Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (169)
  • International Business Machines Corporation International Technical Support Organization,  (14)
  • Conder, Shane  (12)
  • Bryla, Bob  (11)
  • Buttfield-Addison, Paris  (11)
  • Application software ; Development  (102)
  • Oracle (Computer file)  (61)
  • Computer security  (58)
Datasource
Material
Language
Years
Author, Corporation
  • 1
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Database management ; Client/server computing ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Abstract What is the difference between a virtual machine and a Docker container? A virtual machine (VM) is like a house. It is fully contained with its own plumbing and heating and cooling system. If you want another house, you build a new foundation, with new walls, new plumbing, and its own heating and cooling system. VMs are large. They start their own operating systems. Containers are like apartments in an apartment building. They share infrastructure. They can be many different sizes. You can have different sizes depending on the needs. Containers "live" in a Docker host. If you build a house, you need many resources. If you build an apartment building, each unit shares resources. Like an apartment, Docker is smaller and satisfies specific needs, is more agile, and more easily changed. This IBM® Redbooks® publication examines the installation and operation of Docker Enterprise Edition on the IBM Z® platform.
    Note: Number on resource description page: SG24842900. - "IBM Z.". - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed June 7, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    New York : McGraw-Hill Education
    ISBN: 9781259837203 , 1259837203
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Oracle (Computer file) ; Relational databases ; Electronic books ; Electronic books ; local
    Abstract: Leverage the New and Improved Features of Oracle Database 12c Written by Oracle experts Bob Bryla and Robert G. Freeman, this Oracle Press guide describes the myriad new and enhanced capabilities available in the latest Oracle Database release. Inside, you'll find everything you need to know to get up and running quickly on Oracle Database 12c Release 2. Supported by contributions from Oracle expert Eric Yen, Oracle Database 12c Release 2 New Features offers detailed coverage of: • Installing Oracle Database 12c and Grid Infrastructure • Architectural changes, such as Oracle Multitenant • The most current information on upgrading and migrating to Oracle Database 12c • The pre-upgrade information tool and parallel processing for database upgrades • Oracle Real Application Clusters new features, such as Oracle Flex Cluster, Oracle Flex Automatic Storage Management, and Oracle Automatic Storage Management Cluster File System • Enhanced and new online operations: tables, indexes, and PDBs • Oracle RMAN enhancements, including cross-platform backup and recovery • Oracle Data Guard improvements, such as Fast Sync, and Oracle Active Data Guard new features, such as Far Sync • SQL, PL/SQL, DML, and DDL new features • Improvements to partitioning manageability, performance, and availability • Advanced business intelligence and data warehousing capabilities • Security enhancements, including privileges analysis, data redaction, and new administrative-level privileges • Manageability, performance, and optimization improvements
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed September 8, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Third edition.
    Series Statement: IBM redbooks
    Keywords: IBM Cloud ; Application software ; Development ; Cloud computing ; Software architecture ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks® publication is designed to teach university students and app developers the foundation skills that are required to develop, test, and deploy cloud-based applications on IBM Cloud. It shows the latest features of IBM Cloud for developing cloud applications, enhancing applications by using managed services, and the use of DevOps services to manage applications. This book is used as presentations guide for the IBM Skills Academy track Cloud Application Developer and as preparation material for the IBM professional certification exam IBM Certified Application Developer - Cloud Platform. The primary target audience for this course is university students in undergraduate computer science and computer engineer programs with no previous experience working in cloud environments. However, anyone new to cloud computing or IBM Cloud can also benefit from this course.
    Note: "In partnership with IBM Skills Academy Program.". - "Cloud.". - "SG24837402"--Cover page 4. - Includes bibliographical references. - Description based on online resource; title from cover (viewed January 15, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition (December 2017) /
    Series Statement: IBM redbooks
    Keywords: Application software ; Development ; JavaScript (Computer program language) ; Cloud computing ; Software architecture ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks® publication explains how to create various applications based on Node.js, and deploy and run them on IBM Cloud. This book includes the following exercises: Develop a Hello World application in Node.js on IBM Cloud. Use asynchronous callback to call an external service. Create an Express application. Build a rich front-end application by using React and ES6. During these exercises, you will perform these tasks: Create an IBM SDK for Node.js application. Write your first Node.js application. Deploy an IBM SDK for Node.js application on an IBM Cloud account. Create a Node.js module and use it in your code. Understand asynchronous callbacks and know how to use it to call an external service. Understand IBM Watson™ Language Translator service. Create a Hello World Express application. Create a simple HTML view for your application. Understand Express routing. Use third-party modules in Node.js. Understand IBM Watson® Natural Language Understanding service. Use a Git repository on IBM Cloud DevOps services. Understand Delivery Pipeline. Understand how to clone an IBM Cloud application. Use React to create interactive web pages. Understand the following concepts of ES6: Classes, arrow functions, and promises. This book is for beginner and experienced developers who want to start coding Node.js applications on IBM Cloud.
    Note: "In partnership with IBM Skills Academy Program.". - "Cloud.". - "SG24840601"--Cover page 4. - Includes bibliographical references. - Description based on online resource; title from cover (viewed January 15, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Language: English
    Pages: 1 online resource (1 streaming video file (45 min., 13 sec.)) , digital, sound, color
    Keywords: iOS (Electronic resource) ; Application software ; Development ; Computer animation ; Electronic videos ; local
    Abstract: "Managing your iOS app's user interface keeps getting easier with Apple's developer tools. This Learning Path focuses on UIKit Dynamics, which provides a way to integrate real-world physics, mechanics, and animation into your app--basically a nifty little physics engine! Learn how to use UIKit dynamics by following Paris, Jon, and Tim as they show how gravity works on a box. Oh, and there's a cool pendulum example as well."--Resource description page.
    Note: Title from title screen (viewed April 21, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Language: English
    Pages: 1 online resource (1 streaming video file (21 min., 4 sec.)) , digital, sound, color
    Keywords: iOS (Electronic resource) ; Application software ; Development ; Mobile computing ; Electronic videos ; local
    Abstract: "Table views are one of the most basic ways that users interface with an iOS app. Think of the ones that segment your music into pop, alternative, and classical. This quick Learning Path will show you when, why, and how to use this mobile interface staple for all your iOS apps. Once you've got the hang of it, Paris, Jon, and Tim will take you one step further, showing you how to customize these cells in the interface building."--Resource description page.
    Note: Title from title screen (viewed April 21, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Oracle (Computer file) ; IBM Database 2 ; Linux ; Database management ; Electronic books ; Electronic books ; local
    Abstract: Abstract Oracle Database 12c Release 1 running on Linux is available for deployment on IBM® z Systems®. The enterprise-grade Linux on IBM z Systems solution is designed to add value to Oracle Database solutions, including the new functions that are introduced in Oracle Database 12c. In this IBM Redbooks® publication, we explore the IBM and Oracle Alliance and describe how Oracle Database benefits from IBM z Systems®. We then explain how to set up Linux guests to install Oracle Database 12c. We also describe how to use the Oracle Enterprise Manager Cloud Control Agent to manage Oracle Database 12c Release 1. We also describe a successful consolidation project from sizing to migration, performance management topics, and high availability. Finally, we end with a chapter about surrounding Oracle with Open Source software. The audience for this publication includes database consultants, installers, administrators, and system programmers. This publication is not meant to replace Oracle documentation, but to supplement it with our experiences while installing and using Oracle products.
    Note: Number on resource description page: SG24839700. - "z Systems.". - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed June 30, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition.
    Series Statement: IBM redbooks
    Keywords: Application software ; Development ; Cloud computing ; Software architecture ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks® publication is based on the Presentations Guide of the course Essentials of Cloud Application Development on IBM Bluemix that was developed by the IBM Redbooks team in partnership with IBM Skills Academy Program. This course is designed to teach university students the basic skills that are required to develop, deploy, and test cloud-based applications that use the IBM Bluemix® cloud services. The primary target audience for this course is university students in undergraduate computer science and computer engineer programs with no previous experience working in cloud environments. However, anyone new to cloud computing can also benefit from this course. After completing this course, you should be able to accomplish the following tasks: Define cloud computing Describe the factors that lead to the adoption of cloud computing Describe the choices that developers have when creating cloud applications Describe infrastructure as a service, platform as a service, and software as a service Describe IBM Bluemix and its architecture Identify the runtimes and services that IBM Bluemix offers Describe IBM Bluemix infrastructure types Create an application in IBM Bluemix Describe the IBM Bluemix dashboard, catalog, and documentation features Explain how the application route is used to test an application from the browser Create services in IBM Bluemix Describe how to bind services to an application in IBM Bluemix Describe the environment variables that are used with IBM Bluemix services Explain what are IBM Bluemix organizations, domains, spaces, and users Describe how to create an IBM SDK for Node.js application that runs on IBM Bluemix Explain how to manage your IBM Bluemix account with the Cloud Foundry CLI Describe how to set up and use the IBM Bluemix plug-in for Eclipse Describe the role of Node.js for server-side scripting Describe IBM Bluemix DevOps Services and the capabilities of IBM DevOps Services Identify the Web IDE features in IBM Bluemix DevOps Describe how to connect a Git repository client to Bluemix DevOps Services project Explain the pipeline build and deploy processes that IBM Bluemix DevOps Services use Describe how IBM Bluemix DevOps Services integrate with the IBM Bluemix cloud Describe the agile planning tools in IBM Bluemix Describe the characteristics of REST APIs Explain the advantages of the JSON data format Describe an example of REST APIs using Watson Describe the main types of data services in I...
    Note: "In partnership with IBM Skills Academy Program.". - Number from resource description page: SG24837401. - "Cloud.". - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed August 21, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Oracle (Computer file) ; Linux ; Information storage and retrieval systems ; Database management ; Open source software ; Electronic books ; Electronic books ; local
    Abstract: Abstract Oracle Database 12c Release 1 running on Linux is available for deployment on IBM® LinuxONE. The enterprise-grade Linux on LinuxONE solution is designed to add value to Oracle Database solutions, including the new functions that are introduced in Oracle Database 12c. In this IBM Redbooks® publication, we explore the IBM and Oracle Alliance and describe how Oracle Database benefits from LinuxONE. We then explain how to set up Linux guests to install Oracle Database 12c. We also describe how to use the Oracle Enterprise Manager Cloud Control Agent to manage Oracle Database 12c Release 1. We also describe a successful consolidation project from sizing to migration, performance management topics, and high availability. Finally, we end with a chapter about surrounding Oracle with Open Source software. The audience for this publication includes database consultants, installers, administrators, and system programmers. This publication is not meant to replace Oracle documentation, but to supplement it with our experiences while installing and using Oracle products.
    Note: Number on resource description page: SG24838400. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed June 29, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Application software ; Development ; JavaScript (Computer program language) ; Cloud computing ; Software architecture ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks® publication explains how to create various applications based on Node.js and run them on IBM Bluemix®. In this book, you will do the following activities: Develop a Hello World application in Node.js, executing on IBM Bluemix. Through this activity, you can learn about these technologies: IBM SDK for Node.js Eclipse Orion Web IDE Use asynchronous callback Create an Express application Build a rich user interface application by using AngularJS based in Node.js This book is for beginner and experienced developers who want to start coding Node.js applications on IBM Bluemix.
    Note: "In partnership with IBM Skills Academy Program.". - Number from resource description page: SG24840600. - "Cloud.". - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed August 31, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Language: English
    Pages: 1 online resource (1 streaming video file (14 min., 52 sec.)) , digital, sound, color
    Keywords: iOS (Electronic resource) ; Mobile apps ; Development ; Application software ; Development ; Mobile computing ; Electronic videos ; local
    Abstract: "Taking a constraint-based approach within your iOS app allows Auto Layout to adjust your view hierarchy depending on how much real estate you are dealing with and how it is laid out. A clear understanding of how to construct constraints is key get your apps looking good across devices with minimal fuss--spend the next few minutes and get the process down right."--Resource description page.
    Note: Title from title screen (viewed April 21, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Swift (Computer program language) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Get valuable hands-on experience with Swift 3, the latest version of Apple's programming language. With this practical guide, skilled programmers with little or no knowledge of Apple development will learn how to code with Swift 3 by developing three complete, tightly linked versions of the Notes application for the OS X, iOS, and watchOS platforms. In the process, you'll learn Swift's fundamentals, including its syntax and features, along with the basics of the Cocoa, CocoaTouch, and WatchKit frameworks. This book teaches you how to use common design patterns for Swift, how to structure an application for Apple's platforms, and how to submit working apps to the App Store. Divided into four distinct parts, this book includes: Swift 2 basics: Learn Swift's basic building blocks and features for object-oriented development OS X app development: Set up the document model, build out features, and sync data with iCloud iOS app development: Use multimedia, contacts, location, notifications, and iCloud files to build a fully featured iOS Notes app Advanced app extensions: Build an Apple Watch app, and learn how to debug, monitor, and test all three of your Swift apps
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed April 7, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: First edition.
