Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (34)
  • 2005-2009  (34)
  • Safari, an O’Reilly Media Company.  (34)
  • Därr-Expeditionsservice
  • [Erscheinungsort nicht ermittelbar] : Peachpit Press  (17)
  • [Erscheinungsort nicht ermittelbar] : Syngress  (17)
Datasource
Material
Language
  • English  (34)
Years
Year
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9780080958576
    Language: English
    Pages: 1 online resource (496 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Winner of the Best Book Bejtlich Read in 2009 award! "SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich, http://taosecurity.blogspot.com/ SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts. What is SQL injection?-Understand what it is and how it works Find, confirm, and automate SQL injection discovery Discover tips and tricks for finding SQL injection within the code Create exploits using SQL injection Design to avoid the dangers of these attacks
    Note: Online resource; Title from title page (viewed May 5, 2009) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (232 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Photodex ProShow: Visual Quickstart Guide , in full color, leads readers through the process of creating stunning slide shows that can be viewed on computers, televisions, devices, and over the Internet. Whether the reader wants to create a show around their last vacation or professionals needing to create shows for weddings and other events, this task-based tutorial has it all. Both versions of ProShow 4 are covered in-detail: ProShow Gold and ProShow Producer. Photodex ProShow: Visual QuickStart Guide offers: Easy visual approach uses full color pictures to guide you through Photodex ProShow and show you what to do. Concise steps and explanations let you get up and running in no time. Page for page, the best content and value around. Companion Web site at www.proshowbook.com offers sample images, effects, and more. With ProShow users combine photos, videos, and music to create stunning slideshows. Users can create a unique and personalized photo slide show for any occasion whether it's a birthday, anniversary, graduation, holiday, wedding or just showing-off vacation photos. Even professionals use Proshow as it provides an elegant way to present photos and pitch clients. Built-in editing tools and effects make it easy to add borders to photos, crop and edit video and audio clips, pan and zoom, and add transition styles including dissolves, fades, wipes, and shapes. When it's time to output a show, Proshow offers many output options including DVD, Blu-ray, CD, the Web and dozens of devices like the iPod, iPhone, and Blackberry. You can even upload your slide shows directly to YouTube.
    Note: Online resource; Title from title page (viewed April 7, 2009) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597492409
    Language: English
    Pages: 1 online resource (416 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems. -- Stephen Northcutt OSSEC determines if a host has been compromised in this manner by taking the equivalent of a picture of the host machine in its original, unaltered state. This "picture" captures the most relevant information about that machine's configuration. OSSEC saves this "picture" and then constantly compares it to the current state of that machine to identify anything that may have changed from the original configuration. Now, many of these changes are necessary, harmless, and authorized, such as a system administrator installing a new software upgrade, patch, or application. But, then there are the not-so-harmless changes, like the installation of a rootkit, trojan horse, or virus. Differentiating between the harmless and the not-so-harmless changes determines whether the system administrator or security professional is managing a secure, efficient network or a compromised network which might be funneling credit card numbers out to phishing gangs or storing massive amounts of pornography creating significant liability for that organization. Separating the wheat from the chaff is by no means an easy task. Hence the need for this book. The book is co-authored by Daniel Cid, who is the founder and lead developer of the freely available OSSEC host-based IDS. As such, readers can be certain they are reading the most accurate, timely, and insightful information on OSSEC. * Nominee for Best Book Bejtlich read in 2008! * http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html • Get Started with OSSEC Get an overview of the features of OSSEC including commonly used terminology, pre-install preparation, and deployment considerations. • Follow Steb-by-Step Installation Instructions Walk through the installation process for the "local, “agent, and "server" install types on some of th...
    Note: Online resource; Title from title page (viewed April 9, 2008) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (544 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: The only Apple-certified book on Mac OS X 10.5 Leopard, this comprehensive reference takes support technicians and ardent Mac users deep inside their operating systems, covering everything from networking technologies to system administration, customizing the operating system, command-line programming, and more. Keyed to the learning objectives of the AppleCertified Technical Coordinator certification exam, the lessons in this self-paced volume serve as a perfect supplement to Apple’s own training class and a first-rate primer for computer support personnel who need to troubleshoot and optimize Mac OS X as part of their jobs. Self-quizzes and chapter tests reinforce the knowledge gained along the way.
