Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (187)
  • Linux  (76)
  • Microsoft .NET  (63)
  • Computer networks ; Security measures  (51)
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    Upper Saddle River, NJ. ; : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 480 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.4469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Praise for Marcel Gagné's Moving to Linux: Kiss the Blue Screen of Death Goodbye! "This is kind of a funny book for me to be recommending to readers of a Windows newsletter, but a lot of people ask me about this topic, so here goes. Author Marcel Gagné is a columnist for Linux Journal , and in Moving to Linux he's prepared a step-by-step guide to converting a Windows PC to Linux-or just trying it! The book includes a bootable CD with a version of Linux that you can poke around in without touching or changing anything about your Windows installation. If your boss is asking, 'What's with this Linux stuff?', moving to Linux is a great way to show that you know what you're talking about." -Brian Livingston, Editor, WindowsSecrets.com "Pros: Too many to list in the available space. We liked the book from the very first page right through to the end. Gagné has done a solid job of exposing Linux and all its components in a way that is both inviting, useful, and easy to understand . . . We really liked this book-highly recommended." -Howard Carson, Kickstart News, www.kickstartnews.com "Marcel walks the user through each technique in a very chatty and comfortable style. In fact, when I put the book down, I had a momentary impression that I'd just finished watching a good cooking show with an entertaining chef. (Australian readers may understand if I say that it felt like having just watched Ian Parmenter do an episode of 'Consuming Passions.')" -Jenn Vesperman, Linuxchix.org "Gagné's Moving to Linux is a straightforward exposition of just how a non-hacker PC user can get rid of 'The Blue Screen of Death'. If you have a friend, a co-worker, a significant other, or a relative who periodically screams, sighs, bursts into tears, or asks for help, here's the simple solution. It comes with a bootable CD of Knoppix, Klaus Knopper's variant of Debian." -Peter H. Salus, writing in ;login: The Usenix Magazine "This is a book aimed not at you, dear developer/techie/guru, but at your friends, acquaintances, and family who are lowly users of Windows. Yes, such people do exist even in the tightest of families. Fear not, however, because salvation is at hand should any of them decide that this Linux thing might be worth investigating. No longer will you be faced with the unenviable task of walking them through the process of switching OS. Moving to Linux: Kiss the Blue Screen of Death Goodbye! is a big, bold, and friendly guide to help them along. The emphasis i...
    Note: Disc in pocket attached to inside back cover. - Includes index. - Previous ed.: Boston, Mass. : Addison-Wesley, 2004
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xiii, 435 p. , ill. ; , 23 cm. +
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Novell Linux Desktop 9 User's Handbook is the official handbook to help you take control of you Novell Linux Desktop. Walk through the new Novell Linux interfaces as you learn how to use them, interact with the operating system, create files and more. Cover everything that you need to know to effectively and efficiently use the new desktop and quickly get up to speed on the latest technology from Novell with Novell Linux Desktop 9 User's Handbook .
    Note: Accompanied by Supplemental DVD. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: x, 182 p. , ill. ; , 23 cm. +
    DDC: 005.446076
    Keywords: Linux ; Operating systems (Computers) ; Problems, exercises, etc ; Operating systems (Computers) ; Certification ; Study guides ; Electronic books ; local
    Abstract: Familiarize yourself with practicum exams to successfully take either the Novell Certified Linux Professional (CLP) or the Novell Certified Linux Engineer (CLE) exam with the Novell Linux Certification Practicum Lab Manual . The first half of the book consists of exercises with scenarios and relevant background information. The second half of the book walks through the exercises and shows the reader how to obtain the needed results, and is broken into four sections: Working with the Desktop (CLP) Intermediate Administration (CLP and CLE) Advanced Administration (CLE) Answers (CLP and CLE) You will be able to walk through the scenarios and assess your preparedness for the exam with the help of the Novell Linux Certification Practicum Lab Manual .