    Keywords: Swift (Computer program language) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Swift 3 is the first significant release since Apple's heralded programming language became an open source project in late 2015. In this report, Jon Manning, Paris Buttfield-Addison, and Tim Nugent-authors of Learning Swift -provide a tour of Swift 3 and its growing ecosystem. You'll learn about the language's most impactful and interesting new features, and explore Swift's use on non-Apple platforms. Many changes in Swift 3 are subtle refinements that knock the rough corners off the language, making human interactions with Swift much smoother. To help you gain a better understanding of Swift 3, the authors provide a simple program designed for one of Apple's Swift Playgrounds. Get a high-level view of Swift 3's changes and new features, and learn how this version differs from Swift 2 Explore the Swift Evolution Process and the full list of accepted proposals-including those not yet implemented Dive into Swift 3's changes to the language's syntax, standard library features, and other areas Examine Swift 3's use on the server, and use a simple program to learn about Swift's use on Linux Find further resources for learning about, working with, and converting projects to Swift 3
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed December 12, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9780134389653 , 0134389654
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Fifth edition.
    Parallel Title: Erscheint auch als
    Keywords: Android (Electronic resource) ; Application software ; Development ; Mobile computing ; Electronic books ; Electronic books ; local
    Abstract: What Every Android App Developer Should Know Today: Android 6 Tools, App/UI Design, Testing, Publishing, and More Introduction to Android ™ Application Development, Fifth Edition , is the most useful real-world guide to building robust, commercial-grade Android apps with the new Android 6 SDK, Android Studio, and latest development best practices. Bigger, better, and more comprehensive than ever, this book covers everything you need to start developing professional apps for modern Android devices. If you're serious about Android development, this guide will prepare you to build virtually any app you can imagine! Three well-respected experts guide you through setting up your development environment, designing user interfaces, developing for diverse devices, and optimizing your entire app-development process. Up-to-date code listings support in-depth explanations of key API features, and many chapters contain multiple sample apps. This fifth edition adds brand-new chapters on material design, styling applications, design patterns, and querying with SQLite. You'll find a treasure trove of Android Studio tips, plus a brand-new appendix on the Gradle build system. This edition also offers Updated coverage of the latest Android 5.1 and 6 APIs, tools, utilities, and best practices New coverage of the Android 6.0 permission model Powerful techniques for integrating material design into your apps An all-new chapter on using styles and reusing common UI components Extensive new coverage of app design, architecture, and backward compatibility A full chapter on using SQLite with persistent database-backed app data Revised quiz questions and exercises to test your knowledge Download this book's source code at informit.com/title/9780134389455 or introductiontoandroid.blogspot.com.
    Note: "Covers Android 6"--Cover. - Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Application software ; Development ; Middleware ; Cloud computing ; Database management ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication takes you on a hybrid cloud journey with IBM PureApplication® System and PureApplication Service: from the what, over the why, and to the how. We outline the needs for a hybrid PureApplication cloud and we describe how to build a strategy. We provide advice about the components, including security. Through use cases, we define the need and the strategy for a hybrid cloud implementation with IBM PureApplication System, Software, or Service. The target audience for this book varies from anyone who is interested in learning more about a true hybrid cloud solution from IBM to strategists, IT architects, and IT specialists who want an overview of what is required to build a hybrid cloud with IBM PureApplication family members.
    Note: Number on resource description page: SG24828400. - Description based on online resource; title from cover page (Safari, viewed February 17, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Application software ; Development ; Cloud computing ; Software architecture ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks® publication is based on the Presentations Guide of the course "Essentials of Cloud Application Development on IBM Bluemix" that was developed by the IBM Redbooks team in partnership with IBM Middle East and Africa (MEA) University Program. This course is designed to teach university students the basic skills that are required to develop, deploy, and test cloud-based applications that use the IBM Bluemix® cloud services. The primary target audience for this course is university students in undergraduate computer science and computer engineer programs with no previous experience working in cloud environments. However, anyone new to cloud computing can benefit from this course. After completing this course, you should be able to accomplish these tasks: Describe the factors that lead to the adoption of cloud computing. Describe infrastructure as a service, platform as a service, and software as a service. Define cloud computing. Describe IBM Bluemix. Describe the architecture of IBM Bluemix. Identify the runtimes and services that Bluemix offers. Explain how to get started with Bluemix. Describe Bluemix organizations, domains, spaces, and users. Create Bluemix applications. Use services in a Bluemix application. Set environmental variables that are used with Bluemix services. Deploy and run Bluemix applications. Describe how to create an IBM SDK for Node.js application that runs on Bluemix. Explain how to manage a Bluemix account with the Cloud Foundry CLI.[ ]Describe how to integrate workstation development platforms with Bluemix. Manage application code and assets with IBM Bluemix DevOps services. Work with the Git repository that is used by DevOps services. Describe the characteristics of REST APIs. Describe the use of JSON as the preferred data format for REST APIs. dentify the data services that are available on Bluemix. Describe the features in Bluemix for developing mobile applications. Create a MobileFirst Services Starter application on Bluemix. Send push notifications from Bluemix and receive them on the mobile device emulator. The workshop materials were created in August 2016. Thus, all IBM Bluemix features discussed in this Presentations Guide and Bluemix user interfaces used in the examples are current as of August 2016. Note: This IBM Redbooks publication references exercises that are NOT included with this book. The exercises are only available to students attending the course.
    Note: "In partnership with IBM MEA University Program.". - Number from resource description page: SG24837400. - "Cloud.". - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed June 29, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: Smartwatches ; Programming ; Application software ; Development ; Swift (Computer program language) ; Electronic books ; Electronic books ; local
    Abstract: Apple Watch is the sort of science-fiction gadget that people used to dream about as kids. What kinds of apps do you envision for this new device? If you're comfortable using OS X, Xcode, and iOS-and familiar with Swift-this concise book shows you the basics of building your own apps for this wrist-mounted computer with Apple's WatchKit framework. You'll learn what an Apple Watch is, what it isn't, and how and why people might interact with apps you build for it.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed June 3, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9780134178318 , 0134178319
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Fourth edition.
    Keywords: Android (Electronic resource) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: This is the Rough Cut version of the printed book. In just 24 sessions of one hour or less, learn how to build powerful apps for Android - the world's most popular mobile platform. The 4th edition kicks off by introducing the core components of the Android Framework. You'll learn about Activities, Intents, and Service. Using Android Studio, the new Android development environment, you'll build complete Android 5.0 apps from the ground up. Along the way you'll master the skills to design, develop, test, and publish meaningful apps. The fourth edition is extensively updated for Android's newest features and tools, every lesson builds on what you've already learned, giving you a rock-solid foundation for real-world success! Highlights of this new Fourth Edition include: Extensive new coverage: Android 5.0 Lollipop, Android Studio, and Material Design A laser focus on Android fundamentals: Activities, Intents, Resources and background processing Exclusive Android 5.0 features for Android TV and Android Wear. Complete projects developed in Android Studio available in nearly every chapter Learn how to... Use Android Studio as your development environment. Add sophisticated navigation with action toolbars and slide out menus. Develop apps using Material Design Develop intuitive user interfaces using Android controls Access the cloud and retrieve data using the Flickr API Create a full-blown app that parses JSON, stores metadata, and displays Flickr images Access the cloud to download and parse JSON data Use a SQLite database and content providers to create responsive, data-driven apps Package and publish apps to Google Play and other app stores
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed July 9, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Keywords: iOS (Electronic resource) ; Mac OS ; Swift (Computer program language) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Get hands-on experience with Apple's Swift programming language by building real working apps. With this practical guide, skilled programmers with little or no knowledge of Apple development will learn how to code with Swift 2 by developing three complete, tightly linked versions of the Notes application for the OS X, iOS, and watchOS platforms.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed May 6, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    New York : McGraw-Hill Education
    ISBN: 9780071830058 , 0071830057
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Third edition.
    Parallel Title: Erscheint auch als
    Keywords: Oracle (Computer file) ; Database management ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Electronic books ; Electronic books ; local
    Abstract: A Complete Study System for OCP Exam 1Z0-063 Prepare for the Oracle Certified Professional Oracle Database 12 c Advanced Administration exam with this exclusive Oracle Press guide. Each chapter features challenging exercises, a certification summary, a two-minute drill, and a self test to reinforce the topics presented. This authoritative resource helps you pass the exam and also serves as an essential on-the-job reference. Get complete coverage of all OCP objectives for exam 1Z0-063, including: Configuring and managing Oracle Recovery Manager (RMAN) settings Using the Oracle RMAN recovery catalog Performing backup and recovery Diagnosing database failures and using the automatic diagnostic repository Encrypting, securing, monitoring, and tuning Oracle RMAN backups Configuring and using flashback features Transporting and copying tablespaces and databases Creating and managing multitenant container databases and pluggable databases Using the Oracle Data Pump, SQL*Loader, and auditing features Electronic content includes: 150+ practice exam questions Test engine that provides practice exams or quizzes that can be customized by chapter or exam objective
    Note: "Complete exam preparation"--Cover page. - Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    New York : McGraw-Hill Education
    ISBN: 9780071798792 , 007179879X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Oracle (Computer file) ; Database management ; Relational databases ; Electronic books ; Electronic books ; local
    Abstract: The definitive reference for every Oracle DBA-completely updated for Oracle Database 12 c Oracle Database 12c DBA Handbook is the quintessential tool for the DBA with an emphasis on the big picture-enabling administrators to achieve effective and efficient database management. Fully revised to cover every new feature and utility, this Oracle Press guide shows how to harness cloud capability, perform a new installation, upgrade from previous versions, configure hardware and software, handle backup and recovery, and provide failover capability. The newly revised material features high-level and practical content on cloud integration, storage management, performance tuning, information management, and the latest on a completely revised security program. Shows how to administer a scalable, flexible Oracle enterprise database Includes new chapters on cloud integration, new security capabilities, and other cutting-edge features All code and examples available online
    Note: "Manage a scalable, secure Oracle enterprise database environment"--Cover page. - Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: WebSphere ; Application software ; Development ; Web sites ; Management ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication provides an example approach for an agile IT team to implement DevOps capabilities in their software delivery of a Java application. We introduce several tools that show how teams can achieve transparency, traceability, and automation in their application lifecycle to all of the stakeholders to deliver a high-quality application that meets its initial requirements. The application that is built highlights the composable and dynamic nature of the Liberty run time. The Liberty run time helps developers to get their applications up and running quickly by using only the programming model features that are required for their applications. The target audience for this book is IT developers, IT managers, IT architects, project managers, test managers, test developers, operations managers, and operations developers.
    Note: Number on resource description page: SG24828600. - "Cloud; WebSphere.". - Description based on online resource; title from cover page (Safari, viewed November 23, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9780133892420 , 0133892425
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 4th ed.
    Parallel Title: Erscheint auch als
    Keywords: Android (Electronic resource) ; Application software ; Development ; Mobile computing ; Wireless communication systems ; Electronic books ; Electronic books ; local
    Abstract: Advanced Android™ Application Development, Fourth Edition, is the definitive guide to building robust, commercial-grade Android apps. Systematically revised and updated, this guide brings together powerful, advanced techniques for the entire app development cycle, including design, coding, testing, debugging, and distribution. With the addition of quizzes and exercises in every chapter, it is ideal for both professional and classroom use. An outstanding practical reference for the newest Android APIs, this guide provides in-depth explanations of code utilizing key API features and includes downloadable sample apps for nearly every chapter. Together, they provide a solid foundation for any modern app project. Throughout, the authors draw on decades of in-the-trenches experience as professional mobile developers to provide tips and best practices for highly efficient development. They show you how to break through traditional app boundaries with optional features, including the Android NDK, Google Analytics and Android Wear APIs, and Google Play Game Services. New coverage in this edition includes Integrating Google Cloud Messaging into your apps Utilizing the new Google location and Google Maps Android APIs Leveraging in-app billing from Google Play, as well as third-party providers Getting started with the Android Studio IDE Localizing language and using Google Play App Translation services Extending your app's reach with Lockscreen widgets and DayDreams Leveraging improvements to Notification, Web, SMS, and other APIs Annuzzi has released new source code samples for use with Android Studio. The code updates are posted to the associated blog site: http://advancedandroidbook.blogspot.com/ This title is an indispensable resource for intermediate- to advanced-level Java programmers who are now developing for Android, and for seasoned mobile developers who want to make the most of the new Android platform and hardware. This revamped, newly titled edition is a complete update of Android™ Wireless Application Development, Volume II: Advanced Topics, Third Edition.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9780071828079 , 0071828079
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Oracle (Computer file) ; SQL (Computer program language) ; Examinations ; Study guides ; Relational databases ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Study guides ; Electronic books ; Electronic books ; local
    Abstract: This Oracle Press certification exam guide prepares you for the new Oracle Database 12 c certification track, including the core requirements for OCA and OCP certification. OCA/OCP Oracle Database 12c All-in-One Exam Guide (Exams 1Z0-061, 1Z0-062, & 1Z0-063) covers all of the exam objectives on the Installation and Administration, SQL Fundamentals, and Advanced Administration exams in detail. Each chapter includes examples, practice questions, Inside the Exam sections highlighting key exam topics, a chapter summary, and a two-minute drill to reinforce essential knowledge. 300+ practice exam questions match the format, topics, and difficulty of the real exam. Electronic content includes interactive practice exam software with hundreds of questions that include detailed answers and explanations, and a score report performance assessment tool Ideal as both exam guide and on-the-job reference The most comprehensive single preparation tool for the Oracle Database 12 c OCA and OCP certification exams
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media
    ISBN: 9781491934524
    Language: English
    Pages: 1 online resource (1 streaming video file (1 hr., 3 min., 17 sec.)) , digital, sound, color.