    Note: Online resource; Title from title page (viewed January 7, 2008) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (448 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a hacker to lower the pricing on any product products). How to protect the supply chain (malicous/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products). How to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits). The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. . * Deloitte & Touche expects over 10 billion RFID tags to be in circulation by the end of 2005 * Parties debating the security issue of RFID need information on the pros and cons of the technology and this is that information * Little competition in a market desperate for information
    Note: Online resource; Title from title page (viewed May 25, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If you're looking for an easy way to work fast in Photoshop CS2, congratulations, you've found it! Matt Kloskowski, Education and Curriculum Developer for the NAPP, shows you how to use the power of automation to instantly save time, money, and frustration. Once you master these powerful tools, you'll wonder how you ever got along without them. You'll learn how to: • Effectively use Adobe Bridge to manage your images • Add automation using actions • Create smarter actions • Use batch processing • Speed up the Camera Raw workflow • Customize scripts • Fine tune filters and preferences • And much more! This guide is not only packed with info, it will also show you hidden actions and automation gems that are already loaded when you install Photoshop CS2! If you want to increase your speed, and get twice the work done with half the headaches--this is the book for you!
    Note: Online resource; Title from title page (viewed March 21, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597490870
    Language: English
    Pages: 1 online resource (500 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the network’s vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users. · A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator · Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding · Does not bog you down with history, but offers practical useful information for today
    Note: Online resource; Title from title page (viewed August 22, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9781597491068
    Language: English
    Pages: 1 online resource (481 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how. This book will detail the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort. Furthermore, the book will provide a thorough understanding of the benefits of a virtual infrastructure and a comprehensive examination of how Virtual Server can ease administration and lower overall IT costs. Lastly, the book delivers a thorough understanding of the virtual evolution which is underway in many IT organizations and how the reader will benefit from shifting from the physical to a virtual world. * Examines in detail the default and custom installation of Microsoft's Virtual Server 2005 * Addresses th important topics of server requirements and the cost implications involved * Looks at addressing IT costs and the benefits to the organisation
    Note: Online resource; Title from title page (viewed October 13, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (600 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals. Configuring SonicWALL Firewalls is the first book to deliver an in-depth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Also covered are advanced troubleshooting techniques and the SonicWALL Security Manager. This book offers novice users a complete opportunity to learn the SonicWALL firewall appliance. Advanced users will find it a rich technical resource. * First book to deliver an in-depth look at the SonicWALL firewall product line * Covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls * Includes advanced troubleshooting techniques and the SonicWALL Security Manager
    Note: Online resource; Title from title page (viewed May 25, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    ISBN: 0321429176
    Language: English
    Pages: 1 online resource (208 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Here’s the perfect introduction to the art of the videoblog, or vlog, whatever your subject. Filled with both technical and creative tips, this fun, fast, full-color guide provides everything you need to get started vlogging. You’ll learn: • How to find and keep track of your favorite videoblogs • How to create your own vlog under Windows or Mac OS X • Where to find free vlog-hosting services • Tips on lighting, shooting, sound, and video compression for vlogs • Where to download free, legal music for your vlog • How to build an audience with RSS feeds • And many more insider secrets Vlogging pioneers Michael Verdi and Ryanne Hodson are co-founders of NO DE101, an international network of videoblog classrooms, and FreeVlog.org, NO DE101’s online equivalent. Verdi also vlogs at www.michaelverdi.com, while Hodson produces vlogs at http://ryanedit.blogspot.com and http://revlog.blogspot.com. Video training pioneers Diana Weynand and Shirley Craig are co-owners of Weynand Training International, an Apple Authorized Training Center that provides training services to the entertainment industry. They vlog at www.weynand.blogspot.com.
    Note: Online resource; Title from title page (viewed April 25, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    ISBN: 0321368983
    Language: English
    Pages: 1 online resource (408 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If you're exploring a career in digital imaging or design, then you're likely to encounter Photoshop along the way--you probably already have. But how well do you know it? Understanding Adobe Photoshop: Digital Image Concepts and Techniques goes beyond the school newspaper or internship and teaches you the fundamental digital imaging techniques in Adobe Photoshop and Photoshop Elements that you'll need to succeed both in the classroom and the workforce. While many Photoshop books focus on features, tools, or techniques, this book covers both the basics and delves into specific skills, tricks, and uses in multimedia. With a friendly style and interactive DVD-ROM, Richard Harrington covers digital imaging basics (correcting, editing, sharpening, retouching, and presenting photos) and shows you real-world projects and exercises, including: digital painting; designing a CD/DVD label, magazine cover, and advertisements; creating Web sites/animations; and more!
