Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2005-2009  (414)
  • 2005  (414)
  • Safari Tech Books Online  (381)
  • Hann, Chris
  • SpringerLink 〈Online service〉
Material
Language
Years
  • 2005-2009  (414)
Year
  • 1
    Online Resource
    Online Resource
    Language: English
    DDC: 4
    RVK:
    Keywords: Anthropology ; Anthropologie ; Regional ethnology ; Regionale Ethnologie ; Ethnologie régionale ; General theory ; Universaltheorie ; Théorie générale ; General theories ; Comparative analysis ; Vergleichsanalyse ; Analyse comparative ; Socialism ; Sozialismus ; Socialisme ; Eurasia (no further specification) ; Eurasien (ohne genauere Angaben) ; Fachgrenzen und das Verhältnis zu anderen Wissenschaften ; Anthropology, its scope and its relations to the other sciences ; Theorie der Ethnologie (Volks- und Völkerkunde) ; Anthropology theory ; Methoden und Techniken der Ethnologie ; Methods and techniques ; Politsche Anthropologie ; Politcal anthropology ; Eurasien ; Eurasia ; Europe ; Asia ; Vergleichende Kulturanthropologie ; Individuelle Publikationen ; Arbeitspapier, Preprint
    Note: Informationen zur Ressource: 1615-4568
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Language: English
    DDC: 561
    RVK:
    Keywords: History ; Geschichte ; Histoire ; Ethnopolitics ; Ethnopolitik ; Ethnopolitique ; Ethnicity ; Ethnizität ; Ethnicité ; Turkey ; Türkei ; Historische Quellen ; Historical material ; Politsche Anthropologie ; Politcal anthropology ; Allgemeine Arbeiten zu sozialer und kultureller Identität ; General works of social and cultural Identity ; Naher und Mittlerer Osten (Vorderasien) ; Near and Middle East ; Turkey ; Ethnizität ; Individuelle Publikationen ; Arbeitspapier, Preprint
    Note: Informationen zur Ressource: 1615-4568
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    Halle : Max Planck Inst. for Social Anthropology
    ISSN: 1618-8683
    Language: English
    Pages: IV, 133 S. , Ill.
    RVK:
    RVK:
    Keywords: Wirtschaft ; Property Cross-cultural studies ; Property ; Eigentum ; Former communist countries Economic conditions ; Aufsatzsammlung ; Aufsatzsammlung ; Eigentum
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    Halle/Saale : Max Planck Inst. for Social Anthropology
    Language: English
    Pages: IV,133 S.
    DDC: 306.32
    RVK:
    RVK:
    URL: Inhaltsverzeichnis  (kostenfrei)
    URL: Inhaltsverzeichnis  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISSN: 1618-8683
    Language: English
    Keywords: Eigentum Wirtschaftsethnologie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Article
    Article
    In:  2005, S. 137-141.
    Language: German
    Angaben zur Quelle: 2005, S. 137-141.
    Note: Chris Hann
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Article
    Article
    In:  2005, S. 124-131.
    Language: German
    Angaben zur Quelle: 2005, S. 124-131.
    Note: Chris Hann
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Article
    Article
    In:  2005, S. 161-171.
    Language: German
    Angaben zur Quelle: 2005, S. 161-171.
    Note: Chris Hann
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Article
    Article
    In:  A _handbook of economic anthropology Cheltenham, 2005, S. 110-124
    Language: English
    Titel der Quelle: A _handbook of economic anthropology
    Angaben zur Quelle: Cheltenham, 2005, S. 110-124
    Note: Chris Hann
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Article
    Article
    In:  A _handbook of economic anthropology Cheltenham, 2005, S. 547-557
    Language: English
    Titel der Quelle: A _handbook of economic anthropology
    Angaben zur Quelle: Cheltenham, 2005, S. 547-557
    Note: Chris Hann
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Article
    Article
    In:  Property relations: the Halle Focus Group, 2000-2005 Halle (Saale) 2005, S. 2-12
    Language: English
    Titel der Quelle: Property relations: the Halle Focus Group, 2000-2005
    Angaben zur Quelle: Halle (Saale) 2005, S. 2-12
    Note: Chris Hann
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Language: English
    Angaben zur Quelle: 2004-2005, S. 144-147.
    Note: Juraj Buzalka, László Fosztó, Chris Hann, Monica Heintz, Stéphanie Mahieu, Vlad Naumescu, and Tanya Richardson
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Article
    Article
    In:  Bewegliche Horizonte Leipzig 2005, S. 445-458.
    Language: German
    Titel der Quelle: Bewegliche Horizonte
    Angaben zur Quelle: Leipzig 2005, S. 445-458.
    Note: Chris Hann
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Article
    Article
    In:  Property relations: the Halle Focus Group, 2000-2005 Halle (Saale) 2005, S. 42-45
    Language: English
    Titel der Quelle: Property relations: the Halle Focus Group, 2000-2005
    Angaben zur Quelle: Halle (Saale) 2005, S. 42-45
    Note: Chris Hann
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    ISBN: 9781587050404 , 1587050404
    Language: English
    Pages: xxxiii, 696 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    DDC: 621.382
    Keywords: Signaling system 7 ; Telecommunication systems ; Telephone switching systems, Electronic ; Telephone systems ; Electronic books ; local ; Telecommunication systems ; Telephone switching systems, Electronic ; Telephone systems ; Téléphonie ; Système de signalisation 7 ; Téléphone ; Systèmes de commutation électronique ; Signaling system 7 ; Telecommunication systems ; Systèmes de télécommunications ; Telephone systems
    Abstract: A complete, practical guide to the world's most popular signaling system, including SIGTRAN, GSM-MAP, and Intelligent Networks. Provides in-depth coverage of the SS7 protocols, including implementation details Covers SS7 over IP (SIGTRAN) using real-world examples Covers SS7/C7 from both a North American and European perspective, providing a broad international understanding of the technology and associated standards Explains mobile wireless concepts and signaling, including mobile application part (MAP) Provides a thorough explanation of the Intelligent Network (IN) and associated protocols (INAP/AIN) Signaling System No. 7 (SS7) is a signaling network and protocol that is used globally to bring telecommunications networks, both fixed-line and cellular, to life. SS7 has numerous applications and is at the very heart of telecommunications. Setting up phone calls, providing cellular roaming and messaging, and supplying converged voice and data services are only a few of the ways that SS7 is used in the communications network. SS7 also provides the point of interconnection between converging voice and data networks. This transition, which affects everyone who works with the data network, has bolstered the need for practical and applied information on SS7. In short, anyone who is interested in telecommunications should have a solid understanding of SS7. Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services will help you understand SS7 from several perspectives. It examines the framework and architecture of SS7, as well as how it is used to provide today's telecommunications services. It also examines each level of the SS7 protocol-all the way down to the bit level of messages. In addition, the SIGTRAN standards are discussed in detail, showing the migration from SS7 to IP and explaining how SS7 information is transported over IP.
    Note: Includes bibliographical references (p. [665]-673) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    ISBN: 9780596517168 , 0596517165 , 0596005040
    Language: English
    Pages: xxxv, 816 p. , ill. ; , 24 cm
    Parallel Title: Erscheint auch als
    DDC: 384.5/35
    Keywords: Flash (Computer file) ; Mobile communication systems ; Multimedia communications ; Electronic books ; local ; Flash (Computer file) ; Mobile communication systems ; Multimedia communications ; Réseaux multimédias ; TECHNOLOGY & ENGINEERING ; Mobile & Wireless Communications ; Flash (Logiciel) ; Radiocommunications mobiles
    Abstract: With the advent of Flash Communication Server MX (FCS), Macromedia believes that it's on the edge of a breakthrough in how people think about the Internet. FCS has been designed to provide web developers with the means to add polished interactive audio and video features to their sites, the sort of features that users have come to expect. Naturally, the process of efficiently integrating rich media into applications, web sites, and web content is a complex one, to say the least. That's where Programming Flash Communication Server factors in. As the foremost reference on FCS, it helps readers understand how FCS can facilitate: Video on demand Live webcasts Video chat and messaging Shared desktop conferences Live auctions Interactive whiteboard presentations Workflow collaboration Multi-user games Programming Flash Communication Server not only explains how to use the pre-built FCS components to construct a simple application, it also explains the architecture so that developers can program custom components to make even more advanced applications. In addition, the book explains how to truly optimize performance, and talks about considerations for networked applications as well as the media issues pertaining to FCS. Programming Flash Communication Server gives developers a sorely needed leg up on this potentially intimidating technology. It lets users develop cool web applications ranging from direct dating experiences with real-time video, to pre-recorded corporate presentations, to news services with video and audio, and much more. At last, the ability to build web sites with rich interactive features--minus the complex downloads and installation hassles--is a reality. And now, with Programming Flash Communication Server from O'Reilly by your side, you can do more quickly and easily than you ever dreamed possible.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A comprehensive guide to analyzing the business rationale for WLANs Evaluate the business rationale behind the deployment of WLANs, including return on investment (ROI), net present value, payback period, and total cost of ownership Develop a robust execution plan to deploy and operate the WLAN Understand the high-level technical issues of deploying and managing your WLAN from a business decision-maker's perspective Maximize the positive impact of supplementary and complementary services such as voice, video, and guest WLAN access Identify potential security threats and develop strategies to mitigate attacks Learn methodological and technical best practices from WLAN deployment case studies featuring real-world, enterprise-class businesses and institutions Gather information easily by referring to quick reference sheets and appendixes covering an antenna overview, a high-level sample project plan, checklists, and flowcharts Businesses today are increasingly adopting wireless LANs (WLANs) as a primary data transport mechanism. To determine when and how to effectively deploy WLANs, business managers, project managers, and IT executives need a clear, holistic evaluation of the business benefits and risks behind this complex technology solution. The Business Case for Enterprise-Class Wireless LANs helps you make the right decisions by explaining the business value and cost of investing in a WLAN-from security and architecture to deployment and application. Using a lifecycle perspective, this guide covers the value proposition, cost justification, and alignment of security, design, and operational components within the business. Written in an approachable style, The Business Case for Enterprise-Class Wireless LANs provides a baseline analysis of WLAN technologies for a large-scale deployment and includes concise real-world case studies with checklists and flowcharts that you can adapt for your needs. By recognizing the obstacles and advantages of implementing a WLAN from a strategic and justified business perspective, you can apply the economic benefits to your organization and ensure a timely and efficient deployment of your organization's WLAN. This volume is in the Network Business Series offered by Cisco Press®. Books in this series provide IT executives, decision makers, and networking professionals with pertinent information about today's most important technologies and business strategies.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The all-in-one practical guide to supporting your Cisco network Provides detailed tips for using freeware and open-source tools readily available from the Internet, including the reasons behind choosing a particular tool Refer to a single source for common Cisco network administration issues Dedicated section for network security aids administrators in effectively dealing with security issues Deploy fully functional RADIUS and TACACS+ for servers for controlling access to Cisco devices Deploy Linux- and Windows-based syslog servers to centrally collect syslog information generated by Cisco devices Deploy Linux- and Windows-based network monitoring systems to monitor interface traffic through Cisco devices including routers, switches, VPN concentrators, and Cisco PIX® firewalls Use the trending feature of network monitoring systems for long-term network analysis and capacity planning Automatically detect and report configuration changes on Cisco IOS® Software-based devices and Cisco PIX firewalls Deploy Cisco-based VPNs in mixed environments using Linux- and Windows-based VPN servers Network Administrators Survival Guide solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco® networks using freeware tools. It is a single reference source that explains particular issues, their significance for administrators, and the installation and configuration process for the tools. The solutions are Cisco centric and provide detail not available in generic online information. Network Administrators Survival Guide emphasizes solutions for network managers and administrators of small to medium-sized businesses and enterprises. Each chapter is broadly based on a network administration function, starting with an overview of the topic, followed by the methodology involved to accomplish that function. This includes the tools available, why they are the right choice, and their installation, configuration, and usage methods. For any given function, Network Administrators Survival Guide covers both Windows- and Linux-based tools as appropriate. Most of the Windows-based tools offer the advantage of GUI for ease of use, whereas the Linux-based tools are command-line based and can be used in automated scripts. Both are significant for network administrators. Based on author Anand Deveriya's extensive field experience, this practical guide to maintaining Cisco networks will save you signifi...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A complete configuration manual for MPLS, MPLS VPNs, MPLS TE, QoS, Any Transport over MPLS (AToM), and VPLS Understand the crucial Cisco commands for various MPLS scenarios Understand fundamentals of MPLS operation and learn to configure basic MPLS in Frame Relay and ATM-based environments Master fundamentals of MPLS VPN operation including Multiprotocol BGP (MBGP) operation, VPNv4 route exchange, and basic MPLS VPN configuration in the provider network Understand and configure various PE-CE routing protocols in MPLS VPN networks Understand MPLS VPN provisioning in an Inter-provider VPN (Inter-AS) and Carrier Supporting Carrier (CSC) environment Learn MPLS TE and its advanced features Examine AToM with configuration examples for like-to-like and any-to-any L2 VPN implementations and VPLS components and operation, VPLS configuration and verification, and VPLS topologies Learn about MPLS QoS, including configuration and implementation of uniform and short pipe modes MPLS Configuration on Cisco IOS Software is a complete and detailed resource to the configuration of Multiprotocol Label Switching (MPLS) networks and associated features. Through its practical, hands-on approach, you'll become familiar with MPLS technologies and their configurations using Cisco IOS® Software. MPLS Configuration on Cisco IOS Software covers basic-to-advanced MPLS concepts and configuration. Beyond its emphasis on MPLS, you'll learn about applications and deployments associated with MPLS, such as traffic engineering (TE), Layer 2 virtual private networks (VPN), and Virtual Private LAN Service (VPLS). You'll receive practical guidance and deployment scenarios that can be enhanced by re-creation of the setups and configurations demonstrated within this book. You'll move quickly from a brief overview of MPLS technology and basic MPLS configuration on Cisco® routers to more advanced topics. Several chapters provide instruction on VPN connectivity options, including implementing Border Gateway Protocol (BGP) in MPLS VPNs. You'll receive configuration guidelines for advanced MPLS implementations such as MPLS TE, quality of service (QoS), and extranet VPNs. You'll learn about implementation of Layer 2 VPNs versus Layer 3 VPNs with Cisco Any Transport over MPLS (AToM). And you'll see demonstrations of implementing VPLS on Cisco routers complete with the configurations and platform support. "I highly recommend MPLS Configuration on Cisco IOS Software as required reading for th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Language: English
    Pages: xxxii, 346 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.1
    Keywords: Rational Clearcase ; Software configuration management ; Electronic books ; local
    Abstract: "I wrote that the first edition of this book "communicates much of the experience, wisdom, and insight that was acquired along the way to discovering what SCM best practices are and how to implement/deploy them." The second edition is full of even more practical experience! It not only refines and expands upon earlier strategies and best practices, it also contains even more concrete "how-to" information about implementing and deploying them." -Brad Appleton co-author of Software Configuration Management Patterns: Effective Teamwork, Practical Integration "Read this book when you're getting started with configuration management (CM); read it again in six months and once more two years later. Software Configuration Management Strategies and IBM Rational ClearCase goes beyond the basics to provide a coherent review of CM strategies for projects of all sizes and complexities." -Jennie Brown, CM Specialist IBM Corporation "This book covers practical software configuration management (SCM), ClearCase UCM and ClearCase use for project teams. Every project lead and SCM specialist should (re)read this book before starting a project." -Roger Jarrett, Senior Software Engineer IBM Rational Software "This second edition captures vital Unified Change Management (UCM) features and concepts. It brings the entire UCM feature set full circle and lays the ground work for a successful UCM implementation; Bellagio and Milligan continue where the first edition left off. The inclusion of composite baseline concepts, single stream development, performance tuning, and other features and concepts make this the core of any old or new Unified Change Management implementation. It is rare that a second edition of a book can hold your interest like the first. This publication does just that...this continues to be the standard for users interested in Unified Change Management deployment." -Adam Levensohn, Manager IBM Rational Software Software Configuration Management (SCM) can help even the largest, most complex project teams manage change, so they can deliver higher quality products faster. The First Edition of Software Configuration Management Strategies and Rational ClearCase established itself as the definitive single source for guidance on both SCM best practices and the market's leading product, IBM Rational ClearCase. This fully updated Second Edition systematically addresses the latest ClearCase and ClearQuest® innovations, while offering even deeper insight into S...
