Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (263)
  • International Business Machines Corporation International Technical Support Organization.  (50)
  • Operating systems (Computers)  (211)
  • Computer security  (65)
  • Perl (Computer program language)
Datasource
Material
Language
Years
Author, Corporation
  • 1
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Fourth edition.
    Series Statement: IBM redbooks
    Keywords: Computer security ; Electronic books ; Electronic books ; local
    Abstract: Abstract One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.
    Note: "This edition (SG24-7691-02) applies to IBM z/VSE V6R2"--Cover verso. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed July 11, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition (June 2018).
    Series Statement: IBM redbooks
    Keywords: z/OS ; Data encryption (Computer science) ; Operating systems (Computers) ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
    Note: Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed July 11, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition (January 2018).
    Series Statement: IBM redbooks
    Keywords: IBM computers ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks® publication describes the IBM System z® Personal Development Tool (IBM zPDT®) 2017 Sysplex Extensions, which is a package that consists of sample files and supporting documentation to help you get a functioning, data sharing sysplex up and running with minimal time and effort. This book is a significant revision of zPDT 2016 Sysplex Extensions, SG24-8315, which is still available online for readers who need the IBM z/OS® 2.1 level of this package. This package is designed and tested to be installed on top of a standard Application Developers Controlled Distribution (ADCD) environment. It provides the extra files that you need to create a two-way data sharing IBM z/OS 2.2 sysplex that runs under IBM z/VM® in a zPDT environment.
    Note: "This edition applies to the May 2017 Edition of the Application Developer Controlled Distribution (ADCD)"--Cover verso. - Number on back cover: SG24-8386-01. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed February 12, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition (September 2017).
    Series Statement: IBM redbooks
    Keywords: IBM computers ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks® publication describes the IBM System z® Personal Development Tool (IBM zPDT®) 2017 Sysplex Extensions, which is a package that consists of sample files and supporting documentation to help you get a functioning, data sharing sysplex up and running with minimal time and effort. This book is a significant revision of zPDT 2016 Sysplex Extensions , SG24-8315, which is still available online for readers who need the IBM z/OS® 2.1 level of this package. This package is designed and tested to be installed on top of a standard Application Developer Controlled Distribution (ADCD) environment. It provides the extra files that you need to create a two-way data sharing IBM z/OS 2.2 sysplex that runs under IBM z/VM® in a zPDT environment.
    Note: Number on back cover: SG24-8386-00. - "This edition applies to the Novmber 2016 Edition of the Application Developer Controlled Distribution (ADCD).". - Includes bibliographical references. - Description based on online resource; title from title page (viewed September 28, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Third edition.
    Series Statement: IBM redbooks
    Keywords: IBM computers ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks® publication provides both introductory information and technical details about the IBM System z® Personal Development Tool (IBM zPDT®), which produces a small System z environment suitable for application development. zPDT is a PC Linux application. When zPDT is installed (on Linux), normal System z operating systems (such as IBM z/OS®) can be run on it. zPDT provides the basic System z architecture and emulated IBM 3390 disk drives, 3270 interfaces, OSA interfaces, and so on. The systems that are discussed in this document are complex. They have elements of Linux (for the underlying PC machine), IBM z/Architecture® (for the core zPDT elements), System z I/O functions (for emulated I/O devices), z/OS (the most common System z operating system), and various applications and subsystems under z/OS. The reader is assumed to be familiar with general concepts and terminology of System z hardware and software elements, and with basic PC Linux characteristics. This book provides the primary documentation for zPDT.
    Note: "Part Number: SG24820503."--Resource description page. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed January 22, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition.
    Series Statement: IBM redbooks
    Keywords: IBM computers ; Application software ; Development ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks® publication provides both introductory information and technical details about the IBM System z® Personal Development Tool (IBM zPDT®), which produces a small System z environment suitable for application development. zPDT is a PC Linux application. When zPDT is installed (on Linux), normal System z operating systems (such as IBM z/OS®) can be run on it. zPDT provides the basic System z architecture and emulated IBM 3390 disk drives, 3270 interfaces, OSA interfaces, and so on. The systems that are discussed in this document are complex. They have elements of Linux (for the underlying PC machine), IBM z/Architecture® (for the core zPDT elements), System z I/O functions (for emulated I/O devices), z/OS (the most common System z operating system), and various applications and subsystems under z/OS. The reader is assumed to be familiar with general concepts and terminology of System z hardware and software elements, and with basic PC Linux characteristics. This book provides the primary documentation for zPDT.
    Note: Number on resource description page: SG24820502. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed July 10, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition.
    Series Statement: IBM redbooks
    Keywords: Operating systems (Computers) ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication provides a technical overview of the features, functions, and enhancements that are available in IBM i 7.2, including all the available Technology Refresh (TR) levels, from TR1 to TR3. This publication provides a summary and brief explanation of the many capabilities and functions in the operating system. It also describes many of the licensed programs and application development tools that are associated with IBM i. The information that is provided in this book is useful for clients, IBM Business Partners, and IBM service professionals that are involved with planning, supporting, upgrading, and implementing IBM i 7.2 solutions.
    Note: Number on resource description page: SG24824901. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed January 12, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition (June 2016).
    Series Statement: IBM redbooks
    Keywords: Operating systems (Computers) ; Business enterprises ; Computer networks ; Management ; IBM computers ; Multiprocessors ; Electronic books ; Electronic books ; local
    Abstract: IBM® PowerHA® SystemMirror® for i is the IBM high-availability (HA), disk-based clustering solution for the IBM i operating system. When PowerHA for i is combined with IBM i clustering technology, PowerHA for i delivers a complete HA and disaster-recovery (DR) solution for business applications that are running in an IBM i environment. Use PowerHA for i to support HA capabilities with either native disk storage, IBM DS8000® storage servers, or IBM Storwize® storage servers. This IBM Redbooks® publication helps you to install, tailor, and configure IBM PowerHA SystemMirror for i to use with geographic mirroring and native storage. This publication provides you with planning information to prepare to use the various PowerHA offerings with geographic mirroring with IBM i native storage. It also provides implementation and management information. It provides guidance about troubleshooting these solutions and identifies the documentation that you need to capture before you call IBM Support. This book is part of a four-book set that gives you a complete understanding of PowerHA for i with native disk storage, IBM DS8000 storage servers, or IBM Storwize storage servers. The following IBM Redbooks publications are part of this PowerHA for i volume set: IBM PowerHA SystemMirror for i: Preparation, SG24-8400 IBM PowerHA SystemMirror for i: Using DS8000, SG24-8403 IBM PowerHA SystemMirror for i: Using IBM Storwize, SG24-8402 Important: The information that is presented in this volume set is for technical consultants, technical support staff, IT architects, and IT specialists who are responsible for providing HA and support for IBM i solutions. If you are new to HA, you need to first review the information that is presented in the first book of this volume set, IBM PowerHA SystemMirror for i: Preparation (Volume 1 of 4), SG24-8400, to obtain a general understanding of clustering technology, independent auxiliary storage pools (IASPs), and the PowerHA architecture.
    Note: "Volume 4 of 4.". - "This edition applies to Version 7, Release 2 of IBM PowerHA SystemMirror for i (product number 5770-HAS)."--Front matter. - "SG24840200"--Back cover. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed January 30, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Operating systems (Computers) ; Business enterprises ; Computer networks ; Management ; IBM computers ; Multiprocessors ; Electronic books ; Electronic books ; local
    Abstract: IBM® PowerHA® SystemMirror® for i is the IBM high-availability (HA), disk-based clustering solution for the IBM i operating system. When combined with IBM i clustering technology, PowerHA for i delivers a complete HA and disaster recovery (DR) solution for business applications running in an IBM i environment. You can use PowerHA for i to support HA capabilities with either native disk storage, IBM DS8000® storage servers, or IBM Storwize® storage servers. Use this IBM Redbooks® publication to help you install, tailor, and configure IBM PowerHA SystemMirror for i with the IBM Storwize storage servers. This publication provides you with planning information to prepare for using the various PowerHA offerings for the IBM Storwize storage family. It also provides implementation and managing information. Finally, it provides guidance on troubleshooting these solutions and identifies the documentation that you must capture before calling support. This book is part of a four-book volume set that gives you a complete understanding of PowerHA for i by using native disk storage, IBM DS8000 storage servers, or IBM Storwize storage servers. The following publications are part of this PowerHA for i volume set: IBM PowerHA SystemMirror for i: Preparation (Volume 1 of 4), SG24-8400 IBM PowerHA SystemMirror for i: Using DS8000 (Volume 2 of 4), SG24-8403 IBM PowerHA SystemMirror for i: Using Geographic Mirroring (Volume 4 of 4), SG24-8401 Important: The information that is presented in this volume set is for technical consultants, technical support staff, IT architects, and IT specialists who are responsible for providing HA and support for IBM i solutions. If you are new to HA, you should first review the information that is presented in the first book of this volume set, IBM PowerHA SystemMirror for i: Preparation (Volume 1 of 4), SG24-8400, to get a general understanding of clustering technology, independent auxiliary storage pools (IASPs), and the PowerHA architecture.
    Note: "Volume 3 of 4.". - Number on resource description page: SG24840200. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed June 22, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition (May 2016).
    Series Statement: IBM redbooks
    Keywords: IBM computers ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication describes the IBM zPDT® 2016 Sysplex Extensions, which is a package that consists of sample files and supporting documentation to help you get a functioning, data sharing, sysplex up and running with minimal time and effort. This package is designed and tested to be installed on top of a standard ADCD environment. It provides the extra files that you need to create a two-way data sharing IBM z/OS® 2.1 or z/OS 2.2 sysplex that runs under ADCD in a zPDT environment. This package differs from the previous zPDT sysplex package in that it provides working examples of more sysplex exploiters. It also is designed to adhere to IBM's sysplex best practice recommendations, in as far as is possible in a zPDT environment. Although the package was not tested with IBM Rational® Development and Test for IBM System z® (RD&T), it might be used to reduce the effort to create a fully functional sysplex under RD&T. Conceptually, the package might also be restored and used as a template to create a sysplex environment that is running on a real IBM z Systems™ CPC. The target audience for this document is system programmers that are responsible for designing, creating, and maintaining IBM Parallel Sysplex® environments. It can also be beneficial to developers that currently maintain their own ADCD environments and want to extend them to add sysplex functions.
    Note: Number on back cover: SG24-8315-01. - "This edition applies to the December 2015 Edition of Application Developers Controlled Distributions (ADCD).". - Includes bibliographical references. - Description based on online resource; title from title page (viewed June 7, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Computer systems ; Computer input-output equipment ; IBM computers ; Programming ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication helps you install, customize, and configure an IBM z13® and build z/OS® environments. This book is intended for those readers who are new to the platform and are faced with the task of installing a mainframe for the first time. By the term mainframe in this instance, we refer to the hardware and the system software. The intention is to show you how this installation can be done. Volume 1 shows you how we set up a mainframe and installed z/OS V2R2 and IBM DB2® V11. The starting point is a basic hardware configuration of an IBM z13 and DS8000® as shipped from the factory. Volume 1 shows you how the following milestones were achieved: Creating a configuration for the Customized Offering Driver (COD) system Stand-alone restoration of the COD Expanding the configuration Installing the z/OS V2R2 ServerPac Loading and running IVPs for z/OS ServerPac Installing DB2 ServerPac and IVPs This publication includes figures that show you how the initial builds were achieved. For this book, we designed a scenario and show you how to build that scenario step-by-step. Although your requirements likely differ from our scenario, we intend to provide you with an example to show you how it can be done and samples and downloadable materials that you can choose to modify to bring you closer to meeting your needs. This book is divided into the following parts: Part 1: Overview and Planning In this part, we introduce you to how we approached the project. Part 2: Configuration and builds In this part, we describe the tasks that must be completed to create the initial build for the scenario that is described in Part 1.
    Note: Number on resource description page: SG24832900. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed January 17, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Language: English
    Pages: 1 online resource (xvi, 534 pages) , illustrations.
    Edition: First edition (June 2016).
