Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (60)
  • Safari, an O’Reilly Media Company  (60)
  • ebrary, Inc
  • [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc.  (40)
  • [Erscheinungsort nicht ermittelbar] : Syngress  (20)
Datasource
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9780128022221
    Language: English
    Pages: 1 online resource (72 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography. The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices
    Note: Online resource; Title from title page (viewed December 5, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (575 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Learning OpenCV puts you in the middle of the rapidly expanding field of computer vision. Written by the creators of the free open source OpenCV library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on that data. The second edition is updated to cover new features and changes in OpenCV 2.0, especially the C++ interface.
    Note: Online resource; Title from title page (viewed December 15, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781491920626
    Language: English
    Pages: 1 online resource (1 video file, approximately 27 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: In this webcast, Laura Busche, author of Lean Branding, will share 15 tactics to build your very own high-converting, dynamic brand. Trying to market a product or service with a limited budget and little or no time? This webcast is for you.
    Note: Online resource; Title from title screen (viewed November 13, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9780128001103
    Language: English
    Pages: 1 online resource (94 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient’s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments. Discusses how and why malicious e-mail is used Explains how to find hidden viruses in e-mails Provides hands-on concrete steps to detect and stop malicious e-mail before it is too late Covers what you need to do if a malicious e-mail slips through
    Note: Online resource; Title from title page (viewed October 7, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (178 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Get valuable tips and techniques for automating your cloud deployments with Azure PowerShell cmdlets, and learn how to provision Azure services on the fly. In this hands-on guide, Microsoft cloud technology expert Michael Washam shows you how to automate various management tasks and deploy solutions that are both complex and at scale.
    Note: Online resource; Title from title page (viewed November 5, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (226 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: If you know how to program, you have the skills to turn data into knowledge, using tools of probability and statistics. This concise introduction shows you how to perform statistical analysis computationally, rather than mathematically, with programs written in Python. You’ll learn the entire process of exploratory data analysis—from collecting data and generating statistics to identifying patterns and testing hypotheses.
    Note: Online resource; Title from title page (viewed October 28, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (800 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: How can you make your bookkeeping workflow smoother and faster? Simple. With this Missing Manual, you’re in control: you get step-by-step instructions on how and when to use specific features, along with basic bookkeeping and accounting advice to guide you through the learning process. Discover new and improved features like the Insights dashboard and easy report commenting. You’ll soon see why this book is the Official Intuit Guide to QuickBooks 2015. The important stuff you need to know: Get started fast. Quickly set up accounts, customers, jobs, and invoice items. Follow the money. Track everything from billable and unbillable time and expenses to income and profit. Keep your company financially fit. Examine budgets and actual spending, income, inventory, assets, and liabilities. Gain insights. Open a new dashboard that highlights your company’s financial activity and status the moment you log in. Spend less time on bookkeeping. Create and reuse bills, invoices, sales receipts, and timesheets. Find key info. Use QuickBooks’ Search and Find features, as well as the Vendor, Customer, Inventory, and Employee Centers.
    Note: Online resource; Title from title page (viewed October 27, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9780128027226
    Language: English
    Pages: 1 online resource (68 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey. Learn the basics of the digital security industry Get tips on creating an effective resume and making contacts within the industry Figure out the best certifications to pursue and what qualifications will get you your ideal career
    Note: Online resource; Title from title page (viewed December 5, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9780128027301
    Language: English
    Pages: 1 online resource (42 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security. Learn how to create a proactive strategy for digital security Use data analysis and threat forecasting to predict and prevent attacks before they start Understand the fundamentals of today's threatscape and how best to organize your defenses
    Note: Online resource; Title from title page (viewed December 5, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (388 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Take advantage of Chef’s highly customizable design to tackle specific automation issues that you can’t solve by simply using Chef’s tools, resources, and services out of the box. With this practical guide, you’ll examine the internal structure of this configuration management technology and learn where, how, and why to add custom code.
    Note: Online resource; Title from title page (viewed September 9, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9780128021453
    Language: English
    Pages: 1 online resource (200 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way. Provides a roadmap and direction on how to build an intelligence-led information security program to protect your company. Learn how to understand your network through logs and client monitoring, so you can effectively evaluate threat intelligence. Learn how to use popular tools such as BIND, SNORT, squid, STIX, TAXII, CyBox, and splunk to conduct network intelligence.
