Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (31)
  • Hungarian
  • 2005-2009  (31)
  • 1955-1959
  • 2006  (31)
  • Boston, MA : Safari  (31)
  • Electronic books  (30)
  • Commerce  (1)
Datasource
Material
Language
  • English  (31)
  • Hungarian
Years
  • 2005-2009  (31)
  • 1955-1959
Year
  • 1
    ISBN: 9781597490580
    Language: English
    Pages: 1 online resource (500 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority. The book will start off by teaching readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements. Next, readers will create the logical design for an Active Directory infrastructure. Here the book starts to drill deeper and focus on aspects such as group policy design. Finally, readers will learn to create the physical design for an active directory and network Infrastructure including DNS server placement; DC and GC placements and Flexible Single Master Operations (FSMO) role placement. The next book in our best selling and critically acclaimed How to Cheat series. This is the perfect book for users who have already purchased How to Cheat at Managing Windows 2003 Small Business Server. * Active Directory is the market leader in the directory services space, and 57% of all Microsoft corporate customers have deployed AD * Follows Syngress's proven "How To Cheat" methodology * Companion Web site offers dozens of templates, "Cheat Sheets", and checklists for readers
    Note: Online resource; Title from title page (viewed February 8, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597490641
    Language: English
    Pages: 1 online resource (448 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware. * A recent survey published by Information Security Magazine stated that "combating spyare" was the #2 priority for security professionals in 2005 * Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market * Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors
    Note: Online resource; Title from title page (viewed August 4, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597491150
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful. IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification candidates for security specializations like CISSP and Security+ will also find this a valuable resource. * Your one stop shop coverage of malware, wireless technologies, and phishing *An easy to use tol featuring the ability to cross references makeing navigation easy * Includes special coverage of military and government terms for the latest hot topics
    Note: Online resource; Title from title page (viewed August 18, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    ISBN: 9780750679701
    Language: English
    Pages: 1 online resource (528 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The design of Switching Power Supplies has become one of the most crucial aspects of power electronics, particularly in the explosive market for portable devices. Unfortunately, this seemingly simple mechanism is actually one of the most complex and under-estimated processes in Power Electronics. Switching power conversion involves several engineering disciplines: Semiconductor Physics, Thermal Management, Control Loop theory, Magnetics etc, and all these come into play eventually, in ways hard for non-experts to grasp. This book grows out of decades of the author's experience designing commercial power supplies. Although his formal education was in physics, he learned the hard way what it took to succeed in designing power supplies for companies like Siemens and National Semiconductor. His passion for power supplies and his empathy for the practicing or aspiring power conversion engineer is evident on every page. * The most comprehensive study available of the theoretical and practical aspects of controlling and measuring Electromagnetic Interference in switching power supplies, including input filter instability considerations. * Step-by-step and iterative approach for calculating high-frequency losses in forward converter transformers, including Proximity losses based on Dowell's equations. * Thorough, yet uniquely simple design flow-chart for building DC-DC converters and their magnetic components under typical wide-input supply conditions * Step-by-step, solved examples for stabilizing control loops of all three major topologies, using either transconductance or conventional operational amplifiers, and either current-mode or voltage-mode control.
