, Fourth Edition, the extensively revised edition of the classic logical database design reference, explains how you can model and design your database application in consideration of new technology or new business needs. It is an ideal text for a stand-alone data management course focused on logical database design, or a supplement to an introductory text for introductory database management. This book features clear explanations, lots of terrific examples and an illustrative case, and practical advice, with design rules that are applicable to any SQL-based system. The common examples are based on real-life experiences and have been thoroughly class-tested. The text takes a detailed look at the Unified Modeling Language (UML-2) as well as the entity-relationship (ER) approach for data requirements specification and conceptual modeling - complemented with examples for both approaches. It also discusses the use of data modeling concepts in logical database design; the transformation of the conceptual model to the relational model and to SQL syntax; the fundamentals of database normalization through the fifth normal form; and the major issues in business intelligence such as data warehousing, OLAP for decision support systems, and data mining. There are examples for how to use the most popular CASE tools to handle complex data modeling problems, along with exercises that test understanding of all material, plus solutions for many exercises. Lecture notes and a solutions manual are also available. This edition will appeal to professional data modelers and database design professionals, including database application designers, and database administrators (DBAs); new/novice data management professionals, such as those working on object oriented database design; and students in second courses in database focusing on design. + a detailed look at the Unified Modeling Language (UML-2) as well as the entity-relationship (ER) approach for data requirements specification and conceptual modeling--with examples throughout the book in both approaches! + the details and examples of how to use data modeling concepts in logical database design, and the transformation of the conceptual model to the relational model and to SQL syntax; + the fundamentals of database normalization through the fifth normal form; + practical coverage of the major issues in business intelligence--data warehousing, OLAP for decision support systems, and dat...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    San Francisco, Calif. : Morgan Kaufmann | Boston, Mass. :Safari Books Online,
    ISBN: 9780123693792 , 0123693799
    Language: English
    Pages: xxviii, 808 p , ill. , 24 cm
    Edition: 3rd ed.
    Series Statement: Morgan Kaufmann series in data management systems
    Keywords: SQL (Computer program language) ; Electronic books ; local ; Electronic books
    Abstract: SQL for Smarties was hailed as the first book devoted explicitly to the advanced techniques needed to transform an experienced SQL programmer into an expert. Now, 10 years later and in the third edition, this classic still reigns supreme as the book written by an SQL master that teaches future SQL masters. These are not just tips and techniques; Joe also offers the best solutions to old and new challenges and conveys the way you need to think in order to get the most out of SQL programming efforts for both correctness and performance. In the third edition, Joe features new examples and updates to SQL-99, expanded sections of Query techniques, and a new section on schema design, with the same war-story teaching style that made the first and second editions of this book classics. Expert advice from a noted SQL authority and award-winning columnist, who has given ten years of service to the ANSI SQL standards committee and many more years of dependable help to readers of online forums. Teaches scores of advanced techniques that can be used with any product, in any SQL environment, whether it is an SQL-92 or SQL-99 environment. Offers tips for working around system deficiencies. Continues to use war stories--updated!--that give insights into real-world SQL programming challenges.
    Note: Includes bibliographical references (p. 761-771) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Rockland, Mass. : Syngress | Boston, Mass. :Safari Books Online,
    ISBN: 9781597490313 , 1597490318
    Language: English
    Pages: xxx, 625 p , ill.
    DDC: 005.8
    Keywords: FireWall-1 ; Firewalls (Computer security) ; Computer networks ; Security measures ; Computer programs ; Computer security ; Computer programs ; Extranets (Computer networks) ; Electronic books ; local ; Electronic books
    Abstract: Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection & Tunnel Management, Multiple Entry Points, Route Injection Mechanism, Wire Mode, and SecurePlatform Pro. Many of the new features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available *and* secure. Demand for this book will be strong because Check Point is requiring all of its 3rd party developers to certify their products for this release. * Packed full with extensive coverage of features new to the product, allowing 3rd party partners to certify NGX add-on products quickly * Protect your network from both internal and external threats and learn to recognize future threats * All yuou need to securly and efficiently deploy, troubleshoot, and maintain Check Point NXG
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...