Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (366)
  • Hudson, Paul  (5)
  • Mitchell, Scott
  • Boston : Addison-Wesley  (175)
  • Indianapolis, Ind. : Sams  (121)
  • Indianapolis, IN : Cisco Press  (78)
Datasource
Material
Language
Years
  • 1
    ISBN: 9780133475654 , 0133475654
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2014 ed.
    Keywords: Ubuntu (Electronic resource) ; Linux ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: The Publisher regrets that the CD/DVD content for this title cannot be made available Online. Ubuntu Unleashed 2014 Edition is filled with unique and advanced information for everyone who wants to make the most of the Linux-based Ubuntu operating system. This new edition has been thoroughly revised and updated by a long-time Ubuntu community leader to reflect the exciting new Ubuntu 13.10 and the forthcoming Ubuntu 14.04. Former Ubuntu Forum administrator Matthew Helmke covers all you need to know about Ubuntu 13.10/14.04 installation, configuration, productivity, multimedia, development, system administration, server operations, networking, virtualization, security, DevOps, and more-including intermediate-to-advanced techniques you won't find in any other book. Helmke presents up-to-the-minute introductions to Ubuntu's key productivity and Web development tools, programming languages, hardware support, and more. You'll find new or improved coverage of Ubuntu's Unity interface, various types of servers, software repositories, database options, virtualization and cloud services, development tools, monitoring, troubleshooting, Ubuntu's push into mobile and other touch screen devices, and much more. Matthew Helmke served from 2006 to 2011 on the Ubuntu Forum Council, providing leadership and oversight of the Ubuntu Forums, and spent two years on the Ubuntu regional membership approval board for Europe, the Middle East, and Africa. He has written about Ubuntu for several magazines and websites and is the lead author of The Official Ubuntu Book . He works for Pearson Education writing technical documentation for educational testing software. Detailed information on how to... Configure and customize the Unity desktop Get started with multimedia and productivity applications, including LibreOffice Manage Linux services, users, and software packages Administer and run Ubuntu from the command line Automate tasks and use shell scripting Provide secure remote access and configure a secure VPN Manage kernels and modules Administer file, print, email, proxy, LDAP, DNS, and HTTP servers (Apache, Nginx, or alternatives) Learn about new options for managing large numbers of servers Work with databases (both SQL and the newest NoSQL alternatives) Get started with virtualization Build a private cloud with Juju and Charms Learn the basics about popular programming languages including Python, PHP, Perl, and new alternatives such as Go and Rust Learn about Ubuntu's ...
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed Jan. 27, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780133135251 , 013313525X
    Language: English
    Pages: 1 online resource (1 v.)
    Edition: 2013 ed.
    Parallel Title: Erscheint auch als
    Keywords: Ubuntu (Electronic resource) ; Linux ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: This eBook edition does not provide a DVD of Ubuntu or the upgrade kit. You can download the most current release of Ubuntu from www.ubuntu.com/download. Ubuntu Unleashed 2013 Edition is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been thoroughly revised and updated by a long-time Ubuntu community leader to reflect the exciting new Ubuntu 12.10 ("Quantal Quetzal") and the forthcoming Ubuntu 13.04. Former Ubuntu Forum administrator Matthew Helmke covers all you need to know about Ubuntu 12.10/13.04 installation, configuration, productivity, multimedia, development, system administration, server operations, networking, virtualization, security, DevOps, and more-including intermediate-to-advanced techniques you won't find in any other book. Helmke presents up-to-the-minute introductions to Ubuntu's key productivity and Web development tools, programming languages, hardware support, and more. You'll find new or improved coverage of navigation via Unity Dash, wireless networking, VPNs, software repositories, new NoSQL database options, virtualization and cloud services, new programming languages and development tools, monitoring, troubleshooting, and more. Configure and customize the Unity desktop and make the most of the Dash Get started with multimedia and productivity applications, including LibreOffice Manage Linux services, users, and software packages Administer and run Ubuntu from the command line (with added coverage of stdin, stdout, sdterr, redirection, and file comparison) Automate tasks and use shell scripting Provide secure remote access and configure a secure VPN Manage kernels and modules Administer file, print, email, proxy, LDAP, and HTTP servers (Apache or alternatives) Learn about new options for managing large numbers of servers Work with databases (both SQL and the newest NoSQL alternatives) Get started with virtualization Build a private cloud with Juju and Charms Learn the basics about popular programming languages including Python, PHP, Perl, and new alternatives such as Go and Rust
    Note: "Covering 12.10 and 13.04"--Cover. - Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, Mass. :Safari Books Online,
    ISBN: 9780768685633 , 076868563X
    Language: English
    Pages: viii, 240 p , ill. (chiefly col.), maps , 24 cm. +
    Edition: 4th ed.
    Parallel Title: Erscheint auch als
    Keywords: Web sites ; Design ; Electronic books ; local
    Abstract: Build a great personal or business website... absolutely no experience needed! Why pay a professional web developer? If you can use a word processor, you can do it yourself! This package contains all the software, templates, and simple step-by-step instructions you need to build a great site in practically no time! Build sites like these using our professional-quality templates: -Family sites -Hobby sites -Community and nonprofit sites -Online storefronts that accept credit card payments via PayPal -Post video on YouTube 8 Easy Projects In this book you'll see just how easy it is to create your own website. The CD included with this book contains professional website templates and a free web page editor. With the web page editor, you can quickly and easily customize the templates into your personal websites. Better still, using the editor is as simple as using a word processor. Use easy web-based services to: -Sell products at your own eBay Store -Create your own personal or professional blog -Display your digital photos on your own Snapfish site -Share your videos on YouTube -Create a MySpace page that'll stand out from the crowd -Build your social network with your own Facebook presence You won't believe how easy it is to build your own site...or how much fun! CD-ROM contains all the tools you need: The complete open source SeaMonkey Suite software toolset for building websites (no restrictions, not a demo!) HTML sample templates
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, Mass. :Safari Books Online,
    ISBN: 9780768678482 , 076867848X
    Language: English
    Pages: xii, 628 p , ill. , 23 cm. +
    Series Statement: Sams teach yourself
    Parallel Title: Erscheint auch als
    Keywords: Active server pages ; Web sites ; Design ; Microsoft .NET ; Electronic books ; local
    Abstract: Sams Teach Yourself ASP.NET 3.5 in 24 Hours Scott Mitchell Starter Kit DVD includes Microsoft Visual Web Developer 2008 Express Edition In just 24 sessions of one hour or less, you will be up and running with ASP.NET 3.5. Using a straightforward, step-by-step approach, each lesson builds upon a real-world foundation forged in both technology and business matters, allowing you to learn the essentials of building dynamic, data-driven web applications from the ground up. Step-by-step instructions carefully walk you through the most common questions, issues, and tasks. Q&As, quizzes, and exercises at the end of each lesson help you build and test your knowledge. By the Way, Did You Know?, and Watch Out! boxes point out shortcuts and solutions. Learn how to... Design and create ASP.NET web pages Use Microsoft Visual Web Developer to quickly and professionally build ASP.NET websites Collect input from users visiting your web pages Display database data through a web page Edit, insert, delete, sort, and page through database data from an ASP.NET page Build a website that supports user accounts Use Ajax to design interactive web user interfaces As editor and main contributor to 4GuysFromRolla.com, a popular ASP.NET resource website, Scott Mitchell has authored more than a thousand articles on Microsoft web technologies since 1998. In addition to his vast collection of online articles, Scott has written six previous books on ASP and ASP.NET: Sams Teach Yourself Active Server Pages 3.0 in 21 Days (Sams); Designing Active Server Pages (O'Reilly); ASP.NET: Tips, Tutorials, and Code (Sams); ASP.NET Data Web Controls Kick Start (Sams); Sams Teach Yourself ASP.NET in 24 Hours (Sams); and Sams Teach Yourself ASP.NET 2.0 in 24 Hours (Sams). Scott has also written a number of magazine articles and is a regular columnist for Microsoft's MSDN Magazine. DVD Includes: Microsoft Visual Web Developer 2008 Express Edition On the Web: Register your book at informit.com/title/9780672329975 for access to author code, examples, updates and corrections as they become available. Category: Microsoft Programming/ASP.NET Covers: ASP.NET 3.5 User Level: Beginning-Intermediate
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, Mass. :Safari Books Online
    ISBN: 9780672329692 , 0672329697
    Language: English
    Pages: xxiv, 811 p , ill. , 23 cm. +
    Keywords: Ubuntu (Electronic resource) ; Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 067232993X ISBN-13: 9780672329937 Ubuntu 7.10 Linux Unleashed Andrew Hudson Paul Hudson DVD Includes Ubuntu 7.10 "Gutsy Gibbon" Ubuntu 7.10 Linux Unleashed presents comprehensive coverage of the popular Ubuntu Linux distribution. Windows users, Mac users, and Linux enthusiasts have been increasingly turning to Ubuntu for a user-friendly, easy-to-use Linux distribution. This book provides detailed information on installing, using, and administering Ubuntu. You'll learn how to set up a workstation or a server, and you'll find complete details on Ubuntu's easy-to-use desktop and productivity software. Ubuntu 7.10 Linux Unleashed includes a range of coverage: From the software you need in your everyday work, such as the OpenOffice.org productivity suite, to how to configure your Linux desktop to run smoothly using multiple printers, shell scripts, and more. For the hardcore Linux enthusiast, there is complete coverage of the X Window system, Linux programming, web server administration, and network administration. Install and configure Ubuntu Get all your system's devices and peripherals up and running Configure and use the X Window System Manage Linux services and users Run a printer server Connect to a local network and the Internet Set up and administer a web server with Apache Secure your machine and your network from intruders Learn shell scripting Share files with Windows users using Samba Get productive with OpenOffice.org Play games on Linux Use Linux multimedia programs Create and maintain a MySQL database Configure a firewall Set up an FTP server Use Ubuntu's development and programming tools Tune your Ubuntu system for maximum performance Learn to manage and compile the kernel and modules Andrew Hudson is a regular freelance contributor to Linux Format magazine, the UK's largest Linux magazine. He is the co-author of Fedora Unleashed . Paul Hudson is a professional developer and full-time journalist for Future Publishing. His articles have appeared in Mac Format , PC Answers , PC Format , PC Plus , and Linux Format . He is the co-author of Fedora Unleashed . DVD includes The full Ubuntu 7.10 distribution for Intel x86 computers The complete OpenOffice.org office suite Hundreds of additional programs and utilities Category: Operating Systems/Linux Covers: Ubuntu 7.10 "Gutsy Gibbon" User Level: Intermediate-Advanced
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, Mass. :Safari Books Online,
    ISBN: 9780768680300 , 0768680301
    Language: English
    Pages: xxv, 926 p , ill. , 23 cm. +
    Edition: 2008 ed.
    Parallel Title: Erscheint auch als
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Fedora Unleashed, 2008 Edition presents comprehensive coverage of Fedora 8, the popular Linux distribution developed by the Red Hat-sponsored Fedora Project. This book provides detailed information on installing, using, and administering Fedora. You'll learn how to set up a desktop workstation or a high-powered server, and you'll find complete details on Yum, Fedora's easy-to-use desktop and productivity software. Fedora Unleashed, 2008 Edition covers a wide range of topics, from using the software you need every day for work, such as the OpenOffice.org productivity suite and the Firefox web browser, to configuring your Linux desktop to run smoothly using multiple printers, shell scripts, and more. Install and configure the Fedora 8 Linux distribution Manage Linux services and users Run a printer server with CUPS Connect to a local network and the Internet Set up and administer a web server with Apache Secure your machine and your network from intruders Rebuild and install a new Linux kernel Learn shell scripting Run other operating systems on Fedora with Xen Share files with Windows users using Samba Get productive with OpenOffice.org Play games on Linux Use Linux multimedia programs Use a database with Fedora Set up a firewall Set up a DNS server Work with the X Window system Learn Linux programming (including Mono) Fedora 8 on DVD: DVD includes the Fedora 8 binary distribution with all the base Fedora packages plus hundreds of additional programs and utilities. Free Upgrade! Purchase this book anytime in 2008 and receive a free Fedora 9 Upgrade Kit by mail (U.S. or Canada only) after Fedora 9 is released. See inside back cover for details.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: ix, 1020 p. , ill. ; , 24 cm
    DDC: 005.72
    Keywords: Dreamweaver (Computer file) ; Web site development ; Electronic books ; local
    Abstract: Macromedia Dreamweaver 8 Unleashed is your complete reference guide to developing dynamic, data-driven web sites and applications with Dreamweaver 8. Based on the newest version of Dreamweaver, you will find comprehensive and up-to-date instruction on developing complex applications, as well as how to collect information from users, personalize their online experience, and use a variety of built-in site management tools to create the ultimate web site experience. With Macromedia Dreamweaver 8 Unleashed , you will learn how to fully exploit Dreamweaver 8 by working with frames and framesets, layers, incorporating multimedia and animation, and adding dynamic elements such as a shopping cart.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: viii, 244 p. , ill. ; , 21 cm
    DDC: 006.74
    Keywords: Cascading style sheets ; Web sites ; Design ; Electronic books ; local
    Abstract: The short, focused lessons presented in Sams Teach Yourself CSS in 10 Minutes will help you quickly understand cascading style sheets (CSS) and how to immediately apply it to your work. Author Russ Weakley is a well-respected member of the CSS community and is known for his ability to make complicated concepts easy-to-understand for even inexperienced CSS users. With this book, you will cover the essentials for standards compliant techniques that are supported by the most common browsers. Once you master the basics, Weakley will also take you inside positioning, troubleshooting CSS, and handling common CSS bugs. Sams Teach Yourself CSS in 10 Minutes is the ultimate quick learning tool and handy desk reference guide to CSS.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: vii, 326 p. , ill. ; , 24 cm
    DDC: 005.2762
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Take your Java programming skills beyond the ordinary. Java After Hours: 10 Projects You'll Never Do at Work will make Java your playground with ten detailed projects that will have you exploring the various fields that Java offers to build exciting new programs. You'll learn to: Create graphics interactively on Web servers Send images to Web browsers Tinker with Java's Swing package to make it do seemingly impossible things Search websites and send e-mail from Java programs Use multithreading, Ant and more! Increase your Java arsenal by taking control of Java and explore its possibilities with Java After Hours .
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: ix, 366 p. , ill. ; , 21 cm
    DDC: 005.5
    Keywords: Lotus Notes ; Business ; Computer programs ; Database management ; Computer programs ; Electronic mail systems ; Groupware (Computer software) ; Electronic books ; local
    Abstract: In today's fast paced world, we're lucky to get spare time each day to think, relax, read, take a nap...Who has time to learn something new? You do. Sams Teach Yourself Lotus Notes 7 in 10 Minutes is an essential reference guide to Lotus Notes 7 with practical answers for people who need fast results. Broken into concise ten minutes sections, you will learn about the features of Lotus Notes 7, including: E-mail Calendar Web Conferencing TeamRoom Discussion Templates Discover Folders Discover and master the use of features that you didn't even know existed with Sams Teach Yourself Lotus Notes 7 in 10 Minutes .
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xii, 320 p. , ill. ; , 24 cm
    DDC: 686.22544536
    Keywords: Adobe InDesign ; Desktop publishing ; Electronic books ; local
    Abstract: Adobe InDesign CS2 is a powerful, but complicated, page layout technology. Sure, learning how to use the various tools and techniques is important, but what you really need and want to know is how to put those tools and techniques to use to complete projects at work. That's where Adobe InDesign CS2 Work: Projects You Can Use on the Job comes into play. The InDesign tools and basics are introduced to you in the first three chapters. After that, you will accomplish a variety of real-world job tasks with detailed instructions that allow for personalization. The projects you will learn to tackle include: Business Collateral Marketing Materials Newspaper/Magazine Ads and Posters Brochures Interactive Reports/Presentations Monthly Newsletters Product Catalogues Order Forms Annual Reports Tips, tricks and notes provide you with the information that you need to carry over what you learn in Adobe InDesign CS2 @ Work: Projects You Can Use on the Job to your job. Put your knowledge and talents to work! "I'm really impressed with Adobe InDesign @work: Projects You Can Use on the Job. Cate Indiano found just the right balance of easy step-by-step instructions and pertinent background information, including workflow, project management, and production issues. The example layouts and files are well-designed and provide real-world context for the entire book. You won't find any fluff here - just a combination of clear and purposeful text and screenshots." Adam Pratt, Application Engineer, Adobe Systems, Inc. "Cate Indiano has produced a thorough, well thought out book. She's an excellent instructor and her focus on making sure her readers learn what they need to know to produce work efficiently in the real world is very evident in this book." Sterling Ledet, Sterling Ledet & Associates
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xiv, 558 p. , ill. ; , 24 cm. +
    Edition: 4th ed.