    Note: Online resource; Title from title page (viewed June 22, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    ISBN: 9780750678933
    Language: English
    Pages: 1 online resource (344 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Ultra wideband technology turns the radio spectrum available to wireless applications from a country road into a high-speed ten lane super freeway, and the destination is the future of wireless technology. UWB is a huge leap forward because it offers wide bandwidth with little interference, allowing multiple UWB signals to share a single channel. This multi-author volume, compiled under the guidance of Dr. Roberto Aiello, introduces the theory and concepts behind ultra wideband (UWB) systems as well as their applications. Authors include those involved in creating the UWB standards, researchers, and applications specialists. This book has been broken down into three parts: introduction to UWB, different techniques available, and applications. Within these sections topics covered are UWB spectrum and regulations, UWB channels, modulation techniques, antennas, signal propagation, and UWB transceiver architectures. This book has all the information RF/wireless engineers will need to understand this burgeoning technology. *An all-star list of contributors covers the subject more authoritatively than any single author could *Discusses U.S. and international ultra wideband regulations *Includes material on antenna systems and signal propagation at ultra wideband frequencies
    Note: Online resource; Title from title page (viewed June 12, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123735966
    Language: English
    Pages: 1 online resource (352 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Joe Celko's SQL Puzzles and Answers, Second Edition , challenges you with his trickiest puzzles and then helps solve them with a variety of solutions and explanations. Author Joe Celko demonstrates the thought processes that are involved in attacking a problem from an SQL perspective to help advanced database programmers solve the puzzles you frequently face. These techniques not only help with the puzzle at hand, but also help develop the mindset needed to solve the many difficult SQL puzzles you face every day. This updated edition features many new puzzles; dozens of new solutions to puzzles; and new chapters on temporal query puzzles and common misconceptions about SQL and RDBMS that leads to problems. This book is recommended for database programmers with a good knowledge of SQL. A great collection of tricky SQL puzzles with a variety of solutions and explanations Uses the proven format of puzzles and solutions to provide a user-friendly, practical look into SQL programming problems - many of which will help users solve their own problems New edition features: Many new puzzles added!, Dozens of new solutions to puzzles, and using features in SQL-99, Code is edited to conform to SQL STYLE rules, New chapter on temporal query puzzles, New chapter on common misconceptions about SQL and RDBMS that leads to problems
    Note: Online resource; Title from title page (viewed October 9, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Routledge | Boston, MA : Safari
    ISBN: 9780415341035
    Language: English
    Pages: 1 online resource (400 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Collected for the first time in a single volume, these essays and articles by Naoki Fukui form an outline of some of the most significant and formative contributions to syntactic theory. Focusing particularly on the typological differences between English/type language and Japanese/type languages, Fukui examines the abstract parameters that both link and divide them. Linguistic universals are considered in the light of cross-linguistic variation and typological (parametric) differences are investigated from the viewpoint of universal principles. The book's main focus is the nature and structure of invariant principles and parameters (variables) and how they interact to give principled accounts to a variety of seemingly unrelated differences between English and Japanese. The contrasts between these two types of language is an ideal testing ground, since the languages are superficially different in virtually every aspect of their linguistic structures from word order and wh-movement, to grammatical agreement and case-marking systems, among many others. These articles constitute a considerable contribution to the development of the principles-and-parameters model in its exploration and refinement of theoretical concepts and fundamental principles of linguistic theory, leading to some of the basic insights that lie behind the minimalist program.
    Note: Online resource; Title from title page (viewed April 18, 2006)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media | Boston, MA : Safari
    ISBN: 0596100639
    Language: English
    Pages: 1 online resource (1184 pages)
    Edition: 2nd edition
    Keywords: Electronic books
    Abstract: With C# Cookbook, 2nd Edition , you'll be able to learn and improve your mastery of both the C# language and the .NET platform. This updated bestseller has been completely revised to account for C# 2.0, the latest version of this popular object-oriented programming language. It also includes more than 100 new code solutions (over 300 overall) to common problems and tasks that you're sure to face as a C# programmer. Nearly every solution, or "recipe," contains a complete, documented code sample showing you how to solve the specific problem, as well as a detailed discussion of how and why the underling technology works. This question-solution-discussion format is a proven teaching method, as any fan of O'Reilly's "Cookbook" series can attest to. In fact, no other source offers a learn-as-you-go format quite like this. C# Cookbook, 2nd Edition is organized into 20 chapters, each of which focuses on a particular topic in creating C# solutions. Here are just some of what's covered: Numeric data types Strings and characters Classes and structures Generics Exception handling Delegates, events, and anonymous methods Filesystem interactions Web site access XML usage (including XPath and XSLT) Networking Threading Unsafe code Best of all, you don't have to be an experienced C# or .NET developer to use C# Cookbook, 2nd Edition . You just have to be someone who wants to solve a problem now, without having to learn all the related theory first.