    Keywords: iOS (Electronic resource) ; Programming ; iPhone OS ; Programming ; Swift (computer program language) ; Application software ; Development ; iPad (Computer) ; Programming ; Electronic videos ; local
    Abstract: "In this webcast, well cover five important features of the Swift language, and talk about how you can use them to reduce the amount of code you need to write, to make your code easier to understand, and to extend the Swift language to meet your needs. Generics: write code that doesn't need to know every detail about the data it's working with closures: writing code that can be run at a later time types and protocols: understanding how Swift's type system works, and how to make custom types that fit neatly into the language custom operators: creating your own representations for different ways objects can interact with each other. Literal convertibles: writing code that interacts nicely with built-in types. This talk is designed for existing programmers of any type, but does not necessarily require any Swift (or Objective-C) experience. At the end, attendees will understand these five essential components of the Swift, and how to use them to improve their code and be more "Swifty"."--Resource description page.
    Note: Title taken from title screen. - Date of publication taken from resource description page
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition.
    Series Statement: IBM redbooks
    Keywords: WebSphere ; Web servers ; Computer programs ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: IBM® WebSphere® Application Server V8.5 includes a Liberty profile, which is a highly composable, dynamic application server profile. It is designed for two specific use cases: Developers with a smaller production runtime, and production environments. For developers, it focuses on the tasks that a developer does most frequently, and makes it possible for the developer to complete those tasks as quickly and as simply as possible. For production environments, it provides a dynamic, small footprint runtime to be able to maximize system resources. This IBM Redbooks® publication targets administrators of Liberty environments. It provides the information needed to create, configure, and manage Liberty servers. It includes information about managing multiple servers in an installation, including the use of the new administrative capabilities introduced in WebSphere Application Server V8.5.5.7. The following publications are companion publications for this book: WebSphere Application Server: New Features in V8.5.5, REDP-4870 WebSphere Application Server V8.5.5 Technical Overview, REDP-4855 IBM WebSphere Application Server V8.5 Concepts, Planning, and Design Guide, SG24-8022 WebSphere Application Server Liberty Profile Guide for Developers, SG24-8076
    Note: "WebSphere.". - Number on resource description page: SG24817001. - Description based on online resource; title from cover page (Safari, viewed November 10, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition.
    Series Statement: IBM redbooks
    Keywords: WebSphere ; Application software ; Development ; Open source software ; Middleware ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication explains the capabilities of IBM WebSphere® Application Server Liberty profile (Liberty profile), which is lightweight, easy to install, and fast to use. Liberty profile provides a convenient and capable platform for developing and testing your web and OSGi applications. The Liberty profile server is built by using OSGi technology and concepts. The fit-for-purpose nature of the run time relies on the dynamic behavior that is inherent in the OSGi framework and service registry. As bundles are installed or uninstalled from the framework, their services are automatically added or removed from the service registry. The result is a dynamic, composable run time that can be provisioned with only what your application requires and responds dynamically to configuration changes as your application evolves. This book can help you install, customize, and configure several popular open source technologies that can be deployed effectively with the Liberty profile server. The following popular open source toolkits for the Liberty profile server were selected for this book based on the significant enhancements they provide to the web application development process: Apache Maven Spring Framework Hibernate Jenkins Opscode Chef Arquillian MongoDB In this book, the Todo sample demonstrates the use of multiple open source frameworks or toolkits with the Liberty profile server, including Maven, MongoDB, Spring, JPA, Arquillian, Wicket, and others. The Todo sample is a simple application that can be used to create, update, and delete todo items and todo lists, and put the todo items into a related todo list.
    Note: Number on resource description page: SG24819401. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed August 5, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    ISBN: 9780738440811
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Application software ; Development ; Software architecture ; Electronic books ; Electronic books ; local
    Abstract: Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. They communicate with each other using language-neutral protocols, such as Representational State Transfer (REST), or messaging applications, such as IBM® MQ Light. This IBM Redbooks® publication gives a broad understanding of this increasingly popular architectural style, and provides some real-life examples of how you can develop applications using the microservices approach with IBM Bluemix™. The source code for all of these sample scenarios can be found on GitHub (https://github.com/). The book also presents some case studies from IBM products. We explain the architectural decisions made, our experiences, and lessons learned when redesigning these products using the microservices approach. Information technology (IT) professionals interested in learning about microservices and how to develop or redesign an application in Bluemix using microservices can benefit from this book.
    Note: "Cloud.". - Number from resource description page: SG24827500. - Description based on online resource; title from cover page (Safari, viewed October 12, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media
    Language: English
    Pages: 1 online resource (1 streaming video file (12 hr., 31 min., 15 sec.)) , digital, sound, color.
    Keywords: Application software ; Development ; Apple computer ; Programming ; iPhone (Smartphone) ; Mobile apps ; iPad (Computer) ; Programming ; Macintosh (Computer) ; Programming ; Electronic videos ; local
    Abstract: "Building apps for iPhone, iPad, and Mac just got easier, faster, and safer, now that Apple has released Swift. In this video workshop, Secret Lab co-founders Jon Manning and Paris Buttfield-Addison, together with Tim Nugent, take you through the components used for building iOS and OS X apps with Swift, and then step through the creation of a simple notepad from scratch, with counterparts for each operating system. If you're an experienced programmer who's never touched Apple developer tools before, you'll learn the basics for putting the Swift language, the Xcode IDE, Interface Builder, and many other Apple technologies to work. With this video workshop, you'll learn how to turn your app ideas into reality."--Resource description page.
    Note: Title from resource description page (viewed April 22, 2015). - Date of publication taken from resource description page
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: IBM computers ; Security measures ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z™ Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z Systems™ provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
    Note: "Security; z Systems.". - Number on resource description page: SG24819600. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed November 18, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    New York : McGraw-Hill Education
    ISBN: 9780071801744 , 007180174X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Oracle (Computer file) ; Database management ; Relational databases ; Electronic books ; Electronic books ; local
    Abstract: Master the Cutting-Edge Features of Oracle Database 12c Maintain a scalable, highly available enterprise platform and reduce complexity by leveraging the powerful new tools and cloud enhancements of Oracle Database 12c. This authoritative Oracle Press guide offers complete coverage of installation, configuration, tuning, and administration. Find out how to build and populate Oracle databases, perform effective queries, design applications, and secure your enterprise data. Oracle Database 12c: The Complete Reference also contains a comprehensive appendix covering commands, keywords, features, and functions. Set up Oracle Database 12c or upgrade from an earlier version Design Oracle databases and plan for application implementation Construct SQL and SQL*Plus statements and execute powerful queries Secure data with roles, privileges, virtualization, and encryption Move data with SQL*Loader and Oracle Data Pump Restore databases using flashback and the Oracle Database Automatic Undo Management feature Build and deploy PL/SQL triggers, procedures, and packages Work with Oracle pluggable and container databases Develop database applications using Java, JDBC, and XML Optimize performance with Oracle Real Application Clusters
    Note: Includes index. - "Administer and secure a robust Cloud-based environment"--Cover. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Keywords: iOS (Electronic resource) ; Mac OS ; Objective-C (Computer program language) ; Application software ; Programming ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Get up to speed on Cocoa and Objective-C, and start developing applications on the iOS and OS X platforms. If you don't have experience with Apple's developer tools, no problem! From object-oriented programming to storing app data in iCloud, the fourth edition of this book covers everything you need to build apps for the iPhone, iPad, and Mac.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed Feb. 28, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    ISBN: 9780133411010 , 013341101X
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 3rd ed.
    Keywords: Android (Electronic resource) ; Application software ; Development ; Mobile computing ; Electronic books ; Electronic books ; local
    Abstract: In just 24 sessions of one hour or less, learn how to build powerful apps for the world's most popular mobile platform: Android 4.3. Using this book's straightforward, step-by-step approach, you'll build complete Android 4.3 apps from the ground up as you master the skills you need to design, develop, test, and publish powerful solutions. Extensively updated for Android's newest features and tools, every lesson builds on what you've already learned, giving you a rock-solid foundation for real-world success! Highlights of this new Third Edition include: Extensive new coverage: fragments, action bar, SQLite, content providers, Facebook SDK, and more Practical guidance on developing for multiple Android versions How to use open source projects to simplify Android development New topic-focused structure with at least one complete project in nearly every chapter Register your book at informit.com/register to gain access to the Bonus KitKat chapter online. Learn how to... Quickly set up your development environment and create Android projects Use Android layouts and fragments to create apps that look great on phones, tablets, and even TVs Develop intuitive user interfaces using Android controls Access the cloud and retrieve data using the Flickr API Create a full-blown app that parses JSON, stores metadata, and displays Flickr images Use a SQLite database and content providers to create responsive, data-driven apps Write social apps using the Facebook Android SDK Use contact and calendar data Build location-based apps using LocationManager APIs or the new Google Play Location Services Internationalize your apps Work with media and cameras Use open-source libraries to add "finishing touches" Package and publish apps to Google Play and other app stores
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed June 19, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    ISBN: 9780133477306 , 0133477304
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 4th ed.
    Parallel Title: Erscheint auch als
    Keywords: Android (Electronic resource) ; Application software ; Development ; Mobile computing ; Wireless communication systems ; Electronic books ; Electronic books ; local
    Abstract: Bonus KitKat material is available for download at www.informit.com/title/9780321940261 What Every Android™ App Developer Should Know Today: Android Tools, App/UI Design, Testing, Publishing, And More This fully reworked edition of a proven title is the most useful real-world guide to building robust, commercial-grade Android™ apps. The content is revised and updated for the latest Android 4.3 SDK and the newest development best practices. Introduction to Android ™ Application Development: Android Essentials, Fourth Edition, covers all you need to quickly start developing professional apps for today's Android devices. Three expert developers guide you through setting up your development environment, designing user interfaces, developing for diverse devices, and optimizing your entire app-development process-from design through publication. Updated throughout, this title includes extensive coverage of the most useful new Android tools and utilities. It adds an all-new chapter on planning an amazing Android app user experience, plus extensive new coverage of unit testing, dialogs, preferences, and app publishing. Throughout, key concepts are taught through clear, up-to-date example code. This edition offers Fully updated introductions to the latest Android 4.3 APIs, tools, utilities, and best practices Up-to-date strategies for leveraging new Android capabilities while preserving compatibility Navigation patterns and code samples for delivering more intuitive user experiences Example-based explanations of ActionBars, DialogFragments, and other key concepts Expert automated testing techniques to quickly improve code quality New Google Play Developer Console app publishing techniques that also offer more control For Android developers at all levels of experience, this reference is now more valuable than ever. Students, instructors, and self-learners will especially appreciate new chapter-ending questions and exercises, carefully designed to test knowledge and deepen mastery. Annuzzi has released new source code samples for use with Android Studio. The code updates are posted to the associated blog site: http://introductiontoandroid.blogspot.com/ Note: This revamped, newly titled edition is a complete update of Android™ Wireless Application Development, Volume I: Android Essentials, Third Edition
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 3rd ed.
    Parallel Title: Erscheint auch als
    Keywords: Application software ; Development ; Cocoa (Application development environment) ; Objective-C (Computer program language) ; Electronic books ; Electronic books ; local
    Abstract: Get up to speed on Cocoa and Objective-C, and start developing applications on the iOS and OS X platforms. If you don't have experience with Apple's developer tools, no problem! From object-oriented programming to storing app data in iCloud, this book covers everything you need to build apps for the iPhone, iPad, and Mac. You'll learn how to work with the Xcode IDE, Objective-C's Foundation library, and other developer tools such as Event Kit framework and Core Animation. Along the way, you'll build example projects, including a simple Objective-C application, a custom view, a simple video player application, and an app that displays calendar events for the user. Learn the application life cycle on OS X and iOS Work with the user-interface system in Cocoa and Cocoa Touch Use AV Foundation to display video and audio Build apps that let users create, edit, and work with documents Store data locally with the file system, or on the network with iCloud Display lists or collections of data with table views and collection views Interact with the outside world with Core Location and Core Motion Use blocks and operation queues for multiprocessing
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    ISBN: 9780133040487 , 0133040488
    Language: English
    Pages: 1 online resource (1 v. (unpaged)) , ill.