    DDC: 005.71262
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: If you have been wanting to learn Java, check out the newly revised fourth edition of the best-seller Sams Teach Yourself Programming with Java in 24 Hours . This step-by-step tutorial will teach you how to create simple Java programs and applets. Comprised of 24 one-hour lessons, this new edition focuses on key programming concepts and essential Java basics, has been improved by dozens of reader comments, and is reorganized to better cover the latest developments in Java. The book's coverage of core Java programming topics has also been expanded. A great starting point for learning Java, this book is also a great primer to reading sams Teach Yourself Java in 21 Days .
    Note: Includes index. - Previous ed. published as: Sams teach yourself Java 2 in 24 hours. 2003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco SNRS exam 642-502 Attack threats Router management and administration Authentication, Authorization, and Accounting (AAA) and Cisco Secure Access Control Server RADIUS and TACACS+ Cisco IOS® Firewall feature set Securing networks with Cisco routers Mitigating Layer 2 attacks IPsec and Easy Virtual Private Network (VPN) Security Device Manager (SDM) CCSP SNRS Exam Certification Guide is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the SNRS exam. Network security engineers Greg Bastien, Sara Nasseh, and Christian Degu share preparation hints and test-taking tips, helping you identify areas of weakness and improve your knowledge of router and switch security. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCSP SNRS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Foundation summary information gives you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful test engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP SNRS Exam Certification Guide is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press®. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains an electronic copy of the book and over 200 practice questions for the SNRS exam, all available in study mode, test mode, and flash card format. Includes a FREE 45-Day Online Edition T...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: An introduction to network attack mitigation with IPS Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the "big picture"? What are the best practices related to IPS? How is IPS deployed, and what should be considered prior to a deployment? Intrusion Prevention Fundamentals offers an introduction and in-depth overview of Intrusion Prevention Systems (IPS) technology. Using real-world scenarios and practical case studies, this book walks you through the lifecycle of an IPS project-from needs definition to deployment considerations. Implementation examples help you learn how IPS works, so you can make decisions about how and when to use the technology and understand what "flavors" of IPS are available. The book will answer questions like: Whether you are evaluating IPS technologies or want to learn how to deploy and manage IPS in your network, this book is an invaluable resource for anyone who needs to know how IPS technology works, what problems it can or cannot solve, how it is deployed, and where it fits in the larger security marketplace. Understand the types, triggers, and actions of IPS signatures Deploy, configure, and monitor IPS activities and secure IPS communications Learn the capabilities, benefits, and limitations of host IPS Examine the inner workings of host IPS agents and management infrastructures Enhance your network security posture by deploying network IPS features Evaluate the various network IPS sensor types and management options Examine real-world host and network IPS deployment scenarios This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques. Includes a FREE 45-Day Online Edition
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, Mass. :Safari Books Online
    ISBN: 0672329298 , 9780672329296
    Language: English
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Red Hat® Fedora™ Core 6 Unleashed presents comprehensive coverage of Fedora Core 6, the popular Linux distribution developed by the Red Hat-sponsored Fedora Project. This book provides detailed information on installing, using, and administering Fedora. You'll learn how to set up a desktop workstation or a high-powered server, and you'll find complete details on Yum, Fedora's easy-to-use desktop and productivity software. Red Hat® Fedora™ Core 6 Unleashed covers a wide range of topics from using the software you need every day for work, such as the OpenOffice.org productivity suite and the Firefox web browser, to configuring your Linux desktop to run smoothly using multiple printers, shell scripts, and more. For the hardcore Linux enthusiast, there is complete coverage of the X Window system, Linux programming (including Mono), web server administration, and network administration. Install and configure Red Hat's Fedora Core 6 Linux distribution Manage Linux services and users Run a printer server with CUPS Connect to a local network and the Internet Set up and administer a web server with Apache Secure your machine and your network from intruders Rebuild and install a new Linux kernel Learn shell scripting Run other operating systems on Fedora with Xen Share files with Windows users using Samba Get productive with OpenOffice.org Play games on Linux Use Linux multimedia programs Use a database with Fedora Set up a firewall Watch television on your computer Set up a DNS server Andrew Hudson is a regular freelance contributor to Linux Format magazine, the UK's largest Linux magazine. His particular area of expertise is Fedora Core and the Red Hat Enterprise platform. Paul Hudson is a professional developer and full-time journalist for Future Publishing. His articles have appeared in Mac Format, PC Answers, PC Format, PC Plus, and Linux Format. DVD includes The full Fedora Core 6 binary distribution, packed with the complete Fedora Core packages The complete OpenOffice.org office suite Hundreds of additional programs and utilities Register your book at www.samspublishing.com/register for access to exclusive bonus content and other resources. Category: Operating Systems/Linux Covers: Fedora Core 6 Linux Distribution User Level: Intermediate-Advanced www.samspublishing.com
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: Your first step into the world of IP telephony No IP telephony experience required Includes clear and easily understood explanations Makes learning easy Your first step to the world of IP telephony begins here! Learn how voice and data communications merge in voice-over-IP technology Use this reader-friendly guide to understand the benefits of this technology Explore real-life applications and theories through case studies in every chapter Welcome to the world of voice over IP We use either a telephone or e-mail for much of our day-to-day communication. Today, these two worlds are merging, and companies can place phone calls over their existing data network infrastructures using a technology called voice over IP (VoIP). No prior experience with VoIP technology is required Voice over IP First-Step is anyone's introduction to the world of VoIP networks. The concepts in this book are presented in plain language, so you don't need in-depth background knowledge to comprehend the technologies covered. If you work with data networks, if you work with telephony networks, if you're a home user interested in how VoIP can reduce your monthly phone bill, or if the concept of VoIP simply intrigues you, this book is for you.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xv, 467, [37] p. , ill. ; , 24 cm
    DDC: 005.7585
    Keywords: Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Abstract: Oracle Database 10g Insider Solutions is a must-have reference guide for all Oracle professionals. It provides much-needed information on best practices, tips, and techniques in debugging, installation, deployment, and tuning of the Oracle 10g database. You can draw upon the experience and knowledge of these authors to find creative ways to put your Oracle database to work. The authors will also address common and not-so-common installation concerns, database administration, development, and tuning. Oracle Database 10g Insider Solutions will bring you the insider information that you can't get anywhere else.
    Note: "Covers release 2"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: viii, 612 p. ; , 24 cm
    DDC: 006.786
    Keywords: Flash (Computer file) ; Computer animation ; Electronic books ; local
    Abstract: Explore the depth and flexibility of Macromedia Flash 8 with Sams Teach Yourself Macromedia Flash 8 in 24 Hours . Fundamental topics are presented one-by-one in a series of 24 one-hour lessons that will help you master the basics of Flash. Author Phillip Kerman , an internationally-known Macromedia trainer and multimedia expert, offers you a clearly-written, well-organized introduction to Macromedia Flash 8 without becoming too overwhelming. You will cover such subjects as: Drawing and Painting Original Art Using Motion Tween to Animate Animatng Using Movie Clips Using Actions to Create Non-Linear Movies Optimizing a Flash Site Publishing a Creation Not only will you master the basics of Macromedia Flash 8 with Sams Teach Yourself Macromedia Flash 8 in 24 Hours , you will also be better prepared to learn more advanced topics in the future.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    ISBN: 1587052024
    Language: English
    Pages: p. ; , cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: A detailed examination of interior routing protocols -- completely updated in a new edition A complete revision of the best-selling first edition--widely considered a premier text on TCP/IP routing protocols A core textbook for CCIE preparation and a practical reference for network designers, administrators, and engineers Includes configuration and troubleshooting lessons that would cost thousands to learn in a classroom and numerous real-world examples and case studies Praised in its first edition for its approachable style and wealth of information, this new edition provides readers a deep understanding of IP routing protocols, teaches how to implement these protocols using Cisco routers, and brings readers up to date protocol and implementation enhancements. Routing TCP/IP, Volume 1 , Second Edition, includes protocol changes and Cisco features that enhance routing integrity, secure routers from attacks initiated through routing protocols, and provide greater control over the propagation of routing information for all the IP interior routing protocols. Routing TCP/IP, Volume 1 , Second Edition, provides a detailed analysis of each of the IP interior gateway protocols (IGPs). Its structure remains the same as the best-selling first edition, though information within each section is enhanced and modified to include the new developments in routing protocols and Cisco implementations. What's New In This Edition? The first edition covers routing protocols as they existed in 1998. The new book updates all covered routing protocols and discusses new features integrated in the latest version of Cisco IOS Software. IPv6, its use with interior routing protocols, and its interoperability and integration with IPv4 are also integrated into this book. Approximately 200 pages of new information are added to the main text, with some old text removed. Additional exercise and solutions are also included.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 734 p. , ill. ; , 24 cm
    Keywords: Computer networks ; Design and construction ; Computer networks ; Management ; Quality control ; Electronic books ; local
    Abstract: Best-practice QoS designs for protecting voice, video, and critical data while mitigating network denial-of-service attacks Understand the service-level requirements of voice, video, and data applications Examine strategic QoS best practices, including Scavenger-class QoS tactics for DoS/worm mitigation Learn about QoS tools and the various interdependencies and caveats of these tools that can impact design considerations Learn how to protect voice, video, and data traffic using various QoS mechanisms Evaluate design recommendations for protecting voice, video, and multiple classes of data while mitigating DoS/worm attacks for the following network infrastructure architectures: campus LAN, private WAN, MPLS VPN, and IPSec VPN Quality of Service (QoS) has already proven itself as the enabling technology for the convergence of voice, video, and data networks. As business needs evolve, so do the demands for QoS. The need to protect critical applications via QoS mechanisms in business networks has escalated over the past few years, primarily due to the increased frequency and sophistication of denial-of-service (DoS) and worm attacks. End-to-End QoS Network Design is a detailed handbook for planning and deploying QoS solutions to address current business needs. This book goes beyond discussing available QoS technologies and considers detailed design examples that illustrate where, when, and how to deploy various QoS features to provide validated and tested solutions for voice, video, and critical data over the LAN, WAN, and VPN. The book starts with a brief background of network infrastructure evolution and the subsequent need for QoS. It then goes on to cover the various QoS features and tools currently available and comments on their evolution and direction. The QoS requirements of voice, interactive and streaming video, and multiple classes of data applications are presented, along with an overview of the nature and effects of various types of DoS and worm attacks. QoS best-practice design principles are introduced to show how QoS mechanisms can be strategically deployed end-to-end to address application requirements while mitigating network attacks. The next section focuses on how these strategic design principles are applied to campus LAN QoS design. Considerations and detailed design recommendations specific to the access, distribution, and core layers of an enterprise campus network are presented. Private WAN QoS design is discussed in the ...
    Note: Subtitle on cover: Quality of service in LANs, WANs, and VPNs. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xx, 238 p. , ill. ; , 23 cm
    DDC: 004.6/2
    Keywords: Wireless communication systems ; Electronic books ; local
    Abstract: Your First-Step into the World of Wireless Networks No experience required! Gain an understanding of wireless networking basics with this reader friendly guide The first book anyone should read about wireless networks with step-by-step instruction Learn from an author experienced in and known for writing to a generalist wireless audience with a clear, simple-to-understand style As a basic introduction to wireless networking, Wireless Networks First-Step assumes that readers have no previous wireless experience. The book provides an overview of wireless networking, along with details of applicable standards and technologies. Newcomers to wireless technologies will find practical information along with an abundance of examples. Case studies throughout the chapters provide real-world implementation examples, presented in a non-technical fashion. Implementation details are discussed only to the extent that readers can identify what type of wireless network may be appropriate for their needs. Wireless Networks First-Step , written by Jim Geier, begins with a basic introduction to wireless networks and an explanation of radio wave communications. It then reviews different types of wireless networks including WPANs (wireless personal area networks), WLANs (wireless local area networks), wireless MANs (metropolitan area networks), and WWANs (wireless wide area networks). The final section covers security threats to wireless networks, and solutions to combat these threats. 158720111903232004
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvii, 555 p. , ill. ; , 24 cm
    DDC: 006.76
    Keywords: Web site development ; Web sites ; Authoring programs ; Electronic books ; local
    Abstract: PostNuke Content Management is a practical, application-oriented guide to building content-driven websites and portals with the PostNuke package. Website developers will find that this guide will help you get your website up and running quickly. You'll learn how to install and setup PostNuke and use it to build fully-customizeable content-focused websites. Each section will take you to a new level of site development and will teach you tips, tricks and hacks to customize the function and interface exactly for your specific needs. Author Kevin Hatch maintains a popular PHP and PostNuke online tutorial and is an experienced PostNuke user, so you are sure to get thorough PostNuke information through this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: lxxxix, 1649 p. , ill. ; , 24 cm. +
    DDC: 004.165
    Keywords: Pentium (Microprocessor) ; Electronic books ; local
    Abstract: "In this monumental new book, Tom Shanley pulls together 15 years of history of Intel's mainline microprocessors, the most popular and important computer architecture in history. Shanley has a keen eye for the salient facts, and an outstanding sense for how to organize and display the material for easy accessibility by the reader. If you want to know what does this bit control, what does that feature do, and how did those instructions evolve through several generations of x86, this is the reference book for you. This is the book Intel should have written, but now they don't have to." - Bob Colwell , Intel Fellow The Unabridged Pentium 4 offers unparalleled coverage of Intel's IA32 family of processors, from the 386 through the Pentium 4 and Pentium M processors. Unlike other texts, which address solely a hardware or software audience, this book serves as a comprehensive technical reference for both audiences. Inside, Tom Shanley covers not only the hardware design and software enhancements of Intel's latest processors, he also explains the relationship between these hardware and software characteristics. As a result, readers will come away with a complete understanding of the processor's internal architecture, the Front Side Bus (FSB), the processor's relationship to the system, and the processor's software architecture. Essential topics covered include: Goals of single-task and multi-task operating systems The 386 processor-the baseline ancestor of the IA32 processor family The 486 processor, including a cache primer The Pentium processor The P6 roadmap, P6 processor core, and P6 FSB The Pentium Pro processor, including the Microcode Update feature The Pentium II and the Pentium II Xeon and Celeron processors The Pentium III and the Pentium III Xeon and Celeron processors The Pentium 4 processor family The Pentium M processor Processor identification, System Management Mode, and the IO and Local APICs An "at-a-glance" table of contents allows readers to quickly find topics ranging from 386 Demand Mode Paging to Pentium 4 CPU Arbitration. The accompanying CD-ROM contains 16 extra chapters. Whether you design software or hardware or are responsible for system maintenance or customer support, The Unabridged Pentium 4 will prove an invaluable reference to the world's most widely used microprocessor chips. MindShare's PC System Architecture series is a crisply written and comprehensive set of guides to the most important PC hardware standards. Boo...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvi, 460 p. , ill. ; , 24 cm. +
    DDC: 005.8/6
    Keywords: Data recovery (Computer science) ; Electronic data processing ; Backup processing alternatives ; Electronic books ; local
    Abstract: Praise for Windows Forensics and Incident Recovery " Windows Forensics and Incident Recovery doesn't just discuss forensics, it also includes tools for analysis and shows readers how to use them. I look forward to putting these tools through their paces, and I recommend Carvey's book as a terrific addition to the security professional's bookshelf." -Warren G. Kruse II, Partner Computer Forensic Services, LLC "This book is a good reference for the tools needed to prepare for, respond to, and confirm a Windows-based computer incident." -Brian Carrier Digital forensics researcher "This book provides a unique 'command-line centric' view of Microsoft and non-Microsoft tools that can be very helpful to folks responsible for security and system administration on the Windows platform." -Vishwas Lele, principal architect Applied Information Sciences, Inc. "Harlan Carvey's book serves as a great resource for investigators and systems administrators looking to peek under the hoods of their Windows systems." -Jason Chan, security consultant stake "Regardless of what you know already, you are guaranteed to learn something new about Windows incident response from this book." -Brian Behler, computer forensics and intrusion analyst/engineer "Harlan Carvey's vast security and forensics experience shows through in all facets of this work. Many books have attempted to be the prescriptive guide to forensics on the Windows platform. This book not only attempts it, but it succeeds-with guidance to spare." -Rick Kingslan, Microsoft MVP West Corporation "This book is the first to bring together into a single volume the topics of malicious code, incident response, and forensics on the Windows platform. Mr. Carvey's work should serve as a valuable reference for any Windows system administrator or security professional." -Jennifer Kolde, information security consultant, author, and instructor "Harlan Carvey's book is a one-of-a-kind approach to do-it-yourself Windows forensics. With detailed and illustrative examples coupled with Harlan's renowned Perl scripts, this book certainly is a great find." -Mark Burnett, security consultant and author The first book to focus on forensics and incident recovery in a Windows environment Teaches through case studies and real world-examples Companion CD contains unique tools developed by the author. Covers Windows Server 2003, Windows 2000, Windows NT, and Windows XP If you're responsible for protecting Windows systems, firewalls a...
