Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (11)
  • Ringgenberg, J. D  (1)
  • Upper Saddle River, N.J. : Prentice Hall PTR  (10)
  • Sebastopol, CA : O'Reilly & Associates  (2)
  • Linux  (5)
  • Object-oriented programming (Computer science)  (4)
  • Computer security  (3)
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 651 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Where has this book been all my professional life? It is about time someone wrote this book. The author covers many basic, practical issues that other authors omit in a format that makes for a great troubleshooting reference and for casual perusing. There are a lot of books available that give a broad overview of system and network administration, and there are a lot of detailed books on each specific topic covered in this book, but I don't know of any other place where I can get so much useful, practical information on such a wide range of topics in such a concise and readable form. I will highly recommend it to my friends and colleagues who are trying to manage their own systems. I am anxious to show it to our instructors who teach data communications and networks as a possible text or lab manual." -Ron McCarty, instructor and program chair, Computer Science, Penn State Erie "This book takes a very unique approach and is very flexible. It offers a great deal to the home user, students, small businesses-all the way to any Linux sys admin that needs a handy reference. I found it very refreshing in terms of style, stated goals, presentation, ease of use, direction, and the "present and future" value of the content. In other words the author is very current and knowledgeable. I would recommend this book to every level from programmer to manager." -Joe Brazeal, Information Technician III, Southwest Power Pool "This book is an excellent resource for new Linux administrators. I was impressed with the comprehensive set of 35 topic chapters, making this book a very useful reference. I know of no other work like this." -George Vish II, Linux curriculum program manager and senior education consultant, Hewlett-Packard Education "I would recommend this book to novice Linux users and administrators. It covers a lot of topics, and makes it easy for readers to follow along." -Bret Strong, education consultant, Hewlett-Packard Company "Linux Quick Fix Notebook is a well-written guide to designing, installing, and maintaining Linux servers. Many Linux reference texts are just simple rewrites of Linux ¨man¨ and ¨info¨ pages, but this book addresses the real issues that systems administrators encounter when working with Linux. The author provides a pedagogical guide to learning Linux server administration. In addition, the book includes step-by-step information so that users can quickly take advantage of the best that open source software has to offer today. I...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 426 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: JavaBeans ; Computer security ; Java (Computer program language) ; Servlets ; Web services ; Electronic books ; local
    Abstract: J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place, at the right time, and in the right way. Kumar covers every significant J2SE and J2EE security mechanism, presenting practical implementation techniques for the entire J2EE project lifecycle: analysis, design, development, deployment and operations. The book's example-rich coverage includes: Implementing cryptography with the JCA (Java Cryptography Architecture) and JCE (Java Cryptography Extension) security APIs Building PKI systems with Java: implementing X.509 certificates, Certification Authorities, Certificate Revocation Lists, and repositories Java security managers, policy files, and JAAS: implementing access control based on code origin, code signer and user credentials Securing the wire: Using SSL and the JSSE API to secure data exchange over unprotected networks Ensuring XML message integrity, authentication, and confidentiality with the standards: XML Signature & XML Encryption using the VeriSign TSIK, and Infomosaic SecureXML libraries Addressing security issues in RMI-based distributed applications Developing and deploying servlets and EJBs for authenticated and secure access Securing Web services with transport- and message-based security: SSL for transport-based and WS Security for message-based security Covering security aspects of best-of-breed products: Apache Tomcat, Apache Axis, and BEA WebLogic Server.
    Note: Includes bibliographical references (p. 413-414) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xiv, 392 p. , ill. ; , 24 cm
    DDC: 004.67/8
    Keywords: Curl (Computer program language) ; Internet programming ; Object-oriented programming (Computer science) ; Programming languages (Electronic computers) ; Web site development ; Electronic books ; local
    Abstract: Breakthrough Curl techniques Build rich, robust, low-bandwidth Web applications Curl makes it easy to build Internet applications that use little bandwidth, integrate with existing Web standards, provide a rich graphical interface, and fit seamlessly into virtually any client environment. Enterprise Curl is the first book that shows how to take advantage of Curl for serious enterprise development. Through a start-to-finish case study, Paul Sheehan introduces powerfully effective design and development techniques that draw on his experience leading a Curl consulting teams. Coverage includes: Developing the key elements of a Curl-based application framework Creating search interfaces that accept and extract XML responses, then display them in flexible, powerful spreadsheet-like grids Using Curl to show data within 2D graphs Building Web-based data mining applications that can "drill down" to more detailed views of data Using Curl's built-in SOAP support to construct sophisticated Web services
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvi, 406 p. , ill. ; , 24 cm
    DDC: 005.75/8