    Note: Online resource; Title from title page (viewed March 10, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (240 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: iPod users want to start using their devices as soon as they get their hands on them, and this guide shows them how. In these pages, trusted gadget teacher Christopher Breen reveals the secrets to using the leading portable player. This handy guide offers the quickest way to learn how to use the iTunes Store (including the new movie store!), import songs from CDs, and how to pick the right accessories. Readers will also find thorough coverage of the entire iPod family, including the iPod shuffle ($79-1GB; the world's smallest MP3 player), iPod nano ($149-2GB; $199-4GB; $249-8GB), and the updated iPod ($249-30GB and $349-80GB, which holds up to 20,000 songs or 100 hours of video). Along the way, Christopher offers hints for burning CDs, tips for making the most of the device's storage capabilities,and troubleshooting advice for when the gadgets become uncooperative.
    Note: Online resource; Title from title page (viewed November 3, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597490634
    Language: English
    Pages: 1 online resource (336 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively. For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting travel costs while maintaining the benefits of face-to-face contact. Unfortunately, most solutions never lived up to the promise, due primarily to lack of internet bandwidth and poorly developed protocols. That's no all changed. The capacity has been created, the hardware works, and businesses are more eager than ever to cut down on travel costs. * Budget conscious methods for deploying Video over IP in small to medium enterprises * Coverage of Cisco, Microsoft, Skype, AOL, Google, VidiTel and many other products * How to identify and resolve nagging quality of service issues such as transmission delays and out of synch video-to-voice feeds
    Note: Online resource; Title from title page (viewed June 7, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (328 pages)
    Edition: 3rd edition
    Keywords: Electronic books ; local
    Abstract: The world's best-selling iPod book is back and fully updated with all the new iPods and features in iTunes 7. This book is so popular because it is a book of a different breed. There are basically two kinds of iPod books: (1) The "tell me all about it" kind, which includes in-depth discussions on compression algorithms, debates about analog vs. digital equalizers; and tutorials on how to export your playlist in Unicode format. (2) There's this book. It's not a "tell me all about it" book, it’s a "show me how to do it" book. Award-winning author Scott Kelby shows you step-by-step how it's all done, using the same casual, plain-English style that has made him one of the world's best-selling technology authors. You'll learn how to do only the most important, most requested, and just plain cool things you're going to want to do with your iPod—so you can start having fun with it today. Right now! Each page covers just one topic, complete with full color photos, making it easy to find just what you're looking for fast. Plus, it shows you how to get the most from the iTunes Store, how to watch movies and TV shows with your iPod, how to integrate your iPod into your car, which iPod accessories are hot, how to use photos with your iPod, and everything you need to know about the latest models in the iPod family, including the iPod Nano and the re-designed, tiny iPod Shuffle! It's all here, in the only book of its kind, and you're gonna love it!
    Note: Online resource; Title from title page (viewed November 2, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (177 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: You've just downloaded the brand-new, free Beta version of Lightroom, the revolutionary new workflow application from Adobe. Now what? Pick up this ebook, written by best-selling author Scott Kelby , to give you all the dirt you need on Lightroom to allow you to work faster, smarter, and more creatively. You'll learn the essential shortcuts you need to know to save hours every week, the best ways to import and organize your images, which tools and features to really hone in on to get the most out of this application, how to manage your photos like a pro, plus all the inside secrets on processing raw images. You'll also learn how to use Lightroom together with Photoshop to get the best, most efficient workflow, along with the best images. Finally, the eBook is loaded with tips, tricks, and insights that will absolutely transform the way you work with digital images!
    Note: Online resource; Title from title page (viewed March 21, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (608 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success. * The first book devoted exclusively to managing IT security projects * Expert authors combine superb project management skills with in-depth coverage of highly complex security projects * By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments
    Note: Online resource; Title from title page (viewed July 4, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (216 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: From "America's Most Popular Photo Expert" comes this beautiful book on working and playing with the Photoshop digital darkroom. World-famous, award-winning professional photographer and writer Rick Sammon, author of 25 books and host of 2 television programs, shares his favorite creative enhancements for turning "straight" digital pictures into more creative and imaginative images. With this book you will become not only a well-rounded photographer but also a self-motivated artist in the powerful age of digital imaging. Rick begins the book with advice on seeing creatively and outlines his winning artistic process to help you learn to visualize the end-result before taking a picture. He then turns to the technical aspects of taking photographs, including his philosophy of using features like Camera Raw in Photoshop and how it is a must to obtain the best possible images. Step-by-step lessons follow, each showing how Rick transforms his digital photographs into compelling images. Detailed screenshots of the process accompany Rick's stunning photography and amusing anecdotes of photo shoots from around the world.