    Note: Accompanied by double-sided DVD-ROM. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Microsoft Windows (Computer file) ; Computer software ; Development ; Microsoft .NET ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: "Brian Noyes' writing style easily captures your attention as he elaborates on all aspects of data binding in his book. He has a refreshingly clear and crisp delivery as he starts each chapter with a simple tour of each topic, and then leads you into practical concerns for sound practices and extensibility opportunities. Most importantly, as Brian explains approaches to data-binding architecture, patterns of usage, the value of data sets, binding controls and the rest, he always describes how he reaches his recommendations on the topic. This book is perfect for newcomers to .NET 2.0, but also for those that have some experience. Anyone who cares about data in their applications (okay, that should be almost everyone) is guaranteed to learn something new and useful by reading Brian's book." -Michele Leroux Bustamante, IDesign chief architect, Microsoft regional director, and MVP "Brian has saved me a lot of time. I'm writing The Hitchhiker's Guide to Visual Studio and SQL Server 2005 (7th Edition) and I'm not going to have to cover data binding nearly as deeply because Brian has done it for me. His book gets right to the meat of the subject and makes data binding look easy. I was also pleased to see that the book focuses on the misunderstood and under-applied Windows Forms architecture. It's a must-read for anyone trying to make their application more interactive and to leverage the new Visual Studio 2005 technology. I'm planning to point my readers to this resource when they need an in-depth treatment of data binding." -William Vaughn, president, Beta V Corporation "Data binding has finally come of age in Windows applications. Back in the Visual Studio 6.0 days, I ignored data binding completely and wrote my own repetitive code to encapsulate my business logic. With Visual Studio 2005, we finally have a robust and compelling data-binding technology. To ignore it today would make you inefficient and put you behind the curve. Brian delivers a clear and concise discussion of a core topic of development for Windows today. A combination of an easy-to-follow conversational yet technical tone, excellent examples, and solid explanations make this a must-read for any developer writing for Windows or learning to write for Windows." -Stephen Forte, chief technical officer, Corzen Inc. "This book provides a clear, readable, and in-depth treatment of data binding, with detailed discussions of best practices in the presentation and use of data. Brian c...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xv, 362 p. , ill. ; , 23 cm
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: What better way to learn something than from the inside? Novell Linux Desktop 9 Administrator's Handbook brings you inside the system and inside the only Novell authorized administrator's handbook for the new Novell Linux Desktop (NLD). Learn how NLD interacts with other Novell components and how to integrate security throughout the operating system. You'll also cover: Working with graphical interfaces, devices and file systems How to boot, initialize, shutdown and run levels Linux administration With the help of Novell Linux Desktop 9 Administrator's Handbook , you will master the administration of Novell Linux Desktop 9 systems.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xiv, 246 p. , ill. ; , 23 cm. +
    DDC: 005.438
    Keywords: Linux ; Z.E.N.works ; Graphical user interfaces (Computer systems) ; Electronic books ; local
    Abstract: Novell ZENworks Linux Management Administrator's Handbook is the official guide to ZENworks Linux Management, written by Ron Tanner , Novell ZENworks product manager, and Richard Whitehead , Novell ZENworks product marketing manager. Learn about the innovative combination of SUSE Linux and the advanced management capabilities of ZENworks that has positioned Novell as the leading enterprise Linux solution provider. You will learn about: The ZENworks family The ZENworks Management web console Registering devices into them system and system settings Reporting Common device management tasks Keeping servers synchronized Troubleshooting Gather insight directly from the minds behind ZENworks Linux Management with the Novell ZENworks Linux Management Administrator's Handbook .
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 532 p. , ill. ; , 23 cm
    DDC: 005.71376
    Keywords: Linux ; Directory services (Computer network technology) ; Electronic books ; local
    Abstract: As a system administrator, you are justly concerned about the security of your infrastructure. SUSE Linux Enterprise Server (SLES 9) can lead the way to infrastructure security and SUSE Linux Enterprise Server Administrator's Handbook is the authoritative source for information on this secure server. Step-by-step procedures will walk you through installing and securing a SLES 9 system, and it will focus on the specific security features that make SLES 9 an important platform for all system administrators. Some of what you will cover is: SuSE server installation User access and security Installing and configuring networking services Securing your SuSE server Leverage Linux and open source with SLES 9 and SUSE Linux Enterprise Server Administrator's Handbook to build a secure computing network for your company.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxx, 972 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Written for C# 2.0 and .NET 2.0: contains coverage of generics, Master Pages, the DataGridView, and other new features Covers Web development, Windows development, data management, security, threading, remoting, and much more Presents hundreds of non-trivial code examples that help you solve real-world problems The Complete and Comprehensive Developer's Guide to C# 2.0 and .NET 2.0 Core C# and .NET is the no-nonsense, example-rich guide to achieving exceptional results with C# 2.0 and .NET 2.0. Writing for experienced programmers, Stephen Perry presents today's best practices for leveraging both C# 2.0 language features and Microsoft's .NET 2.0 infrastructure. Like all books in the Core Series, Core C# and .NET focuses on solving real-world problems with serious, non-trivial code. Perry's broad, deep coverage ranges from new C# generics to Web services, from reflection to security. He systematically introduces the development of Windows Forms applications and the effective use of GDI+ graphics classes. He offers detailed