    Keywords: Android (Electronic resource) ; Kindle Fire (Computer) ; Programming ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Get Started Fast with Android App Development for Amazon's Best-Selling Kindle Fire! Practically overnight, the Amazon Kindle Fire has become the world's top-selling Android-based tablet. Now, in this electronic-only mini-book, expert Android developers provide an introduction to the basics of Kindle Fire development. Lauren Darcey and Shane Conder first introduce you to Android and walk you through installing its latest development tools. Next, you'll learn the essential design principles you need to write Android Kindle Fire apps, discover how Android applications are structured and configured, and walk through incorporating user interfaces and other application resources into your projects. It's simply the fastest way to start developing apps for today's hottest Android tablet! Like this mini-book? Take the next step: read the full version! Learning Android Application Programming for the Kindle Fire , available August 2012 in print and eBook formats, walks you step-by-step through every facet of building a production-quality Kindle Fire app!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    ISBN: 9780133038873 , 0133038874
    Language: English
    Pages: 1 online resource (xx, 327 p.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Android (Electronic resource) ; Application software ; Development ; Kindle Fire (Computer) ; Programming ; Tablet computers ; Programming ; Electronic books ; Electronic books ; local
    Abstract: Master Android™ App Development for Amazon's Bestselling Kindle Fire™-Hands-On, Step-by-Step! In this book, bestselling Android programming authors Lauren Darcey and Shane Conder teach you every skill and technique you need to write production-quality apps for Amazon Kindle Fire, the world's hottest Android tablet. You'll learn the very best way: by building a complete app from start to finish. Every chapter builds on what you've already learned, helping you construct, expand, and extend your working app as you move through the entire development lifecycle. Packed with fully tested, reusable sample code, this book requires absolutely no previous Android or mobile development experience. If you've ever written any Java code, you can dive right in and get results fast. Darcey and Conder start with the absolute basics: installing Android development tools, structuring and configuring Kindle Fire apps, and applying crucial design principles associated with high-quality software. Next, building on this strong foundation, you'll learn how to manage application resources and build application frameworks; integrate user interfaces, logic, and support for networking and web services; test your apps; and publish on the Amazon Appstore. Coverage includes Establishing an efficient development environment and setting up your first project Mastering Android fundamentals and adapting them to the Kindle Fire Building reusable prototypes that define a framework for production projects Incorporating strings, graphics, styles, templates, and other app and system resources Developing screens, from splash screens and main menus to settings and help Displaying dialogs and collecting user input Controlling app state, saving settings, and launching specific activities Internationalizing Kindle Fire apps to reach wider markets Setting application identity and permissions Preparing your app for publication
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    ISBN: 9780132786904 , 0132786907
    Language: English
    Pages: 1 online resource (xix, 485 p.) , ill.
    Edition: 2nd ed.
    Parallel Title: Erscheint auch als
    Keywords: Android (Electronic resource) ; Application software ; Development ; Mobile computing ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: Android is the world's #1 mobile development platform, and with the new Android 3.0, it's becoming as popular for tablets as it is for smartphones. If you are a beginner, in just 24 lessons of one hour or less, this friendly, full-color book will help you master modern Android development. You can build a fully-featured app from scratch, learning all the skills you'll need to create¿your own. Each lesson builds on prior chapters, providing a solid foundation for success. This edition is thoroughly updated for Android's newest features and development tools, while still supporting the popular Android 2.0. Coverage includes: Using Eclipse to write apps quickly and efficiently Understanding the application lifecycle Building robust, friendly user interfaces Retrieving, storing, and using data Adding network, social, and location-based features Supporting the camera and other hardware Internationalizing, testing, and publishing apps Revised and simplified step-by-step instructions with full-color screenshots walk you through key tasks... updated Q and As, Quizzes, and Exercises test your knowledge..."Did You Know?" tips offer insider advice..."Watch Out!" alerts help you avoid problems. By the time you're finished, you won't just understand core Android concepts: you'll be comfortable writing, testing, and publishing your own new apps.
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley
    ISBN: 9780132484473 , 0132484471
    Language: English
    Pages: 1 online resource (xxviii, 761 p.) , ill.
    Edition: 2nd ed.
    Series Statement: Developer's library
    Parallel Title: Erscheint auch als
    Keywords: Android (Electronic resource) ; Application software ; Development ; Mobile computing ; Electronic books ; lcgft ; Electronic books ; local
    Abstract: Android™ Wireless Application Development Second Edition Lauren Darcey Shane Conder The start-to-finish guide to Android application development: massively updated for the newest SDKs and developer techniques! This book delivers all the up-to-date information, tested code, and best practices you need to create and market successful mobile apps with the latest versions of Android. Drawing on their extensive experience with mobile and wireless development, Lauren Darcey and Shane Conder cover every step: concept, design, coding, testing, packaging, and delivery. The authors introduce the Android platform, explain the principles of effective Android application design, and present today's best practices for crafting effective user interfaces. Next, they offer detailed coverage of each key Android API, including data storage, networking, telephony, location-based services, multimedia, 3D graphics, and hardware. Every chapter of this edition has been updated for the newest Android SDKs, tools, utilities, and hardware. All sample code has been overhauled and tested on leading devices from multiple companies, including HTC, Motorola, and ARCHOS. Many new examples have been added, including complete new applications. This new edition also adds Nine new chapters covering web APIs, the Android NDK, extending application reach, managing users, data synchronization, backups, advanced user input, and more Greatly expanded coverage of Android manifest files, content providers, app design, and testing New coverage of hot topics like Bluetooth, gestures, voice recognition, App Widgets, live folders, live wallpapers, and global search Updated 3D graphics programming coverage reflecting OpenGL ES 2.0 An all-new chapter on tackling cross-device compatibility issues, from designing for the smallest phones to the big new tablets hitting the market Even more tips and tricks to help you design, develop, and test applications for different devices A new appendix full of Eclipse tips and tricks This book is an indispensable resource for every member of the Android development team: software developers with all levels of mobile experience, team leaders and project managers, testers and QA specialists, software architects, and even marketers. Programming/Java
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    ISBN: 9780132947794 , 013294779X
    Language: English
    Pages: 1 online resource ([96] p.) , ill.
    Series Statement: Developer's library
    Keywords: Android (Electronic resource) ; Application software ; Development ; Mobile computing ; Programming ; Smartphones ; Programming ; Electronic books ; Electronic books ; local
    Abstract: The Android platform continues to aggressively grow in market share against competing mobile platforms, such as Apple iOS and BlackBerry. Android's latest major platform update, Android 4.0, frequently called by its code-name, Ice Cream Sandwich or just ICS merges the smartphone-centric Android 2.3.x (Gingerbread) and the tablet-centric Android 3.x (Honeycomb) platform editions into a single SDK for all smart-devices, be they phones, tablets, televisions, or toasters. This short e-book provides an overview from the authors on the importance of Ice Cream Sandwich as well as key preview content from the upcoming book, "Android Wireless Application Development, Third Edition, Volume I." This preview content provides some essential references, updated for Android SDK 4.0, for those interested in jumping into Android application development at this exciting time. To use this e-book most effectively, you need to download the Android development SDK and tools, install them on your development machine, and configure them using the development environment of your choice. You can find instructions for installing and configuring your computer for Android software development on the Android Developer website at http://d.android.com/sdk/.
    Note: Cover title
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    ISBN: 9780768696349 , 0768696348
    Language: English
    Pages: 1 online resource , ill.
    Series Statement: Sams teach yourself in 24 Hours
    Parallel Title: Erscheint auch als
    Keywords: Android (Electronic resource) ; Application software ; Development ; Mobile computing ; Electronic books ; local
    Abstract: &〉 In just 24 sessions of one hour or less, learn how to build powerful applications for the world's first complete, open, and free mobile platform: Android. Using this book's straightforward, step-by-step approach, you'll build a fully-featured Android application from the ground up and master the skills you need to design, develop, test, and publish powerful applications. Each lesson builds on what you've already learned, giving you a rock-solid foundation for real-world success! Step-by-step instructions carefully walk you through the most common Android development tasks. Quizzes and Exercises at the end of each chapter help you test your knowledge. By the Way notes present interesting information related to the discussion. Did You Know? tips offer advice or show you easier ways to perform tasks. Watch Out! cautions alert you to possible problems and give you advice on how to avoid them. Learn how to... Develop Android applications quickly and successfully with Java Master Google's Android SDK and development tools Leverage the Eclipse programming environment to develop Android projects Understand the Android application lifecycle Build effective, user-friendly user interfaces Retrieve, store, and work with application data Develop powerful network applications Add popular social features and location-based services to your applications Take advantage of Android device hardware like the camera Internationalize, test, and publish your Android applications
    Note: Description based on print version record. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    New York : McGraw-Hill | Boston, Mass. :Safari Books Online,
    ISBN: 9780071597098 , 0071597093
    Language: English
    Pages: xxxi, 714 p , ill. , 24 cm. +
    Parallel Title: Erscheint auch als
    Keywords: Oracle (Computer file) ; Electronic data processing personnel ; Certification ; Database management ; Examinations ; Study guides ; Electronic books ; local
    Abstract: A Fully Integrated Study System for OCP Exam 1Z0-053 Prepare for the Oracle Certified Professional Oracle Database 11 g : Administration II exam with help from this exclusive Oracle Press guide. In each chapter, you'll find challenging exercises, practice questions, a two-minute drill, and a chapter summary to highlight what you've learned. This authoritative guide will help you pass the test and serve as your essential on-the-job reference. Get complete coverage of all OCP objectives for exam 1Z0-053, including: Database structure and Oracle Automatic Storage Management Configuring database recoverability Oracle Recovery Manager (RMAN) Oracle Flashback Memory management techniques Database tuning advisors Disk space and resource management Configuring database diagnostics Administering the Oracle Scheduler Database globalization On the CD-ROM: One full practice exam that simulates the actual OCP exam Detailed answers and explanations Score report performance assessment tool Complete electronic book Bonus exam available free with online registration
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    ISBN: 1430225092 , 9781430225096
    Language: English
    Pages: 1 online resource (xxv, 542 p.) , ill.
    Series Statement: The expert's voice in Oracle
    Parallel Title: Erscheint auch als
    Keywords: Oracle (Computer file) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: "Oracle SQL Recipes is written for developers and database administrators who write SQL to run against an Oracle database. It is further written for those whose time is precious, and who just wish for a good example to help them get on with their work. If you want to spend your time writing SQL rather than reading about it, then this is the right book for you"--Resource description page.
    Note: Description based on print version record. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [United States?] : Addison-Wesley Professional | Boston, Mass. :Safari Books Online,
    ISBN: 9780321619686 , 0321619684
    Language: English
    Pages: 1 v. (unpaged) , ill.
    Keywords: Android ; Application software ; Development ; Mobile computing ; Electronic books ; local
    Abstract: The start-to-finish guide to Android development-from concept to market! Android Wireless Application Development combines all the reliable information, sample code, and best practices you need to build, distribute, and market successful Android mobile applications. Drawing on their extensive experience with mobile and wireless development, Shane Conder and Lauren Darcey cover everything you need to execute a successful Android project: from concept and design through coding, testing, packaging, and delivery. Conder and Darcey explain how mobile development differs from conventional development, how Android differs from other mobile platforms, and how to take full advantage of Android's unique features and capabilities. They present detailed, code-rich coverage of Android's most important APIs, expert techniques for organizing development teams and managing Android projects, and dozens of time-saving tricks and pitfalls to avoid. Master the latest Android development tools and Android SDK 1.5 Use the Eclipse Development Environment for Java to develop and debug Android applications Design Android applications that are more efficient, reliable, and easier to use and offer better performance Work with Android's optional hardware-specific APIs Use Android's APIs for data, storage, networking, telephony, Location-Based Services (LBS), multimedia, and 3D graphics Leverage advanced Android capabilities such as Notifications and Services Ensure quality through solid test planning, efficient testing, and comprehensive defect tracking Make more money from your Android applications This book is an indispensable resource for every member of the Android development team: software developers with all levels of mobile experience, team leaders and project managers, testers and QA specialists, software architects, and even marketers.
    Note: Title from resource description page (viewed March 30, 2009)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [New York] : McGraw-Hill, Oracle Press | Boston, Mass. :Safari Books Online,
    ISBN: 9780071496636 , 0071496637
    Language: English
    Pages: xxi, 670 p , ill. , 24 cm
    Edition: Fully updated and expanded, Fully rev.
    Keywords: Oracle (Computer file) ; Database management ; Relational databases ; Electronic books ; local
    Abstract: The Essential Resource for Oracle DBAs--Fully Updated and Expanded Manage a flexible, highly available Oracle database with help from the expert information contained in this exclusive Oracle Press guide. Fully revised to cover every new feature and utility, Oracle Database 11g DBA Handbook shows how to perform a new installation, upgrade from previous versions, configure hardware and software for maximum efficiency, and employ bulletproof security. You will learn to automate the backup and recovery process, provide transparent failover capability, audit and tune performance, and distribute your enterprise databases with Oracle Net. Plan and deploy permanent, temporary, and bigfile tablespaces Optimize disk allocation, CPU usage, I/O throughput, and SQL queries Develop powerful database management applications Guard against human errors using Oracle Flashback and Oracle Automatic Undo Management Diagnose and tune system performance using Oracle Automatic Workload Repository and SQL Tuning Sets Implement robust security using authentication, authorization, fine-grained auditing, and fine-grained access control Maintain high availability using Oracle Real Application Clusters and Oracle Active Data Guard Respond more efficiently to failure scenarios by leveraging the Oracle Automatic Diagnostic Repository and the Oracle Repair Advisor Back up and restore tables, tablespaces, and databases with Oracle Recovery Manager and Oracle Data Pump Export and Import Work with networked databases, data warehouses, and VLDBs Put the latest Oracle Database 11 g tools to work--Oracle Total Recall, Oracle Flashback Data Archive, and more
    Note: Includes index. - Title from resource description page
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: "When it comes to software security, the devil is in the details. This book tackles the details." --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies "McGraw's book shows you how to make the 'culture of security' part of your development lifecycle." --Howard A. Schmidt, Former White House Cyber Security Advisor "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the lunchroom wall." --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book's methods without radically changing the way you work. Inside you'll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development lifecycle with the touchpoints described in this book. Let this expert author show you how to build more secure software by building security in.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xv, 467, [37] p. , ill. ; , 24 cm
    DDC: 005.7585
    Keywords: Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Abstract: Oracle Database 10g Insider Solutions is a must-have reference guide for all Oracle professionals. It provides much-needed information on best practices, tips, and techniques in debugging, installation, deployment, and tuning of the Oracle 10g database. You can draw upon the experience and knowledge of these authors to find creative ways to put your Oracle database to work. The authors will also address common and not-so-common installation concerns, database administration, development, and tuning. Oracle Database 10g Insider Solutions will bring you the insider information that you can't get anywhere else.