    Note: Online resource; Title from title page (viewed August 8, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (350 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the “Top 10 security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the “Top 10 list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site. Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of “log file. This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity. * Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network * Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site. * Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks
    Note: Online resource; Title from title page (viewed January 27, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597490412
    Language: English
    Pages: 1 online resource (182 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember. * Examines the password problem from the perspective of the administrator trying to secure their network * Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot * Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords
    Note: Online resource; Title from title page (viewed January 9, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (54 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Unlike emulation systems such as Microsoft's Virtual PC, Apple's new Boot Camp takes advantage of the fact that your new Intel-equipped iMac, Mac mini or MacBook Pro uses the same type of Intel processor that normal Windows PCs use, allowing you to now run Windows XP on your Intel-equipped Mac at full speed. While most of the information currently available on Boot Camp focuses mainly on installation, in Ben Long's "Apple Boot Camp Public Beta First Look" full-color PDF e-book, Mac authority Ben Long walks you step by step through everything you need to know to get Boot Camp running effectively, including how to find your way around Windows, how to get Windows working with some of your other hardware, how to avoid Windows viruses and Malware, how to share data back and forth between your Mac and Windows systems, how to back up your Windows system, how to restore your Windows system and finally, even how to virtualize Windows using Parallels. With this Apple Boot Camp Public Beta First Look, you'll get a solid grounding in how to get Windows XP up and running on your Mac.
    Note: Online resource; Title from title page (viewed April 18, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597492515
    Language: English
    Pages: 1 online resource (400 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever find them, thereby enabling administrators to lower their costs of operations and simplify management of their Windows Server System infrastructure. MOM can notify system administrators of overloaded processors, depleted memory, or failed network connections affecting their Windows servers long before these problems bother users. Microsoft Operations Manager (MOM) 2005 delivers open and scalable enterprise-class operational management by providing comprehensive event management, proactive monitoring and alerting, reporting and trend analysis, and system and application specific knowledge and tasks to improve the manageability of Windows Server System environments, including Windows, Exchange, SQL, IIS, Active Directory etc. * A users guide to Microsoft Operations Manager (MOM) enabling a cost reduction and simplification in managing your Windows Server System Infrastructure * Companion Web site for book offers dozens of customized scripts and tools for automating MOM 2005 and many other Windows Server products * There is no other compact resource like this for this core, Microsoft Server product
    Note: Online resource; Title from title page (viewed March 1, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781932266986
    Language: English
    Pages: 1 online resource (400 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out. This book is about software piracy--what it is and how it's done This is the first book ever to describe how software is actually stolen and traded over the internet Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software
    Note: Online resource; Title from title page (viewed October 7, 2005) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781931836203
    Language: English
    Pages: 1 online resource (560 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker. *First book to demonstrate and explore controversial network strike back and countermeasure techniques. *Provides tightly guarded secrets to find out WHO is really attacking you over the internet. *Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.
    Note: Online resource; Title from title page (viewed April 12, 2005) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    ISBN: 0321334175
    Language: English
    Pages: 1 online resource (480 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: As dynamic, database-driven Web sites become the standard, more and more nonprogrammers just like yourself are being forced to work with database information and create and edit database objects. With SQL and this task-based guide to it, you can do it too-- no programming experience required! After going over the relational database model and SQL syntax in the first few chapters, veteran author Chris Fehily launches into the tasks that will get you comfortable with SQL fast. In addition to explaining SQL basics, this updated reference covers the ANSI SQL:2003 standard and contains a wealth of brand-new information, including a new chapter on set operations and common tasks, well-placed optimization tips to make your queries run fast, sidebars on advanced topics, and added IBM DB2 coverage. Best of all, the book's examples were tested on the latest versions of Microsoft Access, Microsoft SQL Server, Oracle, IBM DB2, MySQL, and PostgreSQL. On the companion Web site, you can download the SQL scripts and sample database for all these systems and put your knowledge to work immediately on a real database..