    Series Statement: IBM redbooks
    Keywords: IBM i ; Operating systems (Computers) ; Multiprocessors ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: IBM® PowerHA® SystemMirror® for i is the IBM high-availability (HA), disk-based clustering solution for the IBM i operating system. When PowerHA for i is combined with IBM i clustering technology, PowerHA for i delivers a complete HA and disaster-recovery (DR) solution for business applications that run in an IBM i environment. With PowerHA for i, you can support HA capabilities with either native disk storage, IBM DS8000® storage servers, or IBM Storwize® storage servers. This IBM Redbooks® publication helps you to install, tailor, and configure IBM PowerHA SystemMirror for i with the IBM System Storage® DS8000 series. This publication provides you with planning information to prepare to use the various PowerHA offerings for the IBM DS8000 family. It also provides implementation and management information. It provides guidance about troubleshooting these solutions and identifies the documentation and data that you need to capture before you call IBM Support. This book is part of a four-book volume set that gives you a complete understanding of PowerHA for i that uses native disk storage, IBM DS8000 storage servers, or IBM Storwize storage servers. The following IBM Redbooks publications are part of this PowerHA for i volume set: IBM PowerHA SystemMirror for i: Preparation, SG24-8400 IBM PowerHA SystemMirror for i: Using IBM Storwize, SG24-8402 IBM PowerHA SystemMirror for i: Using Geographic Mirroring, SG24-8401 Important: The information that is presented in this volume set is for technical consultants, technical support staff, IT architects, and IT specialists who are responsible for providing HA and support for IBM i solutions. If you are new to HA, review the information that is presented in the first book of this volume set, IBM PowerHA SystemMirror for i: Preparation (Volume 1 of 4), SG24-8400, to get a general understanding of clustering technology, independent auxiliary storage pools (IASPs), and the PowerHA architecture.
    Note: "This edition applies to Version 7, Release 2 of PowerHA SystemMirror for IBM i (product number 5770-HAS).". - "SG24-8403-00"--Back cover. - Includes bibliographical references (pages 519-520) and index. - Description based on online resource; title from cover (viewed June 22, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: z/VM ; Computer security ; Virtual computer systems ; Cloud computing ; Electronic books ; Electronic books ; local
    Abstract: As workloads are being offloaded to IBM® z Systems™ based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM® and Linux on z Systems. The audience for this book is IT architects and those planning to use z Systems for their cloud environments.
    Note: Number on resource description page: SG24835300. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed November 1, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: First edition (August 2016).
    Series Statement: IBM redbooks
    Keywords: IBM computers ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication provides all the messages that are associated with IBM System z® Personal Development Tool (IBM zPDT®) operation in a single reference source. This edition is intended for zPDT Version 1 Release 6 (commonly known as GA6), but should be useful for all zPDT releases.
    Note: "This edition applies to Version 1. Release 6 of the zPDT product"--Front matter. - "SG24-8103-00"--Back cover. - Includes bibliographical references. - Description based on online resource; title from cover (viewed September 14, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: AIX (Computer file) ; Linux ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication positions high availability solutions for IBM Power Systems™ with IBM PowerHA® SystemMirror® Standard and Enterprise Editions (hardware, software, best practices, reference architectures, migration, and tools) with a well-defined and documented deployment model within an IBM Power Systems environment allowing customers a planned foundation for a dynamic high available infrastructure for their enterprise applications. This Redbooks publication documents topics to leverage the strengths of IBM PowerHA SystemMirror Standard and Enterprise Editions 7.1.3 for IBM Power Systems to solve customers' application high availability challenges, and maximize systems' availability, and management. This Redbooks publication focuses on providing the readers with technical information and references on the capabilities of each edition, functionalities, usability, and features that make IBM PowerHA SystemMirror a premier solution for high availability and disaster recovery for IBM Power Systems servers. This Redbooks publication helps strengthen the position of the IBM PowerHA SystemMirror solution with a well-defined and documented best practices, usability, functionality, migration and deployment model within an IBM POWER® system virtualized environment allowing customers a planned foundation for business resilient infrastructure solutions. This Redbooks publication is targeted toward technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) responsible for providing high availability solutions and support with the IBM PowerHA SystemMirror on IBM POWER.
    Note: Numebr from resource description page: SG24-8234-00. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed February 25, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Third edition.
    Series Statement: IBM redbooks
    Keywords: Electronic data processing ; Batch processing ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication focuses on developing Web service applications in IBM CICS®. It takes the broad view of developing and modernizing CICS applications for XML, Web services, SOAP, and SOA support, and lays out a reference architecture for developing these kinds of applications. We start by discussing Web services in general, then review how CICS implements Web services. We offer an overview of different development approaches: bottom-up, top-down, and meet-in-the-middle. We then look at how you would go about exposing a CICS application as a Web service provider, again looking at the different approaches. The book then steps through the process of creating a CICS Web service requester. We follow this by looking at CICS application aggregation (including 3270 applications) with IBM Rational® Application Developer for IBM System z® and how to implement CICS Web Services using CICS Cloud technology. The first part is concluded with hints and tips to help you when implementing this technology. Part two of this publication provides performance figures for a basic Web service. We investigate some common variables and examine their effects on the performance of CICS as both a requester and provider of Web services.
    Note: Number on resource description page: SG24-7126-02. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed February 17, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Keywords: AIX (Computer file) ; Multiprocessors ; Operating systems (Computers) ; Fault-tolerant computing ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication for IBM Power Systems™ with IBM PowerHA® SystemMirror® Standard and Enterprise Editions (hardware, software, practices, reference architectures, and tools) documents a well-defined deployment model within an IBM Power Systems environment. It guides you through a planned foundation for a dynamic infrastructure for your enterprise applications. This information is for technical consultants, technical support staff, IT architects, and IT specialists who are responsible for providing high availability and support for the IBM PowerHA SystemMirror Standard and Enterprise Editions on IBM POWER® systems.
    Note: Number on resource descrition page: SG24-8167-00. - Includes bibligraphical references. - Description based on online resource; title from cover (Safari, viewed Oct. 29, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: IBM redbooks
    Keywords: Computer networks ; Management ; Software ; Computer network protocols ; Software ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: The importance of modern computer networks is steadily growing as increasing amounts of data are exchanged over company intranets and the Internet. Understanding current networking technologies and communication protocols that are available for the IBM® mainframe and System z® operating systems is essential for setting up your network infrastructure with IBM z/VSE®. This IBM Redbooks® publication helps you install, tailor, and configure new networking options for z/VSE that are available with TCP/IP for VSE/ESA, IPv6/VSE, and Fast Path to Linux on System z (Linux Fast Path). We put a strong focus on network security and describe how the new OpenSSL-based SSL runtime component can be used to enhance the security of your business. This IBM Redbooks publication extends the information that is provided in Security on IBM z/VSE, SG24-7691.
    Note: Number on resource description page: SG24-8091-01. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed January 27, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Fourth edition.
    Series Statement: IBM redbooks
    Keywords: IBM i ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication provides a technical overview of the features, functions, and enhancements available in IBM i 7.1, including all the Technology Refresh (TR) levels from TR1 to TR7. It provides a summary and brief explanation of the many capabilities and functions in the operating system. It also describes many of the licensed programs and application development tools that are associated with IBM i. The information provided in this book is useful for clients, IBM Business Partners, and IBM service professionals who are involved with planning, supporting, upgrading, and implementing IBM i 7.1 solutions.
    Note: Number on resource description page: SG24-7858-03. - Includes bibliographical references and index. - Description based on online resource; title from cover page (Safari, viewed January 22, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition.
    Series Statement: IBM redbooks
    Keywords: AIX (Computer file) ; Multiprocessors ; Operating systems (Computers) ; Fault-tolerant computing ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication can help you install, tailor, and configure the new IBM PowerHA® Version 7.1.3, and understand new and improved features such as migrations, cluster administration, and advanced topics like configuring in a virtualized environment including workload partitions (WPARs). With this book, you can gain a broad understanding of the IBM PowerHA SystemMirror® architecture. If you plan to install, migrate, or administer a high availability cluster, this book is right for you. This book can help IBM AIX® professionals who seek a comprehensive and task-oriented guide for developing the knowledge and skills required for PowerHA cluster design, implementation, and daily system administration. It provides a combination of theory and practical experience. This book is targeted toward technical professionals (consultants, technical support staff, IT architects, and IT specialists) who are responsible for providing high availability solutions and support with the IBM PowerHA SystemMirror Standard on IBM POWER® systems.
    Note: Number on resource descrition page: SG24-7739-01. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed November 17, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 4th ed.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Operating systems (Computers) ; IBM computers ; Programming ; Electronic books ; Electronic books ; local
    Abstract: The ABCs of IBM® z/OS® System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. Whether you want to become more familiar with z/OS in your current environment, or you are evaluating platforms to consolidate your online business applications, the ABCs collection will serve as a powerful technical tool. Volume 1 provides an updated understanding of the software and IBM zSeries architecture, and explains how it is used together with the z/OS operating system. This includes the main components of z/OS needed to customize and install the z/OS operating system. This edition has been significantly updated and revised. The other volumes contain the following content: Volume 2: z/OS implementation and daily maintenance, defining subsystems, IBM Job Entry Subsystem 2 (JES2) and JES3, link pack area (LPA), LNKLST, authorized libraries, System Modification Program/Extended (SMP/E), IBM Language Environment® Volume 3: Introduction to Data Facility Storage Management Subsystem (DFSMS), data set basics, storage management hardware and software, catalogs, and DFSMS Transactional Virtual Storage Access Method (VSAM), or DFSMStvs Volume 4: z/OS Communications Server, Transmission Control Protocol/Internet Protocol (TCP/IP), and IBM Virtual Telecommunications Access Method (IBM VTAM®) Volume 5: Base and IBM Parallel Sysplex®, z/OS System Logger, Resource Recovery Services (RRS), Global Resource Serialization (GRS), z/OS system operations, z/OS Automatic Restart Manager (ARM), IBM Geographically Dispersed Parallel Sysplex™ (IBM GDPS®) Volume 6: Introduction to security, IBM Resource Access Control Facility (IBM RACF®), Digital certificates and public key infrastructure (PKI), Kerberos, cryptography and IBM eServer™ z990 integrated cryptography, zSeries firewall technologies, Lightweight Directory Access Protocol (LDAP), and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and IBM DS8000® Volume 11: Capacity planning, IBM Performance Management, z...
    Note: Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Sept. 10, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Operating systems (Computers) ; IBM computers ; Programming ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication helps you install, configure, and use IBM z/OS® Management Facility (z/OSMF). z/OSMF is a product for z/OS that simplifies, optimizes, and modernizes the z/OS system programmer experience. z/OSMF delivers solutions in a task-oriented, web-browser-based user interface with integrated user assistance. The goal of z/OSMF is to improve system programmer productivity, and make functions easier to understand and use. This makes system programmers more productive as quickly as possible with the least amount of training. You can automate tasks, reduce the learning curve, and improve productivity through a modern, simplified, and intuitive task-based, browser-based interface. z/OSMF is aimed at a mixed skills workforce: It is suited to both professionals who are new to z/OS and those who are already skilled in z/OS. Each professional has their own needs and faces their own challenges. Novice system programmer might need to understand the "big picture" and how procedures are done. Novices need to get documentation on procedures and tasks, and implement them according to the rules of the enterprise. Experienced system programmers, conversely, have knowledge of tasks and procedures, so the goal is to make their work less error-prone and easier. This allows them to be more productive and contribute more to their business. z/OS has been delivering simplification since it was introduced, but z/OSMF brings a new dimension and focus to simplification. z/OSMF simplifies and modernizes the user experience and helps make pertinent information readily available and easily accessible.
    Note: Number on resource description page: SG24-7851-01. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed July 24, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Keywords: IBM Storewize ; Operating systems (Computers) ; Computer storage devices ; Virtual storage (Computer science) ; Virtual computer systems ; Electronic books ; local
    Abstract: The use of external storage and the benefits of virtualization became a topic of discussion in the IBM® i area during the last several years. The question tends to be, what are the advantages of the use of external storage that is attached to an IBM i environment as opposed to the use of internal storage. The use of IBM PowerVM® virtualization technology to virtualize Power server processors and memory also became common in IBM i environments. However, virtualized access to external storage and network resources by using a VIO server is still not widely used. This IBM Redbooks® publication gives a broad overview of the IBM Storwize® family products and their features and functions. It describes the setup that is required on the storage side and describes and positions the different options for attaching IBM Storwize family products to an IBM i environment. Basic setup and configuration of a VIO server specifically for the needs of an IBM i environment is also described. In addition, different configuration options for a combined setup of IBM PowerHA® SystemMirror® for i and the Storwize family products are described and positioned against each other. Detailed examples are provided for the setup process that is required for these environments. The information that is provided in this book is useful for clients, IBM Business Partners, and IBM service professionals who need to understand how to install and configure their IBM i environment with attachment to the Storwize family products.