    Note: "Covers release 2"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 713 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." -Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code-and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 695 p. , ill. ; , 24 cm
    Series Statement: IBM Press series--information management
    Keywords: WebSphere ; Application software ; Development ; Java (Computer program language) ; Web servers ; Computer programs ; Web site development ; Electronic books ; local
    Abstract: The expert guide to deploying and managing any WebSphere Application Server V5.x application and environment If you're a WebSphere Application Server administrator or developer, this is your advanced guide for delivering applications rapidly, running them smoothly, and administering them efficiently. Four leading IBM consultants draw on their years of experience to illuminate the key steps involved in taking WebSphere Application Server applications from development to production. They focus on the areas most crucial to success, including application assembly and build, application and infrastructure configuration and administration, and application testing and verification. Along the way, they show how to implement automated deployment processes that can be executed frequently, reliably, and quickly-so you can get your applications to market fast. The focus is on WebSphere Application Server Version 5.1, but much of the information applies to other versions. Coverage includes Installing, testing, and managing WebSphere Application Server environments: clustering, security, messaging, integration, and more Deploying and managing key J2EE technologies: JDBC, Connectors, EJB, container managed and message driven beans, transactions, JMS, JavaMail, and more Deploying highly available, scalable multi-node WebSphere Application Server environments: clustering, distributed session management, and edge components Advanced considerations: working with Java Management Extensions, caching, and much more Performance-tuning tools Troubleshooting Leveraging key WebSphere deployment and administration tools: ANT, wsadmin, Admin Console, and the Application Server Toolkit Advanced discussions of J2EE and architectural concepts you need to deploy successfully-with practical examples © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive book on Security Patterns, which are critical for secure programming. --Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your development efforts. --Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. --Judy Lin, Executive Vice President, VeriSign, Inc. Core Security Patterns provides a comprehensive patterns-driven approach and methodology for effectively incorporating security into your applications. I recommend that every application developer keep a copy of this indispensable security reference by their side. --Bill Hamilton, author of ADO.NET Cookbook , ADO.NET in a Nutshell , and NUnit Pocket Reference As a trusted advisor, this book will serve as a Java developers security handbook, providing applied patterns and design strategies for securing Java applications. --Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase Like Core J2EE Patterns , this book delivers a proactive and patterns-driven approach for designing end-to-end security in your applications. Leveraging the authors strong security experience, they created a must-have book for any designer/developer looking to create secure applications. --John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE Patterns Core Security Patterns is the hands-on practitioners guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisionin...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxi, 434 p. , ill. ; , 24 cm
    Series Statement: Robert C. Martin series
    DDC: 005.1
    Keywords: Application software ; Development ; Electronic books ; local
    Abstract: Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your development efforts. In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases. This book draws on material Michael created for his renowned Object Mentor seminars: techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include Understanding the mechanics of software change: adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platformwith examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structure This book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 338 p. , ill. ; , 24 cm
    DDC: 005.2762
    Keywords: Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Easy-to-follow coverage of twelve indispensable Jakarta Commons packages Code examples that show innovative uses of Commons components, including using HttpClient to access Web resources, FileUpload for handling HTTP file uploads, and BeanUtils for easy form generation Detailed instructions for combining the Commons project libraries with the popular Eclipse IDE Save time and money with reusable open source Java™ components Master the Jakarta Commons Library of Open Source JavaTM Components Using the Apache Jakarta Commons reusable Java™ components, you can leverage the work of the global open-source community to solve common programming problems reliably, quickly, and inexpensively. But, to use the Commons libraries effectively, you need far more guidance than the official documentation offers. In Apache Jakarta Commons: Reusable Java™ Components, Will Iverson covers what Java developers need to know to take full advantage of Jakarta Commons-starting right now. Iverson begins with a definitive overview of the Commons project: goals, installation, and getting started with Commons components. Next, he presents example-rich chapters on the twelve most useful Commons packages, covering topics ranging from HTTP FileUpload to database connectivity. Iverson provides detailed code samples for every component he describes. After you've mastered the core Jakarta Commons packages, you'll constantly rely on this book's handy seventy-five page quick-reference. Iverson's coverage includes Downloading Commons project libraries and installing them into Eclipse Programmatically accessing resources via HTTP, FTP, NNTP, and other Internet protocols Using the Jakarta Commons suite of configurable object pools Managing database connectivity in Swing applications-and anywhere containers aren't doing it for you Using BeanUtils to generate forms and gain runtime access to information provided by JavaBeans-style objects Traversing complex object graphs with JXPath Using Jakarta Commons' advanced collections tools to establish richer object relationships Extending java.lang with better methods for manipulating core classes Implementing conversion routines, configurable logging, command-line help, and more Exploring the newest packages, including emerging "sandbox" packages Whether you're building code for front-end Web applications, client-side software, or back-end servers, learning Jakarta Commons will make you far more efficient. Apache Jakarta Commons is the faste...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Language: English
    Pages: 1 online resource (xlviii, 700 p.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Oracle (Computer file) ; Electronic data processing personnel ; Certification ; Study guides ; Electronic books ; local
    Abstract: Here's the book you need to prepare for the Oracle Database 10g Administration II exam, 1Z0-043. This Study Guide was developed to meet the exacting requirements of today's Oracle certification candidates. In addition to the consistent and accessible instructional approach that has earned Sybex the "Best Study Guide" selection in CertCities Readers' Choice Awards for two consecutive years, this book provides: Clear and concise information on advanced database administration with Oracle 10g Practical examples and insights drawn from the authors' real-world experiences Leading-edge exam preparation software, including a test engine and electronic flashcards You'll also find authoritative coverage of key exam topics, including: Configuring Recovery Manager Understanding the Flashback Database Recovering from User Errors Working with Globalization Support Using the Scheduler to Automate Tasks Monitoring and Managing Storage Securing the Oracle Listener Look to Sybex for the knowledge and skills needed to succeed in today's competitive IT marketplace.
    Note: Description based on print version record. - "Exam 1Z0-043"--Cover. - "Featuring Leading-Edge exam prep software: Custom testing engine, hundreds of sample questions, two bonus exams, electronic flashcards for PCs, pocket PCs, and Palm handhelds"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    San Jose, Calif. ; : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xvii, 533 p. , ill. ; , 23 cm
    Edition: 3rd ed. /
    DDC: 005.8
    Keywords: Linux (Computer file) ; Computer security ; Electronic books ; local
    Abstract: An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall optimization along with some advanced concepts including customizing the Linux kernel to enhance security.The third edition, while distribution neutral, has been updated for the current Linux Kernel and provides code examples for Red Hat, SUSE, and Debian implementations. Don't miss out on the third edition of the critically acclaimed Linux Firewalls .
    Note: Previous ed.: published as by Robert L. Ziegler. Indianapolis, Ind.: New Riders, 2001
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xiii, 324 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.
    Note: "Writing, hacking, and modifying security tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 238 p. , ill. ; , 24 cm
    Keywords: Linux ; Computer security ; Electronic books ; local
    Abstract: The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: A readable and concrete explanation of SELinux concepts and the SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With SELinux , a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR ; | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 395 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Praise for Rapid J2EE Development "The author provides a good survey of the technologies and approaches for rapid development in the J2EE arena. He touches on all areas that should be of interest to a reader, from design through testing. He illustrates the different phases of rapid development by going into several technologies in depth, and he also lists or otherwise mentions other available technologies. I would recommend this book to anyone looking to get started with developing J2EE applications." -Beth Stearns, Consultant, ComputerEase Publishing "This book has a lot of great material in it. The author really shows his experience in the subject matter. The content is excellent. I haven't seen another book that is as comprehensive or contains as many real-world lessons learned." -Madhu Siddalingaiah, Consultant, SEA Corporation "I think the book does a good job of presenting a set of processes and technologies that enable rapid development. I think this is an extremely useful book, and I would recommend it to others." -Satadip Dutta, Software Engineer, HP "The author skillfully presents a collection of tools, technologies and processes that facilitate rapid development of J2EE applications. I see this book as a valuable addition to any company bookshelf, especially given its broad application across the software lifecycle. It's also quite amazing that a Google search does not reveal any existing publications with this title. This book should neatly fill that hole." -Martin Westacott, Director and Senior Consultant, Solstice Software Limited, U.K. "If you ever needed to put some polish to your J2EE development understanding or would like to move into the role of Senior J2EE Developer, then this is the book for you. The author covers everything you need to take you from design to coding to build process. Along the way he introduces some new valuable 'leading-edge' technologies. All this will leave you with good capabilities to tackle most J2EE projects confidently." -Shane Griggs, J2EE Architect Learn to accelerate J2EE development, from design through testing and beyond. Covers agile development, model-driven architecture, code generation, aspect-oriented programming, test-driven development, and much more. An essential resource for every J2EE developer, project leader, and manager. J2EE is today's premier platform for enterprise-level development, but it's difficult to deliver J2EE solutions as quickly as today's businesses need them. This...
    Note: Includes bibliographical references (p. 375-377) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Emeryville, Calif. : McGraw-Hill/Osborne | Boston, Mass. :Safari Books Online,
    ISBN: 9780072231458 , 0072231459
    Language: English
    Pages: xxi, 684 p , ill.
    Keywords: Oracle (Computer file) ; Database management ; Relational databases ; Electronic books ; local
    Abstract: Everything a DBA needs to know in one volume--this is the must-have reference for anyone working with the Oracle database, and it's been fully revised and updated for Oracle Database 10 g . Co-author Kevin Loney is the all-time, best-selling Oracle Press author.
    Note: Title from resource description page (viewed May 17, 2009). - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 381 p. , ill. ; , 23 cm
    Keywords: Computer networks ; Security measures ; Computer security ; Computer security ; United States ; Management ; Data protection ; Data protection ; Management ; Electronic books ; local
    Abstract: Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization's aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board. Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow fin...
    Note: "Understand the total cost of ownership and return on investment for network security solutions"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xiii, 270 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysis But the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.
    Note: "Solutions and examples for Snort administrators"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xii, 177 p. , ill. ; , 26 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer security ; Computers ; Access control ; Data protection ; Identity theft ; Electronic books ; local
    Abstract: From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances shows you how to regain control of your life. You'll learn how to keep private information private, stop nosy bosses, get off that incredibly annoying mailing list, and more. Unless you know what data is available about you and how to protect it, you're a sitting duck. Computer Privacy Annoyances is your guide to a safer, saner, and more private life. Written by privacy pro Dan Tynan, and based on interviews with privacy experts from all over the globe, Computer Privacy Annoyances serves up real-world advice in bite-sized portions that will help you stop the snoops in their tracks. The book even addresses non-computing threats, from telemarketer-cum-stalkers, thieves at your mailbox, nosy folks in your HR department, cell phone eavesdroppers, and more. The key areas covered include: Privacy at Home Privacy on the Net Privacy at Work Privacy in Public Privacy and Uncle Sam Privacy in the Future Daniel Tynan has written about Internet privacy and security for nearly a decade. His work has appeared in more than 40 national publications. As executive editor at PC World , Tynan edited a special issue on Internet Privacy that won a Grand Neal Award and was a finalist for a National Magazine Award. He has won more than a dozen other honors, including nine Neals, four Maggies, and two Computer Press Association Awards.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 504 p. , ill. ; , 23 cm
    DDC: 005.5
    Keywords: Microsoft Office ; Application software ; Development ; Microsoft .NET ; Electronic books ; local
    Abstract: This book delivers real-world strategies and coding techniques for creating Microsoft Office-based solutions that work seamlessly in the .NET environment-information that's been put to work by Microsoft's own product support and development teams.