    Keywords: ActiveX ; Database design ; Microsoft .NET ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: Prentice Hall PTR's new ADO.NET Programming in Visual Basic .NET - The practical guide to database development with VB.NET and ADO.NET Includes detailed coverage of XML-based Web services Data providers, DataGrids, DataSets, data binding, and much more Complete case study application-building a robust ADO.NET data control Build powerful database apps and Web services fast, with VB.NET and ADO.NET! With ADO.NET, you can build database-enabled applications and Web services with more speed, flexibility, and power than ever before. ADO.NET Programming in Visual Basic .NET teaches you all you'll need to know to make the most of ADO.NET - whether you're an experienced Visual Basic database programmer or not. The authors' realistic code examples and practical insights illuminate ADO.NET from its foundations to state-of-the-art data binding and application optimization. Coverage includes - Understanding the ADO.NET class libraries Utilizing Visual Basic.NET's powerful database programming tools Connecting to databases using ADO.NET's wide range of data providers Using DataSets to read, store, and process XML data Mastering data binding with Windows Forms and ASP.NET Web Forms Building data-driven XML-based Web Services and Windows thin client applications The book concludes with a complete case study application - constructing a .NET version of the powerful ADO data control that VB 6 programmers loved, but isn't included in ADO.NET.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxix, 746 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Privacy, Right of ; Electronic books ; local
    Abstract: The classic guide to information security-fully updated for the latest attacks and countermeasures Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike. This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats and vulnerabilities, and offers practical guidance for responding to them. Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more Security in Internet-based, distributed, desktop and traditional centralized applications New attacks, including scripted vulnerability probing, denial of service, and buffer overflows-with symptoms and cures Clear, accessible introduction to cryptography-without sophisticated math Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography Thoroughly revamped coverage of software engineering practices designed to enhance program security Expanded coverage of risk management, contingency planning, and security policies Detailed presentation of protection in general-purpose and trusted operating systems Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security. The companion website (http://www.phptr.com/pfleeger/) contains additional information, book updates, and instructor's resources.
    Note: Includes bibliographical references (p. 691-725) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Language: English
    Pages: xxii, 294 p. , ill. ; , 24 cm. +
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Tools for high-efficiency Linux development in enterprise environments. Linux developers have access to an extraordinary array of GNU and open source tools. Now, two leading Linux developers show how to choose the best tools for your specific needs, and integrate them into a complete development environment that maximizes your effectiveness in any project-no matter how large or complex. This book's example-rich coverage includes: The Linux software development process: research, requirements, coding, debugging, deployment, maintenance, and beyond Choosing and implementing editors, compilers, assemblers, debuggers, version control systems, utilities, and more Using Linux Standard Base (LSB) to deliver applications that run reliably on a wide range of Linux systems Comparing Java development options for Linux platforms Using Linux in cross-platform and embedded development environments Whatever your environment, The Linux Development Platform will help you find, choose, configure, and maintain the right tools-and use them to deliver outstanding Linux software. CD-ROM INCLUDED The accompanying CD-ROM contains all the open source software you need to build and customize your own Linux development environment. Bruce Perens' Open Source Series is a definitive series of Linux and Open Source books by the world's leading Linux software developers, all edited by Bruce Perens, the former Debian GNU/Linux Project Leader who helped launch the Open Source movement.
    Note: "The accompanying CD-ROM contains all the open source software you need to build and customize your own Linux development environment"--Cover p. 4. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xiii, 244 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/76
    Keywords: Internet programming ; Object-oriented programming (Computer science) ; Simple Object Access Protocol (Computer network protocol) ; XML (Document markup language) ; Electronic books ; local
    Abstract: The web services architecture provides a new way to think about and implement application-to-application integration and interoperability that makes the development platform irrelevant. Two applications, regardless of operating system, programming language, or any other technical implementation detail, communicate using XML messages over open Internet protocols such as HTTP or SMTP. The Simple Open Access Protocol (SOAP) is a specification that details how to encode that information and has become the messaging protocol of choice for Web services. Programming Web Services with SOAP is a detailed guide to using SOAP and other leading web services standards--WSDL (Web Service Description Language), and UDDI (Universal Description, Discovery, and Integration protocol). You'll learn the concepts of the web services architecture and get practical advice on building and deploying web services in the enterprise. This authoritative book decodes the standards, explaining the concepts and implementation in a clear, concise style. You'll also learn about the major toolkits for building and deploying web services. Examples in Java, Perl, C#, and Visual Basic illustrate the principles. Significant applications developed using Java and Perl on the Apache Tomcat web platform address real issues such as security, debugging, and interoperability. Covered topic areas include: The Web Services Architecture SOAP envelopes, headers, and encodings WSDL and UDDI Writing web services with Apache SOAP and Java Writing web services with Perl's SOAP::Lite Peer-to-peer (P2P) web services Enterprise issues such as authentication, security, and identity Up-and-coming standards projects for web services Programming Web Services with SOAP provides you with all the information on the standards, protocols, and toolkits you'll need to integrate information services with SOAP. You'll find a solid core of information that will help you develop individual Web services or discover new ways to integrate core business processes across an enterprise.