    Note: Number on resource description page: SG24-8197-00. - Description based on online resource, title from cover page (Safari, viewed August 5, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Poughkeepsie, NY : IBM Corp., International Technical Support Organization]
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Keywords: Computer networks ; Computer security ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: The importance of modern computer networks is steadily growing as increasing amounts of data are exchanged over company intranets and the Internet. Understanding current networking technologies and communication protocols that are available for the IBM® mainframe and System z® operating systems is essential for setting up your network infrastructure with z/VSE®. This IBM Redbooks® publication helps you install, tailor, and configure new networking options for z/VSE that are available with TCP/IP for VSE/ESA, IPv6/VSE, and Fast Path to Linux on System z (Linux Fast Path). We put a strong focus on network security and describe how the new OpenSSL-based SSL runtime component can be used to enhance the security of your business. This IBM Redbooks publication extends the information that is provided in Security on IBM z/VSE, SG24-7691.
    Note: Number on resource description page: SG24-8091-00. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Feb. 24, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Series Statement: Redbooks
    Keywords: z/VM ; Client/server computing ; Virtual computer systems ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication describes how to roll your own Linux virtual servers on IBM System z® hardware under IBM z/VM®. It adopts a cookbook format that provides a concise, repeatable set of procedures for installing and configuring z/VM 6.3 into a single system image (SSI), then installing and customizing Linux. You need at least two IBM System z logical partitions (LPARs) with associated resources, z/VM 6.3 media, and either the Red Hat Enterprise Linux (RHEL) version 6.4 or the SUSE Linux Enterprise Server (SLES) version 11 SP3 distribution (or both). This book assumes that you have a general familiarity with System z technology and terminology. It does not assume an in-depth understanding of z/VM and Linux. It is written for those who want to get a quick start with z/VM and Linux on the mainframe, and to get some virtual servers up and running in a short amount of time (days, not weeks or months).
    Note: Number on back cover: SG24-8147-00. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Jan. 24, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Poughkeepsie, NY? : IBM Corp., International Technical Support Organization?]
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Series Statement: IBM Websphere
    Keywords: z/OS ; Operating systems (Computers) ; Client/server computing ; TCP/IP (Computer network protocol) ; Information storage and retrieval systems ; Electronic books ; Electronic books ; local
    Abstract: For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors in providing, among many other capabilities, world-class, state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for even more secure, scalable, and highly available mainframe TCP/IP implementations. The IBM z/OS Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance for enabling the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication is for people who install and support z/OS Communications Server. It introduces z/OS Communications Server TCP/IP, describes the system resolver, showing implementation of global and local settings for single and multi-stack environments. It presents implementation scenarios for TCP/IP base functions, connectivity, routing, virtual MAC support, and sysplex subplexing.
    Note: Number on resource description page: SG24-8096-00. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed Feb. 7, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Electronic data processing ; Batch processing ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Mainframe computers play a central role in the daily operations of many of the world's largest corporations. Batch processing is still a fundamental, mission-critical component of the workloads that run on the mainframe. A large portion of the workload on IBM® z/OS® systems is processed in batch mode. This IBM Redbooks® publication is the first volume in a series of four in which we specifically address new technologies introduced by IBM to facilitate the use of hybrid batch applications that combine the best aspects of Java and procedural programming languages such as COBOL. This volume specifically focuses on the latest support in CICS to run batch tasks. The audience for this book includes IT architects and application developers, with a focus on batch processing on the z/OS platform in a CICS environment.
    Note: Number on resource description page: SG24-7991-00. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed Jan. 29, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Poughkeepsie, N.Y.] : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Operating systems (Computers) ; Fraud investigation ; Fraud ; Protection ; Data mining ; Corporations ; Corrupt practices ; IBM computers ; Programming ; Electronic books ; Electronic books ; local
    Abstract: Payment fraud can be defined as an intentional deception or misrepresentation that is designed to result in an unauthorized benefit. Fraud schemes are becoming more complex and difficult to identify. It is estimated that industries lose nearly $1 trillion USD annually because of fraud. The ideal solution is where you avoid making fraudulent payments without slowing down legitimate payments. This solution requires that you adopt a comprehensive fraud business architecture that applies predictive analytics. This IBM® Redbooks® publication begins with the business process flows of several industries, such as banking, property/casualty insurance, and tax revenue, where payment fraud is a significant problem. This book then shows how to incorporate technological advancements that help you move from a post-payment to pre-payment fraud detection architecture. Subsequent chapters describe a solution that is specific to the banking industry that can be easily extrapolated to other industries. This book describes the benefits of doing fraud detection on IBM System z®. This book is intended for financial decisionmakers, consultants, and architects, in addition to IT administrators.
    Note: Number on back cover: SG24-8066-00. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Nov. 12, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Poughkeepsie, NY? : IBM Corp., International Technical Support Organization?]
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Keywords: Credit analysis ; IBM computers ; Operating systems (Computers) ; Risk management ; Credit scoring systems ; Electronic books ; Electronic books ; local
    Abstract: When ricocheting a solution that involves analytics, the mainframe might not be the first platform that comes to mind. However, the IBM® System z® group has developed some innovative solutions that include the well-respected mainframe benefits. This book describes a workshop that demonstrates the use of real-time advanced analytics for enhancing core banking decisions using a loan origination example. The workshop is a live hands-on experience of the entire process from analytics modeling to deployment of real-time scoring services for use on IBM z/OS®. In this IBM Redbooks® publication, we include a facilitator guide chapter as well as a participant guide chapter. The facilitator guide includes information about the preparation, such as the needed material, resources, and steps to set up and run this workshop. The participant guide shows step-by-step the tasks for a successful learning experience. The goal of the first hands-on exercise is to learn how to use IBM SPSS® Modeler for Analytics modeling. This provides the basis for the next exercise "Configuring risk assessment in SPSS Decision Management". In the third exercise, the participant experiences how real-time scoring can be implemented on a System z. This publication is written for consultants, IT architects, and IT administrators who want to become familiar with SPSS and analytics solutions on the System z.
    Note: Number on resource description page: SG24-8153-00. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed Feb. 7, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Series Statement: IBM redbooks
    Keywords: Linux ; z/OS ; z/VM ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful. This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to the network, and letting users have access to this formidable resource space in a secure, controlled, and auditable fashion to make sure the System z server and Linux are useful to your business. As the quotation illustrates, the book is also about ensuring that, before you start designing a security solution, you understand what the solution has to achieve. The base for a secure system is tightly related to the way the architecture and virtualization has been implemented on IBM System z. Since its inception 45 years ago, the architecture has been continuously developed to meet the increasing demands for a more secure and stable platform. This book is intended for system engineers and security administrators who want to customize a Linux on System z environment to meet strict security, audit, and control regulations. For additional information, there is a tech note that describes the best practices for securing your network. It can be found at: http://www.redbooks.ibm.com/abstracts/tips0981.html?Open
    Note: Number on resource description page: SG24-7728-01. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Jan. 30, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Poghkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 3rd ed.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: IBM® Problem Determination (PD) Tools consists of a core group of IBM products that are designed to work with compilers and run times to provide a start-to-finish development solution for the IT professional. This IBM Redbooks® publication provides you with an introduction to the tools, guidance for program preparation to use with them, an overview of their integration, and several scenarios for their use. If an abend occurs during testing, Fault Analyzer enables the programmer to quickly and easily pinpoint the abending location and optionally, the failing line of code. Many times, this information is all the programmer requires to correct the problem. However, it might be necessary to delve a little deeper into the code to figure out the problem. Debug Tool allows the programmer to step through the code at whatever level is required to determine where the error was introduced or encountered. After the code or data is corrected, the same process is followed again until no errors are encountered. However, volume testing or testing with multiple terminals is sometimes required to ensure real-world reliability. Workload Simulator can be used to perform this type of testing. After all of the tests are completed, running the application by using Application Performance Analyzer can ensure that no performance bottlenecks are encountered. It also provides a baseline to ensure that future enhancements do not introduce new performance degradation into the application. This publication is intended for z/OS® application developers and system programmers.
    Note: Number from resource description page: SG24-7918-02. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed Jan. 29, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 3rd ed.
    Series Statement: IBM redbooks
    Keywords: Operating systems (Computers) ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication introduces a technical overview of the new features, functions, and enhancements available in IBM i 7.1. It provides a summary and brief explanation of new capabilities and what changed in the operating system. This publication also describes many of the licensed programs and application development tools that are associated with IBM i. This publication includes all the enhancements that were delivered with the Technology Refresh 4 and 5 that were made available in 2012. Many new and enhanced functions are described: IBM DB2® for i support for XML and column level encryption IBM PowerHA® for i asynchronous Geographic Mirroring and LUN-level switching Virtualization enhancements for IBM i hosted partitions and IBM PowerVM® Storage management enhancements for solid-state drives Systems management enhancements for Systems Director Navigator for i IBM Rational® software development product enhancements Zend PHP Enhancements Web Application Serving enhancements The information that is provided in this book is useful for clients, IBM Business Partners, and IBM service professionals that are involved with planning, supporting, upgrading, and implementing IBM i 7.1 solutions.
    Note: Number on resource description page: SG24-7858-02. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Jan. 30, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Oracle (Computer file) ; Relational databases ; Database management ; Database design ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Linux on System z offers many advantages to customers who rely on the IBM® mainframe systems to run their businesses. Linux on System z makes use of the qualities of service in the System z® hardware and in z/VM®, making it a robust industrial strength Linux. This provides an excellent platform for hosting Oracle solutions that run in your enterprise. This IBM Redbooks® publication is divided into several sections to share the following experiences that are gained while Oracle Database 11gR2 is installed and tested: Setting up Red Hat Enterprise Linux 6 for Oracle Managing an Oracle on Linux on System z environment Provisioning Linux guests using several tools It also includes many general hints and tips for running Oracle products on IBM System z with Linux and z/VM. Interested readers include database consultants, installers, administrators, and system programmers. This book is not meant to replace Oracle documentation but to supplement it with our experiences while Oracle products are installed and used. Please note that the additional material referenced in the text is not available from IBM.
    Note: Number from resource description page: SG24-8104-00. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed December 18, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Linux ; Operating systems (Computers) ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication describes the usage of Coupling Facility (CF) functions with the IBM System z® Personal Development Tool (zPDT). It describes the System z Coupling Application Developer Controlled Distribution, which is a Parallel Sysplex® "starter system" based on the AD-CD package and lists the exact steps taken to turn the normal AD-CD z/OS® system into a Parallel Sysplex base. This document assumes that the reader is familiar with basic zPDT usage and terminology, with z/OS, with the z/OS AD-CD system, with basic z/VM® usage, and with general Parallel Sysplex concepts. It is not intended as an introduction to any of these topics. This version of the document is based on z/VM 6.2 (as available to authorized users in an AD-CD package) and z/OS 1.13 (as available to authorized users in the January 2013 update of the AD-CD package).
    Note: Number on resource description page: SG24-7859-02. - Includes bibliographical references. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Poughkeepsie, NY : IBM Corp., International Technical Support Organization]
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Series Statement: IBM redbooks
    Keywords: IBM Power systems ; AIX (Computer file) ; Operating systems (Computers) ; Multiprocessors ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication positions the IBM PowerHA® SystemMirror® V6.1 for AIX® Enterprise Edition as the cluster management solution for high availability. This solution enables near-continuous application service and minimizes the impact of planned and unplanned outages. The primary goal of this high-availability solution is to recover operations at a remote location after a system or data center failure, establish or strengthen a business recovery plan, and provide separate recovery location. The IBM PowerHA SystemMirror Enterprise Edition is targeted at multisite high-availability disaster recovery. The objective of this book is to help new and existing PowerHA customers to understand how to plan to accomplish a successful installation and configuration of the PowerHA SystemMirror for AIX Enterprise Edition. This book emphasizes the IBM Power Systems™ strategy to deliver more advanced functional capabilities for business resiliency and to enhance product usability and robustness through deep integration with AIX, affiliated software stack, and storage technologies. PowerHA SystemMirror is designed, developed, integrated, tested, and supported by IBM from top to bottom.