    Note: At head of title: Microsoft. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Language: English
    Pages: xv, 184 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Series Statement: A developer's notebook
    Keywords: Application software ; Development ; Spring (Computer program language) ; Electronic books ; local
    Abstract: Since development first began on Spring in 2003, there's been a constant buzz about it in Java development publications and corporate IT departments. The reason is clear: Spring is a lightweight Java framework in a world of complex heavyweight architectures that take forever to implement. Spring is like a breath of fresh air to overworked developers.In Spring, you can make an object secure, remote, or transactional, with a couple of lines of configuration instead of embedded code. The resulting application is simple and clean. In Spring, you can work less and go home early, because you can strip away a whole lot of the redundant code that you tend to see in most J2EE applications. You won't be nearly as burdened with meaningless detail. In Spring, you can change your mind without the consequences bleeding through your entire application. You'll adapt much more quickly than you ever could before. Spring: A Developer's Notebook offers a quick dive into the new Spring framework, designed to let you get hands-on as quickly as you like. If you don't want to bother with a lot of theory, this book is definitely for you. You'll work through one example after another. Along the way, you'll discover the energy and promise of the Spring framework.This practical guide features ten code-intensive labs that'll rapidly get you up to speed. You'll learn how to do the following, and more: install the Spring Framework set up the development environment use Spring with other open source Java tools such as Tomcat, Struts, and Hibernate master AOP and transactions utilize ORM solutions As with all titles in the Developer's Notebook series, this no-nonsense book skips all the boring prose and cuts right to the chase. It's an approach that forces you to get your hands dirty by working through one instructional example after another-examples that speak to you instead of at you.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Language: English
    Pages: xviii, 714 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computerinteraction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security & Usability groups 34 essays into six parts: Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems--how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems--methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 377 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/762
    Keywords: Apache (Computer file : Apache Group) ; Application software ; Development ; Java (Computer program language) ; Open source software ; Electronic books ; local
    Abstract: As a Java developer, you're always looking for tools to help in your web and application development. Maybe you've heard of the Jakarta Commons open source Java tools. The Jakarta Commons is an open source Jakarta subproject where developers create and maintain a collection of twenty-plus independent Java components and utilities that serve useful purposes. Jakarta Commons packages include utilities for web, XML, networking, building and testing applications, and some that help other packages work better together. Jakarta Commons packages are designed to be reusable. Each one is a time saver by itself, and when used in combination the results can be very powerful. But in searching for information on the Jakarta Commons tools, you find it hard to locate documentation relevant to your needs. You don't have lots of time to spend searching for information on a specific Jakarta Commons tool to determine what it does and how to incorporate it in your code. If you are looking for a single source for clear information and samples on how to use the Jakarta Commons tools, then the Jakarta Commons Cookbook is for you. The Jakarta Commons Cookbook summarizes each of the available Jakarta Commons packages and contains practical and efficient recipes for making the most out of the Jakarta Commons open source Java tools. You don't have to be an expert, since the book explains how and why to use a utility, pitfalls to avoid, and where to look for additional information on Jakarta Commons utilities. It introduces design possibilities and explores combining Jakarta Commons utilities in novel assemblies to create complex applications. The book offers detailed code samples and insider tips--making it a valuable resource whether you are an expert Java developer or a novice. If you want to quickly learn how to use Jakarta Commons timing-saving utilities or have an invaluable resource for Jakarta Commons questions and techniques, then the Jakarta Commons Cookbook is for you.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 554 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.75/65
    Keywords: Oracle (Computer file) ; Database management ; Electronic books ; local
    Abstract: Despite its wide availability and usage, few developers and DBAs have mastered the true power of Oracle SQL Plus. This bestselling book--now updated for Oracle 10g--is the only in-depth guide to this interactive query tool for writing SQL scripts. It's an essential resource for any Oracle user.The new second edition of Oracle SQL Plus: The Definitive Guide clearly describes how to perform, step-by-step, all of the tasks that Oracle developers and DBAs want to perform with SQL Plus--and maybe some you didn't realize you could perform.With Oracle SQL Plus: The Definitive Guide, you'll expertly: write and execute script files generate ad hoc reports extract data from the database query the data dictionary tables customize an SQL Plus environment and much more It also includes a handy quick reference to all of its syntax options and an often-requested chapter on SQL itself, along with a clear, concise, and complete introduction.This book is truly the definitive guide to SQLPlus. It's an indispensable resource for those who are new to SQL*Plus, a task-oriented learning tool for those who are already using it, and an immediately useful quick reference for every user. If you want to leverage the full power and flexibility of this popular Oracle tool, you'll need this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 445 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: FreeBSD ; OpenBSD ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Abstract: FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure.FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems.Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate.Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Harlow : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 347 p. , ill. ; , 24 cm. +
    DDC: 005.8
    Keywords: Business enterprises ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Praise for J.C. Cannon's Privacy "A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between." -Peter Wayner, author of Translucent Databases "Cannon provides an invaluable map to guide developers through the dark forest created by the collision of cutting-edge software development and personal privacy." -Eric Fredericksen, Sr. Software Engineer, PhD., Foundstone, Inc. "Cannon's book is the most comprehensive work today on privacy for managers and developers. I cannot name any technical areas not covered. No practitioners should miss it." -Ray Lai, Principal Engineer, Sun Microsystems, Inc., co-author of Core Security Patterns and author of J2EE Platform Web Services "Every developer should care deeply about privacy and this is the best book I've read on the subject. Get it, read it, and live it." -Keith Ballinger, Program Manager, Advanced Web Services, Microsoft "J.C. Cannon's book demonstrates that information and communication technology can contribute in a significant way to restoring individual privacy and raises more awareness of the complexity and importance of this societal problem." -Dr. John J. Borking, Former Commissioner and Vice-President of the Dutch Data Protection Authority "If you are planning, implementing, coding, or managing a Privacy campaign in your company or your personal computing, there is no more relevant reference. J.C. Cannon nails the issues." -Rick Kingslan, CISSP, Microsoft MVP-Windows Server: Directory Services and Right Management, West Corporation "It's often been said that security is a process, not a product. Privacy is no different! Unlike other privacy books, J.C. Cannon's book has something valuable to convey to everyone involved in the privacy process, from executives to designers and developers, many of whom aren't thinking about privacy but should be." -Keith Brown, Co-founder of Pluralsight and author of The .NET Developer's Guide to Windows Security and Programming Windows Security "J.C. Cannon's new book on electronic privacy is an important addition to the available works in this emerging field of study and practice. Through many humorous (and occasionally frightening) examples of privacy gone wrong, J.C. helps you better understand how to protect your privacy and how to build privacy awareness into your organization and its development process. Keenly illustrating both the pros and cons of various privacy-e...
    Note: Includes bibliographical references (p. 319-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Electronic books ; local
    Abstract: The Definitive Guide to Protecting Enterprise Data Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecycle Management , leading industry consultant Tom Petrocelli presents a systematic, coherent approach to planning and implementing cost-effective data protection. This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy. Coverage includes A complete, unique framework for considering and planning data protection Understanding storage technology from the standpoint of data protection Architecting more effective backup/restore solutions Using remote copy and replication to keep data synchronized and support immediate failover to hot sites Leveraging core computer security concepts and strategies to protect your most critical data Securing your entire storage infrastructure, not just servers Using policy-driven data protection and Data Lifecycle Management (DLM) to improve security and reduce cost Using ILM to identify your highest-value data and choose the right ways to protect it Data Protection and Information Lifecycle Management is an indispensable resource for IT executives who must plan and implement strategies for data protection; administrators who must protect data on a day-to-day basis; and product managers, consultants, and marketers responsible for crafting superior data-security solutions.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 747 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company. Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. This shorter version of the original work omits much mathematical formalism, making it more accessible for professionals and students who have a less formal mathematical background, or for readers with a more practical than theoretical interest.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 1142 p. , ill. ; , 24 cm
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!" James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker Jamesaccusource.net "Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003." Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com "Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security." Bob Reinsch bob.reinsch@fosstraining.com " Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information." Richard Siddaway, MCSE rsiddaw@hotmail.com "Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security." Michael VonTungeln, MCSE, CTT mvontung@yahoo.com "I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it. Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all." Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net "R...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: "It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding." --Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible." --Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight. "Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine. "Understanding the ultimate attacker's tool provides ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 702 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    DDC: 005.1
    Keywords: Linux ; Application software ; Development ; Electronic books ; local
    Abstract: "The first edition of this book has always been kept within arm's reach of my desk due to the wonderful explanations of all areas of the Linux userspace API. This second edition greatly overshadows the first one, and will replace it." --Greg Kroah-Hartman, Linux kernel programmer Develop Software that Leverages the Full Power of Today's Linux Linux Application Development, Second Edition, is the definitive reference for Linux programmers at all levels of experience, including C programmers moving from other operating systems. Building on their widely praised first edition, leading Linux programmers Michael Johnson and Erik Troan systematically present the key APIs and techniques you need to create robust, secure, efficient software or to port existing code to Linux. This book has been fully updated for the Linux 2.6 kernel, GNU C library version 2.3, the latest POSIX standards, and the Single Unix Specification, Issue 6. Its deep coverage of Linux-specific extensions and features helps you take advantage of the full power of contemporary Linux. Along the way, the authors share insights, tips, and tricks for developers working with any recent Linux distribution, and virtually any version of Unix. Topics include Developing in Linux: understanding the operating system, licensing, and documentation The development environment: compilers, linker and loader, and unique debugging tools System programming: process models, file handling, signal processing, directory operations, and job control Terminals, sockets, timers, virtual consoles, and the Linux console Development libraries: string matching, terminal handling, command-line parsing, authentication, and more Hundreds of downloadable code samples New to this edition The GNU C library (glibc), underlying standards, and test macros Writing secure Linux programs, system daemons, and utilities Significantly expanded coverage of memory debugging, including Valgrind and mpr Greatly improved coverage of regular expressions IPv6 networking coverage, including new system library interfaces for using IPv6 and IPv4 interchangeably Coverage of strace, ltrace, real-time signals, poll and epoll system calls, popt library improvements, Pluggable Authentication Modules (PAM), qdbm, and much more Improved index and glossary, plus line-numbered code examples
    Note: Includes bibliographical references (p. 679-682) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Note: Includes bibliographical references (p. [389]-395) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 320 p. , ill. ; , 24 cm +
    Edition: 1st ed.
    DDC: 004.67/8
    Keywords: WebSphere ; Application software ; Development ; Web servers ; Computer programs ; Web site development ; Electronic books ; local
    Abstract: Make the most of completely revamped administration tools in WebSphere Version 5 IBM WebSphere Version 5 offers a completely rewritten, radically improved infrastructure for administering servers and applications. Now, its creators have written the definitive WebSphere Version 5 administration reference and tutorial: everything you need to manage WebSphere to the highest levels of performance and efficiency. The authors systematically cover all four WebSphere administration toolsets: command-line utilities, the new Administrative Console, scripting tools, and Java management APIs. You'll find a complete library of code examples, plus powerful new insider's tips for maximizing your productivity as a WebSphere administrator. Whether you're managing WebSphere Version 5 or incorporating administrative support into new WebSphere applications, this book provides you with the techniques, examples, and tips you need to do it right. Fundamentals of WebSphere administration: servers, nodes, node agents, cells, clusters, and the deployment manager Revamped package structure of WebSphere Version 5 and its implications Process internals, distributed administration features, administrative security, and XML configuration file structure Command-line tools: a complete reference with practical examples Web-based graphical management with the new Administrative Console Scripting the management features of WebSphere Version 5 with wsadmin Writing custom management programs Extending the native WebSphere administrative system with new managed options Using Java administrative APIs to manage WebSphere applications from other products Sum Includes extensive code examples, real-world scenarios, and best practices
    Note: "Version 5.1 (Trial version)," from CD-ROM. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 418 p. , ill. ; , 23 cm. +
    DDC: 005.13/3
    Keywords: Application software ; Development ; Internet programming ; Java (Computer program language) ; Web servers ; Web site development ; Java (Langage de programmation) ; Logiciels d'application ; Développement ; Programmation sur Internet ; Serveurs Web ; Sites Web ; Développement ; Electronic books ; local
    Abstract: Written by Sun Microsystems' Java™ BluePrints team, Designing Web Services with the J2EE™ 1.4 Platform is the authoritative guide to the best practices for designing and integrating enterprise-level Web services using the Java 2 Platform, Enterprise Edition (J2EE) 1.4. This book provides the guidelines, patterns, and real-world examples architects and developers need in order to shorten the learning curve and start building robust, scalable, and portable solutions. The authors use the Java Adventure Builder application to bring the design process to life and help illustrate the use of Java APIs for XML Processing (JAXP), Java APIs for XML-Based RPC (JAX-RPC), and other Web service and Java-XML technologies. Key topic coverage includes: Web service requirements and design issues Support for Web services provided by the J2EE 1.4 platform Designing and implementing Web service end points Writing efficient Web service client applications Designing and developing XML-based applications Integrating applications and data using Web services The J2EE platform security model as it applies to Web services A coherent programming model for designing and developing Web service endpoints and clients Designing Web Services with the J2EE™ 1.4 Platform provides the insight, advice, and detail that make it easier to create effective Web service applications using the J2EE 1.4 platform.