    Note: Previous ed.: published under title: Software configuration management strategies and Rational ClearCase / by Brian A. White, 2000. - Includes bibliographical references (p. 325-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 434 p. , ill. ; , 24 cm
    DDC: 004.6/2
    Keywords: BGP (Computer network protocol) ; Electronic books ; local
    Abstract: PRACTICAL BGP "I would recommend this book to network engineers, Internet service providers, network software developers, and IT staff who need to deal with network planning and routing." -Enke Chen, Redback Networks Hands-on guidance for deploying and optimizing BGP networks-enterprise and ISP Now there's a practical guide to deploying and managing BGPv4 in any environment-from small enterprises to the largest Tier 2 and Tier 3 service providers. A team of the world's leading BGP experts brings together powerful insights into network design, configuration, and deployment with the latest version of BGP-including hands-on guidance for leveraging its key enhancements. Coverage includes • Best practices and diverse real-world scenarios for applying BGPv4 • Understanding the impact of BGP design on local networks and the global Internet backbone • Building effective BGP policies: aggregation, propagation, accounting, and more • Maximizing scalability and performance in BGPv4 networks • BGP and network security, including Secure Origin BGP • Deploying BGP/MPLS Layer 3 VPNs • Extensive troubleshooting guidance unavailable in any other book If you're a network engineer or administrator looking to drive maximum reliability and performance from BGP-based networks, Practical BGP will help you get the job done-from start to finish. RUSS WHITE is a Network Protocols Deployment Engineer in Cisco Systems Routing DNA Team specializing in routing protocols. A widely recognized expert in networking, he co-chairs the IETF Routing Protocols Security working group, and co-authored Advanced IP Network Design, IS-IS for IP Networks, and Inside Cisco IOS Software Architecture. DANNY McPHERSON is a member of the Architecture Team at Arbor Networks. He has held technical leadership positions with several global ISPs, is active within the IETF, and is an acknowledged expert in Internet architecture and security. He co-authored Internet Routing Architectures, Second Edition. SRIHARI SANGLI , Senior Manager for MPLS and routing development at Procket Networks, was formerly Senior Technical Leader in Cisco's IOS Routing Protocols group. He, along with others at Cisco, coded the industry-first implementation of BGP/MPLS based Layer-3 VPN.
    Note: Includes index. - The author's name Sangli Srihari is listed as Srihari Sangli on cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: This book uses the PMBOK Guide, Third Edition, so that all information is up to date for the new PMP examination. Don't just take the PMP ® exam: Pass it, the first time! Less than 50% of PMP exam candidates actually pass the exam on their first attempt. But one group passes at an amazing 80+% rate: the students of Dr. Rudd McGary, PMP. McGary has spent years teaching the PMP certification exam and helping professional project managers prepare for it. Now, he's integrated all of these techniques and knowledge to assist you in one book: Passing the PMP Exam . Dr. McGary shows you exactly what the Project Management Institute expects from you and exactly how to be prepared for the certification examination. Whatever your experience, he'll help you rapidly achieve deep mastery of PMI's Project Management Body of Knowledge (PMBOK®). Other books cover PMBOK, but this book is relentlessly focused on helping you ace your exam the first time. Learn proven strategies, methods, and tips for passing your PMP exam Master all five project phases: initiation, planning, execution, control, and closing Use the book to become a project management professional in project integration, scoping, scheduling, costs, quality, human resources, communications, risk, and procurement Understand critical project management details, from Work Breakdown Structures (WBS) to change control systems Review the professional conduct and ethics standards you will be tested on Continue to use the book as a valuable resource of practical information after you are certified The accompanying CD-ROM presents Rudd McGary's unique approach to passing the PMP exam. You'll find more valuable content than on any other PMP study guide CD-ROM-including more than 400 sample exam questions and answers! © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.3
    Keywords: Apache Group ; Open source software ; Electronic books ; local
    Abstract: Learn installation, configuration, management, and security Delve deeper with coverage on SQL, troubleshooting, application development, and more Master Apache Derby: the only open source, pure Java™, fully transactional, small-footprint RDBMS Apache Derby is the world's only enterprise class open source, pure Java, fully transactional relational database. It's small enough to be embedded directly into your Java applications, providing a local data store that requires no DBA support. Powerful enough to support a wide range of traditional applications, this database ships as the default database for WebSphere Application Server and more than fifty other IBM software products. Apache Derby is built on the mature IBM Cloudscape code base IBM recently contributed to the open source community. The IBM Cloudscape code was nominated and won Developer.com's Product of the Year 2005 award. Now, IBM's own database experts have written a comprehensive guide to making the most of Apache Derby-and its commercial counterpart, IBM Cloudscape- in any development or production environment. This book systematically introduces the Apache Derby/IBM Cloudscape technology: where it fits and how to install and configure it-and how to build robust business applications and Web services with it, one step at a time. Coverage includes Comparing Apache Derby with the commercial IBM Cloudscape offering Deploying Apache Derby/IBM Cloudscape to support development and production environments, client/server environments, multi-threaded applications, and Web servers Integrating Apache Derby/IBM Cloudscape into a completely open source development environment Specific instruction on installing Apache Derby/IBM Cloudscape on Windows® and Linux® workstations-with tips on how to install the code on any platform that has a supported JVM Understanding how programming languages interact with Apache Derby/IBM Cloudscape Building complete sample applications step-by-step in JDBC, Windows (ODBC and .NET), PHP, Perl, and Python Managing and securing Apache Derby/IBM Cloudscape databases Writing SQL code for creating, retrieving, and updating data Troubleshooting installations, databases, and applications This book has a companion Web site that contains links to the IBM version of Apache Derby and other downloadable code, documentation, articles, and other resources to give the reader a deeper understanding of some of the features available in Apache Derby. ibmpressbooks.com/title/013185...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Boston, Mass. ; : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 651 p. ; , 24 cm
    Edition: 3rd ed.
    Series Statement: The Java series
    DDC: 005.71262
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Written by the inventors of the technology, The Java™ Language Specification, Third Edition , is the definitive technical reference for the Java™ programming language. If you want to know the precise meaning of the language's constructs, this is the source for you. The book provides complete, accurate, and detailed coverage of the Java programming language. It provides full coverage of all new features added since the previous edition, including generics, annotations, asserts, autoboxing, enums, for-each loops, variable arity methods, and static import clauses.
    Note: Previous ed.: 2000
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 306 p. ; , 24 cm
    DDC: 005.1/4
    Keywords: Debugging in computer science ; Electronic books ; local
    Abstract: 50 exercises to help you find bugs faster -- with less aggravation! Bug hunting is an art, and you need to be a master . Get Find the Bug , and you'll become one. Long-time Microsoft programmer Adam Barr presents 50 programs, each with exactly one bug. Your assignment: find it. As you do, Barr will teach you how to "think like your processor"... anticipating exactly how code will behave, even without running it. You'll learn better ways to read code, understand it -- and above all, improve it. Whether you're building new systems or maintaining someone else's, you'll find bugs earlier, faster, with less frustration... and write cleaner code to begin with. Presents "bugged" programs in C, Java, Python, Perl, and x86 assembly language, with carefully explained solutions Includes language overviews to help you debug all 50 examples, even if you don't know the language Shows how to look past the "surface" of code to uncover its hidden internal logic Offers practical guidance on analyzing programs, including specific inputs to test Presents a wide range of realistic bugs, with no phony "gotchas" Draws on the types of coding and debugging challenges Microsoft uses to interview new programmers An indispensable resource for working programmers, maintainers, testers, quality specialists, and everyone involved in code reviews © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 295-298) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Introducing the Boost libraries: the next breakthrough in C++ programming Boost takes you far beyond the C++ Standard Library, making C++ programming more elegant, robust, and productive. Now, for the first time, a leading Boost expert systematically introduces the broad set of Boost libraries and teaches best practices for their use. Writing for intermediate-to-advanced C++ developers, Björn Karlsson briefly outlines all 58 Boost libraries, and then presents comprehensive coverage of 12 libraries you're likely to find especially useful. Karlsson's topics range from smart pointers and conversions to containers and data structures, explaining exactly how using each library can improve your code. He offers detailed coverage of higher-order function objects that enable you to write code that is more concise, expressive, and readable. He even takes you "behind the scenes" with Boost, revealing tools and techniques for creating your own generic libraries. Coverage includes Smart pointers that provide automatic lifetime management of objects and simplify resource sharing Consistent, best-practice solutions for performing type conversions and lexical conversions Utility classes that make programming simpler and clearer Flexible container libraries that solve common problems not covered by the C++ Standard Library Powerful support for regular expressions with Boost.Regex Function objects defined at the call site with Boost.Bind and Boost.Lambda More flexible callbacks with Boost.Function Managed signals and slots (a.k.a. the Observer pattern) with Boost.Signals The Boost libraries are proving so useful that many of them are planned for inclusion in the next version of the C++ Standard Library. Get your head start now , with Beyond the C++ Standard Library.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 312 p. , ill., facsims. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: "The best thinking in the agile development community brought to street-level in the form of implementable strategy and tactics. Essential reading for anyone who shares the passion for creating quality software." -Eric Olafson, CEO Tomax "Crystal Clear is beyond agile. This book leads you from software process hell to successful software development by practical examples and useful samples." -Basaki Satoshi, Schlumberger "A very powerful message, delivered in a variety of ways to touch the motivation and understanding of many points of view." -Laurie Williams, Assistant Professor, North Carolina State University "A broad, rich understanding of small-team software development based on observations of what actually works." -John Rusk "A superb synthesis of underlying principles and a clear description of strategies and techniques." -Géry Derbier, Project Manager, Solistic "Alistair Cockburn shows how small teams can be highly effective at developing fit-for-purpose software by following a few basic software development practices and by creating proper team dynamics. These small teams can be much more effective and predictable than much larger teams that follow overly bureaucratic and prescriptive development processes." - Todd Little, Sr. Development Manager, Landmark Graphics "I find Cockburn's writings on agile methods enlightening: He describes 'how to do,' of course, but also how to tell whether you're doing it right, to reach into the feeling of the project. This particular book's value is that actual project experiences leading to and confirming the principles and practices are so...well...clearly presented." - Scott Duncan, ASQ Software Division Standards Chair and representative to the US SC7 TAG and IEEE S2ESC Executive Committee and Management Board and Chair of IEEE Working Group 1648 on agile methods " Crystal Clear identifies principles that work not only for software development, but also for any results-centric activities. Dr. Cockburn follows these principles with concrete, practical examples of how to apply the principles to real situations and roles and to resolve real issues." - Niel Nickolaisen, COO, Deseret Book "All the successful projects I've been involved with or have observed over the past 19 or so years have had many of the same characteristics as described in Crystal Clear (even the big projects). And many of the failed projects failed because they missed something-such as expert end-user involvement or accessibility ...
    Note: Includes bibliographical references (p. 304-307) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 352 p. , ill. ; , 23 cm. +
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Enter your Linux Desktop Garage Don't just survive with Linux: thrive Find tools & info to do practically everything , such as: Ripping your CDs (&DVDs) De-Spam-ifying your email Capturing, editing, organizing your digital photos Chatting with your Linux-deficient IM pals Tracking your contacts, appointments, life Transforming Firefox into easy blogware Finding great substitutes for your Windows apps Diving into a veritable plethora of games Where you get the truth (unvarnished) Where you get productive (quick) Where Linux is fun (honest) Your guide: Susan Matteson , real user, real expert She reveals the fun stuff (from MP3s to desktop wallpaper) Demystifies the essentials (from file management to passwords) Simplifies the tasks they said were easy, but weren't (until now) Where there's even more (plenty) Step-by-step instructions for both Mandrake & Fedora Linux Zero-hassle tips for managing & personalizing your PC Gnoppix Linux on CD-ROM (run Linux without touching Windows) © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Upper Saddle River, NJ : IBM Press | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 278 p. ; , 24 cm
    DDC: 658/.05
    Keywords: Information technology ; Economic aspects ; Information technology ; Social aspects ; Information technology ; Technological innovations ; Electronic books ; local
    Abstract: How "data everywhere" transforms business, technology, and the way you live A pioneering look at grand, new efficiencies forthcoming As communications, computing, and data storage converge, data is becoming utterly ubiquitous...and that changes everything. In this book, two leading data management visionaries reveal how data transforms the way you do business, the technologies you use, the investments you make, the life you live, and the world you live in. Chris Stakutis and John Webster draw on interviews with nearly 50 leading experts: technologists, sociologists, entrepreneurs, consultants, researchers, media leaders, and futurists alike. You'll discover how today's "primordial soup" of wired and wireless gadgetry is quickly coalescing into something immensely more powerful, driving applications you thought were pure science fiction. You'll also gain deep insight into the profound implications of ubiquitous data capture: implications that touch everything from your bedroom to the battlefield: The emerging "Connectivity Divide." Which side of the chasm are you on? Inescapable data's technical components: Async communications, pervasive computing devices, wireless, and XML Global calendars, momentary enterprises: Transforming your life and business Uncontrolled information availability: Its risks to your security and well-being The future of technical infrastructure, grids, smart storage, and beyond Radical, new modes of information delivery: Nonnumeric, nontextual, unobtrusive Future tech: From holographic displays to fertility "wall clocks" Your DNA on a chip: The heart of your personal health and wellness program © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 338 p. , ill. ; , 24 cm
    DDC: 005.2762
    Keywords: Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Easy-to-follow coverage of twelve indispensable Jakarta Commons packages Code examples that show innovative uses of Commons components, including using HttpClient to access Web resources, FileUpload for handling HTTP file uploads, and BeanUtils for easy form generation Detailed instructions for combining the Commons project libraries with the popular Eclipse IDE Save time and money with reusable open source Java™ components Master the Jakarta Commons Library of Open Source JavaTM Components Using the Apache Jakarta Commons reusable Java™ components, you can leverage the work of the global open-source community to solve common programming problems reliably, quickly, and inexpensively. But, to use the Commons libraries effectively, you need far more guidance than the official documentation offers. In Apache Jakarta Commons: Reusable Java™ Components, Will Iverson covers what Java developers need to know to take full advantage of Jakarta Commons-starting right now. Iverson begins with a definitive overview of the Commons project: goals, installation, and getting started with Commons components. Next, he presents example-rich chapters on the twelve most useful Commons packages, covering topics ranging from HTTP FileUpload to database connectivity. Iverson provides detailed code samples for every component he describes. After you've mastered the core Jakarta Commons packages, you'll constantly rely on this book's handy seventy-five page quick-reference. Iverson's coverage includes Downloading Commons project libraries and installing them into Eclipse Programmatically accessing resources via HTTP, FTP, NNTP, and other Internet protocols Using the Jakarta Commons suite of configurable object pools Managing database connectivity in Swing applications-and anywhere containers aren't doing it for you Using BeanUtils to generate forms and gain runtime access to information provided by JavaBeans-style objects Traversing complex object graphs with JXPath Using Jakarta Commons' advanced collections tools to establish richer object relationships Extending java.lang with better methods for manipulating core classes Implementing conversion routines, configurable logging, command-line help, and more Exploring the newest packages, including emerging "sandbox" packages Whether you're building code for front-end Web applications, client-side software, or back-end servers, learning Jakarta Commons will make you far more efficient. Apache Jakarta Commons is the faste...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Exposes the inner workings of Cisco CallManager to help you maximize your Cisco IP Communications solution Read new content on QSIG, SIP trunks, video support, hunt lists and line groups, time-of-day routing, and new features added in CallManager releases 3.2, 3.3, 3.4, 4.0, and 4.1 Review content from the first edition that has been fully revised and updated to CallManager release 4.1 Learn how to deploy and manage a CallManager solution Understand the components that make up CallManager call routing through the use of basic to advanced examples that solve enterprise call routing problems Gain a full understanding of how CallManager manages media resources and processes information for conferencing, transcoding, annunciation, and more Learn detailed information about North American and international dial plans, trunk and station devices, media resources, and much more Cisco CallManager Fundamentals , Second Edition, provides examples and reference information about Cisco® CallManager, the call-processing component of the Cisco IP Communications solution. Cisco CallManager Fundamentals uses examples and architectural descriptions to explain how CallManager processes calls. This book details the inner workings of CallManager so that those responsible for designing and maintaining a Voice over IP (VoIP) solution from Cisco Systems® can understand the role each component plays and how they interrelate. This book is the perfect resource to supplement your understanding of CallManager. You'll learn detailed information about dial plan management and call routing, hardware and software components, media processing, call detail records, system management and monitoring, and the history of CallManager. The authors, all members of the original team that developed and implemented the CallManager software and documentation from its early stages, also provide a list of features and Cisco solutions that integrate with CallManager. This second edition of Cisco CallManager Fundamentals covers software releases through release 4.1. With this book, you will gain a deeper understanding of the system and find answers to questions not available in any other source. This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxi, 370 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Broadband communication systems ; Extranets (Computer networks) ; MPLS standard ; Electronic books ; local
    Abstract: Implement the design principles and configurations behind MPLS-based VPNs for broadband access networks The book discusses how MPLS and its VPN service are best used in a broadband environment, concentrating on key design issues and solutions, including How to manage tens of thousands of interfaces and host routes and hundreds of dynamic VPNs When a Virtual Home Gateway is necessary Why use dynamic address assignment How routes should be summarized into the core Deploy MPLS VPNs successfully in broadband networks with Building MPLS-Based Broadband Access VPNs . This book helps you understand why and how today's broadband networks function, covering the principal access technologies: DSL, Ethernet, and cable. The book also examines the different tunneling protocols used for VPN solutions today, namely GRE, IPSec, and L2TP, with examples of how these solutions are deployed and a discussion of their strengths and weaknesses. Building MPLS-Based Broadband Access VPNs also includes an in-depth description of the IOS VRF Lite, which helps you use VRF-aware features with an IP core. Detailed descriptions of the technologies, design principles, network configurations, and case studies are provided throughout the book, helping you develop a pragmatic understanding of MPLS-based broadband access VPNs. Obtain a realistic understanding of large-scale broadband access network design requirements Recognize the business impact of using MPLS to provide access VPN services, including the advantages of QoS, availability, and provisioning Use MPLS in access VPN and transport networks and deal with the unique scalability problems that such networks pose Leverage VRF-aware features to deploy IP-based VPNs Includes detailed Cisco IOS configuration examples based on real-world scenarios This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references (p. [341]-355) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: 418 p. ; , 24 cm. +
    DDC: 794.816693
    Keywords: Computer games ; Programming ; Three-dimensional display systems ; Electronic books ; local
    Abstract: There are many programming hobbyists who write 2D games but there are far fewer that grasp the concepts of 3D programming. Although there are also quite a few ¿game development¿ books on the market, few deal with 3D game development. Those that do are mainly aimed at advanced readers. This book will provide a practical, example driven approach to learning the unique art of 3D Game Development that even the beginner can grasp. It won¿t get bogged down in page after page of boring theory but instead will teach through many interesting hands on examples. Tom Miller brings years and years of 3D game programming to the table and couples that with an engaging writing style to mentor readers in the intricacies of game development. The book starts out with a crash course in game programming concepts and then progresses into developing 3 different types of games with many useful tips, notes, and cautions along the way. This title will serve as a useful guide to either current 2D game developers or programmers that want to learn to program games.