    Note: Number on resource description page: SG24-7841-01. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Apr. 8, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 5th ed.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: The ABCs of z/OS System Programming is an 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. If you would like to become more familiar with z/OS in your current environment, or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection will serve as a powerful technical tool. The contents of the volumes are as follows: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, SMP/E, Language Environment Volume 3: Introduction to DFSMS, data set basics storage management hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and VTAM Volume 5: Base and Parallel Sysplex, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), Geographically Dispersed Parallel Sysplex (GDPS) Volume 6: Introduction to security, RACF, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise identity mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to z/Architecture, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC Volume 11: Capacity planning, performance management, RMF, and SMF Volume 12: WLM Volume 13: JES3
    Note: Number on resource description page: SG24-6990-04. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed Jan. 31, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Series Statement: IBM Redbooks
    Keywords: z/OS ; Operating systems (Computers) ; Systems programming (Computer science) ; Electronic books ; Electronic books ; local
    Abstract: A major goal of operating systems is to process jobs while making the best use of system resources. Thus, one way of viewing operating systems is as resource managers. Before job processing, operating systems reserve input and output resources for jobs. During job processing, operating systems manage resources such as processors and storage. After job processing, operating systems free all resources used by the completed jobs, making the resources available to other jobs. This process is called resource management. There is more to the processing of jobs than the managing of resources needed by the jobs. At any instant, a number of jobs can be in various stages of preparation, processing, and post-processing activity. To use resources efficiently, operating systems divide jobs into parts. They distribute the parts of jobs to queues to wait for needed resources. Keeping track of where things are and routing work from queue to queue is called workflow management, and is a major function of any operating system. JES3 considers job priorities, device and processor alternatives, and installation-specified preferences in preparing jobs for processing job output. This IBM® Redbooks® publication describes a JES3 environment that includes the following: - Single-system image - Workload balancing - Availability - Control flexibility - Physical planning flexibility.
    Note: Number on resource description page: SG24-7717-01. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Jan. 21, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Language: English
    Pages: 1 online resource (704 p.) , ill.
    Series Statement: IBM redbooks
    Parallel Title: Erscheint auch als
    Keywords: AIX (Computer file) ; Operating systems (Computers) ; Multiprocessors ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication helps you install, tailor, and configure the new IBM PowerHA® SystemMirror® for AIX® 7.1.1 Standard Edition. This book gives an understanding of the Cluster Aware AIX (CAA). This book helps you design a solution to migrate from the previous version of the IBM PowerHA. This IBM Redbooks publication is targeted toward technical professionals (consultants, technical support staff, IT architects, and IT specialists) responsible for providing continuous availability solutions and support.
    Note: Number on back cover: SG24-8030-00. - Includes bibliographical references (p. 703). - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Systems programming (Computer science) ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: The ABCs of IBM® z/OS® System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information you need to start your research into z/OS and related subjects. If you would like to become more familiar with z/OS in your current environment, or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection serves as a powerful technical tool. . This IBM Redbooks® publication, Volume 8, shows you how to: - Adopt a systematic and thorough approach to dealing with problems and identifying the different types of problems - Determine where to look for diagnostic information and how to obtain it - Interpret and analyze the diagnostic data collected - Escalate problems to the IBM Support Center when necessary - Collect and analyze diagnostic data-a dynamic and complex process - Identify and document problems, collect and analyze pertinent diagnostic data and obtain help as needed, to speed you on your way to problem resolution The content of the volumes is as follows Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, SMP/E, Language Environment® Volume 3: Introduction to DFSMS, data set basics storage management hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and VTAM® Volume 5: Base and Parallel Sysplex® , System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), Geographically Dispersed Parallel Sysplex™ (GDPS® ) Volume 6: Introduction to security, RACF, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries® firewall technologies, LDAP, and Enterprise identity mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint® Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to z/Architecture™ , zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC Volume 11: Capacity planning, performance management, WLM, RMF™ , and SMF
    Note: Number on resource description page: SG24-6988-01. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Jan. 30, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 6th ed.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: The ABCs of z/OS System Programming is an 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. If you would like to become more familiar with z/OS in your current environment, or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection will serve as a powerful technical tool. The contents of the volumes are as follows: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, SMP/E, Language Environment Volume 3: Introduction to DFSMS, data set basics storage management hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and VTAM Volume 5: Base and Parallel Sysplex, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), Geographically Dispersed Parallel Sysplex (GDPS) Volume 6: Introduction to security, RACF, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise identity mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to z/Architecture, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC Volume 11: Capacity planning, performance management, WLM, RMF, and SMF Volume 12: WLM Volume 13: JES3
    Note: Number from resource description page: SG24-6989-05. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed Feb. 3, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Third edition :
    Series Statement: IBM redbooks
    Keywords: z/OS ; Operating systems (Computers) ; Client/server computing ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication provides students of information systems technology with the background knowledge and skills necessary to begin using the basic facilities of a mainframe computer. It is the first in a planned series of book designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate. This book can also be used as a prerequisite for courses in advanced topics or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation or a reference book that discusses every feature and option of the mainframe facilities. Others who will benefit from this book include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment.
    Note: Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed January 8, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 3rd ed.
    Series Statement: IBM redbooks
    Keywords: Computer security ; Electronic books ; Electronic books ; local
    Abstract: One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data has to be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE™ system has extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent-they could have been using resources without the business even being aware that they are there. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.
    Note: Number on resource description page: SG24-7691-02. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed Feb. 3, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Computer security ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions-they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company's sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators. This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.
    Note: Number on resource description page: SG24-7633-01. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed Feb. 3, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Poughkeepsie, N.Y.] : IBM, International Technical Support Organization
    Language: English
    Pages: 1 online resource (xiv, 238 p.) , ill.
    Series Statement: IBM redbooks
    Keywords: IBM System z ; Operating systems (Computers) ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: You may have several triggers to investigate the feasibility of moving a workload or set of workloads to the IBM® System z® platform. These triggers could be concerns about operational cost, manageability, or delivering the agreed service levels, among others. Investigating the feasibility of a possible migration or transition to any other platform, including System z, requires a number of basic steps. These steps usually start with an understanding of the current workload and its pain points, and end with a business case to move the workload. It is important to find out how easy a migration is going to be and how much risk will be involved. In this IBM Redbooks® publication we offer thoughts on how to move through these steps. We also include a chapter with a System z technology summary to help you understand how a migrated workload may fit on the platform. Our focus in this book is on workloads that are mission-critical and require a high level of availability, including disaster recovery.
    Note: Description based on resource description page (viewed Jan. 13, 2012). - "SG24-7824-00"--P. [4] of cover. - Includes bibliographical references (p. 233-234) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Poughkeepsie, N.Y. : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 3rd ed.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Operating systems (Computers) ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: The ABCs of z/OS® System Programming is an eleven-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information you need to start your research into z/OS and related subjects. If you would like to become more familiar with z/OS in your current environment, or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection will serve as a powerful learning tool. The contents of the volumes are: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, Language Environment®, and SMP/E Volume 3: Introduction to DFSMS, data set basics, storage management hardware and software, VSAM, System-Managed Storage, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP and VTAM® Volume 5: Base and Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, Automatic Restart Management (ARM), Geographically Dispersed Parallel Sysplex™ (GPDS), availability in the zSeries® environment Volume 6: Introduction to security, RACF®, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, Enterprise identity mapping (EIM), and firewall technologies Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX® System Services Volume 10: Introduction to z/Architecture®, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC Volume 11: Capacity planning, performance management, RMF, and SMF Volume 12: WLM Volume 13: JES3
    Note: Number on resource description page: SG24-6985-02. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Feb. 7, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Poughkeepsie, N.Y.] : IBM, International Technical Support Organization
    Language: English
    Pages: 1 online resource (xviii, 430 p.) , ill.
    Series Statement: IBM redbooks
    Keywords: AIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication focuses on the enhancements to IBM AIX® Version 7.1 Standard Edition. It is intended to help system administrators, developers, and users understand these enhancements and evaluate potential benefits in their own environments. AIX Version 7.1 introduces many new features, including: - Domain Role Based Access Control - Workload Partition enhancements - Topas performance tool enhancements - Terabyte segment support - Cluster Aware AIX functionality AIX Version 7.1 offers many other new enhancements, and you can explore them all in this publication. For clients who are not familiar with the enhancements of AIX through Version 5.3, a companion publication, AIX Version 6.1 Differences Guide, SG24-7559, is available.
    Note: Description based on resource description page (viewed Mar. 24, 2011). - "SG24-7910-00"--P. [4] of cover. - Includes bibliographical references (p. 411-415) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition.
    Series Statement: IBM redbooks
    Keywords: Computer storage devices ; Computer input-output equipment ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication consolidates, in one document, detailed descriptions of the hardware configurations and options offered as part of the IBM Midrange System Storage™ servers, which include the IBM System Storage DS4000® and DS5000 families of products. This edition covers updates and additional functions available with the IBM System Storage DS® Storage Manager Version 10.60 (firmware level 7.60). This book presents the concepts and functions used in planning and managing the storage servers, such as multipathing and path failover. The book offers a step-by-step guide to using the Storage Manager to create arrays, logical drives, and other basic (as well as advanced) management tasks. This publication also contains practical information about diagnostics and troubleshooting, and includes practical examples of how to use scripts and the command-line interface. This publication is intended for customers, IBM Business Partners, and IBM technical professionals who want to learn more about the capabilities and advanced functions of the DS4000 series of storage servers with Storage Manager Software V10.60. It also targets those who have a DS4000 and DS5000 storage subsystem and need detailed advice about how to configure it.
    Note: Number on resource description page: SG24767601. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed February 14, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Keywords: z/OS ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: The ABCs of IBM® z/OS® System Programming is an 11-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. If you want to become more familiar with z/OS in your current environment or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection can serve as a powerful technical tool. Following are the contents of the volumes: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, IBM Language Environment®, and SMP/E Volume 3: Introduction to DFSMS, data set basics, storage management hardware and software, VSAM, System-managed storage, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), and IBM Geographically Dispersed Parallel Sysplex™ (IBM GDPS®) Volume 6: Introduction to security, IBM RACF®, digital certificates and public key infrastructure (PKI), Kerberos, cryptography and IBM z9® integrated cryptography, Lightweight Directory Access Protocol (LDAP), and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, IBM System z® processor design, System z connectivity, logical partition (LPAR) concepts, hardware configuration definition (HCD), and Hardware Management Console (HMC) Volume 11: Capacity planning, performance management, Workload Manager (WLM), IBM Resource Measurement Facility™ (RMF™), and System Management Facilities (SMF)
    Note: Number on resource description page: SG24-6986-01. - Description based on online resource; title from cover (Safari, viewed Aug. 27, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xv, 362 p. , ill. ; , 23 cm
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: What better way to learn something than from the inside? Novell Linux Desktop 9 Administrator's Handbook brings you inside the system and inside the only Novell authorized administrator's handbook for the new Novell Linux Desktop (NLD). Learn how NLD interacts with other Novell components and how to integrate security throughout the operating system. You'll also cover: Working with graphical interfaces, devices and file systems How to boot, initialize, shutdown and run levels Linux administration With the help of Novell Linux Desktop 9 Administrator's Handbook , you will master the administration of Novell Linux Desktop 9 systems.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: "When it comes to software security, the devil is in the details. This book tackles the details." --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies "McGraw's book shows you how to make the 'culture of security' part of your development lifecycle." --Howard A. Schmidt, Former White House Cyber Security Advisor "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the lunchroom wall." --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book's methods without radically changing the way you work. Inside you'll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development lifecycle with the touchpoints described in this book. Let this expert author show you how to build more secure software by building security in.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xix, 530 p. , ill. ; , 23 cm
    Edition: [2nd ed.].
    DDC: 005.432
    Keywords: Mac OS ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: As Unix spreads its tentacles across users' desktops, more and more Mac users are starting to pop the hood and learn about the operating system that's at the root of it all. And there's no better way to conquer that fear than by consulting this Visual QuickPro Guide. Matisse Enzer , who wrote the first edition of this book, Unix for Mac OS X: Visual QuickPro Guide has completely updated this guide to reflect all that's new in Tiger's version of Unix. Readers will learn everything they need to know to make sense of the commands and technical jargon surrounding Unix. In the process they'll find out about useful utilities, editing and printing files, security, and more--all through simple, step-by-step instructions that break the learning process into manageable chunks. Throughout, users will find plenty of the tips and visual references that have become the hallmark of Peachpit's popular Visual QuickPro Guides. Unix for Mac OS X 10.4: Visual QuickPro Guide is perfect for any Mac user interested in learning about the Unix operating system.