    Note: Includes bibliographical references (p. xx-xxii) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Boston : Prentice Hall Professional Technical Reference, c2005 : [Verlag nicht ermittelbar] | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 567 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Linux ; Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Linux is the fastest-growing Java development platform because it saves money and time by serving as a platform for both development and deployment. But developers face significant platform-specific challenges when managing and deploying Java applications in a controlled production environment. Written for Java and Linux developers alike, Java™ Application Development on Linux® is the hands-on guide to the full Java application development lifecycle on Linux. Determined to spare other developers hours of trial and error, Albing and Schwarz demonstrate the platform, tools, and application development by showing realistic, easy-to-follow examples. After a simple command-line application introduces basic tools, this program leads readers through business-logic object analysis, database design, Java servlet UIs, Java Server Pages (JSP) UIs, Swing GUIs, and Standard Widget Toolkit (SWT) GUIs. Scaling up to the enterprise level provides the opportunity to use both the JBoss Application Server and the Apache Geronimo Application Servers, and Enterprise JavaBeans (EJB). Readers learn how to Use development tools available on Linux, such as the GNU Compiler for Java (gcj), Ant, the NetBeans IDE, IBM's Eclipse Java IDE, JUnit, and SunONE Studio Develop business logic layers using Java DataBase Connectivity (JDBC) Add a Web interface using servlets and JSPs Add a GUI using Sun's Abstract Window Toolkit (AWT) and IBM's SWT Deploy EJBs in Linux The authors conclude by demonstrating how a hierarchy of budgets can be created, tracked, and shared with Concurrent Versions System (CVS). A companion Website includes all source code and a link to each tool described. Java™ Application Development on Linux® can propel you from a standing start to the full-speed development and deployment of Java applications on Linux.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 581 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Enterprise Java™ Security: Building Secure J2EE™ Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java™ 2 Platform, Enterprise Edition (J2EE), and Java™ 2 Platform, Standard Edition (J2SE™), security architectures and offers practical solutions and usage patterns to address the challenges of Java security. To aid developers who need to build secure J2EE applications, Enterprise Java™ Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP™), and Enterprise JavaBeans™ (EJB™)-technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security. Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology. The relationship between Java and cryptographic technologies is covered in great detail, including: Java Cryptography Architecture (JCA) Java Cryptography Extension (JCE) Public-Key Cryptography Standards (PKCS) Secure/Multipurpose Internet Mail Extensions (S/MIME) Java Secure Socket Extension (JSSE)
    Note: Includes bibliographical references (p. 563) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Inside Java™ 2 Platform Security , the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java experts at Sun Microsystems, provides a detailed look into the central workings of the Java security architecture and describes tools and techniques for successful implementation on even the most demanding network computing environment. While Java has always provided a stronger security model than other platforms, this book reviews all the methods and practices required to improve security without sacrificing functionality. With tips on how to customize, extend, and refine the Java security architecture, users will have everything they need to protect their information assets from both external and internal threats. This book's in-depth coverage encompasses security architecture, deployment, customization, new developments, and much more. Security fundamentals Secure class loading Specifying fine-grained security policy Enforcing security policy with AccessController, SecurityManager, and more Digital certificates, certification paths, signed code, JAAS, and other authentication measures Java-based cryptography with code examples JSSE, Java GSS-API, and RMI for network security Previews of other platforms for security, including Java Card, J2ME and Jini Designed for both the system administrator and software practitioner, this book delivers vital knowledge for building and maintaining a secure system using the Java 2 platform. With detailed code and usage examples throughout, Inside Java™ 2 Platform Security, Second Edition , is an indispensable resource for all platform security needs. The Java™ Series is supported, endorsed, and authored by the creators of the Java technology at Sun Microsystems, Inc. It is the official place to go for complete, expert, and definitive information on Java technology. The books in this Series provide the inside information you need to build effective, robust, and portable applications and applets. The Series is an indispensable resource for anyone targeting the Java™ 2 platform.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 647 p. , ill. ; , 23 cm
    Series Statement: Prentice Hall series in computer networking and distributed systems
    DDC: 005.8
    Keywords: Computer crimes ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to come "This is a truly outstanding book-enormous technical wealth and beautifully written." -Warwick Ford "Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!" -Harlan Carvey, CISSP "This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." -Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it! This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes: Solutions and examples that cover both UNIX® and Windows® Practical, time-tested, real-world actions you can take to secure your systems Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly! Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home compu...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall/PTR ; | Boston, MA :Safari,
    Language: English
    Pages: xiv, 578 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Keywords: Application software ; Development ; Business enterprise ; Data processing ; Java (Computer program language) ; Web services ; Electronic books ; local
    Abstract: Build robust, scalable, end-to-end business solutions with J2EE™ Web Services. This is the definitive practitioner's guide to building enterprise-class J2EE Web Services that integrate with any B2B application and interoperate with any legacy system. Sun senior architect Ray Lai introduces 25 vendor-independent architectural patterns and best practices for designing Web Services that deliver outstanding performance, scalability, and reliability. Lai takes you to the frontiers of emerging Web Services technologies, showing how to make the most of today's leading-edge tools, from Java Web Services Developer Pack to Apache Axis. Coverage includes: Web Services: making the business case, and overcoming the technical and business challenges Real-life examples and scenarios, and a start-to-finish application case study Expert guidance on reducing risk and avoiding implementation pitfalls Building complete business solutions with rich messaging and workflow collaboration Mainframe interoperability and B2B integration within and beyond the enterprise Framework and methodology to develop your Web Services patterns and best practices Up-to-the-minute coverage of Web Services security New applications: service consolidation, wireless, and more An extensive library of links to Web resources, reference material, and vendors Whether you're an architect, designer, project leader, or developer, these are the best practices, patterns, and techniques you need to succeed with Web services in your enterprise environment. Enterprises seeking to leverage Web Services to revolutionize the ways they deliver services to customers, partners, and employees will find the answers they need in this book. "Ray Lai's J2EETM Platform Web Services is a comprehensive look at J2EE platform architecture and should be a must read for any serious Web Services developer." -Larry Tabb, Senior Strategic Advisor, Tower Group "This is a book for true practitioners. It's for those interested in designing and implementing Web Services now-and preparing for new opportunities on the horizon." -Jonathan Schwartz, Executive Vice President, Sun Microsystems
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Beijing ; : O'Reilly Media, Inc. | Boston, MA :Safari,
    Language: English
    Pages: xvii, 262 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Application software ; Development ; Client/server computing ; Computer software ; Development ; Database management ; Computer programs ; Relational databases ; Web servers ; Electronic books ; local
    Abstract: The new Oracle Application Server offers a wide range of functionality, including Java runtime and development tools, portal development tools, business intelligence, single sign-on identify management, and much more. It's so powerful and complex, in fact, that many people who use the product (or are considering using it) are familiar with only a portion of the entire range of its capabilities. The choices can be overwhelming. Few people grasp how the larger issues--such as the interplay between components or the various architectural choices in the product--play out in the Oracle Application Server. This new guide provides the perfect introduction to the Oracle Application Server for users of any level. Regardless of which of the server's capabilities you use, you'll benefit from this tightly focused, all-in-one technical overview. It's written for anyone who is concerned with using and managing web servers, doing Java development and deployment, using Oracle's own tools--like Forms and Reports, using or developing for Oracle Portal, or those who use and administer business intelligence, mobile or integration software. Divided into three concise sections, the book covers server basics, core components, and server functionality. The book leads with the history of Oracle Application Server, its architecture, management, standards, and third-party support for languages and tools such as Java, Perl, and HTTP. The next section covers Oracle's web server, containers for Java web caching, and the server's security features. And finally, the book discusses HTML development, Java development, and Oracle development. Although the book refers mainly to Oracle Application Server 10g, the authors also describe features in earlier product releases where necessary, particularly Oracle9i Application Server. More comprehensible than a large reference and more detailed than a primer, the book provides a foundation for understanding and using Oracle Application Server effectively and efficiently. Readers concentrate on the most important issues and components of the server, focusing primarily on principles rather than syntax. Designed to be the ideal first OracleAS book, Oracle Application Server 10g Essentials offers Oracle application developers and administrators everything they need to know about this powerful server.
    Note: "Architecture and components"--Cover. - Includes bibliographical references (p. 233-240) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 269 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Note: "Intrusion detection with open source tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xv, 392 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Abstract: "As usual, Keith masterfully explains complex security issues in down-to-earth and easy-to-understand language. I bet you'll reach for this book often when building your next software application." --Michael Howard, coauthor, Writing Secure Code "When it comes to teaching Windows security, Keith Brown is 'The Man.' In The .NET Developer's Guide to Windows Security, Keith has written a book that explains the key security concepts of Windows NT, Windows 2000, Windows XP, and Windows Server 2003, and teaches you both how to apply them and how to implement them in C# code. By organizing his material into short, clear snippets, Brown has made a complicated subject highly accessible." --Martin Heller, senior contributing editor at Byte.com and owner of Martin Heller & Co. "Keith Brown has a unique ability to describe complex technical topics, such as security, in a way that can be understood by mere mortals (such as myself). Keith's book is a must read for anyone attempting to keep up with Microsoft's enhancements to its security features and the next major version of .NET." --Peter Partch, principal software engineer, PM Consulting "Keith's book is a collection of practical, concise, and carefully thought out nuggets of security insight. Every .NET developer would be wise to keep a copy of this book close at hand and to consult it first when questions of security arise during application development." --Fritz Onion, author of Essential ASP.NET with Examples in C# The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Windows Server 2003, Windows XP, and Windows 2000. Author Keith Brown crystallizes his application security expertise into 75 short, specific guidelines. Each item is clearly explained, cross-referenced, and illustrated with detailed examples. The items build on one another until they produce a comprehensive picture of what tools are available and how developers should use them. The book highlights new features in Windows Server 2003 and previews features of the upcoming version 2.0 of the .NET Framework. A companion Web site includes the source code and examples used throughout the book. Topics covered include: Kerberos authentication Access control Impersonation Network security Constrained delegation Protocol transition Securing enterprise servi...
    Note: Includes bibliographical references (p. 379-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and respond to such attacks and breaches. The Effective Incident Response Team is the first complete guide to forming and managing a Computer Incident Response Team (CIRT). In this book, system and network administrators and managers will find comprehensive information on establishing a CIRT's focus and scope, complete with organizational and workflow strategies for maximizing available technical resources. The text is also a valuable resource for working teams, thanks to its many examples of day-to-day team operations, communications, forms, and legal references. IT administrators and managers must be prepared for attacks on any platform, exploiting any vulnerability, at any time. The Effective Incident Response Team will guide readers through the critical decisions involved in forming a CIRT and serve as a valuable resource as the team evolves to meet the demands of ever-changing vulnerabilities. Inside, readers will find information on: Formulating reactive or preventative operational strategy Forming, training, and marketing the CIRT Selecting penetration-testing, intrusion-detection, network-monitoring, and forensics tools Recognizing and responding to computer incidents and attacks, including unauthorized access, denial-of-service attacks, port scans, and viruses Tracking, storing, and counting incident reports and assessing the cost of an incident Working with law enforcement and the legal community Benefiting from shared resources Scrutinizing closed incidents to further prevention Offering services such as user-awareness training, vulnerability and risk assessments, penetration testing, and architectural reviews Communicating the CIRT's return on investment through management reporting 0201761750B10062003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 426 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: JavaBeans ; Computer security ; Java (Computer program language) ; Servlets ; Web services ; Electronic books ; local
    Abstract: J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place, at the right time, and in the right way. Kumar covers every significant J2SE and J2EE security mechanism, presenting practical implementation techniques for the entire J2EE project lifecycle: analysis, design, development, deployment and operations. The book's example-rich coverage includes: Implementing cryptography with the JCA (Java Cryptography Architecture) and JCE (Java Cryptography Extension) security APIs Building PKI systems with Java: implementing X.509 certificates, Certification Authorities, Certificate Revocation Lists, and repositories Java security managers, policy files, and JAAS: implementing access control based on code origin, code signer and user credentials Securing the wire: Using SSL and the JSSE API to secure data exchange over unprotected networks Ensuring XML message integrity, authentication, and confidentiality with the standards: XML Signature & XML Encryption using the VeriSign TSIK, and Infomosaic SecureXML libraries Addressing security issues in RMI-based distributed applications Developing and deploying servlets and EJBs for authenticated and secure access Securing Web services with transport- and message-based security: SSL for transport-based and WS Security for message-based security Covering security aspects of best-of-breed products: Apache Tomcat, Apache Axis, and BEA WebLogic Server.
    Note: Includes bibliographical references (p. 413-414) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 252 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Biometric identification ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application. In Biometrics for Network Security , biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes: An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
    Note: Includes bibliographical references (p. 239-241) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 450 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.3
    Keywords: Apache (Computer file : Apache Group) ; JavaServer pages ; Application software ; Development ; Internet programming ; Struts framework ; Web site development ; Electronic books ; local
    Abstract: While the look and feel of an enterprise web application is certainly important, developers usually find themselves spending far too much time on the front-end presentation before they can get to coding the good stuff--the business logic at the heart of the program. Jakarta Struts addresses this issue by combining Java Servlets, Java ServerPages (JSP), custom tags, and messaging resources (like Java Message Service) into a unified, re-usable framework. The result is a cooperative, synergistic platform that's efficient and suitable for independent developers, large development teams, and everyone in between. The Struts Framework has become a highly popular open source project, but there's still woefully little documentation on the technology. What does exist is far too basic and lacks critical information for developers like you writing today's complex web applications. The revised and expanded Programming Jakarta Struts , 2nd Edition covers everything the successful earlier edition did--including an overview of the concepts involved in writing web applications; installation and configuration instructions for getting Struts up and running; a thorough discussion of how Struts implements the Model-View-Controller (MVC) design paradigm (known as the Model 2 approach) and how to interface with that pattern in your own applications; Logging, Validation, and Exception Handling with Struts; using Tiles; writing internationalization and localization code using Struts; and practical, real-world best practices for web applications--as well as plenty more: now fully up to date with Struts 1.1, this edition covers the latest material on tag libraries and the new JavaServerFaces (JSF) APIs and even includes all-new chapters on JSF, JSTL/EL, and security. With each enterprise system he s developed, author Chuck Cavaness has spent many grueling hours learning invaluable lessons about Struts and figuring out the dos and the don'ts of building web applications. He saves you time and headaches by sharing that invaluable real-world experience here, with his realistic, practical, here's how to do it approach to using the Struts Framework to its fullest potential.