    Note: Includes bibliographical references (p. 435-442) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 702 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    DDC: 005.1
    Keywords: Linux ; Application software ; Development ; Electronic books ; local
    Abstract: "The first edition of this book has always been kept within arm's reach of my desk due to the wonderful explanations of all areas of the Linux userspace API. This second edition greatly overshadows the first one, and will replace it." --Greg Kroah-Hartman, Linux kernel programmer Develop Software that Leverages the Full Power of Today's Linux Linux Application Development, Second Edition, is the definitive reference for Linux programmers at all levels of experience, including C programmers moving from other operating systems. Building on their widely praised first edition, leading Linux programmers Michael Johnson and Erik Troan systematically present the key APIs and techniques you need to create robust, secure, efficient software or to port existing code to Linux. This book has been fully updated for the Linux 2.6 kernel, GNU C library version 2.3, the latest POSIX standards, and the Single Unix Specification, Issue 6. Its deep coverage of Linux-specific extensions and features helps you take advantage of the full power of contemporary Linux. Along the way, the authors share insights, tips, and tricks for developers working with any recent Linux distribution, and virtually any version of Unix. Topics include Developing in Linux: understanding the operating system, licensing, and documentation The development environment: compilers, linker and loader, and unique debugging tools System programming: process models, file handling, signal processing, directory operations, and job control Terminals, sockets, timers, virtual consoles, and the Linux console Development libraries: string matching, terminal handling, command-line parsing, authentication, and more Hundreds of downloadable code samples New to this edition The GNU C library (glibc), underlying standards, and test macros Writing secure Linux programs, system daemons, and utilities Significantly expanded coverage of memory debugging, including Valgrind and mpr Greatly improved coverage of regular expressions IPv6 networking coverage, including new system library interfaces for using IPv6 and IPv4 interchangeably Coverage of strace, ltrace, real-time signals, poll and epoll system calls, popt library improvements, Pluggable Authentication Modules (PAM), qdbm, and much more Improved index and glossary, plus line-numbered code examples
    Note: Includes bibliographical references (p. 679-682) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 470 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: "With this book, Ted Neward helps you make the leap from being a good Java enterprise developer to a great developer!" -John Crupi, Sun Distinguished Engineer coauthor, Core J2EE Patterns If you want to build better Java enterprise applications and work more efficiently, look no further. Inside, you will find an accessible guide to the nuances of Java 2 Platform, Enterprise Edition (J2EE) development. Learn how to: Use in-process or local storage to avoid the network, see item 44 Set lower isolation levels for better transactional throughput, see item 35 Use Web services for open integration, see item 22 Consider your lookup carefully, see item 16 Pre-generate content to minimize processing, see item 55 Utilize role-based authorization, see item 63 Be robust in the face of failure, see item 7 Employ independent JREs for side-by-side versioning, see item 69 Ted Neward provides you with 75 easily digestible tips that will help you master J2EE development on a systemic and architectural level. His panoramic look at the good, the bad, and the ugly aspects of J2EE development will address your most pressing concerns. Learn how to design your enterprise systems so they adapt to future demands. Improve the efficiency of your code without compromising its correctness. Discover how to implement sophisticated functionality that is not directly supported by the language or platform. After reading Effective Enterprise Java , you will know how to design and implement better, more scalable enterprise-scope Java software systems.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 273 p. , ill. ; , 24 cm
    DDC: 658.4
    Keywords: Industrial management ; Organizational change ; Technological innovations ; Electronic books ; local
    Abstract: "All that have ever tried to impose change in their organization will immediately recognize and truly value the in-depth knowledge and experience captured in this book. It contains a collection of eye-openers that is a treasure chest for pioneers of new organizational ideas, A fantastic toolbox for use in future missions!" -Lise B. Hvatum, product development manager, Schlumberger "If you have need of changing your organization, and especially of introducing new techniques, then you want to understand what is in this book. It will help you avoid common pitfalls that doom many such projects and will show you a clear path to success. The techniques are derived from the experience of many individuals and organizations. Many are also fun to apply. This stuff is really cool-and really hot." -Joseph Bergin, professor of computer science, Pace University, New York "If change is the only guarantee in life, why is it so hard to do? As this book points out, people are not so much resistant to change itself as they are to being changed. Mary Lynn and Linda have successfully used the pattern form to capture and present the recurring lessons of successful change efforts and have placed a powerful knowledge resource in the hands of their readers." -Alan O'Callaghan, researcher, Software Technology Research Laboratory, De Montfort University, United Kingdom "The most difficult part of absorbing patterns, or any technology, into an organization is overcoming the people issues. The patterns in this book are the documentation of having gone through that experience, giving those that dare push the envelope a head start at success." -David E. DeLano, IBM Pervasive Computing "If you have ever wondered how you could possibly foster any cultural changes in your organization, in this book you will find a lot of concrete advice for doing so. I recommend that everyone read this book who has a vast interest in keeping his or her organization flexible and open for cultural change." -Jutta Eckstein, Independent Consultant, Objects In Action Author of Agile Software Development in the Large 48 Patterns for Driving and Sustaining Change in Your Organization Change. It's brutally tough to initiate, even harder to sustain. It takes too long. People resist it. But without it, organizations lose their competitive edge. Fortunately, you can succeed at making change. In Fearless Change, Mary Lynn Manns and Linda Rising illuminate 48 proven techniques, or patterns, for im...
    Note: Includes bibliographical references (p. 261-266) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention System Secure your endpoint systems with host IPS Build and manipulate policies for the systems you wish to protect Learn how to use groups and hosts in the Cisco Security Agent architecture and how the components are related Install local agent components on various operating systems Explore the event database on the management system to view and filter information Examine Cisco Security Agent reporting mechanisms for monitoring system activity Apply Application Deployment Investigation to report on installed applications, hotfixes, and service packs Collect detailed information on processes and see how they use and are used by system resources Create and tune policies to control your environment without impacting usability Learn how to maintain the Cisco Security Agent architecture, including administrative access roles and backups Cisco Security Agent presents a detailed explanation of Cisco Security Agent, illustrating the use of host Intrusion Prevention Systems (IPS) in modern self-defending network protection schemes. At the endpoint, the deployment of a host IPS provides protection against both worms and viruses. Rather than focusing exclusively on reconnaissance phases of network attacks a host IPS approaches the problem from the other direction, preventing malicious activity on the host by focusing on behavior. By changing the focus to behavior, damaging activity can be detected and blocked-regardless of the attack. Cisco Security Agent is an innovative product in that it secures the portion of corporate networks that are in the greatest need of protection-the end systems. It also has the ability to prevent a day-zero attack, which is a worm that spreads from system to system, taking advantage of vulnerabilities in networks where either the latest patches have not been installed or for which patches are not yet available. Cisco Security Agent utilizes a unique architecture that correlates behavior occurring on the end systems by monitoring clues such as file and memory access, process behavior, COM object access, and access to shared libraries as well as other important indicators. Cisco Security Agent is the first book to explore the features and benefits of this powerful host IPS product. Divided into seven parts, the book provides a detailed overview of Cisco Security Agent features and deployment scenarios. Part...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize a data center site Learn how to lay out key infrastructure objects within the data center for greatest efficiency, from buffer zones to server rows Apply proven installation methods by studying sample illustrations of both overhead and under-floor systems Extract the best practices and design strategies for both in-room and standby electrical infrastructure Avoid accidental downtime, improve productivity, and ensure user safety Safeguard and streamline your network infrastructure with a well-organized physical hierarchy Understand the special challenges of retrofitting overburdened server environments Implement solutions from a wide array of sample illustrations and examples of essential data center signage Safeguard servers with operations standards for people working in or visiting the data center Download templates used by Cisco to design its data centers, customizable to square footage and geography Avoid excess construction costs by designing a data center that meets your needs today and for many years to come All data centers are unique, but they all share the same mission: to protect your company's valuable information. Build the Best Data Center Facility for Your Business answers your individual questions in one flexible step-by-step reference guide. Benefit from the author's concise and practical approach to data center design and management. The author distills this complex topic by sharing his first-hand and worldwide experience and expertise. Regardless of your experience level, you can fill your knowledge gaps on how to safeguard your company's valuable equipment and intellectual property. This easy-to-navigate book is divided into two parts: Part I covers data center design and physical infrastructure details, and Part II covers data center management and operations. You can also access supplementary online materials for installation instructions, which include customizable data center design templates, written cabling specifications, and sample drawings. If you need a starting point for designing your first data center, regardless of size; if you need to prepare yourself with comprehensive strategies to retrofit or improve an existing one; or if you need proven methods to manage a d...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xx, 374 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Local area networks (Computer networks) ; Telecommunication ; Switching systems ; Electronic books ; local
    Abstract: The essential guide for understanding Ethernet switched networks Understand various Ethernet technologies from 10BASE-T to Gigabit Ethernet Learn about common switching modes, paths, and architectures Delve into the Cisco Catalyst switch architecture and examine the various Catalyst switch models, including the 6000/6500, 4500, and 3750 Become familiar with VLAN concepts, including types of trunks, VLAN Trunking Protocol (VTP), and private VLANs Understand Multilayer Switching (MLS) and the various hardware components that make MLS work Learn how to configure Cisco Catalyst switches in both native and hybrid mode Implement QoS on Cisco Catalyst switches Deploy multicast features and protocols, including PIM, IGMP snooping, and CGMP Utilize data link layer features such as BPDU Guard, BPDU Filter, Root Guard, Loop Guard, RSTP, and MST Evaluate design and configuration best practices Learn how to manage LANs and troubleshoot common problems Local-area networks (LANs) are becoming increasingly congested and overburdened because of a dramatic increase in traffic, faster CPUs and operating systems, and more network-intensive applications. Many organizations that use network and computing technology use LAN switching to take advantage of high-speed traffic forwarding and improved performance of traditional Ethernet technologies that don't require costly wiring upgrades or time-consuming host reconfiguration. Cisco LAN Switching Fundamentals provides administrators of campus networks with the most up-to-date introduction to LAN switching within a traditional Ethernet environment. Cisco LAN Switching Fundamentals presents an in-depth look at modern campus network requirements. It provides an easy-to-understand introduction to LAN switching best practices using Cisco Catalyst switches. This book provides you with a wealth of details on the architecture, operation, and configuration of the Cisco Catalyst family of switches. You learn about a wide range of topics, including quality of service (QoS), multicast, Rapid Spanning Tree Protocol (RSTP), Multiple Spanning Tree (MST), private virtual LANs (VLANs), and configuration using the native and hybrid software interfaces. Design advice and configuration examples are discussed liberally throughout the book to provide you with the best perspective on effective deployment techniques. Finally, the book wraps up with a discussion of steps necessary to troubleshoot common problems and optimize LAN performance. ...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xv, 462 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Learn Perl programming quickly and easily with 24 one-hour lessons in Sams Teach Yourself Perl in 24 Hours . The book's step-by-step lessons teach you the basics of Perl and how to apply it in web development and system administration. Plus, the third edition has been updated to include five chapters on new technologies, information on the latest version of Perl, and a look ahead to Perl 6. Sams Teach Yourself Perl in 24 Hours focuses on real-world development, teaching you how to: Effectively use Perl for large development projects using Perl modules Use Perl for data processing Utilize Perl as a "glue" language with other programming languages Use Perl as a web development language
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvi, 313 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: Database management ; PHP (Computer program language) ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: SQLite is a small, fast, embeddable database. What makes it popular is the combination of the database engine and interface into a single library as well as the ability to store all the data in a single file. Its functionality lies between MySQL and PostgreSQL, however it is faster than both databases. In SQLite , author Chris Newman provides a thorough, practical guide to using, administering and programming this up-and-coming database. If you want to learn about SQLite or about its use in conjunction with PHP this is the book for you.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvii, 819 p. , ill. ; , 23 cm
    Keywords: PHP (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: "PHP 5 Unleashed presents a comprehensive look at the world's most popular open-source scripting language. After covering such programming basics as functions and arrays, PHP 5 Unleashed explains how to take full advantage of many of the advanced aspects of the language, such as object-oriented programming, file system access, database interactivity, and myriad other new features introduced in PHP 5."--BOOK JACKET.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 621 p. , ill. ; , 25 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Management ; Software engineering ; Management ; Electronic books ; local
    Abstract: "This pioneering book highlights critical, overlooked skills needed by true software professionals." Steve McConnell CEO and Chief Software Engineering Construx Software "It's about time someone took this stuff seriously." Steven Mellor Chief Scientist Embedded Systems Division Mentor Graphics Corporation Co-Author of Exploring the Role of Executable UML in Model-Driven Architecture and six other books "Despite the fact that engineering economics is considered a core area of any engineering field, virtually no books have been written in the area of software engineering economics. Steve Tockey's Return on Software nicely fills this gaps by providing a comprehensive introduction to software engineering economics accessible both to students and to new software professionals." Donald J. Bagert, Ph.D., P.E. Director of Software Engineering and Professor of Computer Science & Software Engineering Rose-Hulman Institute of Technology "The elements of this book are useful not only in making decisions but also in understanding why and how other people and organizations make decisions" Shari Lawrence Pfleeger Senior Researcher, RAND Co-author of Security in Computing and eight other software engineering titles "This just what the doctor ordered to help software programs solve the problem of how to introduce engineering economics and business decision-making into their curricula. The economics of software development should not only be part of any computing curriculum they are an essential element of recent accreditation and certification recommendations. This book is an accessible and relevant text for any student of software engineering. The style is clear and straightforward and the software examples will be appealing to students and faculty alike. I can't wait to use it in class!" Thomas B. Hilburn, Professor Department of Computer and Software Engineering Embry-Riddle Aeronautical University Is your organization maximizing the return on its investments of money, time, and personnel? Probably not, because most software professionals don't know how to consider the business aspects of their software decisions. Most don't even know that it's important to do so. Business consequences should play a critical role in all software technical choices-from choosing which projects to do, selecting software development processes, choosing algorithms and data structures, all the way to determining how much testing is enough. Return on Software: Maximizing the Retur...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Language: English
    Pages: xxii, 408 p. , ill. ; , 24 cm. +
    DDC: 658.4/038/011
    Keywords: Information resources management ; Management information systems ; Systems engineering ; Electronic books ; local
    Abstract: "The book's use of real-world case study vignettes really does go to the heart of the subject matter. This stuff is real, it has real applicability to real problems, and, as with most things in life, it shows how it all comes down to real money in the final analysis. This book shows you what your peers are doing to drive costs out of integration projects and to build new applications without re-inventing the entire wheel-just a few new spokes and off you go. This is a good book. Read it." - Peter Rhys Jenkins , Complex Systems Architect, Candle Corporation "When you get two long-term, acknowledged experts on integration and interoperability together to lay out the current state of the IT universe you expect an immediate return on investment-and this book delivers. It's common knowledge that 90% of total software lifecycle cost is in maintenance and integration, and that needs to drive IT decision-making. With comprehensive coverage of the integration technology landscape, and clear case studies presented at every turn, this book belongs on every IT manager's, every system architect's, and every software developer's bookshelf." - Richard Mark Soley , chairman and CEO, Object Management Group "Today's myriad of integration technologies and alternatives can be daunting. This book presents a framework and process for the evaluation, design, and selection of the appropriate integration technologies to meet your strategic business needs. You will find the templates a particularly useful mechanism to jump-start documentation and drive your decision-making process." - Ron Zahavi , CIO, Global Business Transformation, Unisys Global Transformation Team; author of Enterprise Application Integration with CORBA "It is refreshing to read a book that presents a good business approach to the integration challenge facing most business leaders today, while at the same time educating them about the major components of the required technologies and management practices changes required. The narrative, examples, and templates establish a common reference point between the business and the technology organizations. A must-read for senior business leaders challenged with the complexities of business integration, as well as Senior IT Leaders challenged with shrinking budgets and lower tolerances for failures." - Chuck Papageorgiou , managing partner, Ideasphere "Integration has, and will continue to be, one of the success indicators of any enterprise project. Failing...