    Note: Online resource; Title from title page (viewed December 10, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9780128002162
    Language: English
    Pages: 1 online resource (122 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Google Earth Forensics is the first book to explain how to use Google Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows how to extract location-based data that can be used to display evidence in compelling audiovisual manners that explain and inform the data in contextual, meaningful, and easy-to-understand ways. As mobile computing devices become more and more prevalent and powerful, they are becoming more and more useful in the field of law enforcement investigations and forensics. Of all the widely used mobile applications, none have more potential for helping solve crimes than those with geo-location tools. Written for investigators and forensic practitioners, Google Earth Forensics is written by an investigator and trainer with more than 13 years of experience in law enforcement who will show you how to use this valuable tool anywhere at the crime scene, in the lab, or in the courtroom. Learn how to extract location-based evidence using the Google Earth program or app on computers and mobile devices Covers the basics of GPS systems, the usage of Google Earth, and helps sort through data imported from external evidence sources Includes tips on presenting evidence in compelling, easy-to-understand formats
    Note: Online resource; Title from title page (viewed December 9, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9780128002087
    Language: English
    Pages: 1 online resource (360 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Augmented Reality (AR) is the blending of digital information in a real-world environment. A common example can be seen during any televised football game, in which information about the game is digitally overlaid on the field as the players move and position themselves. Another application is Google Glass, which enables users to see AR graphics and information about their location and surroundings on the lenses of their "digital eyewear", changing in real-time as they move about. Augmented Reality Law, Privacy, and Ethics is the first book to examine the social, legal, and ethical issues surrounding AR technology. Digital eyewear products have very recently thrust this rapidly-expanding field into the mainstream, but the technology is so much more than those devices. Industry analysts have dubbed AR the "eighth mass medium" of communications. Science fiction movies have shown us the promise of this technology for decades, and now our capabilities are finally catching up to that vision. Augmented Reality will influence society as fundamentally as the Internet itself has done, and such a powerful medium cannot help but radically affect the laws and norms that govern society. No author is as uniquely qualified to provide a big-picture forecast and guidebook for these developments as Brian Wassom. A practicing attorney, he has been writing on AR law since 2007 and has established himself as the world's foremost thought leader on the intersection of law, ethics, privacy, and AR. Augmented Reality professionals around the world follow his Augmented Legality® blog. This book collects and expands upon the best ideas expressed in that blog, and sets them in the context of a big-picture forecast of how AR is shaping all aspects of society. Augmented reality thought-leader Brian Wassom provides you with insight into how AR is changing our world socially, ethically, and legally. Includes current examples, case studies, and legal cases from the frontiers of AR technology. Learn how AR is changing our world in the areas of civil rights, privacy, litigation, courtroom procedure, addition, pornography, criminal activity, patent, copyright, and free speech. An invaluable reference guide to the impacts of this cutting-edge technology for anyone who is developing apps for it, using it, or affected by it in daily life.
    Note: Online resource; Title from title page (viewed December 9, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 57 hr., 39 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: A faster, stronger web is no longer an option. It's an expectation. There’s an eruption of big ideas around DevOps, web operations, web performance, and mobile—and O’Reilly’s Velocity Conference is right at the core. With this complete video compilation of Velocity 2014 New York, you’ll learn how the latest tools, skills, and ideas in web performance and operations can help you make sense of the great changes taking place at great speed. You’ll get a front row seat to every keynote, workshop, session, and lightning demo in this year’s conference. Download these videos or view them through our HD player, and learn what works (and what doesn’t) in real world web applications. More than 100 speakers, including Justin Arbuckle (Chef), bethanye McKinney Blount (Facebook), Tim O’Reilly (O’Reilly Media), Tobi Knaup (Mesosphere), and Tom Limoncelli (StackExchange.com) offer different pieces of the puzzle. You’ll look at your work, your organization, and the technologies you use in completely new ways. Tracks at Velocity NY 2014 focused on: Operations: Learn what’s important to monitor and when, understand which metrics make a difference, and see how large sites deal with config management, failover, and other key issues. Web Performance: Immerse yourself in the latest tools, technologies, and expert advice on getting your site to perform at warp speed. Mobile: Learn how to measure, analyze, and improve mobile performance, including how UX/UI plays a key role in performance. Culture & Organizational Change: Understand how to future-proof the health of your organization by managing complex systems of both the technical and human varieties.