guidance on data management with XML and ADO.NET, plus advanced coverage of threading, remoting, and code security. Finally, Perry presents an extensive section on Web development, covering ASP.NET, state management, HTTP requests, and much more. With practical insights into everything from scalability to localization, this is the C# book you've been searching for: your definitive guide to building production-quality C# applications. Core C# and .NET delivers Best practices for building C#/.NET Windows applications, Web applications, and Web services Expert insight into security, scalability, and other crucial issues Hundreds of professional-quality code examples In-depth coverage of the latest C# 2.0 features, including generics EVERY CORE SERIES BOOK: DEMONSTRATES practical techniques used by professional developers FEATURES robust, thoroughly tested sample code and realistic examples FOCUSES on the cutting-edge technologies you need to master today PROVIDES expert advice that will help you build superior software © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 369 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Linux ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: Covers Red Hat and SUSE When something goes wrong with your Linux firewall, you need to fix it-right now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes: Troubleshooting Linux® Firewalls . Authors Michael Shinn and Scott Shinn are among the world's leading firewall experts; they've even been hired to protect computer security at the White House. In this book, they cover every area where Linux firewalls can go wrong: rules and filtering problems, Layer 2/3/4 issues, trouble with individual services, DNS/DHCP failures, even misconfigured VPNs. They also present an easy, start-to-finish troubleshooting methodology that'll help you identify even the newest or most obscure firewall problem fast-and solve it! Inside, you will find in-depth information on the following areas: What you must know about iptables and netfilter to troubleshoot and avoid problems Using loggers, sniffers, and other tools to diagnose even the most obscure firewall problems Making sure your firewall rules work the way they're supposed to Resolving problems with Network Address Translation and IP Forwarding Troubleshooting SMTP, Apache, Squid, NFS, FTP, instant messaging, and other Web-based services Finding and fixing common problems with IPsec VPN configuration Making your firewalls more failure-resistant: recommendations from the experts If you depend on a Linux firewall, what will you do if it goes down? With Troubleshooting Linux® Firewalls , you can be confident that the solutions are right at hand-so you can sleep at night! © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR ; | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 353 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The first comprehensive, expert guide for end-to-end Linux application optimization Learn to choose the right tools-and use them together to solve real problems in real production environments Superior application performance is more crucial than ever-and in today's complex production environments, it's tougher to ensure, too. If you use Linux, you have extraordinary advantages: complete source code access, plus an exceptional array of optimization tools. But the tools are scattered across the Internet. Many are poorly documented. And few experts know how to use them together to solve real problems. Now, one of those experts has written the definitive Linux tuning primer for every professional: Optimizing Linux® Performance. Renowned Linux benchmarking specialist Phillip Ezolt introduces each of today's most important Linux optimization tools, showing how they fit into a proven methodology for perfecting overall application performance. Using realistic examples, Ezolt shows developers how to pinpoint exact lines of source code that are impacting performance. He teaches sysadmins and application developers how to rapidly drill down to specific bottlenecks, so they can implement solutions more quickly. You'll discover how to: Identify bottlenecks even if you're not familiar with the underlying system Find and choose the right performance tools for any problem Recognize the meaning of the events you're measuring Optimize system CPU, user CPU, memory, network I/O, and disk I/O-and understand their interrelationships Fix CPU-bound, latency-sensitive, and I/O-bound applications, through case studies you can easily adapt to your own environment Install and use oprofile, the advanced systemwide profiler for Linux systems If you're new to tuning, Ezolt gives you a clear and practical introduction to all the principles and strategies you'll need. If you're migrating to Linux, you'll quickly master Linux equivalents to the tools and techniques you already know. Whatever your background or environment, this book can help you improve the performance of all your Linux applications-increasingbusiness value and user satisfaction at the same time. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Praise for Mark Sobell's Books "I keep searching for books that collect everything you want to know about a subject in one place, and keep getting disappointed. Usually the books leave out some important topic, while others go too deep in some areas and must skim lightly over the others. A Practical Guide to Red Hat® Linux® is one of those rare books that actually pulls it off. Mark G. Sobell has created a single reference for Red Hat Linux that cannot be beat! This marvelous text (with a 4-CD set of Linux Fedora Core 2 included) is well worth the price. This is as close to an 'everything you ever needed to know' book that I've seen. It's just that good and rates 5 out of 5." -Ray Lodato, Slashdot contributor "Mark Sobell has written a book as approachable as it is authoritative." -Jeffrey Bianchine, Advocate, Author, Journalist "Excellent reference book, well suited for the sysadmin of a linux cluster, or the owner of a PC contemplating installing a recent stable linux. Don't be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs." -Wes Boudville, Inventor " A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you Mark Sobell." -C. Pozrikidis, University of California at San Diego "This book presents the best overview of the Linux operating system that I have found. . . . It should be very helpful and understandable no matter what the reader's background is: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready." -Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group FRUUG, Boulder, Colorado "Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There's no other book that discusses so many different topics and in such depth." -Eugenia Loli-Queru, Editor in Chief, OSNews.com The Most Useful Linux Tutorial and Reference Ever, with Hundreds of High-Quality Examples Covering Every Linux Distribution! To be truly productive with Linux, you need to thoroughly mast...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 1090 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.26/8