    Note: Online resource; Title from title page (viewed May 12, 2005) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    ISBN: 0321384008
    Language: English
    Pages: 1 online resource (288 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Not long ago the Raw format was limited to high-end digital SLR cameras–which meant you pretty much had to be a professional (or at least quite serious) photographer to take advantage of it. Not so today. Now that Raw is included on even the simplest point-and-shoot cameras, shutterbugs of all stripes can start taking advantage of its greater editing flexibility to produce better final images. This guide is the place to start. In these pages, veteran author Ben Long begins at the beginning, explaining exactly what Raw is and why photographers should use it. He then describes the theory, shooting, and image editing practices needed to work with Raw files. Ben also provides an overview of software used to convert raw files and a thorough explanation of how to use Photoshop Elements to edit Raw images. Some cool Camera Raw tricks, tips for shooting for Raw format, and a glossary of important terms round out the offering.
    Note: Online resource; Title from title page (viewed November 7, 2005) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597490306
    Language: English
    Pages: 1 online resource (450 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information
    Note: Online resource; Title from title page (viewed November 21, 2005) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (288 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: There are basically two kinds of iPod books: (1) The "tell me all about it" kind, which includes in-depth discussions on compression algorithms, debates about analog vs. digital equalizers; and tutorials on how to export your playlist in Unicode format. (2) There's this book. It's not a "tell me all about it" book, it’s a "show me how to do it" book. Award-winning author Scott Kelby shows you step-by-step how it's all done, using the same casual, plain-English style that has made him one of the world's best-selling technology authors. You'll learn how to do only the most important, most requested, and just plain cool things you're going to want to do with your iPod–so you can start having fun with it today. Right now! Each page covers just one topic, complete with full color photos, making it easy to find just what you're looking for fast. Plus, it shows you how to get the most from the iTunes Music Store, how to integrate your iPod into your car, which iPod accessories are hot, how to use photos with your iPod, and everything you need to know about the latest addition to the iPod family, the new iPod Nano! It's all here–in the only book of its kind–and you're gonna love it!
    Note: Online resource; Title from title page (viewed October 25, 2005) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (336 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Call it a control thing, but until recently–or, more specifically, until the availability of digital raw camera formats–you simply weren’t ready to make the move to digital photography. Raw formats, however, changed all of that by allowing you to retrieve images before any in-camera processing has been performed. Photoshop’s Adobe Camera Raw plug-in makes that process even easier by providing a standardized way of accessing and working with these uncompressed digital negatives in your favorite image-manipulation software. In the first volume devoted exclusively to the topic, best-selling author Bruce Fraser shows you how to take advantage of Adobe Camera Raw to set white balance, optimize contrast and saturation, handle noise, correct tint, and recover lost detail in images before converting them to another format. After learning about the raw formats themselves, you’ll discover hands-on techniques for exposing and shooting for digital raw, using Bridge, Adobe’s new standalone file browser, to preview images and automate tasks, and building a workflow around the digital raw process.
    Note: Online resource; Title from title page (viewed May 23, 2005) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    ISBN: 0321414837
    Language: English
    Pages: 1 online resource (160 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If you want to make a great-looking, practical database fast but don't want to get bogged down with the details, then you need a Visual QuickProject Guide! If you've never created a database before, the task can be daunting. Recognizing that you don't necessarily want or need to know about every FileMaker Pro 8 feature, this low-priced, compact guide is the quickest route to creating a functional, organized database. Whether you're a small business owner looking for a better way to track inventory and invoices, someone just looking for a streamlined way to keep track of your contacts, or your boss simply needs a a project database, this book covers the FileMaker Pro 8 basics with full-color illustrations and step-by-step instructions to help you get your project done quickly. The guide also includes a companion Web site with downloadable graphic buttons, custom forms and templates, and more.
    Note: Online resource; Title from title page (viewed November 28, 2005) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597490054
    Language: English
    Pages: 1 online resource (700 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding – The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets – The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same – communication over TCP and UDP, sockets are implemented differently in nearly ever language. 3. Shellcode – Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. 4. Porting – Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not “recreate the wheel. 5. Coding Tools – The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications. *Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits. *Perform zero-day exploit forensics by reverse engineering malicious code. *Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.