    Note: Online resource; Title from title screen (viewed September 29, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (338 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Get up and running with OpenStack Swift, the free, open source solution for deploying high-performance object storage clusters at scale. In this practical guide, Joe Arnold, co-founder and CEO of SwiftStack, brings you up-to-speed on the basic concepts of object storage and walks you through what you need to know to plan, build, operate, and measure the performance of your own Swift storage system.
    Note: Online resource; Title from title page (viewed October 27, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (270 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Create and publish your own interactive data visualization projects on the Web—even if you have little or no experience with data visualization or web development. It’s easy and fun with this practical, hands-on introduction. Author Scott Murray teaches you the fundamental concepts and methods of D3, a JavaScript library that lets you express data visually in a web browser. Along the way, you’ll expand your web programming skills, using tools such as HTML and JavaScript. This step-by-step guide is ideal whether you’re a designer or visual artist with no programming experience, a reporter exploring the new frontier of data journalism, or anyone who wants to visualize and share data. Learn HTML, CSS, JavaScript, and SVG basics Dynamically generate web page elements from your data—and choose visual encoding rules to style them Create bar charts, scatter plots, pie charts, stacked bar charts, and force-directed layouts Use smooth, animated transitions to show changes in your data Introduce interactivity to help users explore data through different views Create customized geographic maps with data Explore hands-on with downloadable code and over 100 examples
    Note: Online resource; Title from title page (viewed March 26, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 3 hr., 25 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This series of videos will help you to discover what being a operations engineer entails and will get you started on the path to becoming a professional. Real-world engineers talk about monitoring, outages, productivity, and more. These videos are in supplement to the free written curriculum of the Ops School project, available at http://www.opsschool.org . Ops School is a community-driven, comprehensive program teaching the skills necessary to become a professional operations engineer. Check out the curriculum and learn how!
    Note: Online resource; Title from title screen (viewed June 17, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597491396
    Language: English
    Pages: 1 online resource (672 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. The book begins with a discussion of Microsoft's Trustworthy Computing Initiative and Vista's development cycle, which was like none other in Microsoft's history. Expert authors will separate the hype from the reality of Vista’s preparedness to withstand the 24 x 7 attacks it will face from malicious attackers as the world’s #1 desktop operating system. Microsoft Windows operating systems run more than 90% of the desktop PCs in the world and Vista is the first major Windows release in more than 5 years This is currently the only book on Windows Vista Security
    Note: Online resource; Title from title page (viewed April 18, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597491969
    Language: English
    Pages: 1 online resource (412 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help in order to get SQL Server secured as quickly and safely as possible. Provides the multi-tasked Sys Admin with the essential information needed to perform the daily tasks Covers SQL Server 2005, which is a massive product with significant challenges for IT managers Emphasizes best-practice security measures
    Note: Online resource; Title from title page (viewed April 18, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597496148
    Language: English
    Pages: 1 online resource (272 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, SMTs are real and growing at an alarming pace. This book contains a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. It will educate readers on the realities of advanced, next generation threats, which take form in a variety ways. This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis. This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO. Includes detailed analysis and examples of the threats in addition to related anecdotal information Authors’ combined backgrounds of security, military, and intelligence, give you distinct and timely insights Presents never-before-published information: identification and analysis of cybercrime and the psychological profiles that accompany them
    Note: Online resource; Title from title page (viewed January 7, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449305833
    Language: English
    Pages: 1 online resource (1 video file, approximately 31 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Big Data and predictive analytics can deliver incredible insight that can be used for purposes both good, and not so good. Drawing on real world examples, this session will examine the fine line between competitive advantage and bad behavior, and implications to a complex cast of stakeholders. Let’s begin a dialog on ethics now instead of waiting for our first major crisis.
    Note: Online resource; Title from title screen (viewed March 10, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449305802
    Language: English
    Pages: 1 online resource (1 video file, approximately 38 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Retailers and their suppliers have always operated on the cutting edge of data science. In fact, this industry is responsible for many of the technology advances that have contributed to the exponential growth of data, analytics, and related technology. This session covers the history of data science in retail, current trends, and explores future directions in the “big” data age.
    Note: Online resource; Title from title screen (viewed March 5, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449306328
    Language: English
    Pages: 1 online resource (1 video file, approximately 42 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: New technologies are driving a new era of global collaboration among scientists and researchers. Digital scholarship, the ability to create, collect, publish and collaborate in new digital mediums, is driving the exponential growth of data related to scholarly research. This talk will highlight evolving strategies used to appraise and predict the success of institutions and researchers.