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The best just became BETTER! Completely revised to meet all your Red Hat Linux needs! Fedora Core and Red Hat Enterprise Linux are advanced operating systems. You need a book that's just as advanced. This book explains Linux clearly and effectively--with a focus on the features you care about, including system security, Internet server setup, and sharing files and printers with Windows systems. Best-selling Linux author Mark Sobell starts at the beginning and walks you through everything that matters, from installing Fedora Core using the included CDs to GNOME, KDE, Samba 3, sendmail, Apache, DNS, NIS, and iptables. Along the way, you learn the "hows" and the "whys." Whether you are a user, an administrator, or a programmer, this book gives you all you need and more. Mark Sobell knows every Linux nook and cranny, has taught hundreds of thousands of readers, and never forgets what it's like to be new to Linux. Don't settle for yesterday's Linux book...get the ONLY book that meets today's challenges and tomorrow's! Compared with the other Linux books out there, A Practical Guide to Red Hat® Linux®, Second Edition, delivers... The full Fedora Core operating system on 4 CDs (not the truncated "Publisher's Edition") AND complete coverage of Fedora Core and the 2.6 Linux kernel, PLUS coverage of Red Hat Enterprise Linux Deeper coverage of GNOME and KDE, including customization More practical coverage of file sharing with Samba, NFS, and FTP Easier-to-follow coverage of Internet server configuration including Apache, sendmail, NFS, and DNS More up-to-date coverage of security, including SELinux (Security Enhanced Linux), OpenSSH, and firewall setup using iptables Better coverage of "meat-and-potatoes" system/network administration tasks A more practical introduction to writing bash shell scripts More complete coverage of configuring local and network printers using CUPS And much more...including a 500+ word glossary and a comprehensive index to help you find what you need fast! Includes 4 CDs! Get the full version of Red Hat's Fedora Core 2 release!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Boston : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 665 p. , ill. ; , 24 cm. +
    Keywords: Linux ; Business ; Data processing ; Computer networks ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Switch your business to Linux: proven techniques for working IT Professionals This is the complete technical resource for migrating your business desktops to Linux, administering them efficiently, and using them to drive cost savings throughout your organization. Respected Linux Journal columnist Marcel Gagné walks you step-by-step through planning and managing the transition, getting users up and running, and keeping them happy. Gagné covers hardware, productivity applications, messaging, coexistence with Windows environments, support, and much more. This is also the first book with in-depth coverage of using Linux Terminal Server Project (LTSP) thin clients to dramatically reduce the cost and complexity of computing. Deploy Linux with your existing PCs, printers, and IT/network infrastructure Centrally manage users and security through Webmin's convenient Web interface Deliver reliable email services with Postfix, or integrate Linux mail clients with Microsoft Exchange servers Configure Windows file sharing with Samba, and Linux file sharing with NFS Secure network communications with Linux firewalls and OpenSSH Plan and deploy LTSP thin clients and diskless workstations and the server support for them Provide LDAP directory services to all your clients Support users by "remote control"-without leaving your desk From network security to spam reduction, automated backup/restore to collaboration groupware, Gagné offers specific solutions and proven techniques for leveraging the full power of Linux in your business. Say goodbye to the expense, hassle, and insecurity of Windows desktops! Say hello to business computing the way it's supposed to be-with Linux! About the Author Marcel Gagné is best known as the author of the Linux Journal's "Cooking with Linux" series, winner of the Readers' Choice award for favorite column for three straight years. He has written two highly acclaimed Addison-Wesley books: Moving to Linux and Linux System Administration: A User's Guide. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 651 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Where has this book been all my professional life? It is about time someone wrote this book. The author covers many basic, practical issues that other authors omit in a format that makes for a great troubleshooting reference and for casual perusing. There are a lot of books available that give a broad overview of system and network administration, and there are a lot of detailed books on each specific topic covered in this book, but I don't know of any other place where I can get so much useful, practical information on such a wide range of topics in such a concise and readable form. I will highly recommend it to my friends and colleagues who are trying to manage their own systems. I am anxious to show it to our instructors who teach data communications and networks as a possible text or lab manual." -Ron McCarty, instructor and program chair, Computer Science, Penn State Erie "This book takes a very unique approach and is very flexible. It offers a great deal to the home user, students, small businesses-all the way to any Linux sys admin that needs a handy reference. I found it very refreshing in terms of style, stated goals, presentation, ease of use, direction, and the "present and future" value of the content. In other words the author is very current and knowledgeable. I would recommend this book to every level from programmer to manager." -Joe Brazeal, Information Technician III, Southwest Power Pool "This book is an excellent resource for new Linux administrators. I was impressed with the comprehensive set of 35 topic chapters, making this book a very useful reference. I know of no other work like this." -George Vish II, Linux curriculum program manager and senior education consultant, Hewlett-Packard Education "I would recommend this book to novice Linux users and administrators. It covers a lot of topics, and makes it easy for readers to follow along." -Bret Strong, education consultant, Hewlett-Packard Company "Linux Quick Fix Notebook is a well-written guide to designing, installing, and maintaining Linux servers. Many Linux reference texts are just simple rewrites of Linux ¨man¨ and ¨info¨ pages, but this book addresses the real issues that systems administrators encounter when working with Linux. The author provides a pedagogical guide to learning Linux server administration. In addition, the book includes step-by-step information so that users can quickly take advantage of the best that open source software has to offer today. I...