Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (7)
  • Sebastopol, CA : O'Reilly  (7)
  • Computer networks ; Security measures
  • Microsoft .NET
Datasource
Material
Language
Years
  • 1
    Language: English
    Pages: xviii, 645 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Keywords: UNIX Shells ; Computer networks ; Security measures ; Data encryption (Computer science) ; Electronic books ; local
    Abstract: Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide . This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
    Note: "Covers SSH-2 protocol"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 234 , ill. ; , 24 cm
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers. Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for ExciteHome.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture. How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
    Note: "Unmasking Identity Management Architecture (IMA)". - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 624 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Keywords: Internet programming ; Microsoft .NET ; Electronic books ; local
    Abstract: Brilliantly compiled by author Juval Lowy, Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover .NET 2.0. It remains one of the few practical books available on this topic. This invaluable resource is targeted at anyone who develops complex or enterprise-level applications with the .NET platform--an ever-widening market. In fact, nearly two million Microsoft developers worldwide now work on such systems. Programming .NET Components , Second Edition begins with a look at the fundamentals of component-oriented programming and then progresses from there. It takes the time to carefully examine how components can simplify and add flexibility to complex applications by allowing users to extend their capabilities. Next, the book introduces a variety of .NET essentials, as well as .NET development techniques. Within this discussion on component development, a separate chapter is devoted to each critical development feature, including asynchronous calls, serialization, remoting, security, and more. All the while, hazardous programming pitfalls are pointed out, saving the reader from experiencing them the hard way.A .NET expert and noted authority on component-oriented programming, Lowy uses his unique access to Microsoft technical teams to the best possible advantage, conveying detailed, insider information in easy-to-grasp, activity-filled language. This hands-on approach is designed to allow individuals to learn by doing rather than just reading. Indeed, after digesting Programming .NET Components , Second Edition, readers should be able to start developing .NET components immediately. Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover...
    Note: "Covers .NET 2.0 & Visual Studio 2005"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: vii, 142 p. ; , 18 cm
    Edition: 1st ed.
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Visual Basic .NET is a radically new version of Microsoft Visual Basic, the world's most widely used rapid application development (RAD) package. Whether you are just beginning application development with Visual Basic .NET or are already deep in code, you will appreciate just how easy and valuable the VB.NET Language Pocket Reference is. VB.NET Language Pocket Reference contains a concise description of all language elements by category. These include language elements implemented by the Visual Basic compiler, as well as all procedures and functions implemented in the Microsoft.VisualBasic namespace. Use it anytime you want to look up those pesky details of Visual Basic syntax or usage. With concise detail and no fluff, you'll want to take this book everywhere.
    Note: "Syntax and descriptions of the Visual Basic .NET language"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 202 p. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Concise but thorough, this second edition of C# Essentials introduces the Microsoft C# programming language, including the Microsoft .NET Common Language Runtime (CLR) and .NET Framework Class Libraries (FCL) that support it. This book?s compact format and terse presentation of key concepts serve as a roadmap to the online documentation included with the Microsoft .NET Framework SDK; the many examples provide much-needed context.This new edition has been updated to cover the final release of the C# language. In addition to overviews of C#, the CLR, and the FCL, this new edition of C# Essentials covers: Every C# language element and its syntax, in reference format, including new keywords The major C# datatypes, with code examples Common C# programming tasks Interoperation with legacy Win32 APIs and COM components, and the use of C/C++ style pointers within the managed context of the CLR Common development issues C# Essentials is an easy way for experienced programmers to evaluate and get up to speed quickly on the language best suited to developing web applications and services on the new Microsoft .NET platform.
    Note: Includes bibliographical references (p. viii-ix) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 367 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: OpenSSL ; Computer network protocols ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols. Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included.OpenSSL may well answer your need to protect sensitive data. If that?s the case, Network Security with OpenSSL is the only guide available on the subject.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.2/76
    Keywords: Active server pages ; Microsoft .NET ; Web site development ; Electronic books ; local
    Abstract: ASP.NET is the newest generation of Active Server Pages from Microsoft. More than a mere upgrade, it's designed to support the development of dynamic and data-driven web applications and web services in much the same way Visual Basic enabled the rapid development of Microsoft® Windows® desktop applications. For those experienced with previous versions of ASP or the .NET platform, ASP.NET in a Nutshell is an invaluable resource that goes beyond the published documentation to highlight little-known details, stress practical uses for particular features, and provide real-world examples that show how features can be used in a working application. ASP.NET in a Nutshell uses Visual Basic .NET for the many examples. Unlike other books, it distills what is a large and comparatively complicated subject into a tutorial and reference that is useful for both learning essential concepts and daily reference. This book covers application and web service development, custom controls, data access, security, deployment, and error handling. There's also an overview of the web-related namespaces in the .NET Framework Class Library. Like other books in the "In a Nutshell" series, ASP.NET in a Nutshell offers the facts, including critical background information, in a no-nonsense manner that users will refer to again and again. It is a detailed reference that enables even experienced web developers to advance their ASP.NET applications to new levels.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...