    Note: Online resource; Title from title screen (viewed March 5, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449306311
    Language: English
    Pages: 1 online resource (1 video file, approximately 39 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Does information really want to be free? While the Internet is full of open data, there's plenty of data that companies are willing to pay handsomely for - particularly if it's timely and well aggregated. As a result, data marketplaces are a burgeoning business. This panel will look at the market for data, and where it's headed.
    Note: Online resource; Title from title screen (viewed March 1, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449305765
    Language: English
    Pages: 1 online resource (1 video file, approximately 45 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: There's never just one way to do things, but for big bets like Big Data, it helps to learn about paths that others have taken. In this presentation, Bob Page, VP Data & Analytics Platforms for eBay, gives a "behind the scenes" look at the systems and procedures that power decision-making at the world's largest online marketplace.
    Note: Online resource; Title from title screen (viewed March 5, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449305819
    Language: English
    Pages: 1 online resource (1 video file, approximately 30 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This presentation will focus on how businesses can maximize big data analytics for deeper customer insights.
    Note: Online resource; Title from title screen (viewed March 11, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 2 hr., 51 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Learn all of the steps necessary for building your first native iOS app. With this introductory video course, experienced iOS developer Alasdair Allan walks you through the entire process, from downloading the developer tools to submitting your finished app to Apple's App Store. You'll discover how to work with the Objective-C language, Xcode, Cocoa Touch, and many other tools and techniques along the way. If you're a beginning programmer, this video is an ideal to start creating your own apps for iPhone, iPad, and iPod Touch. Sign up as an Apple developer, and generate all of the certificates and provisioning profiles you need Become familiar with the Xcode and the iOS SDK by building a simple Hello World app Dive deep into the Cocoa Touch frameworks Build reusable code that enables you to embed web pages in your app Create a working Twitter Trends app and learn how to use several development techniques Prepare your finished app for sale on the App Store and upload it to iTunes Connect
    Note: Online resource; Title from title screen (viewed May 18, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9780080555669
    Language: English
    Pages: 1 online resource (288 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database. The only practical, hands-on guide for securing your Oracle database published by independent experts. Your Oracle database does not exist in a vacuum, so this book shows you how to securely integrate your database into your enterprise.
    Note: Online resource; Title from title page (viewed August 31, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449305901
    Language: English
    Pages: 1 online resource (1 video file, approximately 43 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: While the majority of charts were designed to handle a variety of data, there is a certain novelty of presenting data in a very succinct way. By designing a presentation method restricted to specific data points, we can realize an economy of space and interface.
    Note: Online resource; Title from title screen (viewed March 10, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449306281
    Language: English
    Pages: 1 online resource (1 video file, approximately 30 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: In a first, Forbes presented all federal campaign contributions by America's wealthiest people in our September 2010 online edition of the Forbes 400. We combined human effort and homegrown database code to sort through 6 million political donations and find the 20,000 that came from America's richest people.
    Note: Online resource; Title from title screen (viewed March 5, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9780080569963
    Language: English
    Pages: 1 online resource (200 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Teach your robot new tricks! With this projects-based approach you can program your Mindstorms NXT robot to solve a maze, build a house, run an obstacle course, and many other activities. Along the way you will learn the basics of programming structures and techniques using NXT-G and Microsoft VPL. For hobbyists, and students working on robot projects, Bishop provides the background and tools to program your robot for tasks that go beyond the simple routines provided with the robot kit. The programs range in complexity from simple contact avoidance and path following, to programs generating some degree of artificial intelligence * a how-to guide for programming your robot, using NXT-G and Microsoft VPL * ten robot-specific projects show how to extend your robot's capabilities beyond the manufacturer's provided software. Examples of projects include: Maze solver, Robot House Builder, Search (obstacle avoidance), Song and Dance Act * flowcharts and data flow diagrams are used to illustrate how to develop programs * introduces basic programming structures
    Note: Online resource; Title from title page (viewed April 18, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597491341
    Language: English
    Pages: 1 online resource (352 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders). This book is a guide to CompTIA's new RFID+ Security exam and includes the following study elements: Exam objectives covered in a chapter are clearly explained in the beginning of the chapter, Notes and Alerts highlight the crucial points, Exam’s Eye View emphasizes the important points from the exam’s perspective, Key Terms present definitions, Review Questions contain questions modeled after the real exam questions. Answers to these questions are presented with complete explanations in an appendix. Also included is a full practice exam modeled after the real exam. The answers to the exam questions are presented with full explanations. The only RFID+ study guide that provides 100% coverage of all exam objectives for the CompTIA RFID+ exam Packed full of special features and material to aid and reinforce learning