    Note: Includes CD-ROM
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Indianapolis, Ind. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 434 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Software patterns ; Electronic books ; local
    Abstract: "Gunnar and Karin have not only defined a large collection of use-case patterns and examples of how specific usages are to be modeled in a use-case model, they have also provided an accurate, complete, and comprehensible description of the constructs used in use-case modeling... I am impressed by this book." -From the Foreword by Ivar Jacobson Employ the proven concept of design patterns to build more accurate, usable, and maintainable use-case models This book brings together dozens of proven patterns for creating use cases that more accurately reflect real requirements, are easier to translate into working systems, and are simpler to maintain. Utilizing these patterns, architects, analysts, engineers, and managers can leverage decades of hard-earned knowledge to achieve far better results, far more quickly. The authors carefully describe how each pattern works, what problems it is intended to solve, and the consequences associated with using it. All patterns are supported with detailed examples and platform-independent class models that demonstrate how they may be realized. All constructs and diagrams reflect the current UML 2.0 standard. This book also includes an insightful use-case primer that will be indispensable both to novices and veteran modelers seeking to become more effective. Coverage includes Modeling rules that lead to more comprehensible, maintainable, and correct models Patterns for structuring, layering, mapping, sequencing, and viewing use cases more effectively Blueprints for security, legacy integration, data input/ output, task scheduling, and reporting Constructing use cases that separate mandatory elements from optional parts that can be delivered separately Incorporating business rules in use-case modeling Practical techniques for documenting use cases more effectively When to use multiple patterns and blueprints together Identifying and avoiding eight common mistakes in use-case modeling: guidance for designers and reviewers Examples from a wide range of application domains Rely on this book as the world's #1 reference to reusable use-case solutions- and as a catalyst for inspiration in all your use-case modeling projects. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 423-424) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Boston : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 665 p. , ill. ; , 24 cm. +
    Keywords: Linux ; Business ; Data processing ; Computer networks ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Switch your business to Linux: proven techniques for working IT Professionals This is the complete technical resource for migrating your business desktops to Linux, administering them efficiently, and using them to drive cost savings throughout your organization. Respected Linux Journal columnist Marcel Gagné walks you step-by-step through planning and managing the transition, getting users up and running, and keeping them happy. Gagné covers hardware, productivity applications, messaging, coexistence with Windows environments, support, and much more. This is also the first book with in-depth coverage of using Linux Terminal Server Project (LTSP) thin clients to dramatically reduce the cost and complexity of computing. Deploy Linux with your existing PCs, printers, and IT/network infrastructure Centrally manage users and security through Webmin's convenient Web interface Deliver reliable email services with Postfix, or integrate Linux mail clients with Microsoft Exchange servers Configure Windows file sharing with Samba, and Linux file sharing with NFS Secure network communications with Linux firewalls and OpenSSH Plan and deploy LTSP thin clients and diskless workstations and the server support for them Provide LDAP directory services to all your clients Support users by "remote control"-without leaving your desk From network security to spam reduction, automated backup/restore to collaboration groupware, Gagné offers specific solutions and proven techniques for leveraging the full power of Linux in your business. Say goodbye to the expense, hassle, and insecurity of Windows desktops! Say hello to business computing the way it's supposed to be-with Linux! About the Author Marcel Gagné is best known as the author of the Linux Journal's "Cooking with Linux" series, winner of the Readers' Choice award for favorite column for three straight years. He has written two highly acclaimed Addison-Wesley books: Moving to Linux and Linux System Administration: A User's Guide. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Sun Microsystems Pr | Boston, MA :Safari,
    Language: English
    Keywords: Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0132354799 ISBN-13: 9780132354790 Completely revised and up-to-date coverage of Multithreading -including the java.util.concurrent library, locks, condition objects, futures, thread pools, thread-safe collections, threads and Swing Collection classes -collections framework, concrete collections, and generic utility methods Annotations and metadata -using annotations to automate programming tasks, JDK™ 5.0 standard annotations, the apt tool for source-level annotation processing, and bytecode engineering Advanced Swing and AWT -lists, trees, tables, and other advanced components; image processing and printing JavaBeans™ -including property editors, customizers, and long-term persistence XML -DOM and SAX parsers, XPath, and XSL transformations The seventh edition of Core Java™ 2, Volume II, covers advanced user-interface programming and the enterprise features of the Java 2 Platform, Standard Edition (J2SE™). Like Volume I (which covers the most important language and library features), this book has been completely updated and revised for J2SE 5.0. All of the sample programs have been updated and carefully crafted to illustrate practical solutions to the type of real-world problems professional developers encounter. Volume II includes new sections on annotations and other J2SE 5.0 enhancements, along with complete coverage of Multithreading Distributed objects Databases JNDI and LDAP Advanced GUI components Native methods XML processing Network programming Collection classes Advanced graphics Internationalization JavaBeans Annotations
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The practical guide to building resilient and highly available IP networks Learn from an all-in-one introduction to new features and developments in building a resilient IP network Enable your organization to meet internal service-level agreements (SLAs) for mission-critical resources Understand how a resilient IP network can help in delivering mission-critical information such as video and voice services Work with configuration examples that are based on real-world issues and customer requirements Get tips and best practices from field personnel who have worked on some of the largest networks with stringent uptime requirements and SLAs More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is of utmost importance to companies and their service providers. The challenges for the professionals responsible for these networks include ensuring that the network remains up all the time, keeping abreast of the latest technologies that help maintain uptime, and reacting to ever-increasing denial-of-service (DoS) attacks. Building Resilient IP Networks helps you meet those challenges. This practical guide to building highly available IP networks captures the essence of technologies that contribute to the uptime of networks. You gain a clear understanding of how to achieve network availability through the use of tools, design strategy, and Cisco IOS® Software. With Building Resilient IP Networks , you examine misconceptions about five-nines availability and learn to focus your attention on the real issues: appreciating the limitations of the protocols, understanding what has been done to improve them, and keeping abreast of those changes. Building Resilient IP Networks highlights the importance of having a modular approach to building an IP network and, most important, illustrates how a modular design contributes to a resilient network. You learn how an IP network can be broken down to various modules and how these modules interconnect with one another. Then you explore new network resiliency features that have been developed recently, categorized with respect to the design modules. Building Resilient IP Networks is relevant to both enterprise and service provider customers of all sizes. Regardless of whether the network connects to the Internet, fortifying IP networks for maximum uptime and prevention of attacks is mandatory for anyone's b...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution A complete resource for understanding VPN components and VPN design issues Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients Discover troubleshooting tips and techniques from real-world scenarios based on the author's vast field experience Filled with relevant configurations you can use immediately in your own network With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs. Part I, "VPNs," introduces the topic of VPNs and discusses today's main technologies, including IPsec. It also spends an entire chapter on SSL VPNs, the newest VPN technology and one that Cisco has placed particular emphasis on since 2003. Part II, "Concentrators," provides detail on today's concentrator products and covers site-to-site and remote-access connection types with attention on IPsec and WebVPN. Part III covers the Cisco VPN Client versions 3.x and 4.x along with the Cisco3002 Hardware Client. Cisco IOS® routers are the topic of Part IV, covering scalable VPNs with Dynamic Multipoint VPN, router certificate authorities, and router remote access solutions. Part V explains Cisco PIX and Cisco ASA security appliances and their roles in VPN connectivity, including remote access and site-to-site connections. In Part VI, a case study shows how a VPN solution is best implemented in the real world using a variety of Cisco VPN products in a sample network. This security book is part of the Cisco Press® Networking Technology Serie...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 1587055740 ISBN-13: 9781587055744 Cisco authorized self-study book for CCDP® 642-871 architectures foundation learning Prepare for the CCDP ARCH exam 642-871 with the Cisco authorized self-study guide. This book teaches you how to: Understand the composition and deployment of the Cisco AVVID framework in network design Understand the composition and role of the Enterprise Composite Network Model in enterprise network design Design enterprise campus networks and their edge network connectivity to the Internet Understand and implement network management solutions in the network Integrate new technologies designed to enhance network performance and availability in the enterprise, such as high availability, QoS, multicasting, and storage and content networking Design and implement appropriate security solutions for enterprise networks Deploy wireless technologies within the enterprise Implement and design IP telephony solutions for the enterprise network CCDP Self-Study: Designing Cisco Network Architectures (ARCH) is a Cisco® authorized self-paced learning tool. By presenting a structured format for the conceptual and intermediate design of AVVID network infrastructures, this book teaches you how to design solutions that scale from small to large enterprise networks and take advantage of the latest technologies. Whether you are preparing for the CCDP® certification or simply want to gain a better understanding of how to architect network solutions over intelligent network services to achieve effective performance, scalability, and availability, you will benefit from the foundation information presented in this book. This comprehensive book provides detailed information and easy-to-grasp tutorials on a broad range of topics related to architecture and design, including security, fine-tuning routing protocols, switching structures, and IP multicasting. To keep pace with the Cisco technological developments and new product offerings, this study guide includes coverage of wireless networking, the SAFE Blueprint, content networking, storage networking, quality of service (QoS), IP telephony, network management, and high availability networks. Design examples and sample verification output demonstrate implementation techniques. Configuration exercises, which appear in every chapter, provide a practical review of key concepts to discuss critical issues surrounding network operation. Chapter-ending revie...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    ISBN: 0789734621 , 9780789734624
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 658.404 S689 2005 [ONLINE]
    Keywords: Project management Study guides Examinations ; Electronic data processing personnel Certification ; Electronic books ; local ; Gestion de projet ; Examens ; Guides de l'étudiant ; Electronic data processing personnel ; Certification ; Project management ; Examinations ; Electronic books ; Study guides
    Abstract: The PMP Exam Cram 2, Second Edition provides PMP exam candidates a condensed and focused study vehicle. Organized for optimal learning of criccal project management steps, it covers all objective areas presented by PMI. Candidates using the PMP Exam Cram 2, Second Edition will be able to easily decipher and effectively use PMI's PMBOK. You'll also find notes, tips and cautions to extend on PMP content, and it will explain the differences between traditional methods of project management and what PMI considers to be good project management techniques. Exam Alerts will help alert you to content that will most likely appear on the PMP exam, and practice questions are found both in the book and on the accompanying CD-ROM. You'll even be prepared for last-minute studying with the Cram Sheet tearcard. Give yourself the best chance possible for a great test score with the PMP Exam Cram 2, Second Edition .
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Upper Saddle River, NJ : IBM Press | Boston, MA :Safari,
    Language: English
    Pages: xxx, 895 p. , ill. ; , 24 cm. +
    DDC: 005.75/65
    Keywords: IBM Database 2 ; Relational databases ; Electronic books ; local
    Abstract: The Easy, Visual Guide to IBM DB2 V8.2 IBM DB2 Universal Database™ V8.2 for Linux®, UNIX®, and Windows® is a flexible, scalable, cost-effective, and easy-to-use enterprise database. Now, one book makes DB2 even easier. Understanding DB2 teaches DB2 V8.2 visually, step by step, with dozens of examples and case studies drawn from the authors' unsurpassed experience as DB2 consultants at IBM. Understanding DB2 doesn't just present the big picture. It thoroughly introduces every DB2 concept, procedure, and tool you'll need to get results as an administrator, user, or developer. You'll find authoritative coverage of installation, configuration, objects, database instances, storage, connectivity, security, performance, backup and recovery, SQL fundamentals, and much more. Virtually every new concept is explained with screenshots, diagrams, or tables, all designed to help you learn faster and remember more. For those preparing for certification, this book also contains over a hundred sample questions crafted by the authors to reflect the content and format of the IBM DB2 UDB Database Administration Certification exams, with answers and detailed explanations. Coverage includes Understanding the DB2 product family, DB2 commands, and the DB2 environment Configuring client and server connectivity: walkthroughs of four typical scenarios Managing DB2 storage: partitions, tablespaces, buffer pools, and more Leveraging the power of SQL: queries, inserts, deletes, and updates Implementing security: encryption, authentication, and authorization Administering and maintaining data, from LOAD and EXPORT to backup/recovery Providing high availability with online split mirroring and suspended I/O DB2 architecture: process and memory models Managing database performance and troubleshooting
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: 360 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The fastest route to true Linux mastery! You know your way around Windows (or maybe a Mac, or even UNIX). Now, you're ready for Linux. And you don't have a minute to waste. Welcome. This book's for you . Janet Valade has spent thirteen years helping new users master Linux and related technologies. She knows the "magic words" that'll help you get the job done, fast. (And she knows exactly how to keep you out of trouble, too!) You'll learn Linux through dozens of focused, bite-size examples, each one carefully designed to build on what you've learned before. Need specific solutions? This book's carefully crafted, high-efficiency format delivers them... instantly . Working on Fedora? Mandrake? SuSE? No matter. This book is for you. No other introduction to Linux covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with Linux- without the hassles! Choose the best Linux distribution for your personal or business needs Get Linux installed quickly and running reliably Handle your day-to-day tasks and efficiently manage your files Master KDE, GNOME, and the Linux command line Write documents and build spreadsheets with OpenOffice.org Set up Web access, email, and instant messaging Work with powerful Linux multimedia and graphics software Find, install, and run new Linux software Set up your printer to work with Linux Supercharge Linux with shell scripts and customized configuration files Includes concise Linux command reference and quick guide to building powerful Regular Expressions Spring Into ... is a new series of fast-paced tutorials from Addison-Wesley Professional Publishers. Each book in the series is designed to bring you up-to-speed quickly. Complex technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working... now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Santa Clara, Calif. : Sun Microsystems Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 762 p. , ill. ; , 24 cm
    Edition: 7th ed.