    Note: "Building Web applications with servlets and JSPs"--cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR ; | Boston, MA :Safari,
    Language: English
    Pages: xvi, 330 p. , ill. ; , 24cm
    DDC: 005.13/3
    Keywords: WebSphere ; Application software ; Development ; Electronic mail systems ; Java (Computer program language) ; Telecommunication ; Message processing ; Electronic books ; local
    Abstract: The real-world guide to JMS messaging with IBM WebSphere technologies This book offers start-to-finish guidance for building reliable, high-performance JMS-based messaging infrastructure with IBM WebSphere technologies. IBM expert Kareem Yusuf systematically introduces the latest versions of JMS-both 1.1 and 1.02b. Once you've thoroughly mastered JMS development on any platform, Yusuf turns to the exceptional JMS support found in IBM's WebSphere products. Using extensive code examples, he walks you step-by-step through WebSphere JMS development, configuration, deployment, and administration in several real-world scenarios. Coverage includes: Roles and goals of messaging infrastructure in the enterprise Key JMS concepts: messaging domains, messages, and Application Server Facilities Defining/structuring content, choosing message types, and manipulating messages The JMS API, explained through detailed code examples Using JMS with EJB, message-driven beans, servlets, and portlets Working with IBM WebSphere JMS providers, administered objects, and tools Hands-on tutorials: EJB message exchange, integration with non-JMS applications, and SSL security Resource location and physical topologies for maximizing availability and efficiency Whether you're developing enterprise messaging infrastructure, architecting it, or managing it, this book delivers indispensable guidance-straight from the frontlines. On the Web Download an extensive library of code samples for JMS 1.1 and 1.02b, including complete functional prototypes built for JMS 1.02b.
    Note: Includes bibliographical references (p. 315-318) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    San Francisco : SYBEX | Boston, Mass. :Safari Books Online,
    ISBN: 9780782143720 , 0782143725
    Language: English
    Pages: xvi, 338 p , ill.
    Keywords: Oracle (Computer file) ; SQL (Computer program language) ; Database management ; Electronic books ; local
    Abstract: The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. Oracle Database Foundations provides essential knowledge about installing, configuring, maintaining, and querying Oracle 9i and 10g databases. What you learn here will benefit you in the short term, as you acquire and practice your skills, and in the long term, as you use them. Topics covered include: Basic relational database concepts Reporting and querying using SQL*Plus and iSQL*Plus Creating and maintaining a database Managing user access and security Understanding Oracle database functions Using multiple tables in a query Restricting, sorting, and grouping data Optimizing database performance Creating backups Troubleshooting database errors
    Note: Title from resource description page (viewed Apr. 27, 2009). - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 745 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Indianapolis, IN : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 784 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Keywords: PowerBuilder ; Application software ; Development ; Internet ; Computer programs ; Electronic books ; local
    Abstract: Version 9 of PowerBuilder introduces many features designed specifically to blend the traditional strength of PowerBuilder as a rapid Client/Server application development tool with the new and emerging models for distributed application development. PowerBuilder developers need PowerBuilder-specific information on interacting with Java application servers, such as WebSphere, WebLogic, and Sybase's Enterprise Application Server (EAServer) and Web Service development. This book presents the new capabilities of PowerBuilder 9 along with the architecture and patterns required to create distributed systems in PowerBuilder.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 828 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 006.7
    Keywords: BEA WebLogic server ; Application software ; Development ; Client/server computing ; Java (Computer program language) ; Web servers ; Electronic books ; local
    Abstract: BEA's WebLogic Server implements the full range of J2EE technologies, and includes many additional features such as advanced management, clustering, and web services. Widely adopted, it forms the core of the WebLogic platform, providing a stable framework for building scalable, highly available, and secure applications. In fact, in the long list of WebLogic's strengths and features, only one shortcoming stands out: the documentation that comes with the WebLogic server often leaves users clamoring for more information. WebLogic: The Definitive Guide presents a 360-degree view of the world of WebLogic. Providing in-depth coverage of the WebLogic server, the book takes the concept of "definitive" to a whole new level. Exhaustive treatment of the WebLogic server and management console answers any question that developers or administrators might think to ask. Developers will find a useful guide through the world of WebLogic to help them apply their J2EE expertise to build and manage applications. Administrators will discover all they need to manage a WebLogic-based setup. And system architects will appreciate the detailed analysis of the different system architectures supported by WebLogic, the overall organization of a WebLogic domain and supporting network infrastructure, and more. WebLogic: The Definitive Guide is divided into three sections that explore WebLogic and J2EE, Managing the WebLogic Environment, and WebLogic Enterprise APIs. Some of the topics covered in this comprehensive volume include: Building web applications on the WebLogic Server Building and optimizing RMI applications Using EJBs with WebLogic, including CMP entity beans Packaging and deploying applications Understanding WebLogic's support for clustering Performance tuning and related configuration settings Configuring WebLogic's SSL support Maximizing WebLogic's security features Building web services with XML Using WebLogic's JMX services and MBeans Anyone who has struggled with mastering the WebLogic server will appreciate the thorough, clearly written explanations and examples in this book. WebLogic: The Definitive Guide is the definitive documentation for this popular J2EE application server.
    Note: "Covers versions 7 & 8.1"--Cover. - "Development, deployment & maintenance"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 488 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Keywords: Application software ; Development ; Business enterprise ; Data processing ; Web services ; Electronic books ; local
    Abstract: "Linthicum provides an insightful overview of the services-integration issues that will enable you to capitalize on current and future integration technologies. He also dives deep into the key Web services technologies for implementing the next generation integration architecture. Highly recommended for those thinking of moving from traditional EAI to Web services." --Dr. Ravi Kalakota, CEO, E-Business Strategies Author of Services Blueprint: Roadmap for Execution For a majority of businesses, application integration is an outright failure. Most companies' computer systems are labyrinthine at best and self-destructive at worst. With the arrival of Web services, the new service-oriented middleware technology standard, and increasingly complex and challenging problem domains, it's time to take application integration to the next level. In Next Generation Application Integration distributed computing and application-integration expert David S. Linthicum describes the effect that this new generation of middleware will have on traditional application-integration efforts. Using key industry examples and case studies, Linthicum reveals the techniques and practices that are necessary to revolutionize data-sharing for any company--from sole-proprietorship to Fortune 500. In this book you'll find a thorough discussion of today's most advanced application-integration concepts, approaches, technologies, and solutions. Written with the technical manager and enterprise architect in mind, this book addresses essential application integration issues such as: Strategies for dealing with complex problem domains Forward-looking approaches to ensure long-term solutions that are right for your company Techniques for implementation of new Web services middleware Introductions to the appropriate technologies for next generation application integration Scenarios for Web services integration Support concepts outlined by case studies and real-world examples Descriptions and analyses of the different types of Web service integration--standards, implementation, and enabling technology Full analysis of Web services and integration, including the relationship between EAI and Web services How to leverage both vertical and horizontal application-integration standards If you're responsible for managing or implementing application-integration middleware, Next Generation Application Integration will prove to be an indispensable resource. 0201844567B07142003
    Note: Includes bibliographical references (p. 463-470) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xvi, 411 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Computer software ; Development ; Relational databases ; Electronic books ; local
    Abstract: Complete tutorial for database developers! Thorough coverage of PL/SQL Practical "cookbook" techniques Effectively create and manage complex databases with Oracle! Systems and database expert Kevin Owens explores PL/SQL, Oracle's answer to the Structured Query Language (SQL), and teaches you what you need to know to build robust and complex databases for your business. Using easy-to-follow instructions and examples, this book presents techniques to take advantage of Oracle features such as triggers and stored procedures-features that allow your databases to incorporate business rules which are easy to manage and modify as the business evolves. Topics covered include: Viewing constraints in the data dictionary Complex rule enforcement PL/SQL program units and language features Data types and composite structure Error handling and exceptions Inter-process communications Declarative constraints, including primary key, unique, foreign key, check, and much more Programming Oracle Triggers and Stored Procedures, Third Edition, is an invaluable resource for database developers, designers, and project leaders looking to build and maintain truly intelligent, complex databases
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxi, 479 p. , ill. ; , 24 cm. +
    Edition: 3rd ed.
    DDC: 005.3
    Keywords: Application software ; Development ; UML (Computer science) ; Electronic books ; local
    Abstract: Learn UML, the Unified Modeling Language, to create diagrams describing the various aspects and uses of your application before you start coding, to ensure that you have everything covered. Millions of programmers in all languages have found UML to be an invaluable asset to their craft. More than 50,000 previous readers have learned UML with Sams Teach Yourself UML in 24 Hours . Expert author Joe Schmuller takes you through 24 step-by-step lessons designed to ensure your understanding of UML diagrams and syntax. This updated edition includes the new features of UML 2.0 designed to make UML an even better modeling tool for modern object-oriented and component-based programming. The CD-ROM includes an electronic version of the book, and Poseidon for UML, Community Edition 2.2, a popular UML modeling tool you can use with the lessons in this book to create UML diagrams immediately.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 472 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: The vast majority of Oracle SQL books discuss some syntax, provide the barest rudiments of using Oracle SQL, and perhaps include a few simple examples. It might be enough to pass a survey course, or give you some buzz words to drop in conversation with real Oracle DBAs. But if you use Oracle SQL on a regular basis, you want much more. You want to access the full power of SQL to write queries in an Oracle environment. You want a solid understanding of what's possible with Oracle SQL, creative techniques for writing effective and accurate queries, and the practical, hands-on information that leads to true mastery of the language. Simply put, you want useful, expert best practices that can be put to work immediately, not just non-vendor specific overview or theory.Updated to cover the latest version of Oracle, Oracle 10g, this edition of the highly regarded Mastering Oracle SQL has a stronger focus on technique and on Oracle's implementation of SQL than any other book on the market. It covers Oracle s vast library of built-in functions, the full range of Oracle SQL query-writing features, regular expression support, new aggregate and analytic functions, subqueries in the SELECT and WITH clauses, multiset union operators, enhanced support for hierarchical queries: leaf and loop detection, and the CONNECT_BY_ROOT operator, new partitioning methods (some introduced in Oracle9i Release 2), and the native XML datatype, XMLType. Mastering Oracle SQL , 2nd Edition fills the gap between the sometimes spotty vendor documentation, and other books on SQL that just don't explore the full depth of what is possible with Oracle-specific SQL. For those who want to harness the untapped (and often overlooked) power of Oracle SQL, this essential guide for putting Oracle SQL to work will prove invaluable.
    Note: "Covers Oracle database 10g"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Note: Includes bibliographical references (p. 321-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xvii, 291 p. , ill. ; , 23 cm
    DDC: 005.75/6
    Keywords: Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Abstract: Fast, easy automation for every Oracle 9 i and 10 g DBA! Quick access to real-world examples Installation, database creation, management, monitoring, tuning, and backup/recovery Oracle Universal Installer (OUI), Oracle Net Configuration Assistant (NetCA), and Oracle Database Configuration Assistant (DBCA) The fast, practical Oracle 9 i /10 g automation reference for every DBA! Automate Oracle-and save your time for more important tasks! This is the Oracle automation reference every working Oracle DBA needs... concise, straightforward, and incredibly easy to use . Discover proven solutions for automating installation, database creation, management, monitoring, tuning, backup/recovery, and more. Keep this book by your desk, near your server...wherever you need fast, reliable automation solutions right now ! Master scripting for both Oracle 9 i and Oracle 10 g ! Use Oracle Universal Installer to create response files for automating any installation Use Oracle Network Configuration Assistant (NetCA) to configure network components during installation Use Oracle Database Configuration Assistant (DBCA) to create and clone databases, and to reverse engineer them into templates and scripts Manage files and tablespaces, tune memory, perform backup/recovery, schedule automated administration tasks, and more Extend and customize any script to your own needs Includes concise reference to Perl DBI and its Oracle-specific components-with real-world examples and syntax
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [United States?] : IBM, International Technical Support Organization | Boston, MA :Safari,
    Language: English
    Pages: xvi, 150 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.3
    Keywords: Application software ; Development ; IBM computers ; Programming ; Electronic books ; local
    Abstract: To solve any mystery, detectives rely on their experience along with proven tools and techniques to unravel the conundrum. This IBM Redbook addresses the often illusive mystery known as software deployment success. The information, practices, and methods presented in this book have enabled many IBM customers to achieve their business and IT goals more quickly and efficiently. IBM has accumulated a wealth of knowledge and experience in software deployment. The technologies we have developed, the best practices we have authored, and the employees we have cultivated are our greatest assets. Like a detective explaining how the mystery was solved, we use this redbook to pass on to you -- our customers -- the experience, knowledge, and wisdom we have accumulated after years of solving software deployment mysteries. The primary audience for this redbook is the person who has ultimate ownership for software deployment performance. We refer to this person as the Enterprise Business Sponsor (EBS). Secondary audiences include anyone who is engaged in software deployment activities. Both audiences benefit from the practices and procedures described.
    Note: "February 2004.". - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...