    Note: Includes bibliographical references (p. 387-392) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Language: English
    Pages: xxviii, 683 p. , ill. ; , 25 cm
    DDC: 005.3
    Keywords: FreeBSD ; Free computer software ; Operating systems (Computers) ; Electronic books ; local
    Abstract: As in earlier Addison-Wesley books on the UNIX-based BSD operating system, Kirk McKusick and George Neville-Neil deliver here the most comprehensive, up-to-date, and authoritative technical information on the internal structure of open source FreeBSD. Readers involved in technical and sales support can learn the capabilities and limitations of the system; applications developers can learn effectively and efficiently how to interface to the system; system administrators can learn how to maintain, tune, and configure the system; and systems programmers can learn how to extend, enhance, and interface to the system. The authors provide a concise overview of FreeBSD's design and implementation. Then, while explaining key design decisions, they detail the concepts, data structures, and algorithms used in implementing the systems facilities. As a result, readers can use this book as both a practical reference and an in-depth study of a contemporary, portable, open source operating system. This book: Details the many performance improvements in the virtual memory system Describes the new symmetric multiprocessor support Includes new sections on threads and their scheduling Introduces the new jail facility to ease the hosting of multiple domains Updates information on networking and interprocess communication Already widely used for Internet services and firewalls, high-availability servers, and general timesharing systems, the lean quality of FreeBSD also suits the growing area of embedded systems. Unlike Linux, FreeBSD does not require users to publicize any changes they make to the source code.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxv, 619 p. , ill. ; , 23 cm. +
    Edition: 2nd ed.
    DDC: 005.72
    Keywords: Apache (Computer file : Apache Group) ; MySQL (Electronic resource) ; PHP (Computer program language) ; Web site development ; Electronic books ; local
    Abstract: You own your own business. You have also created a website for your business that details the products or services that you offer, but it doesn't allow potential customers to purchase anything online. Don't risk losing business-learn to create a dynamic online environment using only three programs. PHP, MySQL and Apache are three popular open-source tools that can work together to help you create a dynamic website, such as an online shopping experience. Sams Teach Yourself PHP, MySQL and Apache All in One is a complete reference manual for all three development tools. Learn how they work individually and more importantly, how they work together to create your dynamic website. Use the book and the included CD to create a simple website, as well as a mailing list, online address book, shopping cart and storefront. Open your website to limitless possibilities with Sams Teach Yourself PHP, MySQL and Apache All in One .
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 242 p. ; , 24 cm
    DDC: 005.36
    Keywords: Open source software ; Shareware (Computer software) ; Electronic books ; local
    Abstract: "Open source requires a fundamentally different operating model in order for IT organizations to succeed. Succeeding with Open Source is the first how-to book about selecting open source software based on a product's characteristics such as quality, support, and longevity. Open source software is here to stay. Golden provides an essential tool for evaluating its usefulness/readiness for the corporation." - Martin Fink , Vice-President-Linux, Hewlett-Packard, and author of The Business and Economics of Linux and Open Source "Open source software is transforming the way companies acquire and manage software at every level, from operating systems to applications. Today, IT managers who don't evaluate open source alternatives to proprietary software are doing their companies a profound disservice. If you are involved in any aspect of software acquisition and you aren't intimately familiar with how open source systems are created, documented, and supported, you need this book. It provides you with a new framework for assessing the maturity of open source solutions, walks you through every step of the evaluation process, and provides vital insights into the risks and benefits of making the open source decision." - David A. Taylor, Ph.D., author of Object Technology: A Manager's Guide and Supply Chains: A Manager's Guide "Novell, its customers, and its partners have been waiting for something like this: a quantitative and qualitative way to assess the strength of open source projects we hope to support or build into our products. Golden provides a clear, concise methodology for determining whether an open source project is enterprise-ready and what it would take to make it so." - Chris Stone, Vice Chairman, Novell "Open source software addresses many of the needs of IT organizations. While more and more organizations are using open source software, few understand how to evaluate it in the absence of a parent organization. Golden provides an effective mechanism to quickly evaluate open source software based on standard software measures-such as quality, support, and documentation-and to share those evaluations with other organizations. Using Golden's model, IT organizations can efficiently compare proprietary solutions to open source software solutions." - Stormy Peters, Open Source Program Office, Hewlett-Packard Company "This book contains some of the most valuable, practical advice I have seen on how to transform the use of open source software f...
    Note: Includes bibliographical references (p. 233-234) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 798 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: "The book you are about to read will arm you with the knowledge you need to defend your network from attackers-both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." -Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security-one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." -Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." -Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." -Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes-resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools-including Sguil, Argus, and Ethereal-to mine network traffic for full content, session, statistical, and ale...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: Your complete guide to building your information technology career in any economy The IT Career Builder's Toolkit features market-focused skills and proven methods you can use to jump-start and advance your career. While other books cover just the mechanics of preparing your résumé, writing a cover letter, and interviewing, this book provides all that plus additional insight from IT career development expert, Matt Moran, to help you plan and create a rewarding IT career over the long term. The toolkit approach allows you to use this book to suit your unique needs: Are you new to the IT field? Benefit by reading the book cover to cover. Just need to fine-tune your IT career? Choose a topic and dive in. Understand and prepare for the various and changing factors that affect your career in both positive and negative ways. Learn how to Present the value of your technical skills in the job market Position yourself as the primary commodity of your career Remove the guesswork out of job searches Highlight on-the-job skills and gain meaningful professional exposure The companion CD-ROM includes career management tools such as résumé and cover letter templates, forms to track important contacts, and self-assessment tools. Start or further your consulting career with sample proposals, opportunity tracking forms, and a time-tracking and billing database. Financial tools, including budget and cash-flow summary worksheets, help you gain financial well-being. Use the Value-Added Technologist presentation to gain a clear understanding of the career-building process and how to use the toolkit to build a dynamic career. Most of all, have fun! Every year, people advance along the path to career stardom. Let Matt help you to be one of them through his career philosophy "Do not accept mediocrity as a career objective-demand more of yourself." "I want you to see the [toolkit] techniques as one more set of skills to adopt in your overall career development program. They are skills, just like your technical skills, that you will use daily during your career. Just as you adopt new technical skills, use the toolkit to define those soft skills that you must learn and put to use. The result will be a more well-rounded and complete professional skill-set." ~ Matthew Moran, from the Introduction Companion CD-ROM The CD-ROM contains valuable tools, forms, spreadsheets, and documents that work with the Toolkit to help you master key areas of your career development.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The all-in-one practical guide to supporting your Cisco network Provides detailed tips for using freeware and open-source tools readily available from the Internet, including the reasons behind choosing a particular tool Refer to a single source for common Cisco network administration issues Dedicated section for network security aids administrators in effectively dealing with security issues Deploy fully functional RADIUS and TACACS+ for servers for controlling access to Cisco devices Deploy Linux- and Windows-based syslog servers to centrally collect syslog information generated by Cisco devices Deploy Linux- and Windows-based network monitoring systems to monitor interface traffic through Cisco devices including routers, switches, VPN concentrators, and Cisco PIX® firewalls Use the trending feature of network monitoring systems for long-term network analysis and capacity planning Automatically detect and report configuration changes on Cisco IOS® Software-based devices and Cisco PIX firewalls Deploy Cisco-based VPNs in mixed environments using Linux- and Windows-based VPN servers Network Administrators Survival Guide solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco® networks using freeware tools. It is a single reference source that explains particular issues, their significance for administrators, and the installation and configuration process for the tools. The solutions are Cisco centric and provide detail not available in generic online information. Network Administrators Survival Guide emphasizes solutions for network managers and administrators of small to medium-sized businesses and enterprises. Each chapter is broadly based on a network administration function, starting with an overview of the topic, followed by the methodology involved to accomplish that function. This includes the tools available, why they are the right choice, and their installation, configuration, and usage methods. For any given function, Network Administrators Survival Guide covers both Windows- and Linux-based tools as appropriate. Most of the Windows-based tools offer the advantage of GUI for ease of use, whereas the Linux-based tools are command-line based and can be used in automated scripts. Both are significant for network administrators. Based on author Anand Deveriya's extensive field experience, this practical guide to maintaining Cisco networks will save you signifi...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A complete configuration manual for MPLS, MPLS VPNs, MPLS TE, QoS, Any Transport over MPLS (AToM), and VPLS Understand the crucial Cisco commands for various MPLS scenarios Understand fundamentals of MPLS operation and learn to configure basic MPLS in Frame Relay and ATM-based environments Master fundamentals of MPLS VPN operation including Multiprotocol BGP (MBGP) operation, VPNv4 route exchange, and basic MPLS VPN configuration in the provider network Understand and configure various PE-CE routing protocols in MPLS VPN networks Understand MPLS VPN provisioning in an Inter-provider VPN (Inter-AS) and Carrier Supporting Carrier (CSC) environment Learn MPLS TE and its advanced features Examine AToM with configuration examples for like-to-like and any-to-any L2 VPN implementations and VPLS components and operation, VPLS configuration and verification, and VPLS topologies Learn about MPLS QoS, including configuration and implementation of uniform and short pipe modes MPLS Configuration on Cisco IOS Software is a complete and detailed resource to the configuration of Multiprotocol Label Switching (MPLS) networks and associated features. Through its practical, hands-on approach, you'll become familiar with MPLS technologies and their configurations using Cisco IOS® Software. MPLS Configuration on Cisco IOS Software covers basic-to-advanced MPLS concepts and configuration. Beyond its emphasis on MPLS, you'll learn about applications and deployments associated with MPLS, such as traffic engineering (TE), Layer 2 virtual private networks (VPN), and Virtual Private LAN Service (VPLS). You'll receive practical guidance and deployment scenarios that can be enhanced by re-creation of the setups and configurations demonstrated within this book. You'll move quickly from a brief overview of MPLS technology and basic MPLS configuration on Cisco® routers to more advanced topics. Several chapters provide instruction on VPN connectivity options, including implementing Border Gateway Protocol (BGP) in MPLS VPNs. You'll receive configuration guidelines for advanced MPLS implementations such as MPLS TE, quality of service (QoS), and extranet VPNs. You'll learn about implementation of Layer 2 VPNs versus Layer 3 VPNs with Cisco Any Transport over MPLS (AToM). And you'll see demonstrations of implementing VPLS on Cisco routers complete with the configurations and platform support. "I highly recommend MPLS Configuration on Cisco IOS Software as required reading for th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Identify, analyze, and resolve current and potential network security problems Learn diagnostic commands, common problems and resolutions, best practices, and case studies covering a wide array of Cisco network security troubleshooting scenarios and products Refer to common problems and resolutions in each chapter to identify and solve chronic issues or expedite escalation of problems to the Cisco TAC/HTTS Flip directly to the techniques you need by following the modular chapter organization Isolate the components of a complex network problem in sequence Master the troubleshooting techniques used by TAC/HTTS security support engineers to isolate problems and resolve them on all four security domains: IDS/IPS, AAA, VPNs, and firewalls With the myriad Cisco® security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. Cisco Network Security Troubleshooting Handbook can single-handedly help you analyze current and potential network security problems and identify viable solutions, detailing each step until you reach the best resolution. Through its modular design, the book allows you to move between chapters and sections to find just the information you need. Chapters open with an in-depth architectural look at numerous popular Cisco security products and their packet flows, while also discussing potential third-party compatibility issues. By following the presentation of troubleshooting techniques and tips, you can observe and analyze problems through the eyes of an experienced Cisco TAC or High-Touch Technical Support (HTTS) engineer or determine how to escalate your case to a TAC/HTTS engineer. Part I starts with a solid overview of troubleshooting tools and methodologies. In Part II, the author explains the features of Cisco ASA and Cisco PIX® version 7.0 security platforms, Firewall Services Module (FWSM), and Cisco IOS® firewalls. Part III covers troubleshooting IPsec Virtual Private Networks (IPsec VPN) on Cisco IOS routers, Cisco PIX firewalls with embedded VPN functionalities, and the Cisco 3000 Concentrator. Troubleshooting tools and techniques on the Authentication, Authorization, and Accounting (AAA) framework are discussed thoroughly on routers, Cisco PIX firewalls, and Cisco VPN 3000 concentrators in Part IV. Part IV also covers troubleshooting Cisco Secure ACS on Windows, the server-side component of the AAA framework. IDS/IPS troubleshooting...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The all-in-one guide to modern routed and switched campus network design Understand the network design process and network design models Learn how switches are used in network design Design an IP addressing plan and select appropriate IP routing protocols Apply network security design principles to boost network security Enable WLANs to improve workforce mobility Examine QoS design requirements and tools Unleash the power of voice transport over data networks, including VoIP and IP telephony Use content networking to provide content to users quickly and efficiently Learn how to integrate network management protocols and tools into network designs Understand how to effectively integrate IP multicast, high availability, storage networking, and IPv6 into your network designs Over the past decade, campus network design has evolved many times as new technologies have emerged and business needs have changed. For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and content networking, their core infrastructures must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step. Campus Network Design Fundamentals is an all-in-one guide to key technologies that can be integrated into network design. The book provides insight into why each technology is important and how to apply this knowledge to create a campus network that includes as many or as few of today's productivity-enhancing applications as are needed in your environment. Topics covered throughout the book include network design process and models, switching, IP routing, quality of service (QoS), security, wireless LANs (WLANs), voice transport, content networking, network management, IPv6, IP multicast, increasing network availability, and storage networking. Sample network designs are included through-out, and the book concludes with a comprehensive case study that illustrates the design process and solutions for headquarters, branch offices, and home office/remote users. Whether you need an overview of modern campus technologies or seek advice on how to design switched and routed networks that securely support these technologies, this book is your comprehensive resource to the foundations upon which all modern-day campus networks are based. This book is part of the Cisco Press® Fundament...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 3rd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco IPS exam 642-532 The official study guide helps you master all the topics on the IPS exam, including: IPS concepts Command-line interface (CLI) and IPS Device Manager (IDM) configuration modes Basic sensor and IPS signature configuration IPS signature engines Sensor tuning IPS event monitoring Sensor maintenance Verifying system configuration Using the Cisco IDS Module (IDSM) and Cisco IDS Network Module Capturing network traffic CCSP IPS Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the IPS exam. Cisco Security Test Engineer Earl Carter shares preparation hints and test-taking tips, helping you identify areas of weakness and improve your Intrusion Prevention System (IPS) knowledge. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCSP IPS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary materials make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP IPS Exam Certification Guide is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains an electronic copy of the book and more than 200 practice questions for the IPS ex...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network. Securing Your Business with Cis...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Exposes the inner workings of Cisco CallManager to help you maximize your Cisco IP Communications solution Read new content on QSIG, SIP trunks, video support, hunt lists and line groups, time-of-day routing, and new features added in CallManager releases 3.2, 3.3, 3.4, 4.0, and 4.1 Review content from the first edition that has been fully revised and updated to CallManager release 4.1 Learn how to deploy and manage a CallManager solution Understand the components that make up CallManager call routing through the use of basic to advanced examples that solve enterprise call routing problems Gain a full understanding of how CallManager manages media resources and processes information for conferencing, transcoding, annunciation, and more Learn detailed information about North American and international dial plans, trunk and station devices, media resources, and much more Cisco CallManager Fundamentals , Second Edition, provides examples and reference information about Cisco® CallManager, the call-processing component of the Cisco IP Communications solution. Cisco CallManager Fundamentals uses examples and architectural descriptions to explain how CallManager processes calls. This book details the inner workings of CallManager so that those responsible for designing and maintaining a Voice over IP (VoIP) solution from Cisco Systems® can understand the role each component plays and how they interrelate. This book is the perfect resource to supplement your understanding of CallManager. You'll learn detailed information about dial plan management and call routing, hardware and software components, media processing, call detail records, system management and monitoring, and the history of CallManager. The authors, all members of the original team that developed and implemented the CallManager software and documentation from its early stages, also provide a list of features and Cisco solutions that integrate with CallManager. This second edition of Cisco CallManager Fundamentals covers software releases through release 4.1. With this book, you will gain a deeper understanding of the system and find answers to questions not available in any other source. This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Identify, mitigate, and respond to network attacks Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI) Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM) Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network. This new family of adaptive security appliances also controls network activity and application traffic and delivers flexible VPN connectivity. The result is a powerful multifunction network security device that provides the security breadth and depth for protecting your entire network, while reducing the high deployment and operations costs and complexities associated with managing multiple point products. Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a practitioner's guide to planning, deploying, and troubleshooting a comprehensive security plan with Cisco ASA. The book provides valuable insight and deployment examples and demonstrates how adaptive identification and mitigation services on Cisco ASA provide a sophisticated security solution for both large and small network environments. The book contains many useful sample configurations, proven design scenarios, and discussions of debugs that help you understand how to get the most out of Cisco ASA in your own network. "I have found this book really highlights the practical aspects needed for building real-world security. It offers the insider's guidance needed to plan, implement, configure, and troubleshoot the Cisco ASA in customer environments and demonstrates the potential and power of Self-Defending Networks." -Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems® This security book is part of th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution A complete resource for understanding VPN components and VPN design issues Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients Discover troubleshooting tips and techniques from real-world scenarios based on the author's vast field experience Filled with relevant configurations you can use immediately in your own network With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs. Part I, "VPNs," introduces the topic of VPNs and discusses today's main technologies, including IPsec. It also spends an entire chapter on SSL VPNs, the newest VPN technology and one that Cisco has placed particular emphasis on since 2003. Part II, "Concentrators," provides detail on today's concentrator products and covers site-to-site and remote-access connection types with attention on IPsec and WebVPN. Part III covers the Cisco VPN Client versions 3.x and 4.x along with the Cisco3002 Hardware Client. Cisco IOS® routers are the topic of Part IV, covering scalable VPNs with Dynamic Multipoint VPN, router certificate authorities, and router remote access solutions. Part V explains Cisco PIX and Cisco ASA security appliances and their roles in VPN connectivity, including remote access and site-to-site connections. In Part VI, a case study shows how a VPN solution is best implemented in the real world using a variety of Cisco VPN products in a sample network. This security book is part of the Cisco Press® Networking Technology Serie...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 306 p. ; , 24 cm