    DDC: 005.133
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Completely revised and up-to-date coverage of Generic programming, restrictions and limitations, type bounds, wilcard types, and generic reflection Swing GUI development, including input validation and other enhancements Exception handling and debugging, including chained exceptions, stack frames, assertions, and logging Streams and files, the new I/O API, memory-mapped files, file locking, and character set encoders/decoders Regular expressions using the powerful java.util.regex package Inner classes, reflection, and dynamic proxies Application packaging and the Preferences API The seventh edition of Core Java™ 2, Volume I, covers the fundamentals of the Java 2 Platform, Standard Edition (J2SE™). A no-nonsense tutorial and reliable reference, this book features thoroughly tested real-world examples. The most important language and library features are demonstrated with deliberately simple sample programs, but they aren't fake and they don't cut corners. More importantly, all of the programs have been updated for J2SE 5.0 and should make good starting points for your own code. You won't find any toy examples here. This is a book for programmers who want to write real code to solve real problems. Volume I concentrates on the fundamental concepts of the Java language, along with the basics of user-interface programming and provides detailed coverage of Object-oriented programming Reflection and proxies Interfaces and inner classes The event listener model Graphical user-interface design with the Swing UI toolkit Exception handling Stream input/output and object serialization Generic programming For the same real-world treatment of enterprise features and advanced user-interface programming, look for the forthcoming new edition of Core Java™ 2, Volume II-Advanced Features. It includes new sections on metadata and other J2SE 5.0 enhancements along with complete coverage of: Multithreading • Distributed objects • Databases • Advanced GUI components • Native methods • XML Processing • Network programming • Collection classes • Advanced graphics • Internationalization • JavaBeans
    Note: "J2SE 5.0"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "This welcome addition to the Linux bookshelf provides real insight into the black-art of debugging. All too often debugging books concentrate solely on the tools but this book avoids that pitfall by concentrating on examples. The authors dissect and discuss each example in detail; in so doing they give invaluable insight into the Linux environment." - Richard J Moore , IBM Advanced Linux Response Team-Linux Technology Centre "A plethora of Linux books exist but this guide offers a definitive overview of practical hints and tips for Linux users. Written by experts in the field, it will be extremely useful for system administrators and Linux enthusiasts." - Markus Rex , VP and General Manager, SUSE LINUX The indispensable troubleshooting resource for every Linux administrator, developer, support professional, and power user! Systematically resolve errors, crashes, hangs, performance slowdowns, unexpected behavior, and unexpected outputs Master essential Linux troubleshooting tools, including strace, gdb, kdb, SysRq, /proc, and more The indispensable start-to-finish troubleshooting guide for every Linux professional Now, there's a systematic, practical guide to Linux troubleshooting for every power user, administrator, and developer. In Self-Service Linux® , two of IBM's leading Linux experts introduce a four-step methodology for identifying and resolving every type of Linux-related system or application problem: errors, crashes, hangs, performance slowdowns, unexpected behavior, and unexpected outputs. You'll learn exactly how to use Linux's key troubleshooting tools to solve problems on your own- and how to make effective use of the Linux community's knowledge. If you use Linux professionally, this book can dramatically increase your efficiency, productivity, and marketability. If you're involved with deploying or managing Linux in the enterprise, it can help you significantly reduce operation costs, enhance availability, and improve ROI. Discover proven best practices for diagnosing problems in Linux environments Leverage troubleshooting skills you've developed with other platforms Learn to identify problems with strace -the most frequently used Linux troubleshooting tool Use /proc to uncover crucial information about hardware, kernels, and processes Recompile open source applications with debug information Debug applications with gdb , including C++ and threaded applications Debug kernel crashes and hangs, one step at a time Understand the E...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 695 p. , ill. ; , 24 cm
    Series Statement: IBM Press series--information management
    Keywords: WebSphere ; Application software ; Development ; Java (Computer program language) ; Web servers ; Computer programs ; Web site development ; Electronic books ; local
    Abstract: The expert guide to deploying and managing any WebSphere Application Server V5.x application and environment If you're a WebSphere Application Server administrator or developer, this is your advanced guide for delivering applications rapidly, running them smoothly, and administering them efficiently. Four leading IBM consultants draw on their years of experience to illuminate the key steps involved in taking WebSphere Application Server applications from development to production. They focus on the areas most crucial to success, including application assembly and build, application and infrastructure configuration and administration, and application testing and verification. Along the way, they show how to implement automated deployment processes that can be executed frequently, reliably, and quickly-so you can get your applications to market fast. The focus is on WebSphere Application Server Version 5.1, but much of the information applies to other versions. Coverage includes Installing, testing, and managing WebSphere Application Server environments: clustering, security, messaging, integration, and more Deploying and managing key J2EE technologies: JDBC, Connectors, EJB, container managed and message driven beans, transactions, JMS, JavaMail, and more Deploying highly available, scalable multi-node WebSphere Application Server environments: clustering, distributed session management, and edge components Advanced considerations: working with Java Management Extensions, caching, and much more Performance-tuning tools Troubleshooting Leveraging key WebSphere deployment and administration tools: ANT, wsadmin, Admin Console, and the Application Server Toolkit Advanced discussions of J2EE and architectural concepts you need to deploy successfully-with practical examples © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Pearson Education/PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 337 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: BEA WebLogic server ; BEA WebLogic workshop ; Client/server computing ; Java (Computer program language) ; Web services ; Electronic books ; local
    Abstract: "Very impressive work. This book is valuable for beginning and intermediate technologists." Dwight Mamanteo, Technical Manager, BEA Systems "Provides explanations of Web services, tuning tips, and discussions on security that will likely be of benefit to developers as they create their Web services." Robert W. Husted, Member, Technical Staff, Requisite Software Build Web services infrastructure based on service-oriented architecture (SOA) Implement enterprise-class Web services using WebLogic and J2EE Complete lifecycle coverage with best practices: design, prototyping, development, testing, deployment, and management Real-world enterprise Web services implementation with J2EE and WebLogic You've seen plenty of theory about Web services. This book is about the reality: what it takes to successfully implement J2EE Web services with BEA WebLogic in complex enterprise environments. Anjali Anagol-Subbarao, one of the world's leading Web services experts, offers powerful insights for every stage of the Web services lifecycle: design, prototyping, development, testing, deployment, and management. Anagol-Subbarao draws on her experience architecting and building Web services infrastructure for HP's worldwide operations and takes on the challenges that face every enterprise implementer. She demonstrates how to design robust Web services that align with business processes, smoothly integrate with existing infrastructure, deliver superior performance and security, and can be managed effectively. Coverage includes Primers on WebLogic Workshop, WebLogic Server, WLI, and J2EE Web services technology Building effective service-oriented architectural (SOA) frameworks Translating designs into working code Designing for end-to-end security and tuning for high performance Testing Web services and deploying them to production environments Addressing the unique challenges associated with managing distributed Web services © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxi, 434 p. , ill. ; , 24 cm
    Series Statement: Robert C. Martin series
    DDC: 005.1
    Keywords: Application software ; Development ; Electronic books ; local
    Abstract: Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your development efforts. In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases. This book draws on material Michael created for his renowned Object Mentor seminars: techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include Understanding the mechanics of software change: adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platformwith examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structure This book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Build Powerful, Cross-Platform Rich Client Applications Eclipse is more than a state-of-the-art IDE: its Rich Client Platform (RCP) plug-ins form an outstanding foundation for any desktop application, from chat applications to enterprise software front-ends. In Eclipse Rich Client Platform , two leaders of the Eclipse RCP project show exactly how to leverage Eclipse for rapid, efficient, cross-platform desktop development. In addition to explaining the power of Eclipse as a desktop application development platform, the authors walk step-by-step through developing a fully featured, branded RCP application. They introduce a wide range of techniques, including developing pluggable and dynamically extensible systems, using third-party code libraries, and packaging applications for diverse environments. You'll build, refine, and refactor a complete prototype; customize the user interface; add Help and Update features; and build, brand, and ship the finished software. For every Java developer, regardless of previous Eclipse experience Thoroughly covers Eclipse 3.1's new RCP features and its extensive new tools for designing, coding, and packaging RCP applications Presents techniques for branding and customizing the look and feel of RCP applications Shows how to overcome the challenges and "rough edges" of RCP development Discusses the similarities and differences between RCP and conventional plug-in development Includes an overview of OSGi, the base execution framework for Eclipse If you want to develop and deploy world-class Java applications with rich, native GUIs, and use Eclipse RCP- get this book . CD-ROM contains the Eclipse 3.1 SDK, Eclipse 3.1 RCP SDK, and Eclipse 3.1 RCP Delta Pack appropriate for Windows, Linux, and Mac OS X. It also contains all the code samples developed in the book. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Eclipse Distilled David Carlson Foreword by Grady Booch Series Editors Erich Gamma Lee Nackman John Wiegand A Concise Introduction to Eclipse for the Productive Programmer Organized for rapid access, focused on productivity, Eclipse Distilled brings together all the answers you need to make the most of today's most powerful Java development environment. David Carlson introduces proven best practices for working with Eclipse, and shows exactly how to integrate Eclipse into any Agile development process. Part I shows how to customize workspaces, projects, perspectives, and views for optimal efficiency-and how to leverage Eclipse's rapid development, navigation, and debugging features to maximize both productivity and code quality. Part II focuses entirely on Agile development, demonstrating how Eclipse can simplify team ownership, refactoring, continuous testing, continuousintegration, and other Agile practices. Coverage includes Managing Eclipse projects from start to finish: handling both content and complexity Using perspectives, views, and editors to work more efficiently Setting preferences to fit your own unique needs-or your team's Leveraging Eclipse's powerful local and remote debugging tools Understanding how Eclipse fits into contemporary iterative development processes Performing continuous testing with JUnit in the Eclipse environment Using Eclipse's wizard-assisted refactoring tools Implementing continuous integration with Ant-based automated project builders Employing best practices for code sharing with CVS and other repositories By focusing on need-to-know information and providing best practices and methodologies, this book is designed to get you working with Eclipse quickly. Whether you're building enterprise systems, Eclipse plug-ins, or anything else, this concise book will help you write better code-and do it faster. About the Author David Carlson is a developer, researcher, author, instructor, and consultant who thrives on innovative technology. He started using Java in 1995 and Eclipse in 2001. David has a Ph.D. in Information Systems from the University of Arizona and is a frequent speaker at conferences and a contributor to technical journals. He is creator of the hyperModel plug-in for Eclipse, and author of Modeling XML Applications with UML (Addison-Wesley, 2001). Cover photo: © archivberlin Fotoagentur GmbH / Alamy Addison-Wesley www.awprofessional.com/series/eclipse ISBN 0-321-28815-7 $34.99 US $48.99 CANADA © Copyr...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 419 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Wireless LANs ; Security measures ; Electronic books ; local
    Abstract: Expert guidance for securing your 802.11 networks Learn best practices for securely managing, operating, and scaling WLANs Comprehend the security-related technological underpinnings of WLANs Explore new security protocols in 802.11i and WPA and learn how they prevent attacks Review centralized deployment models for wired/wireless integration Deepen your knowledge of defense by understanding the tools that attackers use to perform reconnaissance and to attack authentication and encryption mechanisms Understand how to design secure WLANs to support enterprise applications with the new standards and practices detailed in this book Reference the next generation authentication standards and protocols Find out about mobility, hotspots, and campus wireless networks Grasp Open Authentication, MAC-based authentication, shared key authentication, EAP authentication protocols, WEP, WPA, and 802.11i Cisco Wireless LAN Security is an in-depth guide to wireless LAN technology and security, introducing the key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect the entire network. Because a WLAN is less effective as an isolated piece of the network, this book emphasizes how to effectively integrate WLAN devices into the wired network while maintaining maximum security. Cisco Wireless LAN Security covers the spectrum of WLAN security, including protocols and specifications, vulnerabilities and threats, and, especially, deployment patterns and design guidelines. With a unique combination of theory and practice, this book addresses fundamental wireless concepts, such as WEP, and innovations, such as EAP, switching, and management. Each chapter includes detailed illustrations, checklists, design templates, and other resources. You will also find generic wireless deployment patterns based on real-world customer installations and functional examples of architecture, design, and best practices. Whether you currently design, configure, implement, and maintain WLANs or simply want to explore wireless security issues, Cisco Wireless LAN Security has everything you need to understand how to create a seamlessly secure, impenetrable 802.11 network. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references (p. [399]-402) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 643 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: HP-UX ; Operating systems (Computers) ; Electronic books ; local
    Abstract: This is the definitive guide to installing and administering HP-UX 11i Version 2 in any environment, on both HP 9000 and HP Integrity server families. Drawing on 18 years of on-site HP-UX consulting experience, Marty Poniatowski offers unparalleled practical insight into running HP-UX 11i efficiently and reliably, illuminating features even experienced HP-UX sysadmins find confusing. Poniatowski organizes this book around your day-to-day needs and your system's lifecycle. He begins with in-depth coverage of installation and bootup, then walks through everything from LVM and kernel configuration through networking. He especially focuses on the capabilities and tools that make HP-UX unique-and how you can use them to save time and money. Coverage includes Partitioning from start to finish-including vPars and nPartitions installation, creation, and modification Booting HP Integrity systems with EFI, and HP 9000 systems with PDC, ISL, or hpux Mastering the Management Processor (MP): console, virtual front panel, and command menu Using HP-UX's new kernel-building commands: kcconfig, kcusage, kctune, kcmodule, and more Working with HP-UX's new web-based tools: pd (devices), parmgr (partitions), and kcweb (kernel) Mapping LBA to slot numbers: clear explanations of a non-intuitive technique Using Ignite-UX to boot and recover systems across the network Managing disks, devices, backup, users/groups, and much more © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR ; | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 353 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The first comprehensive, expert guide for end-to-end Linux application optimization Learn to choose the right tools-and use them together to solve real problems in real production environments Superior application performance is more crucial than ever-and in today's complex production environments, it's tougher to ensure, too. If you use Linux, you have extraordinary advantages: complete source code access, plus an exceptional array of optimization tools. But the tools are scattered across the Internet. Many are poorly documented. And few experts know how to use them together to solve real problems. Now, one of those experts has written the definitive Linux tuning primer for every professional: Optimizing Linux® Performance. Renowned Linux benchmarking specialist Phillip Ezolt introduces each of today's most important Linux optimization tools, showing how they fit into a proven methodology for perfecting overall application performance. Using realistic examples, Ezolt shows developers how to pinpoint exact lines of source code that are impacting performance. He teaches sysadmins and application developers how to rapidly drill down to specific bottlenecks, so they can implement solutions more quickly. You'll discover how to: Identify bottlenecks even if you're not familiar with the underlying system Find and choose the right performance tools for any problem Recognize the meaning of the events you're measuring Optimize system CPU, user CPU, memory, network I/O, and disk I/O-and understand their interrelationships Fix CPU-bound, latency-sensitive, and I/O-bound applications, through case studies you can easily adapt to your own environment Install and use oprofile, the advanced systemwide profiler for Linux systems If you're new to tuning, Ezolt gives you a clear and practical introduction to all the principles and strategies you'll need. If you're migrating to Linux, you'll quickly master Linux equivalents to the tools and techniques you already know. Whatever your background or environment, this book can help you improve the performance of all your Linux applications-increasingbusiness value and user satisfaction at the same time. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Praise for Mark Sobell's Books "I keep searching for books that collect everything you want to know about a subject in one place, and keep getting disappointed. Usually the books leave out some important topic, while others go too deep in some areas and must skim lightly over the others. A Practical Guide to Red Hat® Linux® is one of those rare books that actually pulls it off. Mark G. Sobell has created a single reference for Red Hat Linux that cannot be beat! This marvelous text (with a 4-CD set of Linux Fedora Core 2 included) is well worth the price. This is as close to an 'everything you ever needed to know' book that I've seen. It's just that good and rates 5 out of 5." -Ray Lodato, Slashdot contributor "Mark Sobell has written a book as approachable as it is authoritative." -Jeffrey Bianchine, Advocate, Author, Journalist "Excellent reference book, well suited for the sysadmin of a linux cluster, or the owner of a PC contemplating installing a recent stable linux. Don't be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs." -Wes Boudville, Inventor " A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you Mark Sobell." -C. Pozrikidis, University of California at San Diego "This book presents the best overview of the Linux operating system that I have found. . . . It should be very helpful and understandable no matter what the reader's background is: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready." -Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group FRUUG, Boulder, Colorado "Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There's no other book that discusses so many different topics and in such depth." -Eugenia Loli-Queru, Editor in Chief, OSNews.com The Most Useful Linux Tutorial and Reference Ever, with Hundreds of High-Quality Examples Covering Every Linux Distribution! To be truly productive with Linux, you need to thoroughly mast...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 1090 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.26/8