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Learn Linux kernel programming, hands-on : a uniquely effective top-down approach The Linux ® Kernel Primer is the definitive guide to Linux kernel programming. The authors' unique top-down approach makes kernel programming easier to understand by systematically tracing functionality from user space into the kernel and carefully associating kernel internals with user-level programming fundamentals. Their approach helps you build on what you already know about Linux, gaining a deep understanding of how the kernel works and how its elements fit together. One step at a time, the authors introduce all the tools and assembly language programming techniques required to understand kernel code and control its behavior. They compare x86 and PowerPC implementations side-by-side, illuminating cryptic functionality through carefully-annotated source code examples and realistic projects. The Linux ® Kernel Primer is the first book to offer in-depth coverage of the rapidly growing PowerPC Linux development platform, and the only book to thoroughly discuss kernel configuration with the Linux build system. Coverage includes Data structures x86 and PPC assembly language Viewing kernel internals Linux process model User and kernel space Interrupts and exceptions Memory allocation and tracking Tracing subsystem behavior I/O interactions Filesystems and file operations Scheduling and synchronization Kernel boot process Kernel build system Configuration options Device drivers And more... If you know C, this book teaches you all the skills and techniques you need to succeed with Linux kernel programming. Whether you're a systems programmer, software engineer, systems analyst, test professional, open source project contributor, or simply a Linux enthusiast, you'll find it indispensable. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: 360 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The fastest route to true Linux mastery! You know your way around Windows (or maybe a Mac, or even UNIX). Now, you're ready for Linux. And you don't have a minute to waste. Welcome. This book's for you . Janet Valade has spent thirteen years helping new users master Linux and related technologies. She knows the "magic words" that'll help you get the job done, fast. (And she knows exactly how to keep you out of trouble, too!) You'll learn Linux through dozens of focused, bite-size examples, each one carefully designed to build on what you've learned before. Need specific solutions? This book's carefully crafted, high-efficiency format delivers them... instantly . Working on Fedora? Mandrake? SuSE? No matter. This book is for you. No other introduction to Linux covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with Linux- without the hassles! Choose the best Linux distribution for your personal or business needs Get Linux installed quickly and running reliably Handle your day-to-day tasks and efficiently manage your files Master KDE, GNOME, and the Linux command line Write documents and build spreadsheets with OpenOffice.org Set up Web access, email, and instant messaging Work with powerful Linux multimedia and graphics software Find, install, and run new Linux software Set up your printer to work with Linux Supercharge Linux with shell scripts and customized configuration files Includes concise Linux command reference and quick guide to building powerful Regular Expressions Spring Into ... is a new series of fast-paced tutorials from Addison-Wesley Professional Publishers. Each book in the series is designed to bring you up-to-speed quickly. Complex technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working... now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 352 p. , ill. ; , 23 cm. +
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Enter your Linux Desktop Garage Don't just survive with Linux: thrive Find tools & info to do practically everything , such as: Ripping your CDs (&DVDs) De-Spam-ifying your email Capturing, editing, organizing your digital photos Chatting with your Linux-deficient IM pals Tracking your contacts, appointments, life Transforming Firefox into easy blogware Finding great substitutes for your Windows apps Diving into a veritable plethora of games Where you get the truth (unvarnished) Where you get productive (quick) Where Linux is fun (honest) Your guide: Susan Matteson , real user, real expert She reveals the fun stuff (from MP3s to desktop wallpaper) Demystifies the essentials (from file management to passwords) Simplifies the tasks they said were easy, but weren't (until now) Where there's even more (plenty) Step-by-step instructions for both Mandrake & Fedora Linux Zero-hassle tips for managing & personalizing your PC Gnoppix Linux on CD-ROM (run Linux without touching Windows) © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 381 p. , ill. ; , 23 cm
    Keywords: Computer networks ; Security measures ; Computer security ; Computer security ; United States ; Management ; Data protection ; Data protection ; Management ; Electronic books ; local
    Abstract: Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization's aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board. Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow fin...
    Note: "Understand the total cost of ownership and return on investment for network security solutions"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 238 p. , ill. ; , 24 cm
    Keywords: Linux ; Computer security ; Electronic books ; local
    Abstract: The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: A readable and concrete explanation of SELinux concepts and the SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With SELinux , a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 478 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.