    Note: Online resource; Title from title page (viewed January 30, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123694041
    Language: English
    Pages: 1 online resource (536 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The Globus Toolkit is a key technology in Grid Computing, the exciting new computing paradigm that allows users to share processing power, data, storage, and other computing resources across institutional and geographic boundaries. Globus Toolkit 4: Programming Java Services provides an introduction to the latest version of this widely acclaimed toolkit. Based on the popular web-based The Globus Toolkit 4 Programmer's Tutorial, this book far surpasses that document, providing greater detail, quick reference appendices, and many additional examples. If you’re making the leap into Grid Computing using the Globus Toolkit, you’ll want Globus Toolkit 4: Programming Java Services at your side as you take your first steps. Written for newcomers to Globus Toolkit, but filled with useful information for experienced users. Clearly situates Globus application development within the context of Web Services and evolving Grid standards. Provides detailed coverage of Web Services programming with the Globus Toolkit's Java WS Core component. Covers basic aspects of developing secure services using the Grid Security Infrastructure (GSI). Uses simple, didactic examples throughout the book, but also includes a more elaborate example, the FileBuy application, that showcases common design patterns found in Globus applications. Concludes with useful reference appendices.
    Note: Online resource; Title from title page (viewed January 26, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (6 pages)
    Keywords: Electronic books
    Abstract: One does not have to be a medical expert to know that the health care system in the United States is unequivocally broken, and broke. It no longer serves the needs of many people, as access and affordability have been relegated to select segments of the population.
    Note: Online resource; Title from title page (viewed January 1, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    ISBN: 9780750679077
    Language: English
    Pages: 1 online resource (336 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This book helps engineers to grasp fundamental theories and design principles by presenting physical and intuitive explanations of switched-capacitor circuits. Numerous circuit examples are discussed and the author emphasizes the most important and fundamental principles involved in implementing state-of-the-art switched-capacitor circuits for analog signal processing and power management applications. Throughout the book, the author presents numerous step-by-step tutorials and gives practical design examples. While some quantitative analysis is necessary to understand underlying concepts, tedious mathematical equations and formal proofs are avoided. An intuitive appreciation for switched-capacitor circuits is achieved. Much of the existing information on contemporary switched-capacitor circuit applications is in the form of applications notes and data sheets for various switched-capacitor ICs. This book compiles such information in a single volume and coherently organizes and structures it. The author has his own website at www.mingliangliu.com * Step-by-step tutorials which emphasize the most fundamental principals of switched-capacitor circuits * Few tedious mathematical equations * The first easy-to-understand compilation on this subject--most information available is not very cohesive
    Note: Online resource; Title from title page (viewed June 12, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (6 pages)
    Keywords: Electronic books
    Abstract: Recognizing that young people strongly want to make civic contributions, a number of youth leadership development programs have expanded their focus from the individual to the community level. The thinking is that involvement in their communities not only helps youths build leadership skills but also enables them to expand their knowledge of and access to resources within those communities. How well are such programs working?
    Note: Online resource; Title from title page (viewed January 1, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media | Boston, MA : Safari
    ISBN: 0596527284
    Language: English
    Pages: 1 online resource (574 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: Anyone still think that Adobe Photoshop Elements is a toy version of the real thing? As the most popular photo-editing program on the market, Photoshop Elements not only has Photoshop's marvelous powers, but also has capabilities the mothership lacks. Each new version includes more tools designed specifically for today's consumer digital photo enthusiasts. The latest edition, Photoshop Elements 5, solidifies the reputation of this superb and inexpensive product with new scrapbook features, a link to online photo services, and many other improvements. In fact, there's so much to Photoshop Elements that it can be quite confusing at times. That's precisely why our Missing Manuals are the bestselling books on the topic. Adobe provides a pamphlet and some help files; our book, now in its fifth edition, carefully explains every feature the program has to offer (something no other book has done) by putting each one into a clear, easy-to-understand context. Photoshop Elements 5: The Missing Manual covers the Windows version of Adobe's workhorse and gives you the low down on a host of new features: Learn to create multiple page documents, custom photo layouts with frames, and highly customized layouts for scrapbook projects Master the new editor for Layer Styles, which lets you customize individual layers in a photo "Attach" your photos to areas of a Yahoo! Map so your friends and family can see the pictures you took in specific places Author Barbara Brundage also introduces you to a new sophisticated tool called "Curves" to adjust the color and contrast in your photos, and shows you how to burn multi-session CDs and DVDs. As always, she lets you know which features work well, which don't, and why -- all with a bit of wit and good humor. Although the book progresses from simple to complex tasks, you can easily jump around to learn specific techniques, such as creating photomontages (composites), restoring old photos, preparing images for the Web, and archiving. More than a dozen downloadable images let you practice using the editing tools right away!