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The best just became BETTER! Completely revised to meet all your Red Hat Linux needs! Fedora Core and Red Hat Enterprise Linux are advanced operating systems. You need a book that's just as advanced. This book explains Linux clearly and effectively--with a focus on the features you care about, including system security, Internet server setup, and sharing files and printers with Windows systems. Best-selling Linux author Mark Sobell starts at the beginning and walks you through everything that matters, from installing Fedora Core using the included CDs to GNOME, KDE, Samba 3, sendmail, Apache, DNS, NIS, and iptables. Along the way, you learn the "hows" and the "whys." Whether you are a user, an administrator, or a programmer, this book gives you all you need and more. Mark Sobell knows every Linux nook and cranny, has taught hundreds of thousands of readers, and never forgets what it's like to be new to Linux. Don't settle for yesterday's Linux book...get the ONLY book that meets today's challenges and tomorrow's! Compared with the other Linux books out there, A Practical Guide to Red Hat® Linux®, Second Edition, delivers... The full Fedora Core operating system on 4 CDs (not the truncated "Publisher's Edition") AND complete coverage of Fedora Core and the 2.6 Linux kernel, PLUS coverage of Red Hat Enterprise Linux Deeper coverage of GNOME and KDE, including customization More practical coverage of file sharing with Samba, NFS, and FTP Easier-to-follow coverage of Internet server configuration including Apache, sendmail, NFS, and DNS More up-to-date coverage of security, including SELinux (Security Enhanced Linux), OpenSSH, and firewall setup using iptables Better coverage of "meat-and-potatoes" system/network administration tasks A more practical introduction to writing bash shell scripts More complete coverage of configuring local and network printers using CUPS And much more...including a 500+ word glossary and a comprehensive index to help you find what you need fast! Includes 4 CDs! Get the full version of Red Hat's Fedora Core 2 release!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 396 p. , ill. ; , 23 cm
    DDC: 004.692
    Keywords: Spam (Electronic mail) ; Spam filtering (Electronic mail) ; Electronic books ; local
    Abstract: Real Anti-Spam Help for System Administrators In Slamming Spam , two spam fighters show you how to fight back-and win. Unlike most spam books, this one is written specifically for in-the-trenches system administrators: professionals who need hands-on solutions for detecting, managing, and deterring spam in Unix/Linux and/or Microsoft Windows environments. The authors offer deep, administrator-focused coverage of the most valuable open-source tools for reducing spam's impact in the enterprise-especially SpamAssassin. Drawing on their extensive experience in developing and implementing anti-spam tools, the authors present expert insights into every leading approach to fighting spam, including Bayesian filtering, distributed checksum filtering, and email client filtering. Coverage includes Step-by-step junk mail filtering with Procmail Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse McAfee SpamKiller for Lotus Domino McAfee SpamKiller for Microsoft Exchange Implementing and managing SpamAssassin Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords Sender verification techniques, including challenge/response, special use addresses, and sender compute Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs-IT staff time, network/computing resources, and user productivity. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 363-374) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Indianapolis, MA : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Proven techniques for optimizing web, file, print, database, and application servers Practical introductions to open source performance management tools Easy-to-understand examples based on Red Hat Enterprise Linux and Novell SUSE Linux Enterprise Server An indispensable guide to maximizing Linux system and application performance From Wall Street to Hollywood, Linux runs many of the world's most businesscritical systems. Linux performance now impacts the entire enterprise. In Performance Tuning for Linux Servers, a team of IBM's most-experienced Linux performance specialists shows you how to find bottlenecks, measure performance, and identify effective optimizations. This book doesn't just cover kernel tuning: it shows how to maximize the end-to-end performance of real-world applications and databases running on Linux. Throughout, the authors present realistic examples based on today's most popular enterprise Linux platforms, Intel-based Red Hat Enterprise Linux, and Novell SUSE Linux Enterprise Server. These examples are designed for simplicity, clarity, and easy adaptation to any contemporary Linux environment. You'll discover how to Install and configure Linux for maximum performance from the outset Evaluate and choose the right hardware architecture for your Linux environment Understand Linux kernels 2.4 through 2.6: components, performance issues, and optimization opportunities Master core Linux performance tuning principles and strategies Utilize free, open source tools for measurement, monitoring, system tracing, and benchmarking Interpret performance data to analyze your Linux server's real-world behavior Optimize Linux system schedulers, memory, I/O, file systems, and networking Tune web, file, database, and application servers running commercial workloads Predict the impact of changes in tuning parameters or configurations Tune Linux code: optimize design, timing, sockets, threads, synchronization, and more Architect for maximum performance: SMP scaling, clustering, and topology Integrate kernel and application tuning in end-to-end system optimization projects Whether you're an administrator, developer, integrator, or consultant, Performance Tuning for Linux Serverswill help you maximize the performance and value of every Linux system and application you run. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Learn Linux kernel programming, hands-on : a uniquely effective top-down approach The Linux ® Kernel Primer is the definitive guide to Linux kernel programming. The authors' unique top-down approach makes kernel programming easier to understand by systematically tracing functionality from user space into the kernel and carefully associating kernel internals with user-level programming fundamentals. Their approach helps you build on what you already know about Linux, gaining a deep understanding of how the kernel works and how its elements fit together. One step at a time, the authors introduce all the tools and assembly language programming techniques required to understand kernel code and control its behavior. They compare x86 and PowerPC implementations side-by-side, illuminating cryptic functionality through carefully-annotated source code examples and realistic projects. The Linux ® Kernel Primer is the first book to offer in-depth coverage of the rapidly growing PowerPC Linux development platform, and the only book to thoroughly discuss kernel configuration with the Linux build system. Coverage includes Data structures x86 and PPC assembly language Viewing kernel internals Linux process model User and kernel space Interrupts and exceptions Memory allocation and tracking Tracing subsystem behavior I/O interactions Filesystems and file operations Scheduling and synchronization Kernel boot process Kernel build system Configuration options Device drivers And more... If you know C, this book teaches you all the skills and techniques you need to succeed with Linux kernel programming. Whether you're a systems programmer, software engineer, systems analyst, test professional, open source project contributor, or simply a Linux enthusiast, you'll find it indispensable. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: Your complete guide to building your information technology career in any economy The IT Career Builder's Toolkit features market-focused skills and proven methods you can use to jump-start and advance your career. While other books cover just the mechanics of preparing your résumé, writing a cover letter, and interviewing, this book provides all that plus additional insight from IT career development expert, Matt Moran, to help you plan and create a rewarding IT career over the long term. The toolkit approach allows you to use this book to suit your unique needs: Are you new to the IT field? Benefit by reading the book cover to cover. Just need to fine-tune your IT career? Choose a topic and dive in. Understand and prepare for the various and changing factors that affect your career in both positive and negative ways. Learn how to Present the value of your technical skills in the job market Position yourself as the primary commodity of your career Remove the guesswork out of job searches Highlight on-the-job skills and gain meaningful professional exposure The companion CD-ROM includes career management tools such as résumé and cover letter templates, forms to track important contacts, and self-assessment tools. Start or further your consulting career with sample proposals, opportunity tracking forms, and a time-tracking and billing database. Financial tools, including budget and cash-flow summary worksheets, help you gain financial well-being. Use the Value-Added Technologist presentation to gain a clear understanding of the career-building process and how to use the toolkit to build a dynamic career. Most of all, have fun! Every year, people advance along the path to career stardom. Let Matt help you to be one of them through his career philosophy "Do not accept mediocrity as a career objective-demand more of yourself." "I want you to see the [toolkit] techniques as one more set of skills to adopt in your overall career development program. They are skills, just like your technical skills, that you will use daily during your career. Just as you adopt new technical skills, use the toolkit to define those soft skills that you must learn and put to use. The result will be a more well-rounded and complete professional skill-set." ~ Matthew Moran, from the Introduction Companion CD-ROM The CD-ROM contains valuable tools, forms, spreadsheets, and documents that work with the Toolkit to help you master key areas of your career development.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network. Securing Your Business with Cis...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xvii, 254 p. , col. ill. ; , 23 cm
    DDC: 659.144
    Keywords: Internet advertising ; Web search engines ; Web site development ; Electronic books ; local
    Abstract: Get your Web site to "show you the money" by using Google to draw more eyes--and wallets--to your content. In this friendly, four-color guide from veteran author and Web developer Eric Giguere , you'll learn all about Google's AdSense program and how you can use it to make your Web site or blog more profitable. Written in an easy-to-read, non-technical style, this book follows three average people--Claude, Stef, and Anita--as they learn to create money-making blogs and Web sites. Through their experiences, you'll learn: basic Web terminology; the Google Adsense nuts and bolts; how to host, build, and publish targeted ads and Google search boxes to your Web site; filter out inappropriate ads; track page performance; drive traffic to your site; and more. A four-part companion Web site features a blog, includes reader resources, and details the techniques discussed in the book. Online marketers agree that AdSense is one of the best tools you can use to draw dollars to your site. Let Giguere show you how to make the most of Google and have fun doing it!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 713 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." -Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code-and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Finally, there's a book that treats Excel as the powerful development platform it really is, and covers every facet of developing commercial-quality Excel applications. This is not a book for beginners. Writing for professional developers and true Excel experts, the authors share insider's knowledge they've acquired building Excel applications for many of the world's largest companies-including Microsoft. Professional Excel Development demonstrates how to get the utmost from Excel, addressing everything from application architectures through worksheet and userform design, charting, debugging, error handling and optimizing performance. Along the way, the authors offer best practices for every type of Excel development, from building add-ins through interacting with XML Web services. Coverage includes Building add-ins to provide new Excel functions Designing effective worksheets, userforms and other user interface elements Leveraging Excel's powerful data analysis features Creating sophisticated custom charts Handling errors, debugging applications and optimizing performance Using class modules and interfaces to create custom objects Understanding Windows API calls: when to use them, and how to modify them Adding worksheet functions with C-based XLLs Programming with databases Controlling external applications from Excel Integrating with Visual Basic 6, VB.NET and Visual Studio Tools for Office Using XML to import and export data and communicate with Web services Providing help, securing, packaging and distributing The accompanying CD-ROM contains the book's sample timesheet application at every stage of construction, with detailed code comments. It also includes many examples of the concepts introduced in each chapter and a collection of the authors' Excel development utilities. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 369 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Linux ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: Covers Red Hat and SUSE When something goes wrong with your Linux firewall, you need to fix it-right now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes: Troubleshooting Linux® Firewalls . Authors Michael Shinn and Scott Shinn are among the world's leading firewall experts; they've even been hired to protect computer security at the White House. In this book, they cover every area where Linux firewalls can go wrong: rules and filtering problems, Layer 2/3/4 issues, trouble with individual services, DNS/DHCP failures, even misconfigured VPNs. They also present an easy, start-to-finish troubleshooting methodology that'll help you identify even the newest or most obscure firewall problem fast-and solve it! Inside, you will find in-depth information on the following areas: What you must know about iptables and netfilter to troubleshoot and avoid problems Using loggers, sniffers, and other tools to diagnose even the most obscure firewall problems Making sure your firewall rules work the way they're supposed to Resolving problems with Network Address Translation and IP Forwarding Troubleshooting SMTP, Apache, Squid, NFS, FTP, instant messaging, and other Web-based services Finding and fixing common problems with IPsec VPN configuration Making your firewalls more failure-resistant: recommendations from the experts If you depend on a Linux firewall, what will you do if it goes down? With Troubleshooting Linux® Firewalls , you can be confident that the solutions are right at hand-so you can sleep at night! © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 397 p. , ill. ; , 25 cm
    DDC: 005.1/068/5
    Keywords: Capability maturity model (Computer software) ; Electronic books ; local
    Abstract: Use Assessments to Drive Process Improvements in Software, Systems, Human Resources, and Beyond Pioneered by the world's leading innovators in software engineering, assessments have evolved into a remarkably powerful tool for process improvement in areas ranging from systems to services, hardware to human resources. Unlike audits, assessments are conducted from the inside. When handled correctly, assessments can help transform technical and managerial culture, dramatically improving both quality and profitability. In CMMI Assessments: Motivating Positive Change , two of the field's most respected leaders show exactly how to use them for maximum business advantage. Writing for executives, managers, technical professionals, and assessors themselves, Marilyn Bush and Donna Dunaway illuminate every phase of the assessment process-from planning through post-assessment follow-up. The authors begin with an expert overview of what assessments entail, when they make sense, how to set achievable goals for them, and how to lead them to success. Next, they "drill down" into each stage of the process, presenting step-by-step instructions and defining the roles and responsibilities of every participant. Coverage includes creating and training assessment teams; identifying assessment products; consolidating interview data and other onsite activities; presenting results; and using those results productively. Drawing on their unsurpassed experience leading assessments and mentoring assessors, they offer deep insights into the real-world challenges and obstacles you'll face-and proven solutions. They also present an extended case study showing how a real software development organization drove continuous improvement through four years of iterative assessments-moving from CMM Level 2 to elite Level 5 status, and driving dramatic business benefits along the way. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 375-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Upper Saddle River, NJ. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations of UNIX and UNIX-like environments. And yet, it does all this while retaining the style and taste of the original classic." --Mukesh Kacker, cofounder and former CTO of Pronto Networks, Inc. "One of the essential classics of UNIX programming." --Eric S. Raymond, author of The Art of UNIX Programming "This is the definitive reference book for any serious or professional UNIX systems programmer. Rago has updated and extended the classic Stevens text while keeping true to the original. The APIs are illuminated by clear examples of their use. He also mentions many of the pitfalls to look out for when programming across different UNIX system implementations and points out how to avoid these pitfalls using relevant standards such as POSIX 1003.1, 2004 edition and the Single UNIX Specification, Version 3." --Andrew Josey, Director, Certification, The Open Group, and Chair of the POSIX 1003.1 Working Group " Advanced Programming in the UNIX® Environment, Second Edition, is an essential reference for anyone writing programs for a UNIX system. It's the first book I turn to when I want to understand or re-learn any of the various system interfaces. Stephen Rago has successfully revised this book to incorporate newer operating systems such as GNU/Linux and Apple's OS X while keeping true to the first edition in terms of both readability and usefulness. It will always have a place right next to my computer." --Dr. Benjamin Kuperman, Swarthmore College Praise for the First Edition " Advanced Programming in the UNIX® Environment is a must-have for any serious C programmer who works under UNIX. Its depth, thoroughness, and clarity of explana-tion are unmatched." -- UniForum Monthly "Numerous readers recommended Advanced Programming in the UNIX® Environment by W. Richard Stevens (Addison-Wesley), and I'm glad they did; I hadn't even heard of this book, and it's been out since 1992. I just got my hands on a copy, and the first few chapters have been fascinating." -- Open Systems Today "A much more readable and detailed treatment of UNIX internals can be found in Advanced Programming in the UNIX® Environment by W. Richard Steven...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 651 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Where has this book been all my professional life? It is about time someone wrote this book. The author covers many basic, practical issues that other authors omit in a format that makes for a great troubleshooting reference and for casual perusing. There are a lot of books available that give a broad overview of system and network administration, and there are a lot of detailed books on each specific topic covered in this book, but I don't know of any other place where I can get so much useful, practical information on such a wide range of topics in such a concise and readable form. I will highly recommend it to my friends and colleagues who are trying to manage their own systems. I am anxious to show it to our instructors who teach data communications and networks as a possible text or lab manual." -Ron McCarty, instructor and program chair, Computer Science, Penn State Erie "This book takes a very unique approach and is very flexible. It offers a great deal to the home user, students, small businesses-all the way to any Linux sys admin that needs a handy reference. I found it very refreshing in terms of style, stated goals, presentation, ease of use, direction, and the "present and future" value of the content. In other words the author is very current and knowledgeable. I would recommend this book to every level from programmer to manager." -Joe Brazeal, Information Technician III, Southwest Power Pool "This book is an excellent resource for new Linux administrators. I was impressed with the comprehensive set of 35 topic chapters, making this book a very useful reference. I know of no other work like this." -George Vish II, Linux curriculum program manager and senior education consultant, Hewlett-Packard Education "I would recommend this book to novice Linux users and administrators. It covers a lot of topics, and makes it easy for readers to follow along." -Bret Strong, education consultant, Hewlett-Packard Company "Linux Quick Fix Notebook is a well-written guide to designing, installing, and maintaining Linux servers. Many Linux reference texts are just simple rewrites of Linux ¨man¨ and ¨info¨ pages, but this book addresses the real issues that systems administrators encounter when working with Linux. The author provides a pedagogical guide to learning Linux server administration. In addition, the book includes step-by-step information so that users can quickly take advantage of the best that open source software has to offer today. I...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvi, 316 p. , ill. ; , 24 cm