    Note: "A system administrator's guide to hetrogeneous networking"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 798 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: "The book you are about to read will arm you with the knowledge you need to defend your network from attackers-both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." -Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security-one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." -Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." -Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." -Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes-resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools-including Sguil, Argus, and Ethereal-to mine network traffic for full content, session, statistical, and ale...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 702 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    DDC: 005.1
    Keywords: Linux ; Application software ; Development ; Electronic books ; local
    Abstract: "The first edition of this book has always been kept within arm's reach of my desk due to the wonderful explanations of all areas of the Linux userspace API. This second edition greatly overshadows the first one, and will replace it." --Greg Kroah-Hartman, Linux kernel programmer Develop Software that Leverages the Full Power of Today's Linux Linux Application Development, Second Edition, is the definitive reference for Linux programmers at all levels of experience, including C programmers moving from other operating systems. Building on their widely praised first edition, leading Linux programmers Michael Johnson and Erik Troan systematically present the key APIs and techniques you need to create robust, secure, efficient software or to port existing code to Linux. This book has been fully updated for the Linux 2.6 kernel, GNU C library version 2.3, the latest POSIX standards, and the Single Unix Specification, Issue 6. Its deep coverage of Linux-specific extensions and features helps you take advantage of the full power of contemporary Linux. Along the way, the authors share insights, tips, and tricks for developers working with any recent Linux distribution, and virtually any version of Unix. Topics include Developing in Linux: understanding the operating system, licensing, and documentation The development environment: compilers, linker and loader, and unique debugging tools System programming: process models, file handling, signal processing, directory operations, and job control Terminals, sockets, timers, virtual consoles, and the Linux console Development libraries: string matching, terminal handling, command-line parsing, authentication, and more Hundreds of downloadable code samples New to this edition The GNU C library (glibc), underlying standards, and test macros Writing secure Linux programs, system daemons, and utilities Significantly expanded coverage of memory debugging, including Valgrind and mpr Greatly improved coverage of regular expressions IPv6 networking coverage, including new system library interfaces for using IPv6 and IPv4 interchangeably Coverage of strace, ltrace, real-time signals, poll and epoll system calls, popt library improvements, Pluggable Authentication Modules (PAM), qdbm, and much more Improved index and glossary, plus line-numbered code examples
    Note: Includes bibliographical references (p. 679-682) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 341 p. , ill. ; , 23 cm. +
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: For years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you to perform all the tasks you can do with Windows.Getting to know Linux has never been easier, because now there's a way to test-drive Linux without changing, installing, or configuring a thing on your computer. It's called Test Driving Linux: From Windows to Linux in 60 Seconds .This latest release from O'Reilly comes with a Live CD called Move, that allows Windows users to try all the features of Mandrake Linux, a popular Linux distribution without the hassle of actually installing Linux. Users simply place the Move CD into their CD drive, boot from the disc, then watch an entire Mandrake system run on the fly from the CD-ROM. Test Driving Linux: From Windows to Linux in 60 Seconds is a detailed step-by-step guide to the Linux operating system and several popular open source programs. With this guide you can quickly learn how to use Linux to perform the tasks you do most: surf the web, send and receive email, instant message with friends, write letters, create spreadsheets, and even how to enhance your digital photos. Test Driving Linux: From Windows to Linux in 60 Seconds provides both home and business users with a hassle-free way to investigate this operating system before they purchase and install a complete Linux distribution.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxii, 372 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer crimes ; Prevention ; Computer networks ; Security measures ; Internet ; Security measures ; Electronic books ; local
    Abstract: Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the following topics How denial-of-service attacks are waged How to improve your network's resilience to denial-of-service attacks What to do when you are involved in a denial-of-service attack The laws that apply to these attacks and their implications How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplices The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.
    Note: Includes bibliographical references (p. 335-350) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Note: Includes bibliographical references (p. [389]-395) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 734 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 234 , ill. ; , 24 cm
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers. Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for ExciteHome.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture. How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
    Note: "Unmasking Identity Management Architecture (IMA)". - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xiii, 270 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysis But the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.
    Note: "Solutions and examples for Snort administrators"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Language: English
    Pages: xviii, 645 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Keywords: UNIX Shells ; Computer networks ; Security measures ; Data encryption (Computer science) ; Electronic books ; local
    Abstract: Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide . This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
    Note: "Covers SSH-2 protocol"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xiii, 324 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.
    Note: "Writing, hacking, and modifying security tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 454 p. , ill. ; , 24 cm
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions. Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems. Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detectio...
    Note: Includes bibliographical references (p. [427]-430) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 504 p. , ill. ; , 23 cm
    DDC: 005.5
    Keywords: Microsoft Office ; Application software ; Development ; Microsoft .NET ; Electronic books ; local
    Abstract: This book delivers real-world strategies and coding techniques for creating Microsoft Office-based solutions that work seamlessly in the .NET environment-information that's been put to work by Microsoft's own product support and development teams.
    Note: At head of title: Microsoft. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Sams | Boston, MA :Safari,
    Language: English
    Pages: 976 p. , ill. ; , 24 cm
    Keywords: Microsoft .NET ; Visual programming (Computer science) ; Electronic books ; local
    Abstract: Microsoft Visual C# .NET 2003 Unleashed is a comprehensive reference and learning guide for the .NET Framework, using C# as the instructional language. You will be exposed to everything from low-level information on the Garbage Collector to advanced concepts like creating applications that use Enterprise Services, creating Web Services and even advanced Windows GUI. This book will become your definitive source of information on C# programming and the .NET framework. The book's lay-flat design makes it an ideal desk reference and the online searching and indexing through Safari make it the perfect tool for finding information quickly. Microsoft Visual C# .NET 2003 Unleashed will show you all the ways you can unleash your C# programming skills.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 350 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.26/8
    Keywords: Linux ; Electronic data processing ; Distributed processing ; High performance computing ; Operating systems (Computers) ; Parallel processing (Electronic computers) ; Electronic books ; local
    Abstract: To the outside world, a "supercomputer" appears to be a single system. In fact, it's a cluster of computers that share a local area network and have the ability to work together on a single problem as a team. Many businesses used to consider supercomputing beyond the reach of their budgets, but new Linux applications have made high-performance clusters more affordable than ever. These days, the promise of low-cost supercomputing is one of the main reasons many businesses choose Linux over other operating systems.This new guide covers everything a newcomer to clustering will need to plan, build, and deploy a high-performance Linux cluster. The book focuses on clustering for high-performance computation, although much of its information also applies to clustering for high-availability (failover and disaster recovery). The book discusses the key tools you'll need to get started, including good practices to use while exploring the tools and growing a system. You'll learn about planning, hardware choices, bulk installation of Linux on multiple systems, and other basic considerations. Then, you'll learn about software options that can save you hours--or even weeks--of deployment time.Since a wide variety of options exist in each area of clustering software, the author discusses the pros and cons of the major free software projects and chooses those that are most likely to be helpful to new cluster administrators and programmers. A few of the projects introduced in the book include: MPI, the most popular programming library for clusters. This book offers simple but realistic introductory examples along with some pointers for advanced use. OSCAR and Rocks, two comprehensive installation and administrative systems openMosix (a convenient tool for distributing jobs), Linux kernel extensions that migrate processes transparently for load balancing PVFS, one of the parallel filesystems that make clustering I/O easier C3, a set of commands for administering multiple systems Ganglia, OpenPBS, and cloning tools (Kickstart, SIS and G4U) are also covered. The book looks at cluster installation packages (OSCAR & Rocks) and then considers the core packages individually for greater depth or for folks wishing to do a custom installation. Guidelines for debugging, profiling, performance tuning, and managing jobs from multiple users round out this immensely useful book.