    DDC: 005.1/4
    Keywords: Debugging in computer science ; Electronic books ; local
    Abstract: 50 exercises to help you find bugs faster -- with less aggravation! Bug hunting is an art, and you need to be a master . Get Find the Bug , and you'll become one. Long-time Microsoft programmer Adam Barr presents 50 programs, each with exactly one bug. Your assignment: find it. As you do, Barr will teach you how to "think like your processor"... anticipating exactly how code will behave, even without running it. You'll learn better ways to read code, understand it -- and above all, improve it. Whether you're building new systems or maintaining someone else's, you'll find bugs earlier, faster, with less frustration... and write cleaner code to begin with. Presents "bugged" programs in C, Java, Python, Perl, and x86 assembly language, with carefully explained solutions Includes language overviews to help you debug all 50 examples, even if you don't know the language Shows how to look past the "surface" of code to uncover its hidden internal logic Offers practical guidance on analyzing programs, including specific inputs to test Presents a wide range of realistic bugs, with no phony "gotchas" Draws on the types of coding and debugging challenges Microsoft uses to interview new programmers An indispensable resource for working programmers, maintainers, testers, quality specialists, and everyone involved in code reviews © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 295-298) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A comprehensive guide to analyzing the business rationale for WLANs Evaluate the business rationale behind the deployment of WLANs, including return on investment (ROI), net present value, payback period, and total cost of ownership Develop a robust execution plan to deploy and operate the WLAN Understand the high-level technical issues of deploying and managing your WLAN from a business decision-maker's perspective Maximize the positive impact of supplementary and complementary services such as voice, video, and guest WLAN access Identify potential security threats and develop strategies to mitigate attacks Learn methodological and technical best practices from WLAN deployment case studies featuring real-world, enterprise-class businesses and institutions Gather information easily by referring to quick reference sheets and appendixes covering an antenna overview, a high-level sample project plan, checklists, and flowcharts Businesses today are increasingly adopting wireless LANs (WLANs) as a primary data transport mechanism. To determine when and how to effectively deploy WLANs, business managers, project managers, and IT executives need a clear, holistic evaluation of the business benefits and risks behind this complex technology solution. The Business Case for Enterprise-Class Wireless LANs helps you make the right decisions by explaining the business value and cost of investing in a WLAN-from security and architecture to deployment and application. Using a lifecycle perspective, this guide covers the value proposition, cost justification, and alignment of security, design, and operational components within the business. Written in an approachable style, The Business Case for Enterprise-Class Wireless LANs provides a baseline analysis of WLAN technologies for a large-scale deployment and includes concise real-world case studies with checklists and flowcharts that you can adapt for your needs. By recognizing the obstacles and advantages of implementing a WLAN from a strategic and justified business perspective, you can apply the economic benefits to your organization and ensure a timely and efficient deployment of your organization's WLAN. This volume is in the Network Business Series offered by Cisco Press®. Books in this series provide IT executives, decision makers, and networking professionals with pertinent information about today's most important technologies and business strategies.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 1587055740 ISBN-13: 9781587055744 Cisco authorized self-study book for CCDP® 642-871 architectures foundation learning Prepare for the CCDP ARCH exam 642-871 with the Cisco authorized self-study guide. This book teaches you how to: Understand the composition and deployment of the Cisco AVVID framework in network design Understand the composition and role of the Enterprise Composite Network Model in enterprise network design Design enterprise campus networks and their edge network connectivity to the Internet Understand and implement network management solutions in the network Integrate new technologies designed to enhance network performance and availability in the enterprise, such as high availability, QoS, multicasting, and storage and content networking Design and implement appropriate security solutions for enterprise networks Deploy wireless technologies within the enterprise Implement and design IP telephony solutions for the enterprise network CCDP Self-Study: Designing Cisco Network Architectures (ARCH) is a Cisco® authorized self-paced learning tool. By presenting a structured format for the conceptual and intermediate design of AVVID network infrastructures, this book teaches you how to design solutions that scale from small to large enterprise networks and take advantage of the latest technologies. Whether you are preparing for the CCDP® certification or simply want to gain a better understanding of how to architect network solutions over intelligent network services to achieve effective performance, scalability, and availability, you will benefit from the foundation information presented in this book. This comprehensive book provides detailed information and easy-to-grasp tutorials on a broad range of topics related to architecture and design, including security, fine-tuning routing protocols, switching structures, and IP multicasting. To keep pace with the Cisco technological developments and new product offerings, this study guide includes coverage of wireless networking, the SAFE Blueprint, content networking, storage networking, quality of service (QoS), IP telephony, network management, and high availability networks. Design examples and sample verification output demonstrate implementation techniques. Configuration exercises, which appear in every chapter, provide a practical review of key concepts to discuss critical issues surrounding network operation. Chapter-ending revie...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 434 p. , ill. ; , 24 cm
    DDC: 004.6/2
    Keywords: BGP (Computer network protocol) ; Electronic books ; local
    Abstract: PRACTICAL BGP "I would recommend this book to network engineers, Internet service providers, network software developers, and IT staff who need to deal with network planning and routing." -Enke Chen, Redback Networks Hands-on guidance for deploying and optimizing BGP networks-enterprise and ISP Now there's a practical guide to deploying and managing BGPv4 in any environment-from small enterprises to the largest Tier 2 and Tier 3 service providers. A team of the world's leading BGP experts brings together powerful insights into network design, configuration, and deployment with the latest version of BGP-including hands-on guidance for leveraging its key enhancements. Coverage includes • Best practices and diverse real-world scenarios for applying BGPv4 • Understanding the impact of BGP design on local networks and the global Internet backbone • Building effective BGP policies: aggregation, propagation, accounting, and more • Maximizing scalability and performance in BGPv4 networks • BGP and network security, including Secure Origin BGP • Deploying BGP/MPLS Layer 3 VPNs • Extensive troubleshooting guidance unavailable in any other book If you're a network engineer or administrator looking to drive maximum reliability and performance from BGP-based networks, Practical BGP will help you get the job done-from start to finish. RUSS WHITE is a Network Protocols Deployment Engineer in Cisco Systems Routing DNA Team specializing in routing protocols. A widely recognized expert in networking, he co-chairs the IETF Routing Protocols Security working group, and co-authored Advanced IP Network Design, IS-IS for IP Networks, and Inside Cisco IOS Software Architecture. DANNY McPHERSON is a member of the Architecture Team at Arbor Networks. He has held technical leadership positions with several global ISPs, is active within the IETF, and is an acknowledged expert in Internet architecture and security. He co-authored Internet Routing Architectures, Second Edition. SRIHARI SANGLI , Senior Manager for MPLS and routing development at Procket Networks, was formerly Senior Technical Leader in Cisco's IOS Routing Protocols group. He, along with others at Cisco, coded the industry-first implementation of BGP/MPLS based Layer-3 VPN.
    Note: Includes index. - The author's name Sangli Srihari is listed as Srihari Sangli on cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The practical guide to building resilient and highly available IP networks Learn from an all-in-one introduction to new features and developments in building a resilient IP network Enable your organization to meet internal service-level agreements (SLAs) for mission-critical resources Understand how a resilient IP network can help in delivering mission-critical information such as video and voice services Work with configuration examples that are based on real-world issues and customer requirements Get tips and best practices from field personnel who have worked on some of the largest networks with stringent uptime requirements and SLAs More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is of utmost importance to companies and their service providers. The challenges for the professionals responsible for these networks include ensuring that the network remains up all the time, keeping abreast of the latest technologies that help maintain uptime, and reacting to ever-increasing denial-of-service (DoS) attacks. Building Resilient IP Networks helps you meet those challenges. This practical guide to building highly available IP networks captures the essence of technologies that contribute to the uptime of networks. You gain a clear understanding of how to achieve network availability through the use of tools, design strategy, and Cisco IOS® Software. With Building Resilient IP Networks , you examine misconceptions about five-nines availability and learn to focus your attention on the real issues: appreciating the limitations of the protocols, understanding what has been done to improve them, and keeping abreast of those changes. Building Resilient IP Networks highlights the importance of having a modular approach to building an IP network and, most important, illustrates how a modular design contributes to a resilient network. You learn how an IP network can be broken down to various modules and how these modules interconnect with one another. Then you explore new network resiliency features that have been developed recently, categorized with respect to the design modules. Building Resilient IP Networks is relevant to both enterprise and service provider customers of all sizes. Regardless of whether the network connects to the Internet, fortifying IP networks for maximum uptime and prevention of attacks is mandatory for anyone's b...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: 418 p. ; , 24 cm. +
    DDC: 794.816693
    Keywords: Computer games ; Programming ; Three-dimensional display systems ; Electronic books ; local
    Abstract: There are many programming hobbyists who write 2D games but there are far fewer that grasp the concepts of 3D programming. Although there are also quite a few ¿game development¿ books on the market, few deal with 3D game development. Those that do are mainly aimed at advanced readers. This book will provide a practical, example driven approach to learning the unique art of 3D Game Development that even the beginner can grasp. It won¿t get bogged down in page after page of boring theory but instead will teach through many interesting hands on examples. Tom Miller brings years and years of 3D game programming to the table and couples that with an engaging writing style to mentor readers in the intricacies of game development. The book starts out with a crash course in game programming concepts and then progresses into developing 3 different types of games with many useful tips, notes, and cautions along the way. This title will serve as a useful guide to either current 2D game developers or programmers that want to learn to program games.
    Note: Includes CD-ROM
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 312 p. , ill., facsims. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: "The best thinking in the agile development community brought to street-level in the form of implementable strategy and tactics. Essential reading for anyone who shares the passion for creating quality software." -Eric Olafson, CEO Tomax "Crystal Clear is beyond agile. This book leads you from software process hell to successful software development by practical examples and useful samples." -Basaki Satoshi, Schlumberger "A very powerful message, delivered in a variety of ways to touch the motivation and understanding of many points of view." -Laurie Williams, Assistant Professor, North Carolina State University "A broad, rich understanding of small-team software development based on observations of what actually works." -John Rusk "A superb synthesis of underlying principles and a clear description of strategies and techniques." -Géry Derbier, Project Manager, Solistic "Alistair Cockburn shows how small teams can be highly effective at developing fit-for-purpose software by following a few basic software development practices and by creating proper team dynamics. These small teams can be much more effective and predictable than much larger teams that follow overly bureaucratic and prescriptive development processes." - Todd Little, Sr. Development Manager, Landmark Graphics "I find Cockburn's writings on agile methods enlightening: He describes 'how to do,' of course, but also how to tell whether you're doing it right, to reach into the feeling of the project. This particular book's value is that actual project experiences leading to and confirming the principles and practices are so...well...clearly presented." - Scott Duncan, ASQ Software Division Standards Chair and representative to the US SC7 TAG and IEEE S2ESC Executive Committee and Management Board and Chair of IEEE Working Group 1648 on agile methods " Crystal Clear identifies principles that work not only for software development, but also for any results-centric activities. Dr. Cockburn follows these principles with concrete, practical examples of how to apply the principles to real situations and roles and to resolve real issues." - Niel Nickolaisen, COO, Deseret Book "All the successful projects I've been involved with or have observed over the past 19 or so years have had many of the same characteristics as described in Crystal Clear (even the big projects). And many of the failed projects failed because they missed something-such as expert end-user involvement or accessibility ...
    Note: Includes bibliographical references (p. 304-307) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network. Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization's network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks. Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks. Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources. "This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade." -...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Field-proven MPLS designs covering MPLS VPNs, pseudowire, QoS, traffic engineering, IPv6, network recovery, and multicast Understand technology applications in various service provider and enterprise topologies via detailed design studies Benefit from the authors' vast experience in MPLS network deployment and protocol design Visualize real-world solutions through clear, detailed illustrations Design studies cover various operator profiles including an interexchange carrier (IXC), a national telco deploying a multiservice backbone carrying Internet and IP VPN services as well as national telephony traffic, an international service provider with many POPs all around the globe, and a large enterprise relying on Layer-3 VPN services to control communications within and across subsidiaries Design studies are thoroughly explained through detailed text, sample configurations, and network diagrams Definitive MPLS Network Designs provides examples of how to combine key technologies at the heart of IP/MPLS networks. Techniques are presented through a set of comprehensive design studies. Each design study is based on characteristics and objectives common to a given profile of network operators having deployed MPLS and discusses all the corresponding design aspects. The book starts with a technology refresher for each of the technologies involved in the design studies. Next, a series of design studies is presented, each based on a specific hypothetical network representative of service provider and enterprise networks running MPLS. Each design study chapter delivers four elements. They open with a description of the network environment, including the set of supported services, the network topology, the POP structure, the transmission facilities, the basic IP routing design, and possible constraints. Then the chapters present design objectives, such as optimizing bandwidth usage. Following these are details of all aspects of the network design, covering VPN, QoS, TE, network recovery, and-where applicable-multicast, IPv6, and pseudowire. The chapters conclude with a summary of the lessons that can be drawn from the design study so that all types of service providers and large enterprise MPLS architects can adapt aspects of the design solution to their unique network environment and objectives. Although network architects have many resources for seeking information on the concepts and protocols involved with MPLS, there is no single resource that illustrat...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvii, 238 p. , ill. ; , 22 cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Electronic books ; local
    Abstract: If you're in need of a quick, concise tutorial to learn Unix and get on your way, this is it. Sams Teach Yourself UNIX in 10 Minutes, Second Edition will help you quickly and easily learn UNIX essentials and review UNIX features and functions. You will master components of UNIX programming through clear, concise learning modules and step-by-step instructions without having to wade through a lot of fluff and theory. You will learn to: Get onto the system and use the command line Move about the file system Create, move, rename and delete files and directories Slice and dice command pipe data Use the vi Editor Print in the UNIX environment And more! Whatever your expertise level, Sams Teach Yourself UNIX in 10 Minutes will get you up and running with UNIX in no time.