    DDC: 006.74
    Keywords: HTML (Document markup language) ; Electronic books ; local
    Abstract: The fastest route to true HTML/CSS mastery! Need to build a web site? Or update one? Or just create some effective new web content? Maybe you just need to update your skills, do the job better. Welcome. This book's for you. We'll leverage what you already know about the web, so you'll go further, faster than you ever expected. You'll master today's best practices: the real nuts and bolts, not theory or hooey. You'll learn through dozens of focused HTML, XHTML, and CSS examples: crafted for simplicity and easy to adapt for your own projects. Need specific solutions? This book's modular, visual, high-efficiency format delivers them instantly . Molly E. Holzschlag draws on her unparalleled experience teaching Web design and development. No other HTML/CSS guide covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with HTML, XHTML, and CSS in real-world projects Learn how to build web pages that'll work in any environment, on virtually any contemporary browser Construct templates that simplify every page you develop Structure and tag text so it's easy to work with and manage Add images, media, and scripts-quickly and reliably Discover the right ways to use HTML tables Build easy-to-use forms and validate your users' input Use CSS to take total control over your site's look and feel Master core CSS techniques: color, images, text styles, link effects, lists, navigation, and more Control margins, borders, padding, positioning, floats, even Z-index Design efficient, compatible, easy-to-manage CSS layouts Includes concise XHTML and CSS annotated references: quick help for every language element Spring Into... is a new series of fast-paced tutorials from Addison-Wesley. Each book in the series is designed to bring you up to speed quickly. Complex topics and technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working...now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 282 p. , ill., maps ; , 24 cm
    Keywords: Economic forecasting ; Globalization ; Economic aspects ; Industrial management ; International business enterprises ; International economic integration ; Electronic books ; local
    Abstract: Globalization is a fact. You can't stop it; it has already happened; it is here to stay. And we are moving into a new global stage. A radically new world is taking shape from the ashes of yesterday's nation-based economic world. To succeed, you must act on the global stage, leveraging radically new drivers of economic power and growth. Legendary business strategist Kenichi Ohmae-who in The Borderless World , published in 1990, predicted the rise and success of globalization, coining the very word-synthesizes today's emerging trends into the first coherent view of tomorrow's global economy-and its implications for politics, business, and personal success. Ohmae explores the dynamics of the new "region state," tomorrow's most potent economic institution, and demonstrates how China is rapidly becoming the exemplar of this new economic paradigm. The Next Global Stage offers a practical blueprint for businesses, governments, and individuals who intend to thrive in this new environment. Ohmae concludes with a detailed look at strategy in an era where it's tougher to define competitors, companies, and customers than ever before. As important as Huntington's The Clash of Civilizations , as fascinating as Friedman's The Lexus and the Olive Tree , this book doesn't just explain what's already happened: It offers a roadmap for action in the world that's beginning to emerge. Why Keynes' and Milton Friedman's economics are -and what might replace them New economics for a borderless world history From Windows to English to your global brand Leveraging today's most powerful platforms for growth Anticipating technological obsolescence-and jumping ahead of it Technology: driving business death-and rebirth What government can do when nation-states don't matter Government in the post-national era Honing your global vision and global leadership skills Leadership and strategy on the global stage
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "This book is the best way for beginning developers to learn wxWidgets programming in C++. It is a must-have for programmers thinking of using wxWidgets and those already using it." -Mitch Kapor, founder of Lotus Software and the Open Source Applications Foundation Build advanced cross-platform applications that support native look-and-feel on Windows, Linux, Unix, Mac OS X, and even Pocket PC Master wxWidgets from start to finish-even if you've never built GUI applications before Leverage advanced wxWidgets capabilities: networking, multithreading, streaming, and more CD-ROM: library of development tools, source code, and sample applications Foreword by Mitch Kapor, founder, Lotus Development and Open Source Application Foundation wxWidgets is an easy-to-use, open source C++ API for writing GUI applications that run on Windows, Linux, Unix, Mac OS X, and even Pocket PC-supporting each platform's native look and feel with virtually no additional coding. Now, its creator and two leading developers teach you all you need to know to write robust cross-platform software with wxWidgets. This book covers everything from dialog boxes to drag-and-drop, from networking to multithreading. It includes all the tools and code you need to get great results, fast. From AMD to AOL, Lockheed Martin to Xerox, world-class developers are using wxWidgets to save money, increase efficiency, and reach new markets. With this book, you can, too. wxWidgets quickstart: event/input handling, window layouts, drawing, printing, dialogs, and more Working with window classes, from simple to advanced Memory management, debugging, error checking, internationalization, and other advanced topics Includes extensive code samples for Windows, Linux (GTK+), and Mac OS X About the CD-ROM The CD-ROM contains all of the source code from the book; wxWidgets distributions for Windows, Linux, Unix, Mac OS X, and other platforms; the wxWidgets reference guide; and development tools including the OpenWatcom C++ compiler, the poEdit translation helper, and the DialogBlocks user interface builder. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Language: English
    Pages: xxii, 232 p. , ill. ; , 23 cm
    DDC: 364.16/3
    Keywords: Consumer credit ; United States ; Handbooks, manuals, etc ; Credit ratings ; United States ; Handbooks, manuals, etc ; Identity theft ; United States ; Prevention ; Handbooks, manuals, etc ; Privacy, Right of ; United States ; Handbooks, manuals, etc ; Records ; Access control ; United States ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Everything You Need to Know About Identity Theft, Credit Cards, Credit Repair, and Credit Reports "The author substitutes straight talk for legal mumbo-jumbo in 50 Ways to Protect Your Identity and Your Credit. Reading this book is like getting a black belt in consumer self-defense." -Jim Bohannon, host of The Jim Bohannon Show "Identity theft is among the fastest-growing problems facing Americans today. This book will help you learn all you need to know to protect your lives, money, and security. Consider it your first stop in your quest for knowledge and guidance to prevent ID theft." -Robert Powell, Editor of CBS MarketWatch "As one who has lived through some of the nightmare scenarios discussed by the author, I believe "Steve's Rules" (Chapter 14) need to be placed in a prominent place so you can see them any time you think you are safe. They may be the new practical commandments for financial survival." -Doug Stephan, host of the Good Day nationally syndicated radio show "Detecting and stopping identity thieves is imperative to protecting your finances and financial reputation. Steve Weisman shows you how to protect yourself and what steps to take if you are victimized. This is a must-read for anyone with a bank account and a credit card!" -Bonnie Bleidt, Boston Stock Exchange Reporter, CBS4 Boston, Host of Early Exchange , WBIX Don't be a victim! Save your identity, save your credit-and save a fortune! 10,000,000 Americans had their identities stolen last year-don't be the next! Discover easy steps you can take now to reduce your vulnerability. Recognize "phishing" and other identity scams-online and off. Learn what you must do immediately if you've been attacked. Defend yourself against credit rip-offs, and stop paying more than you have to! It's all here: simple rules, handy checklists, even easy-to-use form letters! © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit | Boston, MA :Safari,
    Language: English
    Pages: 290 p. ; , 23 cm
    Keywords: Flash (Computer file) ; Computer animation ; Electronic books ; local
    Abstract: This guide allows you to learn specific Flash skills step-by-step at your own pace. Choose from among several tutorials to develop the skills that are most appropriate to the Flash projects you are working on at any given time. Each lesson leads you through the workflow for implementing a specific real-world feature or effect in your Flash applications. In Macromedia Flash 8: A Tutorial Guide, learn how to: • Navigate the Flash workspace and use common document types • Use the Flash drawing tools and create engaging graphic effects • Use ActionScript to add interactivity and custom functionality to your documents • Connect your Flash projects to external data sources to create data-driven applications Powerful development and design tools require thorough and authoritative technical advice and documentation. When it comes to Macromedia Flash, no one is more authoritative than Macromedia's own development and writing teams. Now their official documentation is available to you in printed book form. As you work, keep this guide by your side for ready access to valuable information on using Flash. We've designed it so that it's easy to annotate as you progress.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 670 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.7585
    Keywords: Microsoft Windows server ; Client/server computing ; Operating systems (Computers) ; Electronic books ; local
    Abstract: This practical reference guide offers hundreds of useful tasks for managing Windows 2000 and Windows Server 2003, Microsoft's latest and greatest server. Through concise, on-the-job solutions to common problems, Windows Server Cookbook for Windows Server 2003 & Windows 2000 is certain to save you hours of time searching for answers.Now, instead of dredging reams of Microsoft documentation or browsing its unstructured knowledge base to figure out a particular issue--such as how to compare registry values between two hosts--you can simply reference the index of Windows Server Cookbook for Windows Server 2003 & Windows 2000 . From there, you'll be directed to the exact trouble-shooting recipe they need.As the newest title in O'Reilly's popular Cookbook series, this book covers a wide range of issues that you are likely to face in your daily management of the Windows Server operating system. This includes how to deal with: files event logs DNS DHCP security the registry backup/restore One of the book's key benefits is the presentation of solutions in three different recipe formats. Depending on preference, you can solve most problems with the graphical user interface, the command line, or by using scripts. Where appropriate, all three solutions are presented for each recipe in this book. Each recipe also includes a detailed discussion that explains how and why it works. Windows Server Cookbook for Windows Server 2003 & Windows 2000 is written for all levels of system administrators on Windows servers. If you're a relatively new user with only a rudimentary understanding of the job, the book can open your eyes to the many possibilities that await. And if you're an advanced user, it can serve as a useful reference and memory-jogger.Download the code examples from this book. The complete set of examples isavailable at: http://www.rallenhome.com/books/​winsckbk/code.html .
    Note: "Step-by-step procedures and scripts for every occasion"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    San Jose, Calif. : Adobe ; | Boston, MA :Safari,
    Language: English
    Pages: 600 p. ; , 24 cm
    DDC: 005.72
    Keywords: Adobe Acrobat (Computer file) ; Electronic books ; local
    Abstract: Ready to learn the visual effects secrets used at such leading-edge studios as Industrial Light + Magic and The Orphanage? Adobe After Effects 6.5 Studio Techniques inspires you to take your work to the next level with realworld examples and insider techniques. Get blockbuster results without the big budget as you delve deep into the essence of visual effects. This book goes beyond conventional step-by-step instruction, teaching you bread-and-butter effects that you can adapt and combine for countless projects. • Real solutions from real professionals: Nobody does it better, and now they'll show you how. Discover the keys to analyzing your shots from Stu Maschwitz, Visual Effects Supervisor for Star Wars, Episode One and Sin City . Unlock the mysteries of linear color space with Brendan Bolles, co-creator of the eLin plug-ins. Master fundamental effects techniques with Mark Christiansen, After Effects specialist for The Orphanage on The Day After Tomorrow . • Compositing essentials: No matter how sophisticated the effect, they all start from the same building blocks. Find out what you've been missing about color and light matching, keying, motion tracking, rotoscoping, working with film, and more. • Advanced techniques: Your goal should be effects so good that no one notices them. From sky replacement to explosions, from smoke to fire, learn to bring your shots to life and enhance scenes without anyone ever knowing what they're seeing isn't 100% real. • Companion CD-ROM: Professional tools produce professional results. Demo versions of plug-ins from Andersson Technologies, Red Giant Software, Frischluft, and Trapcode will enhance your work. Stop relying on ready-made solutions and pre-built effects. Learn how to build up and customize your own effects with the tools at hand-you'll be amazed at how much better the results look!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "I have had the good fortune to be involved with mobile Java from the very beginning, and I know what it takes to be successful in this marketplace. This book will help you be successful with mobile Java application design and development. If you take the information inside and sprinkle it with some imaginative application ideas, you will have a winning combination." - Jon Bostrom, Senior Director, CTO Java Technology Platforms, Nokia The First Official End-To-End Solutions Guide for Every Nokia Series 40 Developer Nokia's Series 40 Developer Platform gives Java developers access to the world's highest-volume, fastest-growing, and most exciting mobile markets. Nokia sells close to 100 million units within their Developer Platform families every year, and the Series 40 Developer Platform is the highest-volume platform in the family. Success on this platform is crucial for the commercial success of any mobile application. Knowledge of the Series 40 Developer Platform can be applied to the Java environment on all Nokia Developer Platform devices, including Series 60 devices. Fully reviewed by Nokia's subject matter experts, this book covers the entire development process-from design and coding through testing and deployment. The authors walk you through eleven complete example applications, presenting downloadable client and server source code that you can use to jump-start virtually any project. Along the way, the authors illuminate the technical underpinnings of Series 40, review crucial architectural issues, introduce key mobile design patterns, discuss scalability and device optimization strategies, and offer dozens of best practices and tips-many of which have never before been published. Coverage includes Identifying your best opportunities and killer applications for mobile development Building effective MIDP 2.0 user interfaces for devices built on the Series 40 Developer Platform Building animated mobile games Handling persistent and networking data Proven techniques for scaling and optimizing applications across devices © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 342 p. , ill. ; , 24 cm
    DDC: 005.74/068
    Keywords: Business ; Data processing ; Data warehousing ; Database management ; Electronic books ; local
    Abstract: The definitive best-practices guide to enterprise data-management strategy. You can no longer manage enterprise data "piecemeal." To maximize the business value of your data assets, you must define a coherent, enterprise-wide data strategy that reflects all the ways you capture, store, manage, and use information. In this book, three renowned data management experts walk you through creating the optimal data strategy for your organization. Using their proven techniques, you can reduce hardware and maintenance costs, and rein in out-of-control data spending. You can build new systems with less risk, higher quality, and improve data access. Best of all, you can learn how to integrate new applications that support your key business objectives. Drawing on real enterprise case studies and proven best practices, the author team covers everything from goal-setting through managing security and performance. You'll learn how to: Identify the real risks and bottlenecks you face in delivering data-and the right solutions Integrate enterprise data and improve its quality, so it can be used more widely and effectively Systematically secure enterprise data and protect customer privacy Model data more effectively and take full advantage of metadata Choose the DBMS and data storage products that fit best into your overall plan Smoothly accommodate new Business Intelligence (BI) and unstructured data applications Improve the performance of your enterprise database applications Revamp your organization to streamline day-to-day data management and reduce cost Data Strategy is indispensable for everyone who needs to manage enterprise data more efficiently-from database architects to DBAs, technical staff to senior IT decision-makers. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. [317]-321) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: xx, 392 p. , ill. (some col.) ; , 23 cm
    Edition: 3rd ed.