    Note: Includes index. - Previous ed.: 2003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Language: English
    Pages: 1 online resource (xxiv, 1320 p.) , ill.
    Series Statement: IBM redbooks
    Parallel Title: Erscheint auch als
    Keywords: z/OS ; Operating systems (Computers) ; Application software ; Development ; File organization (Computer science) ; Electronic books ; Electronic books ; local
    Abstract: This IBM Redbooks publication introduces the IBM Problem Determination and Deployment Tools for z/OS and OS/390. The tools covered are: -〉 IBM Application Performance Analyzer for z/OS Version 1 Release 1 -〉 IBM Debug Tool for z/OS Version 6 Release 1 -〉 IBM Debug Tool and Advanced Facilities for z/OS Version 6 Release 1 -〉 IBM Fault Analyzer for z/OS Version 6 Release 1 -〉 IBM File Manager for z/OS Version 6 Release 1 -〉 IBM File Export for z/OS Version 1 Release 1 -〉 IBM Workload Simulator for z/OS and OS/390 Version 1 Release 1 This comprehensive suite of powerful yet easy-to-use tools helps developers to efficiently build, test, and service applications while minimizing errors and increasing cost-effectiveness. The tools allow users to quickly identify and resolve problems that occur in batch, IMS, DB2, CICS, and UNIX System Services applications. For each tool, this book provides step-by-step instructions for installation and customization, a detailed discussion of the features and capabilities, and guidance for using the tool in your environment.
    Note: "SG24-7192-00.". - Includes bibliographical references (1311-1313) and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xiii, 435 p. , ill. ; , 23 cm. +
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Novell Linux Desktop 9 User's Handbook is the official handbook to help you take control of you Novell Linux Desktop. Walk through the new Novell Linux interfaces as you learn how to use them, interact with the operating system, create files and more. Cover everything that you need to know to effectively and efficiently use the new desktop and quickly get up to speed on the latest technology from Novell with Novell Linux Desktop 9 User's Handbook .
    Note: Accompanied by Supplemental DVD. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Upper Saddle River, NJ. ; : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 480 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.4469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Praise for Marcel Gagné's Moving to Linux: Kiss the Blue Screen of Death Goodbye! "This is kind of a funny book for me to be recommending to readers of a Windows newsletter, but a lot of people ask me about this topic, so here goes. Author Marcel Gagné is a columnist for Linux Journal , and in Moving to Linux he's prepared a step-by-step guide to converting a Windows PC to Linux-or just trying it! The book includes a bootable CD with a version of Linux that you can poke around in without touching or changing anything about your Windows installation. If your boss is asking, 'What's with this Linux stuff?', moving to Linux is a great way to show that you know what you're talking about." -Brian Livingston, Editor, WindowsSecrets.com "Pros: Too many to list in the available space. We liked the book from the very first page right through to the end. Gagné has done a solid job of exposing Linux and all its components in a way that is both inviting, useful, and easy to understand . . . We really liked this book-highly recommended." -Howard Carson, Kickstart News, www.kickstartnews.com "Marcel walks the user through each technique in a very chatty and comfortable style. In fact, when I put the book down, I had a momentary impression that I'd just finished watching a good cooking show with an entertaining chef. (Australian readers may understand if I say that it felt like having just watched Ian Parmenter do an episode of 'Consuming Passions.')" -Jenn Vesperman, Linuxchix.org "Gagné's Moving to Linux is a straightforward exposition of just how a non-hacker PC user can get rid of 'The Blue Screen of Death'. If you have a friend, a co-worker, a significant other, or a relative who periodically screams, sighs, bursts into tears, or asks for help, here's the simple solution. It comes with a bootable CD of Knoppix, Klaus Knopper's variant of Debian." -Peter H. Salus, writing in ;login: The Usenix Magazine "This is a book aimed not at you, dear developer/techie/guru, but at your friends, acquaintances, and family who are lowly users of Windows. Yes, such people do exist even in the tightest of families. Fear not, however, because salvation is at hand should any of them decide that this Linux thing might be worth investigating. No longer will you be faced with the unenviable task of walking them through the process of switching OS. Moving to Linux: Kiss the Blue Screen of Death Goodbye! is a big, bold, and friendly guide to help them along. The emphasis i...
    Note: Disc in pocket attached to inside back cover. - Includes index. - Previous ed.: Boston, Mass. : Addison-Wesley, 2004
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Note: Includes bibliographical references (p. [389]-395) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Electronic books ; local
    Abstract: The Definitive Guide to Protecting Enterprise Data Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecycle Management , leading industry consultant Tom Petrocelli presents a systematic, coherent approach to planning and implementing cost-effective data protection. This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy. Coverage includes A complete, unique framework for considering and planning data protection Understanding storage technology from the standpoint of data protection Architecting more effective backup/restore solutions Using remote copy and replication to keep data synchronized and support immediate failover to hot sites Leveraging core computer security concepts and strategies to protect your most critical data Securing your entire storage infrastructure, not just servers Using policy-driven data protection and Data Lifecycle Management (DLM) to improve security and reduce cost Using ILM to identify your highest-value data and choose the right ways to protect it Data Protection and Information Lifecycle Management is an indispensable resource for IT executives who must plan and implement strategies for data protection; administrators who must protect data on a day-to-day basis; and product managers, consultants, and marketers responsible for crafting superior data-security solutions.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Harlow : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 347 p. , ill. ; , 24 cm. +
    DDC: 005.8
    Keywords: Business enterprises ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Praise for J.C. Cannon's Privacy "A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between." -Peter Wayner, author of Translucent Databases "Cannon provides an invaluable map to guide developers through the dark forest created by the collision of cutting-edge software development and personal privacy." -Eric Fredericksen, Sr. Software Engineer, PhD., Foundstone, Inc. "Cannon's book is the most comprehensive work today on privacy for managers and developers. I cannot name any technical areas not covered. No practitioners should miss it." -Ray Lai, Principal Engineer, Sun Microsystems, Inc., co-author of Core Security Patterns and author of J2EE Platform Web Services "Every developer should care deeply about privacy and this is the best book I've read on the subject. Get it, read it, and live it." -Keith Ballinger, Program Manager, Advanced Web Services, Microsoft "J.C. Cannon's book demonstrates that information and communication technology can contribute in a significant way to restoring individual privacy and raises more awareness of the complexity and importance of this societal problem." -Dr. John J. Borking, Former Commissioner and Vice-President of the Dutch Data Protection Authority "If you are planning, implementing, coding, or managing a Privacy campaign in your company or your personal computing, there is no more relevant reference. J.C. Cannon nails the issues." -Rick Kingslan, CISSP, Microsoft MVP-Windows Server: Directory Services and Right Management, West Corporation "It's often been said that security is a process, not a product. Privacy is no different! Unlike other privacy books, J.C. Cannon's book has something valuable to convey to everyone involved in the privacy process, from executives to designers and developers, many of whom aren't thinking about privacy but should be." -Keith Brown, Co-founder of Pluralsight and author of The .NET Developer's Guide to Windows Security and Programming Windows Security "J.C. Cannon's new book on electronic privacy is an important addition to the available works in this emerging field of study and practice. Through many humorous (and occasionally frightening) examples of privacy gone wrong, J.C. helps you better understand how to protect your privacy and how to build privacy awareness into your organization and its development process. Keenly illustrating both the pros and cons of various privacy-e...
    Note: Includes bibliographical references (p. 319-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Language: English
    Pages: xxviii, 683 p. , ill. ; , 25 cm
    DDC: 005.3
    Keywords: FreeBSD ; Free computer software ; Operating systems (Computers) ; Electronic books ; local
    Abstract: As in earlier Addison-Wesley books on the UNIX-based BSD operating system, Kirk McKusick and George Neville-Neil deliver here the most comprehensive, up-to-date, and authoritative technical information on the internal structure of open source FreeBSD. Readers involved in technical and sales support can learn the capabilities and limitations of the system; applications developers can learn effectively and efficiently how to interface to the system; system administrators can learn how to maintain, tune, and configure the system; and systems programmers can learn how to extend, enhance, and interface to the system. The authors provide a concise overview of FreeBSD's design and implementation. Then, while explaining key design decisions, they detail the concepts, data structures, and algorithms used in implementing the systems facilities. As a result, readers can use this book as both a practical reference and an in-depth study of a contemporary, portable, open source operating system. This book: Details the many performance improvements in the virtual memory system Describes the new symmetric multiprocessor support Includes new sections on threads and their scheduling Introduces the new jail facility to ease the hosting of multiple domains Updates information on networking and interprocess communication Already widely used for Internet services and firewalls, high-availability servers, and general timesharing systems, the lean quality of FreeBSD also suits the growing area of embedded systems. Unlike Linux, FreeBSD does not require users to publicize any changes they make to the source code.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit ; | Boston, MA :Safari,
    Language: English
    Pages: 703 p. ; , 23 cm
    DDC: 005.446
    Keywords: Mac OS ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: So you're finally ready to find out what all the fuss is about. Whether you're switching from Windows or upgrading from an older Mac OS, this task-based guide represents the surest way to go from 0 to 60 in no time flat with Apple's much anticipated Mac OS X Tiger--more mature, powerfully enhanced, and with more than 200 new features that will knock your socks off. In this thoroughly revised bestseller, Maria Langer walks readers through the process of installing and configuring Tiger, then introduces the Mac OS desktop, including the Dock and the Sidebar, before moving on to more advanced Finder techniques, application basics, printing and faxing, connecting to the Internet, account management, configuring your Mac for multiple users, and more. Weighing in at over 700 pages, this new edition also offers plenty of coverage on what's new in Mac OS X Tiger, including Spotlight, the search tool that helps you find anything on your Mac instantly; multi-way video in iChat AV; the enhanced Mail application; Automator, which lets you automate repetitive manual tasks; Tiger's ultra-useful mini-applications (known as "Dashboard Widgets"); and more. Rounded out with plenty of tips, tricks, and sage advice, this book is equally useful for Macintosh novices as well as early adopters looking for a comprehensive reference on what's new in this much-talked-about Mac OS upgrade.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 1142 p. , ill. ; , 24 cm
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!" James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker Jamesaccusource.net "Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003." Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com "Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security." Bob Reinsch bob.reinsch@fosstraining.com " Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information." Richard Siddaway, MCSE rsiddaw@hotmail.com "Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security." Michael VonTungeln, MCSE, CTT mvontung@yahoo.com "I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it. Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all." Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net "R...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: "It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding." --Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible." --Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight. "Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine. "Understanding the ultimate attacker's tool provides ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 747 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company. Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. This shorter version of the original work omits much mathematical formalism, making it more accessible for professionals and students who have a less formal mathematical background, or for readers with a more practical than theoretical interest.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xiii, 333 p. , col. ill. ; , 19 x 23 cm
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Get the fast facts that make learning Windows XP plain and simple! Fully updated for the latest service packs, technologies, and security updates, this colorful, no-nonsense guide shows the most expedient way to learn a skill or solve a problem.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xvi, 401 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Keywords: Operating systems (Computers) ; Electronic books ; local
    Abstract: "Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their coding. The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces. It covers the Linux kernel from both angles, theoretical and applied, which should appeal to readers with a variety of interests and needs."--BOOK JACKET.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 180 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Is there any sexier topic in software development than software testing? That is, besides game programming, 3D graphics, audio, high-performance clustering, cool websites, et cetera? Okay, so software testing is low on the list. And that's unfortunate, because good software testing can increase your productivity, improve your designs, raise your quality, ease your maintenance burdens, and help to satisfy your customers, coworkers, and managers. Perl has a strong history of automated tests. A very early release of Perl 1.0 included a comprehensive test suite, and it's only improved from there. Learning how Perl's test tools work and how to put them together to solve all sorts of previously intractable problems can make you a better programmer in general. Besides, it's easy to use the Perl tools described to handle all sorts of testing problems that you may encounter, even in other languages. Like all titles in O'Reilly's Developer's Notebook series, this "all lab, no lecture" book skips the boring prose and focuses instead on a series of exercises that speak to you instead of at you. Perl Testing: A Developer's Notebook will help you dive right in and: Write basic Perl tests with ease and interpret the results Apply special techniques and modules to improve your tests Bundle test suites along with projects Test databases and their data Test websites and web projects Use the "Test Anything Protocol" which tests projects written in languages other than Perl With today's increased workloads and short development cycles, unit tests are more vital to building robust, high-quality software than ever before. Once mastered, these lessons will help you ensure low-level code correctness, reduce software development cycle time, and ease maintenance burdens. You don't have to be a die-hard free and open source software developer who lives, breathes, and dreams Perl to use this book. You just have to want to do your job a little bit better.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Language: English
    Pages: xvii, 663 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Series Statement: In a nutshell
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Windows XP in a Nutshell , Second Edition documents everything there is to know about the world's most widely used operating system. Updated to include information on Service Pack 2 (SP2), this compact guide is the ultimate resource for IT professionals and Windows XP power users everywhere. Written in O'Reilly's time-tested in a Nutshell format, Windows XP in a Nutshell , Second Edition cuts through the hype and delivers practical details in a no-nonsense manner. At the heart of the book is an invaluable 200-plus-page section titled Windows XP Application and Tools. In it, readers will find: A list of available commands and utilities, including Start Menu accessories, command prompt tools, and hidden system administration utilities A Task and Setting Index for quick access to hundreds of XP settings A complete reference to XP's command prompt, including advanced commands and scripting features Windows XP in a Nutshell , Second Edition also includes a primer on files, folders, and windows; control panels and built-in applications; how to set up a PC for Internet use; and the standard Windows rituals of troubleshooting, installation, and upgrading. And, of course, this greatly expanded second edition also includes all the need-to-know details about the security technologies featured in SP 2, so you can better defend yourself against viruses, worms, and hackers. Readers even receive guidelines and instructions for installing SP2 on their PC, or across a network of computers. With its wealth of tips, careful instruction, and expert advice, this must-have desktop reference is dedicated to making your time at the computer safer, easier, and more fun.