    Note: Includes index. - SOAP, Simple Object Access Protocol
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxi, 583 p. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Completely updated with hundreds of new examples! The only Linux reference with examples for every command All-new chapters on the Apache Web server, tc shell, and Emacs editor Organized by task, so you can find it fast! The practical, handy desk reference for every Linux user-now completely updated! Linux Desk Reference, Second Edition packs information about every command Linux users need-organized for maximum value and convenience. Scott Hawkins has updated entries throughout the book, and added four new chapters-including all-new coverage of the tc shell, Emacs editor, and Apache Web server. This friendly reference is organized by task so you can find what you need even if you don't know what it's called! Unlike other Linux references, this one delivers practical examples for every command it contains-plus hundreds of invaluable tips, warnings, diagrams, and sample outputs. And if you're a Linux expert, you'll love the "roadmap-style" alphabetical fast-find reference section! No matter what you need to know about Linux, it's here... Files and the filesystem Sessions, users, and groups Networking I/O, devices, and disks Apache Web services Windows connectivity Security X Window System Printers and print queues Text editors-including vi and Emacs The Linux kernel Scripting Email Comparing and merging files Scheduling Archiving and compression Performance monitoring Startup/shutdown Daemons Shells-including bash and tc Pattern matching Processes Diagnostics Tuning NIS/NFS Development resources And more! Whether you're a sysadmin, developer, power user, or newbie, get the most convenient, up-to-date Linux reference you can buy: Linux Desk Reference, Second Edition ! Praise for the first edition "Hawkins provides a superior combination of explanations, descriptions, and examples. Every Linux user, whether novice or experienced administrator, will value the organization and contents of the Linux Desk Reference." - SysAdmin magazine (Sept. 2000)
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, Mass. :Safari Books Online,
    ISBN: 9780132442749 , 0132442744
    Language: English
    Pages: xvi, 339 p , ill. , 25 cm
    Parallel Title: Erscheint auch als
    Keywords: Real-time programming ; Object-oriented programming (Computer science) ; Software engineering ; Mechatronics ; Mechanical engineering ; Computer programs ; Electronic books ; local
    Abstract: This book is about the design and implementation of real times software for the control of mechanical systems. The most appealing aspect of this book is the inclusion of useable C & C++ code, Matlab applications, and BridgeVIEW.
    Note: Includes bibliographical references (p. 331-332) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xviii, 522 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8/4
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out in Malicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book? Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers: The current state of the malicious code writing and cracker community How malicious code works, what types there are, and what it can and cannot do Common anti-virus defenses, including anti-virus software How malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent it Macro viruses affecting MS Word, MS Excel, and VBScript Java applets and ActiveX controls Enterprise-wide malicious code protection Hoaxes The future of malicious mobile code and how to combat such code These days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever. Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvi, 249 p. , ill. ; , 24 cm. +
    Series Statement: Prentice Hall PTR open source technology series
    DDC: 005.265
    Keywords: Linux ; Assembler language (Computer program language) ; Electronic books ; local
    Abstract: Master x86 assembly language from a Linux perspective! Essential information for creating Linux device drivers How Linux works "under the hood!" The first Linux-centered guide to x86 assembly language! In Linux Assembly Language Programming, Bob Neveln explains all the key features of x86 assembly language in the context of the Linux operating system and the C language. The book's step-by-step, one-concept-at-a-time coverage will help any hardware programmer move to Linux, and master essential skills for Linux device driver development. You won't just learn new x86 assembly language skills: you'll also gain powerful "under the hood" insight into how Linux works. Linux x86 assembly language programming, from start to finish! Place-holding numeration Logic circuits Computation The four-field format Machine language Memory The stack Linux user programs NASM DOS programs Interrupts Bit manipulations Device drivers And more...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xviii, 761 p. , ill. ; , 24 cm. +
    DDC: 005.4/469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The complete guide to bash and tsch-PLUS grep, sed, and gawk! Learn Linux shell programming hands-on! Hundreds of classroom-proven examples throughout gawk in-depth! Pattern scanning, text filtering, reporting, and more By best-selling author Ellie Quigley, Silicon Valley's #1 shell programming instructor! CD-ROM: All source code and data files used in the book. Learn Linux shell programming hands-on! One book is all you need to learn Linux shell programming! Linux Shells by Example is your complete, step-by-step guide to both essential Linux shells-bash and tcsh-and three essential Linux shell programming utilities, grep, sed and gawk. Ellie Quigley-Silicon Valley's top shell programming instructor-starts from scratch and gets you all the way to expert-level techniques! Through hundreds of classroom-proven examples, you'll learn what Linux shells are, what they do, and exactly how they integrate with other Linux utilities and processes. Master creating, running, and debugging shell scripts using grep, sed, gawk, and a whole lot more. bash and tcsh: how they compare, and when to use each gawk in depth: pattern scanning, text filtering, reporting, and other key applications Includes hands-on exercises for every topic Detailed syntax listings, comparison charts, essential information on Linux utilities, and more Whether you're a system administrator, application developer or power user, Linux Shells by Example is the most convenient, cost-effective way to learn Linux shell programming! CD-ROM INCLUDED CD-ROM contains all of the source code and datafiles from the book.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...