    Note: Includes index. - Previous ed.: by William Ray. 1999
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxi, 170 p. ; , 23 cm
    DDC: 005.3/068
    Keywords: Acquisition of computer software ; Management ; Computer software industry ; Computer software ; Management ; Electronic books ; local
    Abstract: Do you know what is the real cost of your software? Before you reach for a calculator, be forewarned that it's a trick question. Even technology industry analysts and seasoned IT executives have difficulty putting a hard figure on the Total Cost of Ownership (TCO) of today's enterprise application solutions. What makes the equation so tricky is the sheer number of variables that must be factored in, many of which cannot be lined up in a neat column and reconciled, such as issues of security, availability, performance, problem resolution and change management. The End of Software: Transforming Your Business for the On Demand Future , by Dr. Timothy Chou , is a groundbreaking book for business managers and executives that challenges conventional approaches to business software and proposes new alternatives to managing and maintaining the systems that companies depend on. Read What Industry Experts Have to Say: "Whether you rely on computer software to run your business, create software solutions, or invest in software companies, you are facing the shift from software as a product to software as a service. In The End of Software , Dr. Timothy Chou makes the case for Software on Demand and shows you who's already out there creating and using this new model." Fred Magner, Chief Information Officer, Unocal Corporation "As a pioneer of the On Demand delivery model, Dr. Chou challenges certain conventions long held by the software industry. The End of Software provokes industry participants to re-think how big software should be packaged, sold and delivered in the future." Stephen Wong, Chairman and Chief Executive Officer of Embarcadero Technologies "Dr. Timothy Chou's book The End of Software presents a logical argument for the shift from selling and buying software, or the promise of the value that software represents, to selling and buying the actual value that software can bring to a user. This is very persuasive, especially when you consider the legacy of software vendors, who are notorious for over-promising and under-delivering. As Dr. Chou so clearly understands (and why shouldn't he-he's lived it), this new delivery method simply makes sense. But the world is often slow to change; as keen observers of the technology industry, we'll be watching closely." John S. DiFucci, Senior Software Analyst, Managing Director, Bear, Stearns & Co. Inc.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xi, 431 p. , ill. ; , 24 cm
    Keywords: Microsoft SQL Server. (Computer file) ; Client/server computing ; Relational databases ; Electronic books ; local
    Abstract: Offers example-based coverage for various high availability solutions. High availability is becoming an increasingly important topic for database administrators, data architects and system architects. Covers choosing, planning, implementing and administering a high availability solution along with the business justifications. Paul Bertucci has over 20 years of database experience including consulting for numerous Fortune 500 companies.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 271 p. , ill. ; , 24 cm
    DDC: 005.3
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: "Very informative...The perfect resource when just getting started, and a great reference for someone who has used the product for some time." --John Burrows, Software Configuration Process Manager, DST Interactive, Inc. "If only this book existed when I began using InstallAnywhere!" --Daniel Kirsch, Senior Software Engineer, Symantec Corporation Software installation and deployment made simple--that's the promise of InstallAnywhere from Zero G Software. Are you harnessing the full potential of InstallAnywhere in your software installation project? InstallAnywhere Tutorial and Reference Guide is the authoritative guide for users of InstallAnywhere. It helps you maximize your investment in this powerful deployment tool by taking you step by step through easy-to-follow exercises that will unleash the power and productivity of InstallAnywhere in your organization. InstallAnywhere Tutorial and Reference Guide is perfect for developers of all knowledge levels. Whether you're just getting started or an experienced user of InstallAnywhere, this handy tutorial will help you build and reinforce the skills necessary to create reliable installations every time. And after you've mastered those skills, it is an ideal resource for troubleshooting the most common installation problems. Inside you'll find best practices for making even the most complex software deployments easy. You will learn essential InstallAnywhere user principles and effortlessly discover why InstallAnywhere is the only software installation and deployment solution you'll ever need. Highlights include: Basic installer development strategies Basic installer customization Using advanced actions, interface options, and organization concepts Managing installation locations and uninstaller issues Source and resource management Integrating InstallAnywhere with advanced build environments Developing and using custom code actions InstallAnywhere has been recognized as the preferred multiplatform software deployment and installation tool by developers worldwide. It is the recipient of prestigious industry accolades, including two consecutive Java Developer's Journal Readers' Choice Awards, the Jolt Product Excellence Award from Software Development, and JavaWorld 's Editor's Choice Award.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Language: English
    Pages: xiii, 355 p. , ill. ; , 24 cm
    DDC: 005.2/75
    Keywords: Parallel programming (Computer science) ; Electronic books ; local
    Abstract: The Parallel Programming Guide for Every Software Developer From grids and clusters to next-generation game consoles, parallel computing is going mainstream. Innovations such as Hyper-Threading Technology, HyperTransport Technology, and multicore microprocessors from IBM, Intel, and Sun are accelerating the movement's growth. Only one thing is missing: programmers with the skills to meet the soaring demand for parallel software. That's where Patterns for Parallel Programming comes in. It's the first parallel programming guide written specifically to serve working software developers, not just computer scientists. The authors introduce a complete, highly accessible pattern language that will help any experienced developer "think parallel"-and start writing effective parallel code almost immediately. Instead of formal theory, they deliver proven solutions to the challenges faced by parallel programmers, and pragmatic guidance for using today's parallel APIs in the real world. Coverage includes: Understanding the parallel computing landscape and the challenges faced by parallel developers Finding the concurrency in a software design problem and decomposing it into concurrent tasks Managing the use of data across tasks Creating an algorithm structure that effectively exploits the concurrency you've identified Connecting your algorithmic structures to the APIs needed to implement them Specific software constructs for implementing parallel programs Working with today's leading parallel programming environments: OpenMP, MPI, and Java Patterns have helped thousands of programmers master object-oriented development and other complex programming technologies. With this book, you will learn that they're the best way to master parallel programming too. 0321228111B08232004
    Note: Includes bibliographical references (p. 321-331) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 367 p. , ill. ; , 24 cm
    DDC: 005.1/6
    Keywords: Software patterns ; Software refactoring ; Electronic books ; local
    Abstract: In 1994, Design Patterns changed the landscape of object-oriented development by introducing classic solutions to recurring design problems. In 1999, Refactoring revolutionized design by introducing an effective process for improving code. With the highly anticipated Refactoring to Patterns , Joshua Kerievsky has changed our approach to design by forever uniting patterns with the evolutionary process of refactoring. This book introduces the theory and practice of pattern-directed refactorings: sequences of low-level refactorings that allow designers to safely move designs to, towards, or away from pattern implementations. Using code from real-world projects, Kerievsky documents the thinking and steps underlying over two dozen pattern-based design transformations. Along the way he offers insights into pattern differences and how to implement patterns in the simplest possible ways. Coverage includes: A catalog of twenty-seven pattern-directed refactorings, featuring real-world code examples Descriptions of twelve design smells that indicate the need for this book's refactorings General information and new insights about patterns and refactoring Detailed implementation mechanics: how low-level refactorings are combined to implement high-level patterns Multiple ways to implement the same pattern-and when to use each Practical ways to get started even if you have little experience with patterns or refactoring Refactoring to Patterns reflects three years of refinement and the insights of more than sixty software engineering thought leaders in the global patterns, refactoring, and agile development communities. Whether you're focused on legacy or "greenfield" development, this book will make you a better software designer by helping you learn how to make important design changes safely and effectively.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Note: Includes bibliographical references (p. [389]-395) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 701 p. , ill. ; , 25 cm
    DDC: 005.1
    Keywords: Software engineering ; UML (Computer science) ; Electronic books ; local
    Abstract: "Designing Software Product Lines with UML is well-written, informative, and addresses a very important topic. It is a valuable contribution to the literature in this area, and offers practical guidance for software architects and engineers." -Alan Brown Distinguished Engineer, Rational Software, IBM Software Group "Gomaa's process and UML extensions allow development teams to focus on feature-oriented development and provide a basis for improving the level of reuse across multiple software development efforts. This book will be valuable to any software development professional who needs to manage across projects and wants to focus on creating software that is consistent, reusable, and modular in nature." -Jeffrey S Hammond Group Marketing Manager, Rational Software, IBM Software Group "This book brings together a good range of concepts for understanding software product lines and provides an organized method for developing product lines using object-oriented techniques with the UML. Once again, Hassan has done an excellent job in balancing the needs of both experienced and novice software engineers." -Robert G. Pettit IV, Ph.D. Adjunct Professor of Software Engineering, George Mason University "This breakthrough book provides a comprehensive step-by-step approach on how to develop software product lines, which is of great strategic benefit to industry. The development of software product lines enables significant reuse of software architectures. Practitioners will benefit from the well-defined PLUS process and rich case studies." -Hurley V. Blankenship II Program Manager, Justice and Public Safety, Science Applications International Corporation "The Product Line UML based Software engineering (PLUS) is leading edge. With the author's wide experience and deep knowledge, PLUS is well harmonized with architectural and design pattern technologies." -Michael Shin Assistant Professor, Texas Tech University Long a standard practice in traditional manufacturing, the concept of product lines is quickly earning recognition in the software industry. A software product line is a family of systems that shares a common set of core technical assets with preplanned extensions and variations to address the needs of specific customers or market segments. When skillfully implemented, a product line strategy can yield enormous gains in productivity, quality, and time-to-market. Studies indicate that if three or more systems with a degree of common functiona...
    Note: Includes bibliographical references (p. 675-685) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 401 p. , ill. ; , 23 cm
    Keywords: TCP/IP (Computer network protocol) ; Electronic books ; local
    Abstract: Your first step into the world of TCP/IP No TCP/IP experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding TCP/IP begins here! Learn TCP/IP basics Discover the power of TCP/IP components and subcomponents Use hands-on activities to understand TCP/IP Benefit from examples that illustrate the power of TCP/IP Welcome to the world of TCP/IP! TCP/IP is the world's de facto communications protocol. It is the official protocol of the Internet and, consequently, has become the predominant communications protocol suite in many private networks and internetworks. No TCP/IP experience needed! TCP/IP First-Step explores TCP/IP concepts in a reader-friendly manner that assumes no previous experience. Learn about packetized data transfer, open networking, reference models, and standards bodies. Understand the architecture of the TCP/IP protocol suite and learn about its components, functions, and respective uses. TCP/IP First-Step helps you understand TCP/IP's role in the network. Learn more about the First-Step Series at www.ciscopress.com/firststep.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxix, 946 p. , ill. ; , 23 cm. +
    Edition: 3rd ed.
    Keywords: MySQL (Electronic resource) ; PHP (Computer program language) ; SQL (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0672329166 ISBN-13: 9780672329166 We've taken the best and made it even better. The third edition of the best-selling PHP and MySQL Web Development has been updated to include material and code on MySQL 5, PHP 5 and on PHPs object model and validation. Through a clear, practical approach, you will learn to develop secure, dynamic websites by integrating and implementing the PHP scripting language and the MySQL database system. Real-world examples and working sample projects will give you a strong foundation on which to start building your own websites, complete with features such as SSL, shopping carts and payment systems. The accompanying CD includes the source code from each example in the book, the entire book in PDF format, and source code and binaries for PHP 5, MySQL 5 and Apache. Readers have called PHP and MySQL Web Development call it the best technical book they've ever read, but don't take their word for it. Find out for yourself!
    Note: Accompanying CD-ROM includes source code for the book's examples, the entire book in PDF format, and PHP and MySQL for Linux/Unix, Windows, and Mac OS X. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 747 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company. Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. This shorter version of the original work omits much mathematical formalism, making it more accessible for professionals and students who have a less formal mathematical background, or for readers with a more practical than theoretical interest.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xiv, 325 p. ; , 24 cm
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: Software "style" is about finding the perfect balance between overhead and functionality... elegance and maintainability... flexibility and excess. In Exceptional C++ Style , legendary C++ guru Herb Sutter presents 40 new programming scenarios designed to analyze not only the what but the why and help you find just the right balance in your software. Organized around practical problems and solutions, this book offers new insight into crucial C++ details and interrelationships, and new strategies for today's key C++ programming techniques--including generic programming, STL, exception safety, and more. You'll find answers to questions like: What can you learn about library design from the STL itself? How do you avoid making templated code needlessly non-generic? Why shouldn't you specialize function templates? What should you do instead? How does exception safety go beyond try and catch statements? Should you use exception specifications, or not? When and how should you "leak" the private parts of a class? How do you make classes safer for versioning? What's the real memory cost of using standard containers? How can using const really optimize your code? How does writing inline affect performance? When does code that looks wrong actually compile and run perfectly, and why should you care? What's wrong with the design of std::string? Exceptional C++ Style will help you design, architect, and code with style--and achieve greater robustness and performance in all your C++ software.
    Note: Includes bibliographical references (p. 315-318) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Language: English
    Pages: xiv, 373 p. , ill. ; , 24 cm. +
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Computer programming ; Electronic books ; local
    Abstract: Abrahams and Gurtovoy have written something close to a classic... marvelous fun to read... Read the complete book review by Jack J. Woehr, Dr. Dobbs Journal, June 03, 2005 "If you're like me, you're excited by what people do with template metaprogramming (TMP) but are frustrated at the lack of clear guidance and powerful tools. Well, this is the book we've been waiting for. With help from the excellent Boost Metaprogramming Library, David and Aleksey take TMP from the laboratory to the workplace with readable prose and practical examples, showing that "compile-time STL" is as able as its runtime counterpart. Serving as a tutorial as well as a handbook for experts, this is the book on C++ template metaprogramming." -Chuck Allison, Editor, The C++ Source C++ Template Metaprogramming sheds light on the most powerful idioms of today's C++, at long last delivering practical metaprogramming tools and techniques into the hands of the everyday programmer. A metaprogram is a program that generates or manipulates program code. Ever since generic programming was introduced to C++, programmers have discovered myriad "template tricks" for manipulating programs as they are compiled, effectively eliminating the barrier between program and metaprogram. While excitement among C++ experts about these capabilities has reached the community at large, their practical application remains out of reach for most programmers. This book explains what metaprogramming is and how it is best used. It provides the foundation you'll need to use the template metaprogramming effectively in your own work. This book is aimed at any programmer who is comfortable with idioms of the Standard Template Library (STL). C++ power-users will gain a new insight into their existing work and a new fluency in the domain of metaprogramming. Intermediate-level programmers who have learned a few advanced template techniques will see where these tricks fit in the big picture and will gain the conceptual foundation to use them with discipline. Programmers who have caught the scent of metaprogramming, but for whom it is still mysterious, will finally gain a clear understanding of how, when, and why it works. All readers will leave with a new tool of unprecedented power at their disposal-the Boost Metaprogramming Library. The companion CD-ROM contains all Boost C++ libraries, including the Boost Metaprogramming Library and its reference documentation, along with all of the book's sample code and extens...