    Note: Online resource; Title from title page (viewed April 18, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597495806
    Language: English
    Pages: 1 online resource (248 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Windows Registry Forensics provides the background of the Windows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques are presented that take the student and analyst beyond the current use of viewers and into real analysis of data contained in the Registry, demonstrating the forensic value of the Registry. Named a 2011 Best Digital Forensics Book by InfoSec Reviews , this book is packed with real-world examples using freely available open source tools. It also includes case studies and a CD containing code and author-created tools discussed in the book. This book will appeal to computer forensic and incident response professionals, including federal government and commercial/private sector contractors, consultants, etc. Named a 2011 Best Digital Forensics Book by InfoSec Reviews Packed with real-world examples using freely available open source tools Deep explanation and understanding of the Windows Registry – the most difficult part of Windows to analyze forensically Includes a CD containing code and author-created tools discussed in the book
    Note: Online resource; Title from title page (viewed January 3, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449306168
    Language: English
    Pages: 1 online resource (1 video file, approximately 36 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: The ability to collect, crunch, act upon, and share huge amounts of data disrupts nearly every industry, tearing down barriers to entry and creating entirely new businesses.
    Note: Online resource; Title from title screen (viewed March 5, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    ISBN: 9781449305970
    Language: English
    Pages: 1 online resource (1 video file, approximately 35 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Information is changing healthcare forever. From the study of epidemics, to machine learning that can improve diagnosis, to the sequencing of the human genome, we're doing the math of life itself. This panel of practitioners will show us what they're doing in healthcare, pharmaceuticals, and genomics, and how it will change the way we discover, treat, and eliminate disease.
    Note: Online resource; Title from title screen (viewed March 5, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449306052
    Language: English
    Pages: 1 online resource (1 video file, approximately 42 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Join practitioners from a range of industries to learn how they're putting new tools and massive data sets to work. We'll hear how music, geophysics, and the legal system are all changing by putting huge, rich information into the hands of business.
    Note: Online resource; Title from title screen (viewed March 5, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449305932
    Language: English
    Pages: 1 online resource (1 video file, approximately 41 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Data modeling competitions allow companies and researchers to post a problem and have it scrutinised by the world's best data scientists. By exposing a problem to a wide audience, competitions are a great way to get the most out of a dataset. In just a few months, Kaggle's competitions have helped to progress the state of the art in chess ratings and HIV research.
    Note: Online resource; Title from title screen (viewed March 5, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449316457
    Language: English
    Pages: 1 online resource (1 video file, approximately 56 min.)
    Keywords: Electronic videos ; local
    Abstract: When it comes to conversion optimization, many questions come to mind: How should you design a particular page on your website? Which visitor flow should you consider? What copy or content should you develop to generate the most revenue from your website? Ultimately, the biggest impact on you bottom line relies heavily on choosing the right website design, visitor flow and copy. But what process should you follow and where should you start? While designing websites involves a great deal of art, pairing that with a scientific approach guarantees to deliver a higher ROI. In this webcast, you will: Examine real life case studies with before and after designs that generated uplifts in conversion rates Discover the proven process used to by top internet retailers & lead generation websites to increase revenue by 65% Learn about the six elements that impact visitor's persuasion online Uncover how to address different visitors' persona using different copy and design elements Find how to handle different buying stages on your website
    Note: Online resource; Title from title screen (viewed March 15, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449305963
    Language: English
    Pages: 1 online resource (1 video file, approximately 41 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: How do you build a crack team of data scientists on a shoestring budget? In this 40-minute presentation from the co-founder of Infochimps, Flip Kromer will draw from his experiences as a teacher and his vast programming and data experience to share lessons learned in building a team of smart, enthusiastic hires.
    Note: Online resource; Title from title screen (viewed March 10, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597496551
    Language: English
    Pages: 1 online resource (180 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience is required. It shows how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. With a simple and clean explanation of how to effectively utilize these tools – as well as the introduction to a four-step methodology for conducting a penetration test or hack – the book provides students with the know-how required to jump start their careers and gain a better understanding of offensive security. The book is organized into 7 chapters that cover hacking tools such as Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. PowerPoint slides are available for use in class. This book is an ideal reference for security consultants, beginning InfoSec professionals, and students. Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases. Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University. Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.