    Note: "A comprehensive getting started guide"--Cover. - Includes bibliographical references (p. 329-337) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 624 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Keywords: Internet programming ; Microsoft .NET ; Electronic books ; local
    Abstract: Brilliantly compiled by author Juval Lowy, Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover .NET 2.0. It remains one of the few practical books available on this topic. This invaluable resource is targeted at anyone who develops complex or enterprise-level applications with the .NET platform--an ever-widening market. In fact, nearly two million Microsoft developers worldwide now work on such systems. Programming .NET Components , Second Edition begins with a look at the fundamentals of component-oriented programming and then progresses from there. It takes the time to carefully examine how components can simplify and add flexibility to complex applications by allowing users to extend their capabilities. Next, the book introduces a variety of .NET essentials, as well as .NET development techniques. Within this discussion on component development, a separate chapter is devoted to each critical development feature, including asynchronous calls, serialization, remoting, security, and more. All the while, hazardous programming pitfalls are pointed out, saving the reader from experiencing them the hard way.A .NET expert and noted authority on component-oriented programming, Lowy uses his unique access to Microsoft technical teams to the best possible advantage, conveying detailed, insider information in easy-to-grasp, activity-filled language. This hands-on approach is designed to allow individuals to learn by doing rather than just reading. Indeed, after digesting Programming .NET Components , Second Edition, readers should be able to start developing .NET components immediately. Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover...
    Note: "Covers .NET 2.0 & Visual Studio 2005"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 687 p. , ill. ; , 24 cm
    DDC: 005.4/4682
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "This is an excellent introduction to Linux programming. The topics are well chosen and lucidly presented. I learned things myself, especially about internationalization, and I've been at this for quite a while." -Chet Ramey, Coauthor and Maintainer of the Bash shell "This is a good introduction to Linux programming. Arnold's technique of showing how experienced programmers use the Linux programming interfaces is a nice touch, much more useful than the canned programming examples found in most books." -Ulrich Drepper, Project Lead, GNU C library "A gentle yet thorough introduction to the art of UNIX system programming, Linux Programming by Example uses code from a wide range of familiar programs to illustrate each concept it teaches. Readers will enjoy an interesting mix of in-depth API descriptions and portability guidelines, and will come away well prepared to begin reading and writing systems applications. Heartily recommended." -Jim Meyering, Coauthor and Maintainer of the GNU Core Utility Programs Learn Linux® programming, hands-on... from real source code This book teaches Linux programming in the most effective way possible: by showing and explaining well-written programs. Drawing from both V7 Unix® and current GNU source code, Arnold Robbins focuses on the fundamental system call APIs at the core of any significant program, presenting examples from programs that Linux/Unix users already use every day. Gradually, one step at a time, Robbins teaches both high-level principles and "under the hood" techniques. Along the way, he carefully addresses real-world issues like performance, portability, and robustness. Coverage includes: Memory management File I/O File metadata Processes Users and groups Sorting and searching Argument parsing Extended interfaces Signals Internationalization Debugging And more... Just learning to program? Switching from Windows®? Already developing with Linux but interested in exploring the system call interface further? No matter which, quickly and directly, this book will help you master the fundamentals needed to build serious Linux software. Companion Web Sites, authors.phptr.com/robbins and www.linux-by-example.com , include all code examples.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 326 p. , ill. ; , 24 cm. +
    Edition: 4th ed.