    DDC: 005.7/2
    Keywords: Cascading style sheets ; Computer graphics ; Web publishing ; Web sites ; Design ; Electronic books ; local
    Abstract: In this updated edition to their original best-selling classic, the co-creators of CSS clearly, logically, and painlessly explain the hows and whys and ins and outs of the visual formatting language that is their gift to us. The Web would be a poorer place without Messieurs Bos and Lie. Your shelf will be richer for the addition of this book. Rely on it. Study it. Savor it. The Indispensible CSS Tutorial and Reference-Straight from the Creators of CSS Direct from the creators of CSS, this is the definitive guide to CSS, today's indispensable standard for controlling the appearance of any Web or XML document. This book doesn't just show how to use every significant CSS 1 and 2.x feature; it carefully explains the "why" behind today's most valuable CSS design techniques. You'll find practical, downloadable examples throughout-along with essential browser support information and best practices for building high-impact pages and applications. Cascading Style Sheets: Designing for the Web, Third Edition covers every CSS 2.1 improvement and fix, from new height/width definitions in absolutely positioned elements to new clip property calculations. Clear, readable, and thorough, it's the one must-have CSS resource for every Web developer, designer, and content provider. Coverage includes Mastering essential CSS concepts: Rules, declarations, selectors, properties, and more Working with type: From absolute/relative units to font size and weight Understanding CSS objects: Box model, display properties, list styles, and more Exercising total control over spacing and positioning Specifying colors for borders and backgrounds Managing printing: Margins, page breaks, and more Implementing media-specific style sheets for audio rendering, handhelds, and other forms of presentation Moving from HTML extensions to CSS: Five practical case studies Making the most of cascading and inheritance Using external style sheets and import Integrating CSS with XML documents Optimizing the performance of CSS pages Includes a handy CSS Quick Reference printed on the inside covers © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 4th ed.
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: " C++ Primer is well known as one of the best books for learning C++ and is useful for C++ programmers of all skill levels. This Fourth Edition not only keeps this tradition alive, it actually improves on it." --Steve Vinoski, Chief Engineer, Product Innovation, IONA Technologies " The Primer really brings this large and complex language down to size." --Justin Shaw, Senior Member of Technical Staff, Electronic Programs Division, The Aerospace Corporation "It not only gets novices up and running early, but gets them to do so using good programming practices." --Nevin ":-)" Liber, Senior Principal Engineer (C++ developer since 1988) This popular tutorial introduction to standard C++ has been completely updated, reorganized, and rewritten to help programmers learn the language faster and use it in a more modern, effective way. Just as C++ has evolved since the last edition, so has the authors' approach to teaching it. They now introduce the C++ standard library from the beginning, giving readers the means to write useful programs without first having to master every language detail. Highlighting today's best practices, they show how to write programs that are safe, can be built quickly, and yet offer outstanding performance. Examples that take advantage of the library, and explain the features of C++, also show how to make the best use of the language. As in its previous editions, the book's authoritative discussion of fundamental C++ concepts and techniques makes it a valuable resource even for more experienced programmers. Program Faster and More Effectively with This Rewritten Classic Restructured for quicker learning, using the C++ standard library Updated to teach the most current programming styles and program design techniques Filled with new learning aids that emphasize important points, warn about common pitfalls, suggest good programming practices, and provide general usage tips Complete with exercises that reinforce skills learned Authoritative and comprehensive in its coverage The source code for the book's extended examples is available on the Web at the address below. www.awprofessional.com/cpp_primer
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxi, 384 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Software engineering ; Electronic books ; local
    Abstract: Extend RUP to Drive Improvements Across the Entire IT Lifecycle The Rational Unified Process is a powerful tool for improving software development -- but it doesn't go nearly far enough. Today's development organizations need to extend RUP to cover the entire IT lifecycle, including the cross-project and enterprise issues it largely ignores. The Enterprise Unified Process (EUP) does precisely that, enabling you to deliver systems that meet all the needs of today's businesses. Now, EUP's creator and architects present the definitive introduction to EUP, and demonstrate how to use it in your environment. The Enterprise Unified Process systematically identifies the business and technical problems that RUP fails to address, and shows how EUP fills those gaps. Using actual examples and case studies, the authors introduce processes and disciplines for producing new software, implementing strategic reuse, "sunsetting" obsolete code and systems, managing software portfolios, and much more. Their independent, "tool agnostic" coverage will be indispensable no matter which RUP products or platforms you've invested in. Coverage includes Practical, step-by-step guidance for adopting EUP in midsized-to-large organizations Proven processes for optimizing ongoing IT operations and support Enterprise business modeling and architecture with EUP EUP disciplines for enterprise administration, people management, and software process improvement Using the new EUP plug-in for IBM's RUP platform Workflow diagrams fully consistent with RUP for easy understanding Detailed appendices covering EUP roles, artifacts, and terminology EUP is the missing link that can help IT professionals achieve the full benefits of RUP in the enterprise. This book will help you discover it, master it, implement it, and succeed with it. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 361-369) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive book on Security Patterns, which are critical for secure programming. --Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your development efforts. --Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. --Judy Lin, Executive Vice President, VeriSign, Inc. Core Security Patterns provides a comprehensive patterns-driven approach and methodology for effectively incorporating security into your applications. I recommend that every application developer keep a copy of this indispensable security reference by their side. --Bill Hamilton, author of ADO.NET Cookbook , ADO.NET in a Nutshell , and NUnit Pocket Reference As a trusted advisor, this book will serve as a Java developers security handbook, providing applied patterns and design strategies for securing Java applications. --Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase Like Core J2EE Patterns , this book delivers a proactive and patterns-driven approach for designing end-to-end security in your applications. Leveraging the authors strong security experience, they created a must-have book for any designer/developer looking to create secure applications. --John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE Patterns Core Security Patterns is the hands-on practitioners guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisionin...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 624 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Keywords: Internet programming ; Microsoft .NET ; Electronic books ; local
    Abstract: Brilliantly compiled by author Juval Lowy, Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover .NET 2.0. It remains one of the few practical books available on this topic. This invaluable resource is targeted at anyone who develops complex or enterprise-level applications with the .NET platform--an ever-widening market. In fact, nearly two million Microsoft developers worldwide now work on such systems. Programming .NET Components , Second Edition begins with a look at the fundamentals of component-oriented programming and then progresses from there. It takes the time to carefully examine how components can simplify and add flexibility to complex applications by allowing users to extend their capabilities. Next, the book introduces a variety of .NET essentials, as well as .NET development techniques. Within this discussion on component development, a separate chapter is devoted to each critical development feature, including asynchronous calls, serialization, remoting, security, and more. All the while, hazardous programming pitfalls are pointed out, saving the reader from experiencing them the hard way.A .NET expert and noted authority on component-oriented programming, Lowy uses his unique access to Microsoft technical teams to the best possible advantage, conveying detailed, insider information in easy-to-grasp, activity-filled language. This hands-on approach is designed to allow individuals to learn by doing rather than just reading. Indeed, after digesting Programming .NET Components , Second Edition, readers should be able to start developing .NET components immediately. Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover...
    Note: "Covers .NET 2.0 & Visual Studio 2005"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Direct from the creators of the Java™ programming language, the completely revised fourth edition of The Java™ Programming Language is an indispensable resource for novice and advanced programmers alike. Developers around the world have used previous editions to quickly gain a deep understanding of the Java programming language, its design goals, and how to use it most effectively in real-world development. Now, Ken Arnold, James Gosling, and David Holmes have updated this classic to reflect the major enhancements in Java™ 2 Standard Edition 5.0 (J2SE™ 5.0). The authors systematically cover most classes in Java's main packages, java.lang.* , java.util, and java.io, presenting in-depth explanations of why these classes work as they do, with informative examples. Several new chapters and major sections have been added, and every chapter has been updated to reflect today's best practices for building robust, efficient, and maintainable Java software. Key changes in this edition include New chapters on generics, enums, and annotations, the most powerful new language features introduced in J2SE 5.0 Changes to classes and methods throughout to reflect the addition of generics Major new sections on assertions and regular expressions Coverage of all the new language features, from autoboxing and variable argument methods to the enhanced for-loop and covariant return types Coverage of key new classes, such as Formatter and Scanner The Java™ Programming Language, Fourth Edition, is the definitive tutorial introduction to the Java language and essential libraries and an indispensable reference for all programmers, including those with extensive experience. It brings together insights you can only get from the creators of Java: insights that will help you write software of exceptional quality.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Indianapolis, IN : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 248 p. , ill. ; , 24 cm
    Keywords: UML (Computer science) ; Electronic books ; local
    Abstract: "There are many books that shine light on the darkest corners of the UML, but Eric and Bob present just the essentials needed to make you effective in modeling all the important aspects of a software-intensive system." -Grady Booch "Bob and Eric have managed to capture key system and software design techniques in a style that is refreshingly straightforward to understand and apply, and to distill their ideas and insight from more than a decade of practical use of UML into a book that will increase your appreciation for UML and make you more effective." -Dr. Alan W. Brown, Distinguished Engineer, IBM Rational "A practical introduction to designing real-world business systems using UML, explained from first principles. A great book for anyone who wants to start learning the industry's standard modeling language." -Andrew Watson, Vice President and Technical Director, Object Management Group Need to get results with UML...without unnecessary complexity or mind-numbing jargon? You need UML for Mere Mortals®. This easy-to-read introduction is perfect for technical professionals and business stakeholders alike: anyone who needs to create, understand, or review UML models, without becoming a hard-core modeler. There's nothing theoretical about this book. It explains UML in the context of your real-world challenges. It's organized around the activities you'll need to perform. It focuses on the UML elements you'll find most useful. And it offers specific answers for the problems you're most likely to face. Drawing on extensive experience, the authors offer pragmatic explanations and guidance on core techniques ranging from use cases to component diagrams, architectural patterns to application and database modeling. You'll find practical coverage for using UML to support testing, as well as discussion of UML 2.0 and its implications. Whether you're a manager, programmer, architect, database designer, or documentation specialist, UML for Mere Mortals is the handy resource you need to help you achieve your goals with UML...simply, quickly, painlessly. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Community Press | Boston, MA :Safari,
    Language: English
    Pages: xv, 219 p. , ill. ; , 23 cóm
    Edition: 1st ed.
    Keywords: Computer-assisted instruction ; Computer programs ; Handbooks, manuals, etc ; Instruction systems ; Design ; Handbooks, manuals, etc ; Open source software ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Developed by an extremely active open source community, Moodle is a sophisticated course management system that's ideal for creating dynamic online learning communities and for supplementing face-to-face learning. Used in more than 115 countries and supporting over 60 languages, Moodle can scale from a single-teacher site to a 40,000- student university. Teachers who use Moodle have access to an array of powerful tools such as assignments, forums, journals, quizzes, surveys, chat rooms, and workshops. Using Moodle is a comprehensive, hands-on guide that explains how the system works, with plenty of examples and best practices for its many features and plug-in modules. Authored by a member of the Moodle community, this authoritative book also exposes little-known but powerful hacks for more technically savvy users. For anyone who is using-or thinking of using-this CMS, Using Moodle is required reading.
    Note: "Moodle is a sophisticated course management system that's ideal for creating dynamic online learning communities and for supplementing face-to-face learning"--P. [4] of cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xx, 268 p. , ill. ; , 24 cm
    DDC: 686.2/2544536
    Keywords: Adobe InDesign ; Desktop publishing ; Electronic books ; local
    Abstract: Costs less. Does more. Is easier to use: If this is the conclusion you've reached when comparing InDesign CS with its two long-time rivals (QuarkXPress and PageMaker), you're ready to make the switch. This guide shows you how! Throughout this compact guide, the focus is on leveraging your skill in the other leading desktop publishing packages to get up to speed fast in the new leading publishing package! As the perfect companion to the more comprehensive Real World InDesign CS , this tightly focused guide details the most common tasks and techniques you need to know to get your job done in InDesign CS. Clear, concise instructions enhanced by plenty of screen shots and sample layouts show you how to create and navigate documents, import and style text and objects, manage long projects, work with color, and more. You¿ll also find good coverage of all of InDesign's newest and most unique features: the Story Editor, a Separation Preview palette, nested styles, the Package for GoLive command, and more.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Mac OS ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The Most Useful UNIX Guide for Mac OS X Users Ever, with Hundreds of High-Quality Examples! Beneath Mac OS ® X's stunning graphical user interface (GUI) is the most powerful operating system ever created: UNIX ® . With unmatched clarity and insight, this book explains UNIX for the Mac OS X user-giving you total control over your system, so you can get more done, faster. Building on Mark Sobell's highly praised A Practical Guide to the UNIX System, it delivers comprehensive guidance on the UNIX command line tools every user, administrator, and developer needs to master-together with the world's best day-to-day UNIX reference. This book is packed with hundreds of high-quality examples. From networking and system utilities to shells and programming, this is UNIX from the ground up-both the "whys" and the "hows"-for every Mac user. You'll understand the relationships between GUI tools and their command line counterparts. Need instant answers? Don't bother with confusing online "manual pages": rely on this book's example-rich, quick-access, 236-page command reference! Don't settle for just any UNIX guidebook. Get one focused on your specific needs as a Mac user! A Practical Guide to UNIX ® for Mac OS ® X Users is the most useful, comprehensive UNIX tutorial and reference for Mac OS X and is the only book that delivers Better, more realistic examples covering tasks you'll actually need to perform Deeper insight, based on the authors' immense knowledge of every UNIX and OS X nook and cranny Practical guidance for experienced UNIX users moving to Mac OS X Exclusive discussions of Mac-only utilities, including plutil , ditto , nidump , otool , launchctl , diskutil , GetFileInfo , and SetFile Techniques for implementing secure communications with ssh and scp -plus dozens of tips for making your OS X system more secure Expert guidance on basic and advanced shell programming with bash and tcsh Tips and tricks for using the shell interactively from the command line Thorough guides to vi and emacs designed to help you get productive fast, and maximize your editing efficiency In-depth coverage of the Mac OS X filesystem and access permissions, including extended attributes and Access Control Lists (ACLs) A comprehensive UNIX glossary Dozens of exercises to help you practice and gain confidence And much more, including a superior introduction to UNIX programming tools such as awk , sed , otool , make , gcc , gdb , and CVS
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 658.4/038
    Keywords: Chief information officers ; Information resources management ; Information technology ; Management ; Management ; Electronic books ; local