    Note: Online resource; Title from title page (viewed September 21, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (608 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments
    Note: Online resource; Title from title page (viewed July 4, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (350 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the “Top 10 security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the “Top 10 list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site. Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of “log file. This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity. * Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network * Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site. * Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks
    Note: Online resource; Title from title page (viewed January 27, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123705921
    Language: English
    Pages: 1 online resource (224 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Model Driven Architecture (MDA) is a new approach to software development that helps companies manage large, complex software projects and save development costs while allowing new technologies that come along to be readily incorporated. Although it is based on many long-standing industry precepts and best practices, such as UML, it is enough of a departure from traditional IT approaches to require some "proof of the pudding." Real-Life MDA is composed of six case studies of real companies using MDA that will furnish that proof. The authors' approach MDA projects by describing all aspects of the project from the viewpoint of the end-users—from the reason for choosing an MDA approach to the results and benefits. The case studies are preceded by an introductory chapter and are followed by a wrap-up chapter summarizing lessons learned. Written for executives, analysts, architects, and engineers positioned to influence business-oriented software development at the highest levels Filled with concrete examples and analyses of how MDA is relevant for organizations of various sizes Considers a range of uses for MDA—from business process analysis to full-scale software modeling and development Presents results for each case study in terms of tangible, measured benefits, including automatically generated code, defect reduction, improved visibility, and ROI
    Note: Online resource; Title from title page (viewed December 5, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 0738495603
    Language: English
    Pages: 1 online resource (356 pages)
    Series Statement: IBM redbooks
    Parallel Title: Erscheint auch als
    Keywords: Business Forms ; Computer programs ; Forms management Computer programs ; IBM software ; Electronic books ; local ; Gestion des formulaires ; Logiciels ; Logiciels IBM ; Gestion des formulaires ; Logiciels ; Business ; Forms ; Computer programs ; Forms management ; Computer programs ; IBM software ; Commerce ; Business & Economics ; Local Commerce
    Abstract: This IBM Redbooks publication describes the features and functionality of Workplace Forms and each of its component products. After introducing the products and providing an overview of features and functionality, we discuss the underlying product architecture and address the concept of integration. To help potential users, architects, and developers better understand how to develop and implement a forms application, we introduce a specific scenario based on a "Sales Quotation Approval" application. Using this base scenario as a foundation, we describe in detail how to build an application that captures data in a form, then applies specific business logic and workflow to gain approval for a specific product sales quotation. Throughout the scenario, we build upon the complexity of the application and introduce increasing integration points with other data systems. Ultimately, we demonstrate how an IBM Workplace Forms application can integrate with WebSphere Portal, IBM DB2 Content Manager, and Lotus Domino. Note: The code used for building this sample scenario application is available for download. For specific information about how to download the sample code, please refer to Appendix A. Additional material". Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed July 12, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9781597491068
    Language: English
    Pages: 1 online resource (481 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how. This book will detail the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort. Furthermore, the book will provide a thorough understanding of the benefits of a virtual infrastructure and a comprehensive examination of how Virtual Server can ease administration and lower overall IT costs. Lastly, the book delivers a thorough understanding of the virtual evolution which is underway in many IT organizations and how the reader will benefit from shifting from the physical to a virtual world. * Examines in detail the default and custom installation of Microsoft's Virtual Server 2005 * Addresses th important topics of server requirements and the cost implications involved * Looks at addressing IT costs and the benefits to the organisation
    Note: Online resource; Title from title page (viewed October 13, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    ISBN: 9780750679534