    Note: "Covers Service Pack 2"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xii, 177 p. , ill. ; , 26 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer security ; Computers ; Access control ; Data protection ; Identity theft ; Electronic books ; local
    Abstract: From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances shows you how to regain control of your life. You'll learn how to keep private information private, stop nosy bosses, get off that incredibly annoying mailing list, and more. Unless you know what data is available about you and how to protect it, you're a sitting duck. Computer Privacy Annoyances is your guide to a safer, saner, and more private life. Written by privacy pro Dan Tynan, and based on interviews with privacy experts from all over the globe, Computer Privacy Annoyances serves up real-world advice in bite-sized portions that will help you stop the snoops in their tracks. The book even addresses non-computing threats, from telemarketer-cum-stalkers, thieves at your mailbox, nosy folks in your HR department, cell phone eavesdroppers, and more. The key areas covered include: Privacy at Home Privacy on the Net Privacy at Work Privacy in Public Privacy and Uncle Sam Privacy in the Future Daniel Tynan has written about Internet privacy and security for nearly a decade. His work has appeared in more than 40 national publications. As executive editor at PC World , Tynan edited a special issue on Internet Privacy that won a Grand Neal Award and was a finalist for a National Magazine Award. He has won more than a dozen other honors, including nine Neals, four Maggies, and two Computer Press Association Awards.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 478 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.
    Note: "A system administrator's guide to hetrogeneous networking"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Sebastopol, CA : Pogue Press/O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxi, 359 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Windows XP can be a great tool, but it is all too easy to trip over Windows XP's annoying traits more often than you leverage its productivity. Windows XP power-users troll online resources, documentation, and the expertise (or lucky finds) of friends for valuable tips and tricks--a keyboard shortcut here, an undocumented double-click there--to eliminate annoyances, save time, and take control of their Windows XP. But what if there was an easier way?This new book presents literally hundreds of problems and solutions, amazing power tips, cool tricks, and clever workarounds in one clearly organized, easy to use, and portable resource. Truly insightful and amusing, Windows XP Power Hound gives Windows XP users practical hints for everything from the desktop to Office programs to the registry, and includes documented (but little-known) tips as well as previously undocumented tricks. Windows XP Power Hound moves far beyond mere productivity and explores what's possible with Windows XP--including cool things you probably never thought of doing.An understanding of Windows XP basics will get the job done. But discovering the most useful I didn't know that! tips and shortcuts will make using Windows XP a far richer and less frustrating experience. The practical, concise format of Windows XP Power Hound makes it easy to dip into for a quick tip from time to time; the warm, jargon-free tone makes it easy to read cover to cover.Anyone who wants to smooth out Windows XP's speed bumps and get some serious speed to accelerate through the bottlenecks will find that even a handful of these useful, to-the-point tips will make Windows XP Power Hound worth its weight in chocolate.
    Note: "Covers Windows XP Home & Pro"--Cover. - Includes index. - Subtitle on cover: Teach yourself new tricks
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Language: English
    Edition: 4th ed.
    Keywords: Microsoft Windows (Computer file) ; Microsoft Windows server ; Computer network architectures ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The premier guide to the Windows kernel now covers Windows Server 2003, Windows XP, and Windows 2000, including 64-bit extensions. Get the architectural perspectives and insider insights needed to unlock the power of Windows.
    Note: Includes index. - Title from caption
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xiii, 270 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysis But the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.
    Note: "Solutions and examples for Snort administrators"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 445 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: FreeBSD ; OpenBSD ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Abstract: FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure.FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems.Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate.Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly. | Boston, MA :Safari,
    Language: English
    Pages: xxii, 534 p. , ill. ; , 24 cm
    DDC: 005.43
    Keywords: Operating systems (Computers) ; Electronic books ; local
    Abstract: Shell scripting skills never go out of style. It's the shell that unlocks the real potential of Unix. Shell scripting is essential for Unix users and system administrators-a way to quickly harness and customize the full power of any Unix system. With shell scripts, you can combine the fundamental Unix text and file processing commands to crunch data and automate repetitive tasks. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards. Classic Shell Scripting is written to help you reliably navigate these tricky waters.Writing shell scripts requires more than just a knowledge of the shell language, it also requires familiarity with the individual Unix programs: why each one is there, how to use them by themselves, and in combination with the other programs. The authors are intimately familiar with the tips and tricks that can be used to create excellent scripts, as well as the traps that can make your best effort a bad shell script. With Classic Shell Scripting you'll avoid hours of wasted effort. You'll learn not only write useful shell scripts, but how to do it properly and portably.The ability to program and customize the shell quickly, reliably, and portably to get the best out of any individual system is an important skill for anyone operating and maintaining Unix or Linux systems. Classic Shell Scripting gives you everything you need to master these essential skills.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 350 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.26/8
    Keywords: Linux ; Electronic data processing ; Distributed processing ; High performance computing ; Operating systems (Computers) ; Parallel processing (Electronic computers) ; Electronic books ; local
    Abstract: To the outside world, a "supercomputer" appears to be a single system. In fact, it's a cluster of computers that share a local area network and have the ability to work together on a single problem as a team. Many businesses used to consider supercomputing beyond the reach of their budgets, but new Linux applications have made high-performance clusters more affordable than ever. These days, the promise of low-cost supercomputing is one of the main reasons many businesses choose Linux over other operating systems.This new guide covers everything a newcomer to clustering will need to plan, build, and deploy a high-performance Linux cluster. The book focuses on clustering for high-performance computation, although much of its information also applies to clustering for high-availability (failover and disaster recovery). The book discusses the key tools you'll need to get started, including good practices to use while exploring the tools and growing a system. You'll learn about planning, hardware choices, bulk installation of Linux on multiple systems, and other basic considerations. Then, you'll learn about software options that can save you hours--or even weeks--of deployment time.Since a wide variety of options exist in each area of clustering software, the author discusses the pros and cons of the major free software projects and chooses those that are most likely to be helpful to new cluster administrators and programmers. A few of the projects introduced in the book include: MPI, the most popular programming library for clusters. This book offers simple but realistic introductory examples along with some pointers for advanced use. OSCAR and Rocks, two comprehensive installation and administrative systems openMosix (a convenient tool for distributing jobs), Linux kernel extensions that migrate processes transparently for load balancing PVFS, one of the parallel filesystems that make clustering I/O easier C3, a set of commands for administering multiple systems Ganglia, OpenPBS, and cloning tools (Kickstart, SIS and G4U) are also covered. The book looks at cluster installation packages (OSCAR & Rocks) and then considers the core packages individually for greater depth or for folks wishing to do a custom installation. Guidelines for debugging, profiling, performance tuning, and managing jobs from multiple users round out this immensely useful book.
    Note: "A comprehensive getting started guide"--Cover. - Includes bibliographical references (p. 329-337) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 381 p. , ill. ; , 23 cm
    Keywords: Computer networks ; Security measures ; Computer security ; Computer security ; United States ; Management ; Data protection ; Data protection ; Management ; Electronic books ; local
    Abstract: Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization's aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board. Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow fin...
    Note: "Understand the total cost of ownership and return on investment for network security solutions"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Redmond, WA : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xlvii, 350 p. , col. ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The smart way to learn Windows XP-one step at a time! This fully updated edition makes it easy to teach yourself how to personalize and manage your system, use the new service pack, enjoy digital media technologies, troubleshoot problems, and more.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xvii, 283 p. , ill. ; , 24 cm
    Edition: 4th ed.
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Learning Perl , better known as "the Llama book", starts the programmer on the way to mastery. Written by three prominent members of the Perl community who each have several years of experience teaching Perl around the world, this edition has been updated to account for all the recent changes to the language up to Perl 5.8. Perl is the language for people who want to get work done. It started as a tool for Unix system administrators who needed something powerful for small tasks. Since then, Perl has blossomed into a full-featured programming language used for web programming, database manipulation, XML processing, and system administration--on practically all platforms--while remaining the favorite tool for the small daily tasks it was designed for. You might start using Perl because you need it, but you'll continue to use it because you love it. Informed by their years of success at teaching Perl as consultants, the authors have re-engineered the Llama to better match the pace and scope appropriate for readers getting started with Perl, while retaining the detailed discussion, thorough examples, and eclectic wit for which the Llama is famous. The book includes new exercises and solutions so you can practice what you've learned while it's still fresh in your mind. Here are just some of the topics covered: Perl variable types subroutines file operations regular expressions text processing strings and sorting process management using third party modules If you ask Perl programmers today what book they relied on most when they were learning Perl, you'll find that an overwhelming majority will point to the Llama. With good reason. Other books may teach you to program in Perl, but this book will turn you into a Perl programmer.
    Note: "Covers Perl 5.8" -- Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Sebastopol, Calif. : Pogue Press/O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 847 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.4469
    Keywords: Mac OS ; Macintosh (Computer) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: You can set your watch to it: As soon as Apple comes out with another version of Mac OS X, David Pogue hits the streets with another meticulous Missing Manual to cover it with a wealth of detail. The new Mac OS X 10.4, better known as Tiger, is faster than its predecessors, but nothing's too fast for Pogue and Mac OS X: The Missing Manual . There are many reasons why this is the most popular computer book of all time. With its hallmark objectivity, the Tiger Edition thoroughly explores the latest features to grace the Mac OS. Which ones work well and which do not? What should you look for? This book tackles Spotlight, an enhanced search feature that helps you find anything on your computer; iChat AV for videoconferencing; Automator for automating repetitive, manual or batch tasks; and the hundreds of smaller tweaks and changes, good and bad, that Apple's marketing never bothers to mention. Mac OS X: The Missing Manual, Tiger Edition is the authoritative book that's ideal for every user, including people coming to the Mac for the first time. Our guide offers an ideal introduction that demystifies the Dock, the unfamiliar Mac OS X folder structure, and the entirely new Mail application. There are also mini-manuals on iLife applications such as iMovie, iDVD, and iPhoto, those much-heralded digital media programs, and a tutorial for Safari, Mac's own web browser. And plenty more: learn to configure Mac OS X using the System Preferences application, keep your Mac secure with FileVault, and learn about Tiger's enhanced Firewall capabilities. If you're so inclined, this Missing Manual also offers an easy introduction to the Terminal application for issuing basic Unix commands. There's something new on practically every page, and David Pogue brings his celebrated wit and expertise to every one of them. Mac's brought a new cat to town and we have a great new way to tame it.