    Note: Online resource; Title from title page (viewed July 21, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449306243
    Language: English
    Pages: 1 online resource (1 video file, approximately 43 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Data integration and viz technology have given rise to an appetite for government data–the Gov 2.0 movement. Do government agencies have good data? Sort of: I believe that an understanding of data limitations has gotten short shrift in the drive to develop the next app. I'll discuss why a knowledge of the complexities of government data is crucial to building quality decision-making tools.
    Note: Online resource; Title from title screen (viewed March 5, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449306274
    Language: English
    Pages: 1 online resource (1 video file, approximately 27 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: To many people, Big Data means Open Data: social graphs, voting records, weather patterns, and more. But who owns data? Most of our laws were written for atoms, not bits; they're woefully out of date in an information age. When you share data, does it become more or less valuable? If someone adds to your data, is it still yours? This panel will tackle the gray area of data ownership.
    Note: Online resource; Title from title screen (viewed March 1, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449305758
    Language: English
    Pages: 1 online resource (1 video file, approximately 47 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: With Big Data comes Big Promises. Mine the blogosphere and discover the secret of eternal wealth. Feast on the Twitter feeds for the wisdom of the ages. We have visited this land in the past, naming it data warehousing and business intelligence. Will we learn the lessons of history? Can we do it differently today? Let's take this present moment to review the past and imagine the future.
    Note: Online resource; Title from title screen (viewed March 5, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449305857
    Language: English
    Pages: 1 online resource (1 video file, approximately 39 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Interactive visualizations have become the new media for telling stories online. This session will focus on going from a good visualization to a great visualization by focusing on organization, user interface, and formatting. You should expect to leave this session confident in your ability to consistently create excellent interactive visuals.
    Note: Online resource; Title from title screen (viewed March 1, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449306007
    Language: English
    Pages: 1 online resource (1 video file, approximately 40 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Certain recent academic developments in large data have immediate and sweeping applications in industry. They offer forward-thinking businesses the opportunity to achieve technical competitive advantages. However, these little-known techniques have not been discussed outside academia–until now. What if you knew about important new large data techniques that your competition don't yet know about?
    Note: Online resource; Title from title screen (viewed March 1, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449306359
    Language: English
    Pages: 1 online resource (1 video file, approximately 40 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Virtual worlds are a goldmine of untapped insights, even for predicting physical behaviors. Not only will we share PARC findings and methods developed to extract key data from online games, but more importantly, we'll discuss how social scientists converted and processed raw behavioral metrics into meaningful psychological variables that can be applied to a broad spectrum of business applications.
    Note: Online resource; Title from title screen (viewed March 10, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597491372
    Language: English
    Pages: 1 online resource (624 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The Perfect Reference for the Multitasked System Administrators The new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat will help you get Exchange Server 2007 up and running as quickly and safely as possible. • Understand Exchange 2007 Prerequisites Review hardware and software requirements, Active Directory requirements, and more. • Manage Recipient Filtering Create a custom MMC that contains the Exchange 2007 Recipients work center, which can be used, for example, by the helpdesk staff in your organization. • Manage Outlook Anywhere Outlook Anywhere makes it possible for your end users to remotely access their mailboxes from the Internet using their full Outlook clients. • Manage Outlook Web Access 2007 See how Outlook Web Access 2007 was completely rewritten in managed code to make it scale even better. • Use the Exchange 2007 Queue Viewer You can now view information about queues and examine the messages held within them. • Master Powerful Out-of-the-Box Spam Protection The Edge Transport server supports SMTP, provides several antispam filtering agents, and supports antivirus extensibility. • Manage a Single-Copy Cluster-Based Setup SCC-based cluster provides service failover and still has a single point of failure when it comes to the databases. • Recover Mailbox Databases Use the improved database portability feature to port and recover a Mailbox database to any server in the Exchange 2007 organization. Essential information for the multi-tasked System Administrator charged perform everyday tasks Includes the latest coverage of the major new release of Exchange Server Emphasizes best-practice security measures for all areas and in particular the area of remote access via Outlook
    Note: Online resource; Title from title page (viewed April 18, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449305918
    Language: English
    Pages: 1 online resource (1 video file, approximately 29 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Much useful business data is in "semi-structured" form: government filings, insurance claims, customer comment forms, etc. Although most search tools don't take advantage of it, knowing a little structure goes a long way. This talk will show how semi-structured data can be interpreted, summarized, and applied to produce business value in several real-life examples.