    Abstract: World-class IT leadership solutions from working CIOs: detailed, realistic, proven Every year, IT leadership becomes more challenging. Don't go it alone. Get practical help from the people who know what you're up against, and know what works: your most successful peers . In CIO Wisdom II, more than a dozen of today's leading CIOs share specific, realistic, up-to-the-minute techniques for maximizing agility, cost-effectiveness, and business value . You'll find solutions for managing both the internal and external forces impacting IT, and for dealing with more than 20 of your toughest issues -- business, technical, and human . You'll find specific, realistic approaches to everything from architecture to outsourcing, new technology selection to governance. CIO Wisdom II: it's more valuable than your last consultant -- and a whole lot more cost-effective. Anticipating the next transformation in your role as CIO -- and getting ahead of the curve Delivering real-time, mission-critical business intelligence: lessons from the military Integrating the enterprise: New best practices and cost-effective technical options Quantifying and maximizing software return on investment Mastering five crucial lessons for successful IT outsourcing Managing outsourced environments for maximum responsiveness, flexibility, and efficiency Leveraging the value of open source -- and minimizing its risks Using IT to improve business processes -- and improving your own internal processes, including procurement Systematically securing your IT facilities Achieving compliance -- and leveraging those investments for competitive advantage Previewing tomorrow's key trends in information management © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 3rd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco IPS exam 642-532 The official study guide helps you master all the topics on the IPS exam, including: IPS concepts Command-line interface (CLI) and IPS Device Manager (IDM) configuration modes Basic sensor and IPS signature configuration IPS signature engines Sensor tuning IPS event monitoring Sensor maintenance Verifying system configuration Using the Cisco IDS Module (IDSM) and Cisco IDS Network Module Capturing network traffic CCSP IPS Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the IPS exam. Cisco Security Test Engineer Earl Carter shares preparation hints and test-taking tips, helping you identify areas of weakness and improve your Intrusion Prevention System (IPS) knowledge. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCSP IPS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary materials make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP IPS Exam Certification Guide is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains an electronic copy of the book and more than 200 practice questions for the IPS ex...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The all-in-one guide to modern routed and switched campus network design Understand the network design process and network design models Learn how switches are used in network design Design an IP addressing plan and select appropriate IP routing protocols Apply network security design principles to boost network security Enable WLANs to improve workforce mobility Examine QoS design requirements and tools Unleash the power of voice transport over data networks, including VoIP and IP telephony Use content networking to provide content to users quickly and efficiently Learn how to integrate network management protocols and tools into network designs Understand how to effectively integrate IP multicast, high availability, storage networking, and IPv6 into your network designs Over the past decade, campus network design has evolved many times as new technologies have emerged and business needs have changed. For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and content networking, their core infrastructures must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step. Campus Network Design Fundamentals is an all-in-one guide to key technologies that can be integrated into network design. The book provides insight into why each technology is important and how to apply this knowledge to create a campus network that includes as many or as few of today's productivity-enhancing applications as are needed in your environment. Topics covered throughout the book include network design process and models, switching, IP routing, quality of service (QoS), security, wireless LANs (WLANs), voice transport, content networking, network management, IPv6, IP multicast, increasing network availability, and storage networking. Sample network designs are included through-out, and the book concludes with a comprehensive case study that illustrates the design process and solutions for headquarters, branch offices, and home office/remote users. Whether you need an overview of modern campus technologies or seek advice on how to design switched and routed networks that securely support these technologies, this book is your comprehensive resource to the foundations upon which all modern-day campus networks are based. This book is part of the Cisco Press® Fundament...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Identify, mitigate, and respond to network attacks Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI) Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM) Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network. This new family of adaptive security appliances also controls network activity and application traffic and delivers flexible VPN connectivity. The result is a powerful multifunction network security device that provides the security breadth and depth for protecting your entire network, while reducing the high deployment and operations costs and complexities associated with managing multiple point products. Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a practitioner's guide to planning, deploying, and troubleshooting a comprehensive security plan with Cisco ASA. The book provides valuable insight and deployment examples and demonstrates how adaptive identification and mitigation services on Cisco ASA provide a sophisticated security solution for both large and small network environments. The book contains many useful sample configurations, proven design scenarios, and discussions of debugs that help you understand how to get the most out of Cisco ASA in your own network. "I have found this book really highlights the practical aspects needed for building real-world security. It offers the insider's guidance needed to plan, implement, configure, and troubleshoot the Cisco ASA in customer environments and demonstrates the potential and power of Self-Defending Networks." -Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems® This security book is part of th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Identify, analyze, and resolve current and potential network security problems Learn diagnostic commands, common problems and resolutions, best practices, and case studies covering a wide array of Cisco network security troubleshooting scenarios and products Refer to common problems and resolutions in each chapter to identify and solve chronic issues or expedite escalation of problems to the Cisco TAC/HTTS Flip directly to the techniques you need by following the modular chapter organization Isolate the components of a complex network problem in sequence Master the troubleshooting techniques used by TAC/HTTS security support engineers to isolate problems and resolve them on all four security domains: IDS/IPS, AAA, VPNs, and firewalls With the myriad Cisco® security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. Cisco Network Security Troubleshooting Handbook can single-handedly help you analyze current and potential network security problems and identify viable solutions, detailing each step until you reach the best resolution. Through its modular design, the book allows you to move between chapters and sections to find just the information you need. Chapters open with an in-depth architectural look at numerous popular Cisco security products and their packet flows, while also discussing potential third-party compatibility issues. By following the presentation of troubleshooting techniques and tips, you can observe and analyze problems through the eyes of an experienced Cisco TAC or High-Touch Technical Support (HTTS) engineer or determine how to escalate your case to a TAC/HTTS engineer. Part I starts with a solid overview of troubleshooting tools and methodologies. In Part II, the author explains the features of Cisco ASA and Cisco PIX® version 7.0 security platforms, Firewall Services Module (FWSM), and Cisco IOS® firewalls. Part III covers troubleshooting IPsec Virtual Private Networks (IPsec VPN) on Cisco IOS routers, Cisco PIX firewalls with embedded VPN functionalities, and the Cisco 3000 Concentrator. Troubleshooting tools and techniques on the Authentication, Authorization, and Accounting (AAA) framework are discussed thoroughly on routers, Cisco PIX firewalls, and Cisco VPN 3000 concentrators in Part IV. Part IV also covers troubleshooting Cisco Secure ACS on Windows, the server-side component of the AAA framework. IDS/IPS troubleshooting...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xiv, 282 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: "Every programming language has its quirks. This lively book reveals oddities of the Java programming language through entertaining and thought-provoking programming puzzles." --Guy Steele, Sun Fellow and coauthor of The Java™ Language Specification "I laughed, I cried, I threw up (my hands in admiration)." --Tim Peierls, president, Prior Artisans LLC, and member of the JSR 166 Expert Group How well do you really know Java? Are you a code sleuth? Have you ever spent days chasing a bug caused by a trap or pitfall in Java or its libraries? Do you like brainteasers? Then this is the book for you! In the tradition of Effective Java™ , Bloch and Gafter dive deep into the subtleties of the Java programming language and its core libraries. Illustrated with visually stunning optical illusions, Java™ Puzzlers features 95 diabolical puzzles that educate and entertain. Anyone with a working knowledge of Java will understand the puzzles, but even the most seasoned veteran will find them challenging. Most of the puzzles take the form of a short program whose behavior isn't what it seems. Can you figure out what it does? Puzzles are grouped loosely according to the features they use, and detailed solutions follow each puzzle. The solutions go well beyond a simple explanation of the program's behavior--they show you how to avoid the underlying traps and pitfalls for good. A handy catalog of traps and pitfalls at the back of the book provides a concise taxonomy for future reference. Solve these puzzles and you'll never again fall prey to the counterintuitive or obscure behaviors that can fool even the most experienced programmers.
    Note: Includes bibliographical references (p. 265-269) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 1664 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: HP-UX ; Hewlett-Packard computers ; Programming ; Examinations ; Study guides ; Operating systems (Computers) ; Electronic books ; local
    Abstract: HP-UX CSE: Official Study Guide and Desk Reference The definitive HP-UX CSE exam preparation guide and reference HP-approved coverage of all three CSE exams: CSE HP-UX Advanced System Administration, CSE High Availability Using HP-UX Serviceguard, and CSE HP-UX Networking and Security Comprehensive study resources: exam objectives, sample questions, and summaries for last-minute review More than a great study guide: an outstanding reference for working system engineers This book delivers comprehensive preparation for all three HP-UX CSE exams, the core exam: CSE HP-UX Advanced System Administration, and specialty exams, CSE High Availability Using HP-UX Serviceguard and CSE HP-UX Networking and Security . Coverage includes: Implementing HP-UX in technology-rich enterprise environments Maximizing the performance and availability of HP-UX systems and applications Partitioning: node and virtual partitions Disks, volumes, file systems: RAID, LVM, VxVM, HFS, VxFS, VFS layer, swap/dump space, and more Monitoring system resources, activities, events, and kernels Processes, threads, and bottlenecks: priorities, run queues, multi-processor environments, memory requirements, bottlenecks, and more Installation, patching, and recovery, including Software Distributor and Ignite-UX Emergency recovery with HP-UX installation media Broad networking coverage: IPv6, ndd, DHCP, DNS, NTP, CIFS/9000, LDAP, sendmail, Automatic Port Aggregation, VPNs, VLANs, and more Planning, implementing, and managing high availability clustering with Serviceguard Other HP-UX cluster solutions: Extended Serviceguard Cluster, Metrocluster, Continentalclusters, and more Infrastructure for remote access to HA clusters: SANs, DWDM, dark fiber HP-UX security administration: Trusted systems, SSH, HIDS, IPSec, IPFilter, and Bastille Operating Systems/HP-UX Sample questions, last-minute review tips, and other study resources This isn't just an outstanding prep guide, it's the definitive day-to-day reference for working professionals in high availability environments. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 525 p. , ill. ; , 24 cm
    DDC: 005.2'765
    Keywords: Lotus Notes ; WebSphere ; Software configuration management ; Web servers ; Computer programs ; Electronic books ; local
    Abstract: Straight from IBM, this is the first comprehensive guide to building collaborative solutions that integrate WebSphere and Lotus to drive maximum business value. Writing for experienced Web developers, three leading IBM consultants show how to design and deploy WebSphere and Domino together in any environment, no matter how large or complex. The authors address architecture, security, performance, availability, development, and much more. Using their techniques, you can implement cutting-edge collaboration, drive productivity improvements, streamline business processes, accelerate response times-and build your On Demand enterprise. Coverage includes Architecting WebSphere and Lotus collaboration for maximum effectiveness Establishing a common platform that reduces administrative costs and increases ROI Choosing what to deploy on WebSphere and what to deploy on Domino Optimizing new Lotus collaborative applications for existing WebSphere environments Managing integrated WebSphere and Domino systems Using WebSphere and Domino development tools to extend and customize your system Accessing J2EE from Domino-and vice versa Detailed appendices on WebSphere Application Server, Domino, WebSphere Portal, Lotus Workplace, and much more... © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 501-504) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 689 p. , ill. ; , 24 cm
    DDC: 005.2'762
    Keywords: PHP (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: "This book, written by my colleague, Andi Gutmans, and two very prominent PHP developers, Stig Bakken and Derick Rethans, holds the key to unlocking the riches of PHP 5. It thoroughly covers all of the features of this new version, and is a must have for all PHP developers interested in exploring PHP 5's advanced features" -Zeev Suraski, Co-Designer of PHP 5 and Co-Creator of the Zend Engine Expert PHP 5 programming techniques, direct from PHP 5 co-creator and key developers Definitive coverage of the PHP object model, design patterns, XML/SOAP integration, and more Solid introduction and expert insights into performance tuning, PEAR, extensions, and database access The definitive introduction to PHP 5's advanced features! The definitive introduction for today's most powerful PHP 5 techniques In this book, PHP 5's co-creator and two leading PHP developers show you how to make the most of PHP 5's industrial-strength enhancements in any project-no matter how large or complex. Their unique insights and realistic examples illuminate PHP 5's new object model, powerful design patterns, improved XML Web services support, and much more. Whether you're creating web applications, extensions, packages, or shell scripts-or migrating PHP 4 code-here are high-powered solutions you won't find anywhere else. Review PHP's syntax and master its object-oriented capabilities-from properties and methods to polymorphism, interfaces, and reflection Master the four most important design patterns for PHP development Write powerful web applications: handle input, cookies, session extension, and more Integrate with MySQL, SQLite, and other database engines Provide efficient error handling that's transparent to your users Leverage PHP 5's improved XML support-including parsing, XSLT conversions, and more Build XML-based web services with XML-RPC and SOAP Make the most of PEAR: work with the repository, use key packages, and create your own Upgrade PHP 4 code to PHP 5-compatibility issues, techniques, and practical workarounds Improve script performance: tips and tools for PHP optimization Use PHP extensions to handle files/streams, regular expressions, dates/times, and graphics Create original extensions and shell scripts If you're a software developer new to PHP, you'll leap quickly into PHP and its new object-oriented capabilities. If you're an experienced PHP programmer, you already recognize PHP's convenience and simplicity. Now, discover all of its extraordinary pow...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 381 p. , ill. ; , 23 cm
    Keywords: Computer networks ; Security measures ; Computer security ; Computer security ; United States ; Management ; Data protection ; Data protection ; Management ; Electronic books ; local
    Abstract: Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization's aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board. Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow fin...
    Note: "Understand the total cost of ownership and return on investment for network security solutions"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 870 p. , ill. ; , 23 cm
    Series Statement: Networking technology series
    Keywords: Electronic books ; local
    Abstract: Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic Use router authentication to prevent spoofing and routing attacks Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks Apply stateful filtering of traffic with CBAC, including dynamic port mapping Use Authentication Proxy (AP) for user authentication Perform address translation with NAT, PAT, load distribution, and other methods Implement stateful NAT (SNAT) for redundancy Use Intrusion Detection System (IDS) to protect against basic types of attacks Obtain how-to instructions on basic logging and learn to easily interpret results Apply IPSec to provide secure connectivity for site-to-site and remote access connections Read about many, many more features of the IOS firewall for mastery of router security The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches you how to use the Cisco IOS firewall to enhance the security of your perimeter routers and, along the way, take advantage of the flexibility and scalability that is part of the Cisco IOS Software package. Each chapter in Cisco Router Firewall Security addresses an important component of perimeter router security. Author Richard Deal explains the advantages and disadvantages of all key security features to help you understand when they should be used and includes examples from his personal consulting experience to illustrate critical issues and security pitfalls. A detailed case study is included at the end of the book, which illustrates best practices and specific information on how to implement Cisco router security features. Whether you are looking to learn about firewall security or seeking how-to techniques to enhance security in your Cisco routers, Cisco R...
    Note: "Harden perimeter routers with Cisco firewall functionality and features to ensure network security"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: There's a new browser in town: Firefox is quickly becoming a leading alternative to Microsoft Internet Explorer. If you are new to Firefox and want to see what all the buzz is about, Firefox and Thunderbird: Beyond Browsing and Email is the guide that you need. By focusing on how to configure and customize Firefox and Thunderbird, this book will show you how to quickly get a hold of the less intuitive features that most new users struggle to figure out. You will discover which of Firefox's many options should be adjusted, which shouldn't, and how to locate many hidden preferences that will ultimately create a better browsing experience. The author's tips and tricks will teach you how to adjust the browser's appearance and behavior, and how to install the most popular extensions to maximize the browser's performance. You'll also be introduced to Firefox's e-mail client companion, Thunderbird. You'll cover Thunderbird's built-in spam filters, calendar, and customizeable layout and toolbars. Personalize your e-mail with tips and tricks dedicated to getting the most out of Thunderbird, and learn how to make it work together with Firefox for a seamless online experience. You can even find out how to contribute to the development of Firefox and Thunderbird. A special section on Web development will show you how you can add new extensions, themes, and customizations to each one and make an impact on the future of Firefox and Thunderbird.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que ; | Boston, MA :Safari,
    Language: English
    Pages: 256 p. , ill. ; , 26 cm
    DDC: 004.16
    Keywords: Microcomputers ; Electronic books ; local
    Abstract: Your new PC just arrived. You open the box, excited to hook it up, start surfing the web, send e-mails...and then you see all of the cords, CD-ROMs and parts that need to be connected and installed, and suddenly it doesn't seem like so much fun anymore. The instructions look even more intimidating. Don't panic! Easy Computer Basics can help. This up-to-date, full-color, highly visual guide will walk you through the entire set-up process and then show you how to use the different programs to accomplish common tasks. You'll learn how to: Use Microsoft Windows, Works and Word Connect to the Internet Surf the web Read and write e-mail View and edit digital pictures Download and listen to digital music Add new devices, such as printers and hard drives Perform basic maintenance and security tasks Having a computer is supposed to be fun, so don't let its size or complexity take the fun out of your experience. Make your PC work for you with Easy Computer Basics .
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: We all have those "go-to" people in our lives. The one you go-to for advice, the one you go-to for comfort, the one you go-to with technical questions...now you can be the one that others go-to for help with Microsoft Office 2003. Tricks of the Microsoft Office Gurus is full of exclusive tricks from Paul McFedries , an Office "insider," that will help you learn the Office applications inside and out. Designed to bridge the gap between your expectation and reality, you will go beyond the basics and learn newly discovered techniques, shortcuts and best practices, including: Using Excel's "Camera Tool" for what-if analysis Embedding fonts in shared documents Adding a live stock price quote to a worksheet Using dummy text to layout and format a document Publishing Outlook Calendar to the web Using Word to customize Power Point handouts Through real-world examples that showcase how the tips and tricks can be used in everyday business tasks, Tricks of the Microsoft Office Gurus will help you get the most out of Office 2003.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que ; | Boston, MA :Safari,
    ISBN: 9780789732729 , 0789732726 , 0789732726
    Language: English
    Pages: 480 p. ; , 23 cm
    Series Statement: Exam cram 2
    Parallel Title: Erscheint auch als
    DDC: 658.4038011
    Keywords: Management information systems Study guides Auditing ; Examinations ; Management information systems ; Auditing ; Examinations ; Study guides ; Electronic books ; local ; Electronic books ; Study guides ; Electronic book
    Abstract: Want an affordable yet innovative approach to studying for the Certified Information Systems Auditor (CISA) 2005 exam? CISA 2005 Exam Cram 2 is your solution. You will have the essential material for passing the CISA 2005 exam right at your fingertips. All exam objectives are covered and you'll find practice exams, exam alerts, notes, tips and cautions to help guide you through your exam preparation. A CD also provides you with a video introduction to the exam and complete explanations of answers to the practice questions from Certified Tech Trainers (CTT). As a special bonus, you will receive $75 in discounts on CTT products and services. For your smartest, most efficient way to get certified, choose CISA 2005 Exam Cram 2 .
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...