    Note: Includes bibliographical references (p. 345-348) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 292 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    DDC: 004.67
    Keywords: Computer networks ; Management ; Network performance (Telecommunication) ; Electronic books ; local
    Abstract: Learn about the technologies that drive fast broadband access in the first mile and master the design of first mile access networks Understand the motivating forces behind first mile access networks and learn about the technology and business requirements for first mile access solutions Master the design of passive optical networks (PON) Build EPON solutions and differentiate them from BPON and GPON Enhance bandwidth capacity in the access area using CWDM technology Learn about and design DSL and power-line communication (PLC) networks Discover the use of WiFi in the first mile and study the subsystems involved in a WiFi solution Learn the importance of management in first mile access networks and create a business case for diverse first mile access networks First Mile Access Networks and Enabling Technologies provides a platform for showcasing first mile access technologies and associated network solutions. Using this book, you learn about the bandwidth bottleneck within the first mile and explore the resulting business prospects. Benefit from a thorough and thoughtful discussion of the business case for the first mile, which helps you approach the issue from multiple perspectives. Examine multiple access technologies, understand the diversity of solutions within this area, and take your solutions further using sound and unique management techniques. Utilize the solid and tested implementation method provided by this book to remove networking anomalies, such as the digital divide. This book helps you understand and capitalize on the market opportunity presented by the first mile. First Mile Access Networks and Enabling Technologies covers multiple technologies, protocols, and business methods and can be used to understand the growth of first mile access networks and resulting business opportunities. This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxi, 479 p. , ill. ; , 24 cm. +
    Edition: 3rd ed.
    DDC: 005.3
    Keywords: Application software ; Development ; UML (Computer science) ; Electronic books ; local
    Abstract: Learn UML, the Unified Modeling Language, to create diagrams describing the various aspects and uses of your application before you start coding, to ensure that you have everything covered. Millions of programmers in all languages have found UML to be an invaluable asset to their craft. More than 50,000 previous readers have learned UML with Sams Teach Yourself UML in 24 Hours . Expert author Joe Schmuller takes you through 24 step-by-step lessons designed to ensure your understanding of UML diagrams and syntax. This updated edition includes the new features of UML 2.0 designed to make UML an even better modeling tool for modern object-oriented and component-based programming. The CD-ROM includes an electronic version of the book, and Poseidon for UML, Community Edition 2.2, a popular UML modeling tool you can use with the lessons in this book to create UML diagrams immediately.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 336 p. , ill. ; , 28 cm
    DDC: 621.39/9
    Keywords: Automatic speech recognition ; Human-computer interaction ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: This book is a comprehensive and authoritative guide to voice user interface (VUI) design. The VUI is perhaps the most critical factor in the success of any automated speech recognition (ASR) system, determining whether the user experience will be satisfying or frustrating, or even whether the customer will remain one. This book describes a practical methodology for creating an effective VUI design. The methodology is scientifically based on principles in linguistics, psychology, and language technology, and is illustrated here by examples drawn from the authors' work at Nuance Communications, the market leader in ASR development and deployment. The book begins with an overview of VUI design issues and a description of the technology. The authors then introduce the major phases of their methodology. They first show how to specify requirements and make high-level design decisions during the definition phase. They next cover, in great detail, the design phase, with clear explanations and demonstrations of each design principle and its real-world applications. Finally, they examine problems unique to VUI design in system development, testing, and tuning. Key principles are illustrated with a running sample application. A companion Web site provides audio clips for each example: www.VUIDesign.org The cover photograph depicts the first ASR system, Radio Rex: a toy dog who sits in his house until the sound of his name calls him out. Produced in 1911, Rex was among the few commercial successes in earlier days of speech recognition. Voice User Interface Design reveals the design principles and practices that produce commercial success in an era when effective ASRs are not toys but competitive necessities.
    Note: Includes bibliographical references (p. 315-324) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Your first step into the world of routing No routing experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding routing begins here! Learn routing basics simply and easily Explore how network traffic gets from here to there Understand routing tools and technologies Reinforce your understanding with chapter review questions Welcome to the world of routing! Routing is the technology that enables worldwide Internet communication. Many people involved with networking technologies or companies need to know how routing works. But learning about routing tends to involve a complex web of terms and acronyms-a language that can be difficult and unfamiliar. No routing experience needed! Routing First-Step explains the basics of Internet routing in language all of us can understand. This book takes you on a guided tour of routing, starting with systems you are familiar with: the postal system, the telephone system, and the interstate highway system. From there, you'll learn routing simply and easily. Whether you are looking to take your first step into a career in networking or are interested only in gaining knowledge of the technology, this book is for you!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 860 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Firewalls (Computer security) ; Examinations ; Study guides ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-521 foundation learning Gain proficiency with new features of PIX Firewall version 6.3, including OSPF, 802.1Q VLANs, NAT-T, and more Learn the ins and outs of the PIX product family and its complete feature set Use the PIX Device Manager (PDM) 3.0 to configure and manage the PIX Firewall Use advanced techniques to control traffic on your network using ACLs (access control lists), content filtering, and object groups Improve security using PIX Firewall attack guards, intrusion detection, and shunning features Learn about techniques and security considerations for configuring OSPF on PIX Firewall version 6.3 Configure scalable site-to-site and client remote access VPNs using the PIX Firewall version 6.3 Configure high-availability solutions using stateful and LAN-based failover techniques Use logical interfaces and 802.1Q trunks to scale your PIX Firewall implementation Master enterprise management and maintenance techniques using CiscoWorks Management Center for Firewalls 1.2 and Auto Update Server 1.1 Configure the PIX Firewall Services Module (FWSM) The use of firewalls-devices residing at the network perimeter to protect against intrusion-is an essential building block to even the most basic security program. Cisco Systems has continued the support and development of the PIX OS to provide networks top-notch security while maintaining compatibility with the latest standards and protocols. Now offered in many models, the PIX Firewall is perfectly suited to meet the requirements of small offices (501 model), medium to large businesses (506E, 515E, and 525 models), and large enterprise and service provider customers (525 and 535 models and the Firewall Services Module). CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA) , Second Edition, offers in-depth configuration and deployment information for this popular and versatile firewall solution. CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA) , Second Edition, teaches you the skills needed to configure and operate the PIX Firewall product family. Chapter overviews bring you quickly up to speed and help you get to work right away. Lab exercises and scenario-based solutions allow you to adapt configurations to your network for rapid implementation, helping you make the most of your PIX Firewall. Chapter-ending review questions test your knowledge. PIX Device Manager (PDM) configuration procedures are presented to complement extensive...
    Note: Includes bibliographical references (p. [837]-841) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 745 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvi, 412 p. ; , 23 cm
    DDC: 005.4/32
    Keywords: Linux ; UNIX Shells ; Electronic books ; local
    Abstract: According to IDC, over 170,000 new servers were shipped in the first quarter of 2003. That also means that there were potentially more than 170,000 people like you charged with administering these systems without the proper knowledge or training to do so. Linux Shell Scripting with Bash will help you learn to not only get your system up and running quickly by employing the Bash shell, but it will also show you professional scripting solutions through the use of structured programming and standard Linux development tools. The book focuses on the Linux environment, which the shell relies on to function, and the robust Linux tool set, making this book ideal for learning shell scripting. Real-world scripts are included that are readable, extendable and easy to debug. This book is an asset to any Linux user.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xv, 554 p. , ill. ; , 23 cm
    DDC: 005.7/2
    Keywords: Movable Type (Computer file) ; Web publishing ; Web sites ; Design ; Electronic books ; local
    Abstract: Movable Type, a low-cost, distributed publishing software solution is helping thousands of Web site developers organize and automate the Web content management process. In 24 well-paced chapters, the authors of Sams Teach Yourself Movable Type in 24 Hours show readers how to install, personalize, and configure Movable Type into an indispensable content management tool. Features hands-on tutorials for finding Web hosting services, adjusting publishing preferences, customizing page templates, setting up multiple author accounts and extending the program with plug-ins and custom features, the authors show readers how to use everything from the most basic fundamentals of Movable Type to its most powerful features.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: ix, 318 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Microsoft Visual C (Plus Plus) ; C Plus Plus (Computer program language) ; Electronic books ; local
    Abstract: Microsoft Visual C++ .NET 2003 Kick Start is targeted toward developers interested in making the jump to .NET, working programmers already familiar with another programming language or the previous version of VS. Visual C++ .NET 2003 Kick Start speeds through basic concepts and focuses on practical examples and benefits of moving to VC++ .NET. This book explains how VC++ code interacts with the .NET Framework, the extra capabilities of VC++ compared to VB.NET and C# in .NET code interoperability, how to use Windows Forms (a new feature for VC++ .NET in the 2003 edition), and how to migrate from Visual Studio 6 and COM. The author covers the use of managed and unmanaged Visual C++ code, using both types for most examples. Full of code examples, tips, and professional insights, this book provides maximum learning with minimum investment of time and effort.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xiv, 267 p. ; , 23 cm
    DDC: 005.75/65
    Keywords: MySQL (Electronic resource) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: A concise introduction to the fundamentals of working with MySQL. MySQL is an open-source relational database management system that is rapidly growing in popularity. Known for its speed, reliability, and ease of use, MySQL has proven itself to be particularly well suited both for beginners and for experienced developers to create sophisticated database-backed Web sites and applications. MySQL Tutorial is a clear, concise introduction to the fundamental concepts and techniques of working with MySQL. It teaches the beginning MySQL user how to create and administer powerful databases that can be used at home, at work, and on the Web. Whether you are a novice to databases or a technical professional looking to find out more about how MySQL works, MySQL Tutorial efficiently guides you through the information you need in order to get started with MySQL and quickly become proficient.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxi, 571 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.13/3
    Keywords: Microsoft Visual C# .NET ; C# (Computer program language) ; Visual programming languages (Computer science) ; Electronic books ; local
    Abstract: In just 24 lessons of one hour or less, you will be creating your own Windows applications using the power and functionality of Visual C# .NET. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of Visual C# .NET from the ground up. As an added bonus, the book includes a 60-day Trial Version of Microsoft Visual Studio .NET 2003 on DVD-ROM so you will have every tool you need to create the applications demonstrated in the book. Step-by-step instructions walk you through the most common Visual C# .NET tasks while questions and answers, quizzes, and exercises at the end of each hour help you test your knowledge. Notes and tips point out shortcuts and solutions and help steer you clear of potential problems. You will learn... The basics of Visual C# and then quickly begin applying your knowledge to real-world Windows programming tasks. Important features such as building forms, working with controls, looping, debugging, and working with data in the world of .NET. Tips that ease migration from Visual C++ and Visual Basic 6 to Visual c# .NET 2003.
    Note: "DVD-ROM includes Microsoft Visual Studio .NET 2003! 60-day trial edition"--Cover. - Includes index. - Title on accompanying DVD-ROM: Microsoft Visual Studio.net professional
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvii, 315 p. , ill. ; , 23 cm. +
    DDC: 005.13/3
    Keywords: BEA WebLogic workshop ; Client/server computing ; Java (Computer program language) ; Web services ; Electronic books ; local
    Abstract: BEA WebLogic Workshop 8.1 Kick Start shows you how to make J2EE programming easier, providing the fastest path to productivity with BEA WebLogic Workshop 8.1. The authors show how Workshop leverages the power of BEA WebLogic Platform 8.1, including WebLogic Server, WebLogic Portal, and WebLogic Integration. With BEA WebLogic Workshop 8.1 Kick Start , you'll learn to build J2EE applications and see how each concept works within a real-world online casino application developed over the course of the book. You'll see how Workshop 8.1 facilitates every step of the development process, from design to deployment. The authors' expert insights and tips, along with dozens of practical examples that you can put to use immediately, will have you up and running at full speed in nothing flat. The included CD-ROM contains the Developer's Edition of BEA WebLogic Platform 8.1 (including WebLogic Workshop 8.1) and all the sample code and examples, with a complete version of the casino application developed over the course of the book. In addition you can view the entire book in searchable electronic form.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: 411 p. , ill. ; , 24 +
    DDC: 006.7
    Keywords: DirectX ; Multimedia systems ; Electronic books ; local
    Abstract: Managed DirectX was released with the latest version of the core DirectX libraries in DirectX9. It enables developers using the new .NET languages (i.e. C#, VB.NET, etc.) to develop rich multimedia applications with DirectX. Unfortunately the Managed DirectX runtime was released without adequate documentation, and developers are having a hard time figuring out the best way to write managed applications. This book covers how to use the Managed DirectX objects, how they differ from the core DirectX libraries, and how to create these rich multimedia applications in C#. It also covers in depth graphics techniques and the new high-level shader language shipping with DirectX9.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: 355 p. , ill. ; , 24 cm
    DDC: 006.7/4
    Keywords: Query languages (Computer science) ; XML (Document markup language) ; Electronic books ; local
    Abstract: XQuery Kick Start delivers a concise introduction to the XQuery standard, and useful implementation advice for developers needing to put it into practice. The book starts by explaining the role of XQuery in the XML family of specifications, and its relationship with XPath. The authors then explain the specification in detail, describing the semantics and data model, before moving to examples using XQuery to manipulate XML databases and document storage systems. Later chapters discuss Java implementations of XQuery and development tools that facilitate the development of Web sites with XQuery. This book is up to date with the latest XQuery specifications, and includes coverage of new features for extending the XQuery language.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 150 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer architecture ; Computer software ; Development ; Electronic books ; local
    Abstract: "A readable and much needed introduction to MDA." --Dr. Jim Arlow, coauthor of UML and the Unified Process (Addison-Wesley, 2002) and Enterprise Patterns and MDA (Addison-Wesley, 2004) "This book provides an excellent introduction to the ideas and technologies that will form the foundation of the model-driven architecture over the coming years. I recommend it wholeheartedly." --Dr. Andy Evans, Managing Director, Xactium Limited, UK "Excellent job of distilling MDA down to its core concepts." --Krzysztof Czarnecki, Univeristy of Waterloo, coauthor of Generative Programming (Addison-Wesley, 2000) As systems have grown more crucial to the operations of organizations worldwide, so too have the costs associated with building and maintaining them. Enter model-driven architecture (MDA), a standard framework from the Object Management Group (OMG) that allows developers to link object models together to build complete systems. MDA prevents design decisions from being intertwined with the application and keeps it independent of its implementation. The result is an application that can be combined with other technologies as well as other applications, and models that become highly reusable assets. MDA Distilled is an accessible introduction to the MDA standard and its tools and technologies. The book describes the fundamental features of MDA, how they fit together, and how you can use them in your organization today. You will also learn how to define a model-driven process for a project involving multiple platforms, implement that process, and then test the resulting system. MDA Distilled will help you understand: The MDA framework, including the platform-independent model (PIM) and the platform-specific model (PSM) The Meta Object Facility (MOF)--the OMG's adopted standard for metamodeling Horizontal, vertical, and merging mappings between models Building marks and marking models Elaborating models, including viewing generated models, and managing manual changes Building executable models with Executable UML Agile MDA development Developers and architects can dramatically improve productivity, portability, interoperability, and maintenance with MDA. Find out how with this essential reference, and quickly learn how to harness the significant power of this new framework.