    Note: Online resource; Title from title screen (viewed March 5, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449306175
    Language: English
    Pages: 1 online resource (1 video file, approximately 39 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: After Kennedy, you couldn't win an election without TV. After Obama, it was social media. But tomorrow's citizen gets their information from visualizations. In this panel, three acclaimed designers show how they apply visualization to big data, making complex, controversial topics easy to understand and explore.
    Note: Online resource; Title from title screen (viewed March 10, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (130 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Ready to put your ActionScript 3 skills to work on iPhone and iPad apps? This hands-on book walks you through the process of creating an Adobe AIR application for iOS devices from start to finish, using the Flex 4.5 framework. Move quickly from a basic Hello World application to complex interactions with iOS APIs, and get complete code examples for working with device components—including the accelerometer, GPS, camera, gallery, and multitouch display. This is an ideal resource for Flex developers of all levels. Use Flash Builder 4.5 to create and debug a Flex Mobile project Choose a layout option to determine which files Flash Builder autogenerates Explore APIs that enable your app to interact with the camera, accelerometer, and GPS Read and write text files, and create and write to an SQLite database Interact with the browser, place calls, and create emails and text messages Load content into your app with StageWebView Design for iOS with specific UI elements while maintaining one code version for all mobile devices Publish your app to an Apple iOS installer file with Flash Builder
    Note: Online resource; Title from title page (viewed August 26, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (58 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Creating standards-compliant animations for the Web just got a lot easier. With this concise guide, you’ll learn how to convert Flash animations into HTML5, using Wallaby—the experimental tool from Adobe. Wallaby makes Flash content available for devices that don't support Flash runtimes, including the iPhone and iPad. Developing HTML5 animations is time-consuming with all the coding required. This book shows you how to create compelling content for HTML5 environments with relative ease, whether you know Flash or not. After a quick introduction to simple animation building with Flash, you'll learn how Wallaby helps you convert those animations into HTML5 code. Learn how to create a simple Flash animation, using Flash Professional CS5 Become familiar with the Flash Library, Stage drawing canvas, and animation Timeline Take the right approach to building a complex Flash animation for HTML5 Get performance tips to optimize animations for desktops and mobile devices Use simple JavaScript and CSS code to place the Wallaby animation in a web page Add interactivity to your HTML5 animation with jQuery
    Note: Online resource; Title from title page (viewed September 7, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449305987
    Language: English
    Pages: 1 online resource (1 video file, approximately 43 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: The state of open data today is a real mess. It's very difficult to find the data you need and be confident that it's timely and accurate. There is a growing list of companies now vying to become the key destinations for people to gather around new datasets and be excited together. What projects, partnerships and even ventures would be created if there was a marketplace for data?
    Note: Online resource; Title from title screen (viewed March 1, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449305826
    Language: English
    Pages: 1 online resource (1 video file, approximately 33 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: This presentation lays bare the dark underbelly of analytics in the enterprise. Drawing on darkly humorous experiences, the speaker will explain why executives treat analytics as an occult phenomenon. The talk will give executives the mental tools to separate strategically valuable analytics projects from fishing expeditions, and provide litmus tests to keep the witch doctors honest.
    Note: Online resource; Title from title screen (viewed March 10, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781449305864
    Language: English
    Pages: 1 online resource (1 video file, approximately 36 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: The move to cloud infrastructure and the need to handle big data have created the perfect catalysts for organizations to introduce new infrastructure software and break ties from their expensive incumbent vendors. Ed will share a detailed strategy on how to leverage open source database solutions like PostgreSQL to contain database cost and free budget for other, more valuable initiatives.