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: In this new, highly practical guide, expert embedded designer and manager Lewin Edwards answers the question, “How do I become an embedded engineer? Embedded professionals agree that there is a treacherous gap between graduating from school and becoming an effective engineer in the workplace, and that there are few resources available for newbies to turn to when in need of advice and direction. This book provides that much-needed guidance for engineers fresh out of school, and for the thousands of experienced engineers now migrating into the popular embedded arena. This book helps new embedded engineers to get ahead quickly by preparing them for the technical and professional challenges they will face. Detailed instructions on how to achieve successful designs using a broad spectrum of different microcontrollers and scripting languages are provided. The author shares insights from a lifetime of experience spent in-the-trenches, covering everything from small vs. large companies, and consultancy work vs. salaried positions, to which types of training will prove to be the most lucrative investments. This book provides an expert’s authoritative answers to questions that pop up constantly on Usenet newsgroups and in break rooms all over the world. * An approachable, friendly introduction to working in the world of embedded design * Full of design examples using the most common languages and hardware that new embedded engineers will be likely to use every day * Answers important basic questions on which are the best products to learn, trainings to get, and kinds of companies to work for
    Note: Online resource; Title from title page (viewed August 31, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597490870
    Language: English
    Pages: 1 online resource (500 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the network’s vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. · A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator · Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding · Does not bog you down with history, but offers practical useful information for today
    Note: Online resource; Title from title page (viewed August 22, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597492515
    Language: English
    Pages: 1 online resource (400 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever find them, thereby enabling administrators to lower their costs of operations and simplify management of their Windows Server System infrastructure. MOM can notify system administrators of overloaded processors, depleted memory, or failed network connections affecting their Windows servers long before these problems bother users. Microsoft Operations Manager (MOM) 2005 delivers open and scalable enterprise-class operational management by providing comprehensive event management, proactive monitoring and alerting, reporting and trend analysis, and system and application specific knowledge and tasks to improve the manageability of Windows Server System environments, including Windows, Exchange, SQL, IIS, Active Directory etc. * A users guide to Microsoft Operations Manager (MOM) enabling a cost reduction and simplification in managing your Windows Server System Infrastructure * Companion Web site for book offers dozens of customized scripts and tools for automating MOM 2005 and many other Windows Server products * There is no other compact resource like this for this core, Microsoft Server product
    Note: Online resource; Title from title page (viewed March 1, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    ISBN: 9780750677592
    Language: English
    Pages: 1 online resource (608 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Today's embedded and real-time systems contain a mix of processor types: off-the-shelf microcontrollers, digital signal processors (DSPs), and custom processors. The decreasing cost of DSPs has made these sophisticated chips very attractive for a number of embedded and real-time applications, including automotive, telecommunications, medical imaging, and many others—including even some games and home appliances. However, developing embedded and real-time DSP applications is a complex task influenced by many parameters and issues. DSP Software Development Techniques for Embedded and Real-Time Systems is an introduction to DSP software development for embedded and real-time developers giving details on how to use digital signal processors efficiently in embedded and real-time systems. The book covers software and firmware design principles, from processor architectures and basic theory to the selection of appropriate languages and basic algorithms. The reader will find practical guidelines, diagrammed techniques, tool descriptions, and code templates for developing and optimizing DSP software and firmware. The book also covers integrating and testing DSP systems as well as managing the DSP development effort. Digital signal processors (DSPs) are the future of microchips! Includes practical guidelines, diagrammed techniques, tool descriptions, and code templates to aid in the development and optimization of DSP software and firmware
    Note: Online resource; Title from title page (viewed January 9, 2006)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (448 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a hacker to lower the pricing on any product products). How to protect the supply chain (malicous/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products). How to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits). The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. . * Deloitte & Touche expects over 10 billion RFID tags to be in circulation by the end of 2005 * Parties debating the security issue of RFID need information on the pros and cons of the technology and this is that information * Little competition in a market desperate for information
    Note: Online resource; Title from title page (viewed May 25, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780127745756
    Language: English