    Note: Includes bibliographical references (p. 143-144) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxx, 638 p. , ill. ; , 23 cm
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Rather than being a traditional planning, design, and implementation guide, this book is a serious resource for Windows experts to find tips, tricks, and best practices for implementing and supporting key Windows Server 2003 technologies. The authors started working with Windows Server 2003 (then codename Whistler) just days after the code for Windows 2000 was locked, when most organizations were getting a first chance to see the Windows 2000 server product. With more than three years of experience working with Whistler in early beta and production implementations, the authors of this book have provided a resource to help you make Windows 2003 technologies work properly. When given a choice of different ways of implementing the technologies, you can turn to this book for the best practices of successful field implementations. This book is organized into eight parts focusing around a core technological solution area, with several chapters making up each part. Sections include security, management, design, migration, business continuity, performance, and business productivity.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 488 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Keywords: Application software ; Development ; Business enterprise ; Data processing ; Web services ; Electronic books ; local
    Abstract: "Linthicum provides an insightful overview of the services-integration issues that will enable you to capitalize on current and future integration technologies. He also dives deep into the key Web services technologies for implementing the next generation integration architecture. Highly recommended for those thinking of moving from traditional EAI to Web services." --Dr. Ravi Kalakota, CEO, E-Business Strategies Author of Services Blueprint: Roadmap for Execution For a majority of businesses, application integration is an outright failure. Most companies' computer systems are labyrinthine at best and self-destructive at worst. With the arrival of Web services, the new service-oriented middleware technology standard, and increasingly complex and challenging problem domains, it's time to take application integration to the next level. In Next Generation Application Integration distributed computing and application-integration expert David S. Linthicum describes the effect that this new generation of middleware will have on traditional application-integration efforts. Using key industry examples and case studies, Linthicum reveals the techniques and practices that are necessary to revolutionize data-sharing for any company--from sole-proprietorship to Fortune 500. In this book you'll find a thorough discussion of today's most advanced application-integration concepts, approaches, technologies, and solutions. Written with the technical manager and enterprise architect in mind, this book addresses essential application integration issues such as: Strategies for dealing with complex problem domains Forward-looking approaches to ensure long-term solutions that are right for your company Techniques for implementation of new Web services middleware Introductions to the appropriate technologies for next generation application integration Scenarios for Web services integration Support concepts outlined by case studies and real-world examples Descriptions and analyses of the different types of Web service integration--standards, implementation, and enabling technology Full analysis of Web services and integration, including the relationship between EAI and Web services How to leverage both vertical and horizontal application-integration standards If you're responsible for managing or implementing application-integration middleware, Next Generation Application Integration will prove to be an indispensable resource. 0201844567B07142003
    Note: Includes bibliographical references (p. 463-470) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and respond to such attacks and breaches. The Effective Incident Response Team is the first complete guide to forming and managing a Computer Incident Response Team (CIRT). In this book, system and network administrators and managers will find comprehensive information on establishing a CIRT's focus and scope, complete with organizational and workflow strategies for maximizing available technical resources. The text is also a valuable resource for working teams, thanks to its many examples of day-to-day team operations, communications, forms, and legal references. IT administrators and managers must be prepared for attacks on any platform, exploiting any vulnerability, at any time. The Effective Incident Response Team will guide readers through the critical decisions involved in forming a CIRT and serve as a valuable resource as the team evolves to meet the demands of ever-changing vulnerabilities. Inside, readers will find information on: Formulating reactive or preventative operational strategy Forming, training, and marketing the CIRT Selecting penetration-testing, intrusion-detection, network-monitoring, and forensics tools Recognizing and responding to computer incidents and attacks, including unauthorized access, denial-of-service attacks, port scans, and viruses Tracking, storing, and counting incident reports and assessing the cost of an incident Working with law enforcement and the legal community Benefiting from shared resources Scrutinizing closed incidents to further prevention Offering services such as user-awareness training, vulnerability and risk assessments, penetration testing, and architectural reviews Communicating the CIRT's return on investment through management reporting 0201761750B10062003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: The only home networking book you'll ever need Setting up a home network doesn't need to be difficult. You can use this easy-to-understand reference to set up your home network, secure it, and turn it into an entertainment network. Don't be fooled by other guides-it can be this simple: It's Easy-Set up your home network with this visual step-by-step guide. Quit Wasting Time and Money-Buy the network gadgets and equipment you need. Make It Secure-Use simple tips to make your network secure. Wow the Neighbors-Turn your home network into an entertainment network. What Went Wrong-Fix common problems you might encounter while setting up your network.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Language: English
    Pages: p. cm
    DDC: 005.7/13769
    Keywords: Microsoft Windows server ; Computer storage devices ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Dilip Naik's Inside Windows Storage is an invaluable reference for developers and customers alike and is a must-read for anyone wishing to implement Windows-based storage networking." -Tom Clark, Director, Technical Marketing, Nishan Systems The Windows and enterprise storage markets are converging. Migrating upwards from low-end servers, Windows is becoming a genuine platform for running mission-critical applications. The enterprise storage market is moving from high-end servers to also include medium range servers. Thanks to a slew of enterprise storage related features, Microsoft Windows storage technologies are rapidly gaining widespread acceptance. System administrators, programmers, and technical managers need to learn to appreciate and to tap the full potential of Windows enterprise storage. Inside Windows Storage is the first book to provide a comprehensive look at new and emerging Microsoft storage technologies. The text begins with an overview of the enterprise storage industry and Windows Server architecture, including the Windows NT I/O subsystem. With that foundation in place, readers explore the ins and outs of current Windows offerings, upcoming Windows server releases, and third-party products. Key topic coverage includes: Direct Attached Storage, including the new Windows Storport driver model Fibre Channel Storage Area Networks (SANs) Network Attached Storage (NAS), including the Windows NT network stack and an overview of CIFS Backup and restore technologies, including Windows XP and Windows Server 2003 Volume Shadow Copy Service File systems and disk virtualization, including a detailed overview of NTFS as well as a study of Windows cluster file systems Storage management, including the new Windows Virtual Disk Service IP Storage and Infiniband High availability, including RAID mirroring as well as multi path I/O solutions This extensive guide concludes by tracing Windows NT storage features as they appear in Windows NT 4.0, Windows 2000, and Windows Server 2003, and by offering a preview of what to expect from future Windows server releases. In short, Inside Windows Storage will help IT professionals gear up for the major role that Windows servers will surely play in the future of enterprise storage. 032112698XB06302003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxv, 384 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Local area networks (Computer networks) ; Telecommunication ; Switching systems ; Electronic books ; local
    Abstract: Your first step into the world of LAN switching No LAN switching experience required Includes clear and easily understood explanations Makes learning easy Your first step to LAN switching begins here! Learn local-area network (LAN) key concepts and terminology Identify key issues involved with designing and managing a switched LAN Answer the question: do I need a hub, a bridge, or a switch? Welcome to the world of LAN switching! Network switches work by connecting network paths together and making intelligent decisions about moving traffic in a network. By keeping track of changes in the network, switches reduce congestion and improve speed. No LAN switching experience needed! LAN Switching First-Step explains the basics of LAN switching in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the key concepts behind how bridges and switches work. Whether you are looking to take your first step into a career in networking or are interested in just gaining a conversational knowledge of the technology, this book is for you!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Hands-on techniques for enabling authentication, authorization, and accounting Understand the security concepts behind the AAA framework Learn message formats, communication, and message encryption using the TACACS+ and RADIUS protocols Configure and troubleshoot AAA on Cisco routers Understand where to position and install the CSACS in your network Explore and customize the CSACS interface Configure CSACS user accounts, user groups, and shared profile components Add AAA clients and manage network connections Configure external databases and perform database replication and backup Explore the various reports and logs available in CSACS Learn how AAA models apply to service provider environments Install and configure Cisco Access Registrar As network infrastructures evolve, it is increasingly important that access to vital corporate resources is vigilantly monitored and controlled. The Cisco identity management solutions, including Cisco Secure Access Control Server (CSACS), address this requirement, enabling security, control, and administration of the growing population of users that connect to corporate networks. CSACS, an essential component of the Cisco Identity Based Networking Services (IBNS) architecture, extends access security by combining authentication, user and administrator access, and policy control from a centralized identity-networking framework. This allows greater flexibility and mobility, increased security, and user productivity gains. Cisco Access Control Security provides you with the skills needed to configure authentication, authorization, and accounting (AAA) services on Cisco devices. Separated into three parts, this book presents hard-to-find configuration details of centralized identity networking solutions. Part I provides an overview of the AAA architecture, complete with discussions of configuring Cisco routers for AAA. Part II addresses enterprise AAA management with CSACS, including installation, configuration, and management details. Part III looks at service provider AAA management with Cisco Access Registrar. Full of detailed overviews, diagrams, and step-by-step instructions for enabling essential access control solutions, Cisco Access Control Security is a practical tool that can help enforce assigned access policies and simplify user management. "This book manages the rare combination of being highly accurate and technically astute, while maintaining an easy readability and flow. It is a great guide for s...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 739 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at security design with three included case studies Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way. Beginning where other security books leave off, Network Security Architectures shows you how the various technologies that make up a security system can be used together to improve your network's security. The technologies and best practices you'll find within are not restricted to a single vendor but broadly apply to virtually any network system. This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy. You'll review detailed desig...
    Note: Includes "Glossary of terms" (p. [673]-677). - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: x, 268 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering . These techniques will show you how to better understand and work with third-party applications. Each chapter focuses on a technique to solve a specific problem, such as obfuscation in code or scalability vulnerabilities, outlining the issue and demonstrating possible solutions. Summaries at the end of each chapter will help you double check that you understood the crucial points of each lesson. You will also be able to download all code examples and sample applications for future reference from the publisher's website. Let Covert Java help you crack open mysterious codes!
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 386 p. , ill. ; , 23 cm. +
    DDC: 005
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: "I had a question about how to use a new Eclipse 3.0 feature, job scheduling, so I thought I would try out this book. I immediately found the answer with a concise explanation. Cool!" --Erich Gamma Official Eclipse 3.0 FAQs is the convenient source for answers to your most crucial questions about writing Eclipse plug-ins. Whether you're creating simple extensions for personal use or commercial Eclipse-based applications, you'll find hundreds of concise solutions here--including many that aren't answered anywhere else. John Arthorne and Chris Laffra have worked with Eclipse technology since the very beginning; both are active members of the Eclipse development community and frequently answer questions on Eclipse newsgroups and mailing lists. Here, they cover an extraordinary range of topics, from workspace management to documentation, SWT to JFace, JDT to natural language support. Many FAQs include code samples and references to other information, making the book an invaluable desk reference for anyone working with Eclipse. Just a few of the 350+ questions answered here... How do I upgrade Eclipse? Page 29 What is new in Eclipse 3.0? Page 34 How can I add my views and actions to an existing perspective? Page 187 How do I set up a Java project to share in a repository? Page 58 How do I declare my own extension point? Page 74 How do I display a Web page in SWT? Page 141 How do I support multiple natural languages in my plug-in messages? Page 253 How do I save settings for a dialog or wizard? Page 166 How do I provide syntax coloring in an editor? Page 269 How do I hook into global actions, such as Copy and Delete? Page 225 How do I create a Rich Client application? Page 241 What is the purpose of activities? Page 229 How do I create and examine an AST? Page 369
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xv, 392 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Abstract: "As usual, Keith masterfully explains complex security issues in down-to-earth and easy-to-understand language. I bet you'll reach for this book often when building your next software application." --Michael Howard, coauthor, Writing Secure Code "When it comes to teaching Windows security, Keith Brown is 'The Man.' In The .NET Developer's Guide to Windows Security, Keith has written a book that explains the key security concepts of Windows NT, Windows 2000, Windows XP, and Windows Server 2003, and teaches you both how to apply them and how to implement them in C# code. By organizing his material into short, clear snippets, Brown has made a complicated subject highly accessible." --Martin Heller, senior contributing editor at Byte.com and owner of Martin Heller & Co. "Keith Brown has a unique ability to describe complex technical topics, such as security, in a way that can be understood by mere mortals (such as myself). Keith's book is a must read for anyone attempting to keep up with Microsoft's enhancements to its security features and the next major version of .NET." --Peter Partch, principal software engineer, PM Consulting "Keith's book is a collection of practical, concise, and carefully thought out nuggets of security insight. Every .NET developer would be wise to keep a copy of this book close at hand and to consult it first when questions of security arise during application development." --Fritz Onion, author of Essential ASP.NET with Examples in C# The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Windows Server 2003, Windows XP, and Windows 2000. Author Keith Brown crystallizes his application security expertise into 75 short, specific guidelines. Each item is clearly explained, cross-referenced, and illustrated with detailed examples. The items build on one another until they produce a comprehensive picture of what tools are available and how developers should use them. The book highlights new features in Windows Server 2003 and previews features of the upcoming version 2.0 of the .NET Framework. A companion Web site includes the source code and examples used throughout the book. Topics covered include: Kerberos authentication Access control Impersonation Network security Constrained delegation Protocol transition Securing enterprise servi...
    Note: Includes bibliographical references (p. 379-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Language: English
    Pages: xxx, 337 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 004.36
    Keywords: Computer architecture ; Information technology ; Middleware ; Electronic books ; local
    Abstract: The challenges of designing, building, and maintaining large-scale, distributed enterprise systems are truly daunting. Written by and for IT professionals, IT Architectures and Middleware, Second Edition, will help you rise above the conflicts of new business objectives, new technologies, and vendor wars, allowing you to think clearly and productively about the particular challenges you face. This book focuses on the essential principles and priorities of system design and emphasizes the new requirements emerging from the rise of e-commerce and distributed, integrated systems. It offers a concise overview of middleware technology alternatives and distributed systems. Numerous increasingly complex examples are incorporated throughout, and the book concludes with some short case studies. Topics covered include: Middleware technology review Key principles of distributed systems: resiliency, performance and scalability, security, and systems management Information access requirements and data consistency Application integration design Recasting existing applications as services In this new edition, with updates throughout, coverage has been expanded to include: Service-oriented architecture concepts Web services and .NET technology A more structured approach to system integration design
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Language: English
    Pages: xx, 721 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.3
    Keywords: Computer software ; Development ; UML (Computer science) ; Electronic books ; local
    Abstract: "If you are a serious user of UML, there is no other book quite like this one. I have been involved with the UML specification process for some time, but I still found myself learning things while reading through this book-especially on the changes and new capabilities that have come with UML." - Ed Seidewitz , Chief Architect, IntelliData Technologies Corporation The latest version of the Unified Modeling Language-UML 2.0-has increased its capabilities as the standard notation for modeling software-intensive systems. Like most standards documents, however, the official UML specification is difficult to read and navigate. In addition, UML 2.0 is far more complex than previous versions, making a thorough reference book more essential than ever. In this significantly updated and expanded edition of the definitive reference to the standard, James Rumbaugh, Ivar Jacobson, and Grady Booch-the UML's creators-clearly and completely describe UML concepts, including major revisions to sequence diagrams, activity models, state machines, components, internal structure of classes and components, and profiles. Whether you are capturing requirements, developing software architectures, designing implementations, or trying to understand existing systems, this is the book for you. Highlights include: Alphabetical dictionary of articles covering every UML concept Integrated summary of UML concepts by diagram type Two-color diagrams with extensive annotations in blue Thorough coverage of both semantics and notation, separated in each article for easy reference Further explanations of concepts whose meaning or purpose is obscure in the original specifications Discussion sections offering usage advice and additional insight into tricky concepts Notation summary, with references to individual articles A hyperlinked version of the book in Adobe Reader format on CD-ROM, an excellent resource for browsing or searching the text for specific information An enhanced online index available on the book's web site allowing readers to quickly and easily search the entire text for specific topics The result is an indispensable resource for anyone who needs to understand the inner workings of the industry standard modeling language.
    Note: Includes bibliographical references (p. 703-705) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 277 p. , ill. ; , 24 cm
    DDC: 005.1/2
    Keywords: Computer software ; Development ; Management ; Software engineering ; Electronic books ; local
    Abstract: Please note - there is now a second edition of this book available, with the ISBN of 0321658396. "Jim Highsmith is one of a few modern writers who are helping us understand the new nature of work in the knowledge economy." -Rob Austin, Assistant Professor, Harvard Business School "This is the project management book we've all been waiting for-the book that effectively combines Agile methods and rigorous project management. Not only does this book help us make sense of project management in this current world of iterative, incremental Agile methods, but it's an all-around good read!" -Lynne Ellen, Sr. VP & CIO, DTE Energy "Finally a book that reconciles the passion of the Agile Software movement with the needed disciplines of project management. Jim's book has provided a service to all of us." -Neville R(oy) Singham, CEO, ThoughtWorks, Inc. "The world of product development is becoming more dynamic and uncertain. Many managers cope by reinforcing processes, adding documentation, or further honing costs. This isn't working. Highsmith brilliantly guides us into an alternative that fits the times." -Preston G. Smith, principal, New Product Dynamics/coauthor, Developing Products in Half the Time One of the field's leading experts brings together all the knowledge and resources you need to use APM in your next project. Jim Highsmith shows why APM should be in every manager's toolkit, thoroughly addressing the questions project managers raise about Agile approaches. He systematically introduces the five-phase APM framework, then presents specific, proven tools for every project participant. Coverage includes: Six principles of Agile Project Management How to capitalize on emerging new product development technologies Putting customers at the center of your project, where they belong Creating adaptive teams that respond quickly to changes in your project's "ecosystem" Which projects will benefit from APM-and which won't APM's five phases: Envision, Speculate, Explore, Adapt, Close APM practices, including the Product Vision Box and Project Data Sheet Leveraging your PMI skills in Agile environments Scaling APM to larger projects and teams For every project manager, team leader, and team member
    Note: Includes bibliographical references (p. 263-267) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...