    Note: Online resource; Title from title screen (viewed March 1, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597495547
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally susceptible to similar attacks. If you need to keep up with the latest hacks, attacks, and exploits effecting USB technology, then this book is for you. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The attacks outlined in this book are intended for individuals with moderate Microsoft Windows proficiency. The book provides the tools, tricks, and detailed instructions necessary to reconstruct and mitigate these activities while peering into the risks and future aspects surrounding the respective technologies. There are seven chapters that cover the following: USB Hacksaw; the USB Switchblade; viruses and malicious codes; USB-based heap overflow; the evolution of forensics in computer security; pod slurping; and the human element of security, including the risks, rewards, and controversy surrounding social-engineering engagements. This book was written to target a vast audience including students, technical staff, business leaders, or anyone seeking to understand fully the removable-media risk for Windows systems. It will be a valuable resource for information security professionals of all levels, as well as web application developers and recreational hackers. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
    Note: Online resource; Title from title page (viewed June 3, 2010)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (368 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Network forensics is an evolution of typical digital forensics, in which evidence is gathered from network traffic in near real time. This book will help security and forensics professionals as well as network administrators build a solid foundation of processes and controls to identify incidents and gather evidence from the network. Forensic scientists and investigators are some of the fastest growing jobs in the United States with over 70,000 individuals employed in 2008. Specifically in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10,000 qualified specialists. Almost every technology company has developed or is developing a cloud computing strategy. To cut costs, many companies are moving toward network-based applications like SalesForce.com, PeopleSoft, and HR Direct. Every day, we are moving companies’ proprietary data into a cloud, which can be hosted anywhere in the world. These companies need to understand how to identify where their data is going and what they are sending. Key network forensics skills and tools are discussed-for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering TCP/IP. The current and future states of network forensics analysis tools are addressed. The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation.
    Note: Online resource; Title from title page (viewed July 2, 2010)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 50 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: The real battleground for "Digital Rights Management" may turn out to be negotiating and managing contracts for selling digital content. Hear lessons learned from dozens of ebook and digital contracts (on both sides of the table). How are business terms evolving to handle emerging digital and mobile markets? Are there terms in your digital contracts that are holdovers from the print world and aren't in tune with the realities of digital markets? Learn about five key contract terms that should be in every ebook contract you sign, along with other "gotchas" learned from the trenches.
    Note: Online resource; Title from title screen (viewed July 2, 2010)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597495899
    Language: English
    Pages: 1 online resource (336 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers. Discusses techniques used by malicious attackers in real-world situations Details unorthodox penetration testing techniques by getting inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks
    Note: Online resource; Title from title page (viewed November 2, 2010)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597495752
    Language: English
    Pages: 1 online resource (336 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out high-level attacks, which are developed in intermediate language. The initial part of the book offers an overview of managed code rootkits. It explores environment models of managed code and the relationship of managed code to rootkits by studying how they use application VMs. It also discusses attackers of managed code rootkits and various attack scenarios. The second part of the book covers the development of managed code rootkits, starting with the tools used in producing managed code rootkits through their deployment. The next part focuses on countermeasures that can possibly be used against managed code rootkits, including technical solutions, prevention, detection, and response tactics. The book concludes by presenting techniques that are somehow similar to managed code rootkits, which can be used in solving problems. Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews Introduces the reader briefly to managed code environments and rootkits in general Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation Focuses on managed code including Java, .NET, Android Dalvik and reviews malware development scanarios
    Note: Online resource; Title from title page (viewed November 25, 2010)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 1 hr., 15 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Here's a rule of thumb: During a downturn, executives are much more likely to think change is necessary. In a similar fashion, during times of great growth, we assume that what we're doing is causing the desired results so staying the course makes sense. Neither point of view is necessarily true. It could be that a rising or falling tide lifts or lowers all boats, and what our strategy needs to do is propel our organizations to better than general market outcomes! There's a way to bringing teams together to look at organizational trade-offs-decisions across all areas of their business or department. Remember "White Boarding" -- the tool we use to envision new horizons, new products, new opportunities, new growth? Well here's a tool to help make tough decisions -- MurderBoarding(TM). The opposite of white boarding is MurderBoarding, we select from among the many initiatives to choose only the best. The desire is to cull and eliminate. Many times resources are wasted because we try to do too much. MurderBoarding is a process that helps narrow opportunities so that decisions can be made. This methodology invites us to narrow our focus to what is critical, what is crucial. MurderBoarding is the opportunity to let some things really flourish by trimming off the excess that can distract you and your staff. By killing those time and resource draining activities, the company or department gets "pruned" so it can come back better, stronger for it. And in reality, it's less about "killing ideas" than putting them into purgatory so they can be resurrected when the time is right.
    Note: Online resource; Title from title screen (viewed July 2, 2010)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...