    Pages: 1 online resource (360 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: At the heart of Apple's hugely popular iLife software suite—iMovie, iPhoto, iDVD, GarageBand, and iTunes—is QuickTime, the powerful media engine that drives elegant applications for managing movies, images, and audio files. The enduring success of QuickTime is in no small part attributable to its component architecture. This key feature has allowed it to embrace emerging digital media technologies and standards one by one as they have appeared over the 12 or so years since its launch. None of the competing technologies even comes close, let alone on both Mac OS X and Windows. QuickTime for .NET and COM Developers is the first guide to QuickTime for developers using popular RAD tools such a Visual Basic .NET, C#, and Visual Basic 6. A general introduction to QuickTime is followed by a detailed explanation of the QuickTime architecture from a.NET and COM perspective, liberally accompanied by code snippets. A number of implementation examples illustrate key QuickTime features, ranging from a simple movie player to a sophisticated interactive application. Also covered is QuickTime scripting in both QuickTime Player (using Windows Scripting) and in Microsoft Office applications (using VBA). Brief guides to developing with QuickTime in Delphi and ATL/WTL are also included. Part of the official Quicktime Developer Series , publishing the finest books on QuickTime in cooperation with Apple. * The first book on QuickTime for .NET and COM application and scripting developers * Written by one of the architects of Apple's QuickTime ActiveX/COM control * Offers numerous sample applications and code examples
    Note: Online resource; Title from title page (viewed January 17, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597490412
    Language: English
    Pages: 1 online resource (182 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember. * Examines the password problem from the perspective of the administrator trying to secure their network * Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot * Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords
    Note: Online resource; Title from title page (viewed January 9, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (600 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals. Configuring SonicWALL Firewalls is the first book to deliver an in-depth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Also covered are advanced troubleshooting techniques and the SonicWALL Security Manager. This book offers novice users a complete opportunity to learn the SonicWALL firewall appliance. Advanced users will find it a rich technical resource. * First book to deliver an in-depth look at the SonicWALL firewall product line * Covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls * Includes advanced troubleshooting techniques and the SonicWALL Security Manager
    Note: Online resource; Title from title page (viewed May 25, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Language: English
    Pages: 1 online resource (550 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper’s NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections. · The only book that focuses on creating policies that apply to multiple products. · Included is a bonus chapter on using Ethereal, the most popular protocol analyzer, to monitor and analyze network traffic. · Shows what features can be controlled by a policy, and walks you through the steps for writing the policy to fit the objective at hand
    Note: Online resource; Title from title page (viewed September 28, 2006)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    ISBN: 9780750667555
    Language: English
    Pages: 1 online resource (584 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Embedded Systems with PIC Microcontrollers: Principles and Applications is a hands-on introduction to the principles and practice of embedded system design using the PIC microcontroller. Packed with helpful examples and illustrations, the book provides an in-depth treatment of microcontroller design as well as programming in both assembly language and C, along with advanced topics such as techniques of connectivity and networking and real-time operating systems. In this one book students get all they need to know to be highly proficient at embedded systems design. This text combines embedded systems principles with applications, using the16F84A, 16F873A and the 18F242 PIC microcontrollers. Students learn how to apply the principles using a multitude of sample designs and design ideas, including a robot in the form of an autonomous guide vehicle. Coverage between software and hardware is fully balanced, with full presentation given to microcontroller design and software programming, using both assembler and C. The book is accompanied by a companion website containing copies of all programs and software tools used in the text and a ‘student’ version of the C compiler. This textbook will be ideal for introductory courses and lab-based courses on embedded systems, microprocessors using the PIC microcontroller, as well as more advanced courses which use the 18F series and teach C programming in an embedded environment. Engineers in industry and informed hobbyists will also find this book a valuable resource when designing and implementing both simple and sophisticated embedded systems using the PIC microcontroller. *Gain the knowledge and skills required for developing today's embedded systems, through use of the PIC microcontroller. *Explore in detail the 16F84A, 16F873A and 18F242 microcontrollers as examples of the wider PIC family. *Learn how to program in Assembler and C. *Work through sample designs and design ideas, including a robot in the form of an autonomous guided vehicle. *Accompanied by a CD-ROM containing copies of all programs and software tools used in the text and a ‘student' version of the C complier.