    Note: "Covers Mac OS X 10.4"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxi, 548 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: A smart collection of insider tips and tricks, Windows XP Hacks , Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes extensive coverage of hot-button issues such as: security web browsing controlling the control panel removing uninstallable XP components pop-up ads You'll also find timesaving hacks for file distribution; digital media, such as iTunes; and high-visibility web software, services, and exploits that have emerged since the book's last edition. Each hack in the book can be read easily in just a few minutes, saving countless hours of searching for the right answer.Now completely revised and updated to cover Service Pack 2 (SP2), the second edition of this bestseller carefully breaks down the new features that come with SP2, including IE pop-up blocker, Windows Firewall, and the new wireless client.Written by Preston Gralla, the compact and affordable Windows XP Hacks , Second Edition provides direct, hands-on solutions that can be applied to the challenges facing XP beginners, as well as the more experienced power user. Each year, Windows XP is pre-installed on 90 million PCs worldwide, making it the world's most popular operating system.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 341 p. , ill. ; , 23 cm. +
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: For years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you to perform all the tasks you can do with Windows.Getting to know Linux has never been easier, because now there's a way to test-drive Linux without changing, installing, or configuring a thing on your computer. It's called Test Driving Linux: From Windows to Linux in 60 Seconds .This latest release from O'Reilly comes with a Live CD called Move, that allows Windows users to try all the features of Mandrake Linux, a popular Linux distribution without the hassle of actually installing Linux. Users simply place the Move CD into their CD drive, boot from the disc, then watch an entire Mandrake system run on the fly from the CD-ROM. Test Driving Linux: From Windows to Linux in 60 Seconds is a detailed step-by-step guide to the Linux operating system and several popular open source programs. With this guide you can quickly learn how to use Linux to perform the tasks you do most: surf the web, send and receive email, instant message with friends, write letters, create spreadsheets, and even how to enhance your digital photos. Test Driving Linux: From Windows to Linux in 60 Seconds provides both home and business users with a hassle-free way to investigate this operating system before they purchase and install a complete Linux distribution.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 653 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Operating systems (Computers) ; Electronic books ; local
    Abstract: Each year, Windows XP is pre-installed on 30 million PCs sold inthe U.S.--and 90 million worldwide--making it the world's mostpopular operating system, and proving to frustrated userseverywhere that preponderance does not equate to ease of use. Thereare literally thousands of programs, tools, commands, screens,scripts, buttons, tabs, applets, menus, and settings containedwithin Windows XP. And it has only been in the last couple of yearsthat Microsoft's documentation has actually been more of a helpthan a hindrance. But it still isn't enough. Windows XP users and administrators need a quick and easy way tofind answers. Plenty of books go into detail about the theorybehind a particular technology or application, but few go straightto the essentials for getting the job done. Windows XPCookbook does just that, tackling the most common tasks neededto install, manage, and support Windows XP. Featuring a new twist to O'Reilly's proven Cookbook formula,this problem-solving guide offers multiple solutions for each ofits 300-plus recipes. Solve dilemmas with the graphical userinterface, the command line, through the Registry, or by usingscripts. Each step-by-step recipe includes a discussion thatexplains how and why it works. The book is also among the first tocover Microsoft's XP Service Pack 2. With these practical,on-the-job solutions, Windows XP Cookbook will save youhours of time searching for answers. Windows XP Cookbook will be useful to anyone that has touse, deploy, administer, or automate Windows XP. But this isn't atypical end-user book; it covers the spectrum of topics involvedwith running Windows XP in both small and large environments. As aresult, IT professionals and system administrators will find it agreat day-to-day reference. And power users will find Windows XPCookbook a great source for information on tweaking XP andgetting the most out of their systems. The bottom line is that Windows XP Cookbook will make just about anyone who uses XPmore productive.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 887 p. , ill. ; , 23 cm. +
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: In-depth technical information and tools to help IT professionals deploy Microsoft Windows desktop operating systems and applications-straight from the source. Get definitive guidance, plus must-have tools, templates, and scripts on CD.
    Note: Accompanying CD-ROM includes scripts, worksheets, white papers, and an eBook. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xv, 462 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Learn Perl programming quickly and easily with 24 one-hour lessons in Sams Teach Yourself Perl in 24 Hours . The book's step-by-step lessons teach you the basics of Perl and how to apply it in web development and system administration. Plus, the third edition has been updated to include five chapters on new technologies, information on the latest version of Perl, and a look ahead to Perl 6. Sams Teach Yourself Perl in 24 Hours focuses on real-world development, teaching you how to: Effectively use Perl for large development projects using Perl modules Use Perl for data processing Utilize Perl as a "glue" language with other programming languages Use Perl as a web development language
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    San Jose, Calif. ; : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xvii, 533 p. , ill. ; , 23 cm
    Edition: 3rd ed. /
    DDC: 005.8
    Keywords: Linux (Computer file) ; Computer security ; Electronic books ; local
    Abstract: An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall optimization along with some advanced concepts including customizing the Linux kernel to enhance security.The third edition, while distribution neutral, has been updated for the current Linux Kernel and provides code examples for Red Hat, SUSE, and Debian implementations. Don't miss out on the third edition of the critically acclaimed Linux Firewalls .
    Note: Previous ed.: published as by Robert L. Ziegler. Indianapolis, Ind.: New Riders, 2001
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly | Boston, Mass. :Safari Books Online
    ISBN: 0596100094
    Language: English
    Pages: 206 p
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Windows PowerShell, formerly know by its codename "Monad" and available now for Windows Server 2003, Windows XP, and Windows Vista, and soon for Exchange Server 2007 and MOM, is the future of Windows administration. From setting up automated build environments to managing 20,000 Exchange email clients in an organization, any tool that reduces the number of repetitive steps an administrator must perform, is a real win. Even better, PowerShell part of a major Microsoft initiative that aims to replace a host of Windows management tools with a single, unified shell. This is the promise of PowerShell and the reason IT professionals need to start learning how to use it today Reflecting the best of legacy tools such as bash and the Korn shell, PowerShell also breaks new ground in its command language design and its use of the object-oriented .NET Framework. And there is no better way to learn how to put PowerShell to work than to get your hands on Monad , O'Reilly's innovative, hands-on introduction to the tool. This concise 200-page book is an exciting tour of some of the new capabilities thatPowerShell puts into the hands of system administrators and power users, and is the perfect complement to existing PowerShell documentation. With more than 40 hands-on activities, the book covers every angle, from using PowerShell commands and its object-oriented pipelines to querying systems, generating reports and writing scripts that automate existing tasks. Adding to the lure is the fact that the book is written by Microsoft manager, Andy Oakley with a Foreword by PowerShell architect Jeffrey Snover-so you can be certain that it's teeming with inside information. Monad lets you see for yourself how PowerShell can significantly improve your productivity. Because the PowerShell technology has wide appeal, so, too, does this compact guide. Developers, administrators, and power users alike can all benefit from its insight. If you're someone who habitually drifts toward the c-m-d keys, knows all of the switches to most command tools, or spends time authoring batch files to solve new challenges, this book is right up your alley. And if your organization plans to upgrade soon to Exchange 2007 or MOM V3, there's no time to waste. Breaking News: A PowerShell RC1 Update to the book is now available at no charge from the book's catalog page on oreilly.com!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xviii, 260 p. , ill. ; , 24 cm
    Edition: 4th ed.
    Keywords: Mac OS ; UNIX (Computer file) ; Operating systems (Computers) ; TIGER System (Information retrieval system) ; Electronic books ; local
    Abstract: Beneath Mac OS X Tiger's easy-to-use Aqua interface lies a powerful Unix engine. Mac users know that Unix is at their fingertips, if only they knew how to access it. Learning Unix for Mac OS X Tiger provides Mac users with a user-friendly tour of the Unix world concealed beneath Mac OS X's hood and shows how to make the most use of the command-line tools.Thoroughly revised and updated for Mac OS X Tiger, this new edition introduces Mac users to the Terminal application and shows you how to navigate the command interface, explore hundreds of Unix applications that come with the Mac, and, most importantly, how to take advantage of both the Mac and Unix interfaces. Readers will learn how to: Launch and configure the Terminal application Customize the shell environment Manage files and directories Search with Spotlight from the command line Edit and create text files with vi and Pico Perform remote logins Access internet functions, and much more Learning Unix for Mac OS X Tiger is a clear, concise introduction to what you need to know to learn the basics of Unix on Tiger. If you want to master the command-line, this gentle guide to using Unix on Mac OS X Tiger is well worth its cover price.
    Note: "Unlock the power of UNIX"--Cover. - First 2 eds. have title: Learning Unix for Mac OS X; 3rd ed. has title: Learning Unix for Mac OS X Panther. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Language: English
    Pages: xviii, 714 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computerinteraction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security & Usability groups 34 essays into six parts: Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems--how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems--methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xiii, 324 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.
    Note: "Writing, hacking, and modifying security tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 238 p. , ill. ; , 24 cm
    Keywords: Linux ; Computer security ; Electronic books ; local
    Abstract: The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: A readable and concrete explanation of SELinux concepts and the SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With SELinux , a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 822 p. , ill. ; , 24 cm
    DDC: 005.446
    Keywords: Mac OS ; Macintosh (Computer) ; Operating systems (Computers) ; Web servers ; Electronic books ; local
    Abstract: From the command line to Apple's graphical tools, this book uses a thorough, fundamental approach that leads readers to mastery of every aspect of the server. Full of much-needed insight, clear explanations, troubleshooting tips, and security information in every chapter, the book shows system administrators how to utilize the software's capabilities and features for their individual needs. Some of the topics covered in detail include: Installation Deployment Server management Directory services Web application services System interaction Data gathering Stress planning This comprehensive guide also takes the time to carefully highlight and analyze the differences between Mac OS X and the other server platforms.Whether you're a seasoned Unix or Windows administrator or a long-time Mac professional, Essential Mac OS X Panther Server Administration provides you with the depth you're seeking to maximize the potential of your Mac OS X Panther Server.
    Note: "Integrating Mac OS X server into heterogeneous networks"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 517 , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Many programmers code by instinct, relying on convenient habits ora "style" they picked up early on. They aren't conscious of all thechoices they make, like how they format their source, the namesthey use for variables, or the kinds of loops they use. They'refocused entirely on problems they're solving, solutions they'recreating, and algorithms they're implementing. So they write codein the way that seems natural, that happens intuitively, and thatfeels good. But if you're serious about your profession, intuition isn'tenough. Perl Best Practices author Damian Conway explainsthat rules, conventions, standards, and practices not only helpprogrammers communicate and coordinate with one another, they alsoprovide a reliable framework for thinking about problems, and acommon language for expressing solutions. This is especiallycritical in Perl, because the language is designed to offer manyways to accomplish the same task, and consequently it supports manyincompatible dialects. With a good dose of Aussie humor, Dr. Conway (familiar to manyin the Perl community) offers 256 guidelines on the art of codingto help you write better Perl code--in fact, the best Perl code youpossibly can. The guidelines cover code layout, naming conventions,choice of data and control structures, program decomposition,interface design and implementation, modularity, objectorientation, error handling, testing, and debugging. They're designed to work together to produce code that is clear,robust, efficient, maintainable, and concise, but Dr. Conwaydoesn't pretend that this is the one true universal and unequivocalset of best practices. Instead, Perl Best Practices offerscoherent and widely applicable suggestions based on real-worldexperience of how code is actually written, rather than onsomeone's ivory-tower theories on how software ought to becreated. Most of all, Perl Best Practices offers guidelines thatactually work, and that many developers around the world arealready using. Much like Perl itself, these guidelines are abouthelping you to get your job done, without getting in the way. Praise for Perl Best Practices from Perl communitymembers: "As a manager of a large Perl project, I'd ensure that everymember of my team has a copy of Perl Best Practices on theirdesk, and use it as the basis for an in-house style guide." --Randal Schwartz "There are no more excuses for writing bad Perl programs. Alllevels of Perl programmer will be more productive after readingthis book." ...