    Note: Online resource; Title from title page (viewed April 26, 2005) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (432 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Premiere Elements is geared to newbie filmmakers and hobbyists, students, business users, and home users who want professional-looking videos, but don't want or need the advanced power of classic Adobe Premiere Pro. With Premiere Elements 2 for Windows: Visual QuickStart Guide, readers can start from the beginning to get a tour of the software, or look up specific tasks to learn just what they need to know. This task-based, visual reference guide uses step-by-step instructions and plenty of screenshots to show readers how to start a project; capture and import video; work with clips and the timeline; add transitions, titles, and effects; and output finished video to DVD. Newly updated to cover Premiere Elements 2, it details the hottest new features, including the new customizable DVD menu templates, the Storyboard View, Effect Thumbnails and Preview, Docking Workspaces, and more! In addition to offering hundreds of eye-catching effects and transitions, Premiere Elements 2 can automatically transfer footage from DV camcorders, digital cameras, and even digital cell phones, directly into the timeline and automatically readjust clips during editing. Both beginning users, who want a thorough introduction to the technology, and more advanced users, who are looking for a convenient reference, will find what they need here - in straightforward language and through readily accessible examples.
    Note: Online resource; Title from title page (viewed December 14, 2005) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597490481
    Language: English
    Pages: 1 online resource (350 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified “Insider Threats as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely to pose a threat. Next, the reader will learn about the variety of tools and attacks used by insiders to commit their crimes including: encryption, steganography, and social engineering. The book will then specifically address the dangers faced by corporations and government agencies. Finally, the reader will learn how to design effective security systems to prevent insider attacks and how to investigate insider security breeches that do occur. Throughout the book, the authors will use their backgrounds in the CIA to analyze several, high-profile cases involving insider threats. * Tackles one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today * Both co-authors worked for several years at the CIA, and they use this experience to analyze several high-profile cases involving insider threat attacks * Despite the frequency and harm caused by insider attacks, there are no competing books on this topic.books on this topic
    Note: Online resource; Title from title page (viewed December 15, 2005) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597492430
    Language: English
    Pages: 1 online resource (500 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority. While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs. * The Perfect Guide if "System Administrator is NOT your primary job function * Avoid "time drains" configuring the many different security standards built into Windows 2003 * Secure VPN and Extranet Communications
    Note: Online resource; Title from title page (viewed December 15, 2005) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    ISBN: 0321330625
    Language: English
    Pages: 1 online resource (480 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Scott Kelby , the best-selling Photoshop author in the world today, once again takes this book to a whole new level as he uncovers the latest, most important and most exciting new Adobe Photoshop CS2 techniques for digital photographers. This major update to this award-winning, record-breaking book does something for digital photographers that's never been done before--it cuts through the bull and shows you exactly "how to do it." It's not a bunch of theory; it doesn't challenge you to come up with your own settings or figure it out on your own. Instead, Scott shows you step-by-step the exact techniques used by today's cutting-edge digital photographers and, best of all, he shows you, flat-out, exactly which settings to use, when to use them, and why. That's why the previous version of this book took the digital photography world by storm. But now, his new CS2, version is even bigger, even better, and exposes even more of the pros most closely guarded secrets, including a special chapter which shows, for the first time ever, step-by-step how to how to set-up Photoshop's color management. He does it by throwing out all the theory, all the techno-babble, and all the confusing charts and graphs and instead just shows you exactly what you need to do (and nothing more). LEARN HOW THE PROS DO IT Each year Scott trains thousands of professional photographers how to use Photoshop, and almost without exception they have the same questions, the same problems, and the same challenges--and that's exactly what he covers in this book. You'll learn: The sharpening techniques the pros really use (there's an entire chapter on, just this!) The pros tricks for fixing the most common digital photo problems fast! The step-by-step set-up for getting what comes out of your printer to match exactly what you saw on screen The retouching secrets of how the pros retouch portraits How to process raw digital camera images (plus how to take advantage of all the new Camera Raw features of CS2!) How to color correct any photo without breaking a sweat (you'll be amazed at how easy it is–once you know the secret) A whole chapter on the latest, most requested Photoshop special effects How to reduce noise, deal with lens problems, avoid halos, and more How to show your work like a pro! Plus a host of shortcuts, workarounds, and slick "insider" tricks to send your productivity through the roof! If you're a digital photographer and you're ready to learn the "tricks of the trad...
    Note: Online resource; Title from title page (viewed April 18, 2005) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...