    Note: Online resource; Title from title page (viewed October 24, 2006)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    ISBN: 9780750678612
    Language: English
    Pages: 1 online resource (304 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: As wireless devices and systems get both smaller and more ubiquitous, the demand for effective but small antennas is rapidly increasing. Small Antenna Design describes the theory behind effective small antenna design and give design techniques and examples for small antennas for different operating frequencies. Design techniques are given for the entire radio spectrum, from a very hundred kilohertz to the gigahertz range. Unlike other antenna books which are heavily mathematical and theoretical, Douglas Miron keeps mathematics to the absolute minimum required to explain design techniques. Ground planes, essential for operation of many antenna designs, are extensively discussed. Author's extensive experience as a practicing antenna design engineer gives book a strong "hands-on" emphasis Covers antenna design techniques from very low frequency (below 300 kHz) to microwave (above 1 GHz) ranges Special attention is given to antenna design for mobile/portable applications such as cell phones, WiFi, etc
    Note: Online resource; Title from title page (viewed March 22, 2006)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597490634
    Language: English
    Pages: 1 online resource (336 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively. For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting travel costs while maintaining the benefits of face-to-face contact. Unfortunately, most solutions never lived up to the promise, due primarily to lack of internet bandwidth and poorly developed protocols. That's no all changed. The capacity has been created, the hardware works, and businesses are more eager than ever to cut down on travel costs. * Budget conscious methods for deploying Video over IP in small to medium enterprises * Coverage of Cisco, Microsoft, Skype, AOL, Google, VidiTel and many other products * How to identify and resolve nagging quality of service issues such as transmission delays and out of synch video-to-voice feeds
    Note: Online resource; Title from title page (viewed June 7, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Elsevier Science | Boston, MA : Safari
    ISBN: 0080474772 , 9780080474779 , 1280968176 , 9781280968174 , 9786610968176 , 6610968179
    Language: English
    Pages: 1 online resource (600 pages)
    Series Statement: Morgan Kaufmann series in interactive 3D technology
    Parallel Title: Erscheint auch als
    Keywords: Quaternions ; Electronic books ; local ; MATHEMATICS ; Algebra ; Linear ; Quaternions ; Quaternions ; Quaternions ; Electronic books ; Electronic books
    Abstract: Introduced 160 years ago as an attempt to generalize complex numbers to higher dimensions, quaternions are now recognized as one of the most important concepts in modern computer graphics. They offer a powerful way to represent rotations and compared to rotation matrices they use less memory, compose faster, and are naturally suited for efficient interpolation of rotations. Despite this, many practitioners have avoided quaternions because of the mathematics used to understand them, hoping that some day a more intuitive description will be available. The wait is over. Andrew Hanson's new book is a fresh perspective on quaternions. The first part of the book focuses on visualizing quaternions to provide the intuition necessary to use them, and includes many illustrative examples to motivate why they are important-a beautiful introduction to those wanting to explore quaternions unencumbered by their mathematical aspects. The second part covers the all-important advanced applications, including quaternion curves, surfaces, and volumes. Finally, for those wanting the full story of the mathematics behind quaternions, there is a gentle introduction to their four-dimensional nature and to Clifford Algebras, the all-encompassing framework for vectors and quaternions. * Richly illustrated introduction for the developer, scientist, engineer, or student in computer graphics, visualization, or entertainment computing. * Covers both non-mathematical and mathematical approaches to quaternions. * Companion website with an assortment of quaternion utilities and sample code, data sets for the book's illustrations, and Mathematica notebooks with essential algebraic utilities.
    Note: Online resource; Title from title page (viewed February 6, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...