    Note: Includes bibliographical references (p. 493-494) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Mac OS ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The Most Useful UNIX Guide for Mac OS X Users Ever, with Hundreds of High-Quality Examples! Beneath Mac OS ® X's stunning graphical user interface (GUI) is the most powerful operating system ever created: UNIX ® . With unmatched clarity and insight, this book explains UNIX for the Mac OS X user-giving you total control over your system, so you can get more done, faster. Building on Mark Sobell's highly praised A Practical Guide to the UNIX System, it delivers comprehensive guidance on the UNIX command line tools every user, administrator, and developer needs to master-together with the world's best day-to-day UNIX reference. This book is packed with hundreds of high-quality examples. From networking and system utilities to shells and programming, this is UNIX from the ground up-both the "whys" and the "hows"-for every Mac user. You'll understand the relationships between GUI tools and their command line counterparts. Need instant answers? Don't bother with confusing online "manual pages": rely on this book's example-rich, quick-access, 236-page command reference! Don't settle for just any UNIX guidebook. Get one focused on your specific needs as a Mac user! A Practical Guide to UNIX ® for Mac OS ® X Users is the most useful, comprehensive UNIX tutorial and reference for Mac OS X and is the only book that delivers Better, more realistic examples covering tasks you'll actually need to perform Deeper insight, based on the authors' immense knowledge of every UNIX and OS X nook and cranny Practical guidance for experienced UNIX users moving to Mac OS X Exclusive discussions of Mac-only utilities, including plutil , ditto , nidump , otool , launchctl , diskutil , GetFileInfo , and SetFile Techniques for implementing secure communications with ssh and scp -plus dozens of tips for making your OS X system more secure Expert guidance on basic and advanced shell programming with bash and tcsh Tips and tricks for using the shell interactively from the command line Thorough guides to vi and emacs designed to help you get productive fast, and maximize your editing efficiency In-depth coverage of the Mac OS X filesystem and access permissions, including extended attributes and Access Control Lists (ACLs) A comprehensive UNIX glossary Dozens of exercises to help you practice and gain confidence And much more, including a superior introduction to UNIX programming tools such as awk , sed , otool , make , gcc , gdb , and CVS
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR ; | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 353 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The first comprehensive, expert guide for end-to-end Linux application optimization Learn to choose the right tools-and use them together to solve real problems in real production environments Superior application performance is more crucial than ever-and in today's complex production environments, it's tougher to ensure, too. If you use Linux, you have extraordinary advantages: complete source code access, plus an exceptional array of optimization tools. But the tools are scattered across the Internet. Many are poorly documented. And few experts know how to use them together to solve real problems. Now, one of those experts has written the definitive Linux tuning primer for every professional: Optimizing Linux® Performance. Renowned Linux benchmarking specialist Phillip Ezolt introduces each of today's most important Linux optimization tools, showing how they fit into a proven methodology for perfecting overall application performance. Using realistic examples, Ezolt shows developers how to pinpoint exact lines of source code that are impacting performance. He teaches sysadmins and application developers how to rapidly drill down to specific bottlenecks, so they can implement solutions more quickly. You'll discover how to: Identify bottlenecks even if you're not familiar with the underlying system Find and choose the right performance tools for any problem Recognize the meaning of the events you're measuring Optimize system CPU, user CPU, memory, network I/O, and disk I/O-and understand their interrelationships Fix CPU-bound, latency-sensitive, and I/O-bound applications, through case studies you can easily adapt to your own environment Install and use oprofile, the advanced systemwide profiler for Linux systems If you're new to tuning, Ezolt gives you a clear and practical introduction to all the principles and strategies you'll need. If you're migrating to Linux, you'll quickly master Linux equivalents to the tools and techniques you already know. Whatever your background or environment, this book can help you improve the performance of all your Linux applications-increasingbusiness value and user satisfaction at the same time. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Learn Linux kernel programming, hands-on : a uniquely effective top-down approach The Linux ® Kernel Primer is the definitive guide to Linux kernel programming. The authors' unique top-down approach makes kernel programming easier to understand by systematically tracing functionality from user space into the kernel and carefully associating kernel internals with user-level programming fundamentals. Their approach helps you build on what you already know about Linux, gaining a deep understanding of how the kernel works and how its elements fit together. One step at a time, the authors introduce all the tools and assembly language programming techniques required to understand kernel code and control its behavior. They compare x86 and PowerPC implementations side-by-side, illuminating cryptic functionality through carefully-annotated source code examples and realistic projects. The Linux ® Kernel Primer is the first book to offer in-depth coverage of the rapidly growing PowerPC Linux development platform, and the only book to thoroughly discuss kernel configuration with the Linux build system. Coverage includes Data structures x86 and PPC assembly language Viewing kernel internals Linux process model User and kernel space Interrupts and exceptions Memory allocation and tracking Tracing subsystem behavior I/O interactions Filesystems and file operations Scheduling and synchronization Kernel boot process Kernel build system Configuration options Device drivers And more... If you know C, this book teaches you all the skills and techniques you need to succeed with Linux kernel programming. Whether you're a systems programmer, software engineer, systems analyst, test professional, open source project contributor, or simply a Linux enthusiast, you'll find it indispensable. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 643 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: HP-UX ; Operating systems (Computers) ; Electronic books ; local
    Abstract: This is the definitive guide to installing and administering HP-UX 11i Version 2 in any environment, on both HP 9000 and HP Integrity server families. Drawing on 18 years of on-site HP-UX consulting experience, Marty Poniatowski offers unparalleled practical insight into running HP-UX 11i efficiently and reliably, illuminating features even experienced HP-UX sysadmins find confusing. Poniatowski organizes this book around your day-to-day needs and your system's lifecycle. He begins with in-depth coverage of installation and bootup, then walks through everything from LVM and kernel configuration through networking. He especially focuses on the capabilities and tools that make HP-UX unique-and how you can use them to save time and money. Coverage includes Partitioning from start to finish-including vPars and nPartitions installation, creation, and modification Booting HP Integrity systems with EFI, and HP 9000 systems with PDC, ISL, or hpux Mastering the Management Processor (MP): console, virtual front panel, and command menu Using HP-UX's new kernel-building commands: kcconfig, kcusage, kctune, kcmodule, and more Working with HP-UX's new web-based tools: pd (devices), parmgr (partitions), and kcweb (kernel) Mapping LBA to slot numbers: clear explanations of a non-intuitive technique Using Ignite-UX to boot and recover systems across the network Managing disks, devices, backup, users/groups, and much more © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 352 p. , ill. ; , 23 cm. +
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Enter your Linux Desktop Garage Don't just survive with Linux: thrive Find tools & info to do practically everything , such as: Ripping your CDs (&DVDs) De-Spam-ifying your email Capturing, editing, organizing your digital photos Chatting with your Linux-deficient IM pals Tracking your contacts, appointments, life Transforming Firefox into easy blogware Finding great substitutes for your Windows apps Diving into a veritable plethora of games Where you get the truth (unvarnished) Where you get productive (quick) Where Linux is fun (honest) Your guide: Susan Matteson , real user, real expert She reveals the fun stuff (from MP3s to desktop wallpaper) Demystifies the essentials (from file management to passwords) Simplifies the tasks they said were easy, but weren't (until now) Where there's even more (plenty) Step-by-step instructions for both Mandrake & Fedora Linux Zero-hassle tips for managing & personalizing your PC Gnoppix Linux on CD-ROM (run Linux without touching Windows) © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Praise for Mark Sobell's Books "I keep searching for books that collect everything you want to know about a subject in one place, and keep getting disappointed. Usually the books leave out some important topic, while others go too deep in some areas and must skim lightly over the others. A Practical Guide to Red Hat® Linux® is one of those rare books that actually pulls it off. Mark G. Sobell has created a single reference for Red Hat Linux that cannot be beat! This marvelous text (with a 4-CD set of Linux Fedora Core 2 included) is well worth the price. This is as close to an 'everything you ever needed to know' book that I've seen. It's just that good and rates 5 out of 5." -Ray Lodato, Slashdot contributor "Mark Sobell has written a book as approachable as it is authoritative." -Jeffrey Bianchine, Advocate, Author, Journalist "Excellent reference book, well suited for the sysadmin of a linux cluster, or the owner of a PC contemplating installing a recent stable linux. Don't be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs." -Wes Boudville, Inventor " A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you Mark Sobell." -C. Pozrikidis, University of California at San Diego "This book presents the best overview of the Linux operating system that I have found. . . . It should be very helpful and understandable no matter what the reader's background is: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready." -Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group FRUUG, Boulder, Colorado "Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There's no other book that discusses so many different topics and in such depth." -Eugenia Loli-Queru, Editor in Chief, OSNews.com The Most Useful Linux Tutorial and Reference Ever, with Hundreds of High-Quality Examples Covering Every Linux Distribution! To be truly productive with Linux, you need to thoroughly mast...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive book on Security Patterns, which are critical for secure programming. --Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your development efforts. --Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. --Judy Lin, Executive Vice President, VeriSign, Inc. Core Security Patterns provides a comprehensive patterns-driven approach and methodology for effectively incorporating security into your applications. I recommend that every application developer keep a copy of this indispensable security reference by their side. --Bill Hamilton, author of ADO.NET Cookbook , ADO.NET in a Nutshell , and NUnit Pocket Reference As a trusted advisor, this book will serve as a Java developers security handbook, providing applied patterns and design strategies for securing Java applications. --Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase Like Core J2EE Patterns , this book delivers a proactive and patterns-driven approach for designing end-to-end security in your applications. Leveraging the authors strong security experience, they created a must-have book for any designer/developer looking to create secure applications. --John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE Patterns Core Security Patterns is the hands-on practitioners guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisionin...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Upper Saddle River, NJ. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations of UNIX and UNIX-like environments. And yet, it does all this while retaining the style and taste of the original classic." --Mukesh Kacker, cofounder and former CTO of Pronto Networks, Inc. "One of the essential classics of UNIX programming." --Eric S. Raymond, author of The Art of UNIX Programming "This is the definitive reference book for any serious or professional UNIX systems programmer. Rago has updated and extended the classic Stevens text while keeping true to the original. The APIs are illuminated by clear examples of their use. He also mentions many of the pitfalls to look out for when programming across different UNIX system implementations and points out how to avoid these pitfalls using relevant standards such as POSIX 1003.1, 2004 edition and the Single UNIX Specification, Version 3." --Andrew Josey, Director, Certification, The Open Group, and Chair of the POSIX 1003.1 Working Group " Advanced Programming in the UNIX® Environment, Second Edition, is an essential reference for anyone writing programs for a UNIX system. It's the first book I turn to when I want to understand or re-learn any of the various system interfaces. Stephen Rago has successfully revised this book to incorporate newer operating systems such as GNU/Linux and Apple's OS X while keeping true to the first edition in terms of both readability and usefulness. It will always have a place right next to my computer." --Dr. Benjamin Kuperman, Swarthmore College Praise for the First Edition " Advanced Programming in the UNIX® Environment is a must-have for any serious C programmer who works under UNIX. Its depth, thoroughness, and clarity of explana-tion are unmatched." -- UniForum Monthly "Numerous readers recommended Advanced Programming in the UNIX® Environment by W. Richard Stevens (Addison-Wesley), and I'm glad they did; I hadn't even heard of this book, and it's been out since 1992. I just got my hands on a copy, and the first few chapters have been fascinating." -- Open Systems Today "A much more readable and detailed treatment of UNIX internals can be found in Advanced Programming in the UNIX® Environment by W. Richard Steven...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 651 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Where has this book been all my professional life? It is about time someone wrote this book. The author covers many basic, practical issues that other authors omit in a format that makes for a great troubleshooting reference and for casual perusing. There are a lot of books available that give a broad overview of system and network administration, and there are a lot of detailed books on each specific topic covered in this book, but I don't know of any other place where I can get so much useful, practical information on such a wide range of topics in such a concise and readable form. I will highly recommend it to my friends and colleagues who are trying to manage their own systems. I am anxious to show it to our instructors who teach data communications and networks as a possible text or lab manual." -Ron McCarty, instructor and program chair, Computer Science, Penn State Erie "This book takes a very unique approach and is very flexible. It offers a great deal to the home user, students, small businesses-all the way to any Linux sys admin that needs a handy reference. I found it very refreshing in terms of style, stated goals, presentation, ease of use, direction, and the "present and future" value of the content. In other words the author is very current and knowledgeable. I would recommend this book to every level from programmer to manager." -Joe Brazeal, Information Technician III, Southwest Power Pool "This book is an excellent resource for new Linux administrators. I was impressed with the comprehensive set of 35 topic chapters, making this book a very useful reference. I know of no other work like this." -George Vish II, Linux curriculum program manager and senior education consultant, Hewlett-Packard Education "I would recommend this book to novice Linux users and administrators. It covers a lot of topics, and makes it easy for readers to follow along." -Bret Strong, education consultant, Hewlett-Packard Company "Linux Quick Fix Notebook is a well-written guide to designing, installing, and maintaining Linux servers. Many Linux reference texts are just simple rewrites of Linux ¨man¨ and ¨info¨ pages, but this book addresses the real issues that systems administrators encounter when working with Linux. The author provides a pedagogical guide to learning Linux server administration. In addition, the book includes step-by-step information so that users can quickly take advantage of the best that open source software has to offer today. I...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...