    DDC: 005.4/32
    Keywords: Linux ; Electronic books ; local
    Abstract: The GNU/Linux® success story is well known. Firmly established as a high-performance operating system, its worldwide installations are increasing at phenomenal rates. Much of this success has been on the server side, but more and more PC users are turning to Linux on the desktop, as well. For those grounded in Microsoft Windows® or Apple Macintosh® graphical interfaces, the first look at a powerful Unix-style operating system can be daunting. This book provides a clear, no-nonsense introduction to the popular Red Hat® distribution of Linux. It takes you through installation and shows you the key parts of the system, always with an eye toward what can go wrong and what you need to know to get over the humps. Linux is known as a secure environment and a good platform to run a web server. These topics are among the many covered in this book. But did you know you can also burn CDs, sync a PalmPilot™, and edit slideshow presentations with powerful tools on Linux? Those topics are covered here, too. Red Hat currently provides two distributions, both documented in this book. The first is their commercial, subscription-based product, called Red Hat Enterprise Linux and also available through retail channels as Red Hat Professional Workstation. The second is the freely distributed Fedora distribution. The Publisher's Edition of Fedora is included in this book on two disks. New in this edition are installation instructions for Red Hat Enterprise Linux and Fedora, package updating for Red Hat Enterprise Linux and Fedora, information on the GRUB bootloader, and the CUPS printer system. Learning Red Hat Enterprise Linux and Fedora tells you how to: Prepare your system for installing Linux Install and configure Linux and the two popular desktop environments, GNOME and KDE. Run the most popular productivity tools on Linux: mailers, web browsers, OpenOffice, and Evolution. Obtain and set up software through the Red Hat Package Manager (RPM) Set up a Linux system for networking, either on your local area network (LAN), or via a dialup connection to the Internet. Use the system-administration tools included with Red Hat, GNOME, and KDE, including such valuable utilities as Samba file-sharing and the Apache web server. Understand and write shell scripts so you can peek under the hood and extend the power of Linux.
    Note: Originally published as: Learning Red Hat Linux. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Visual Basic® .NET Power Coding is the experienced developer's guide to mastering advanced Visual Basic .NET concepts. Paul Kimmel saves readers time and money by providing thorough explanations of essential topics so you can quickly begin creating robust programs that have fewer bugs. He also demonstrates important concepts by using numerous real-world examples that include working code that has been tested against Visual Basic .NET 2003. After a brief review of language idioms, Kimmel moves to more advanced techniques that help programmers solve their most challenging problems. Central to advanced development and deployment are chapters on security, Web services, ASP.NET programming, COM Interop, and Remoting. This book also covers thin client programming, which offers businesses a real solution to managing deployment and upgrades with Windows Forms using Reflection and HTTP. An appendix walks readers through migrating Visual Basic 6.0 applications to Visual Basic .NET. A companion Web site includes the complete downloadable source code, extensive reusable examples, and updates from the author. This book can be read cover-to-cover or used as a reference to answer questions faced by experienced VB .NET developers, including: Chapter 4: What can you do with Reflection technology? Chapter 6: How can you safely incorporate multithreaded behavior into Visual Basic .NET applications? Chapter 8: How would you serialize objects and implement Remoting for distributed projects? Chapter 14: How do you return an ADO.NET DataSet from a Web service? Chapter 18: What are the best practices for securing Web applications? Visual Basic® .NET Power Coding empowers developers to exploit all the advanced features of Visual Basic .NET. 0672324075B06062003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Java (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: .NET for Java Developers is the definitive guide to leveraging your Java programming experience in the .NET environment. Understanding the similarities and differences between the C# and Java APIs enables Java programmers to quickly begin rapid application Windows development using C#. The numerous code examples, which have been tested using Visual Studio® .NET 2003 and Java 1.4, show readers how to create feature-rich .NET applications by translating Java coding practices into C#. The authors begin by detailing the .NET Framework and then immediately introduce readers to coding and the Visual Studio® .NET IDE. They compare the features of C# and Java, and provide a systematic analysis of how the two languages relate to each other. Readers cover the essentials of C# programming, from object creation to event programming, before moving into advanced areas, such as database access, XML processing, GUI programming, and reflection. Key topics that explain how to do smart C# programming rather than emulating Java code in C#: Database access Inheritance and polymorphism Thread programming Garbage collection and memory management C# application deployment Delegates Processing XML .NET for Java Developers provides Java developers, programmers, and architects with experience-based advice for a successful transition into the .NET environment. 0672324024B06242003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Boston : Prentice Hall Professional Technical Reference, c2005 : [Verlag nicht ermittelbar] | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 567 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Linux ; Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Linux is the fastest-growing Java development platform because it saves money and time by serving as a platform for both development and deployment. But developers face significant platform-specific challenges when managing and deploying Java applications in a controlled production environment. Written for Java and Linux developers alike, Java™ Application Development on Linux® is the hands-on guide to the full Java application development lifecycle on Linux. Determined to spare other developers hours of trial and error, Albing and Schwarz demonstrate the platform, tools, and application development by showing realistic, easy-to-follow examples. After a simple command-line application introduces basic tools, this program leads readers through business-logic object analysis, database design, Java servlet UIs, Java Server Pages (JSP) UIs, Swing GUIs, and Standard Widget Toolkit (SWT) GUIs. Scaling up to the enterprise level provides the opportunity to use both the JBoss Application Server and the Apache Geronimo Application Servers, and Enterprise JavaBeans (EJB). Readers learn how to Use development tools available on Linux, such as the GNU Compiler for Java (gcj), Ant, the NetBeans IDE, IBM's Eclipse Java IDE, JUnit, and SunONE Studio Develop business logic layers using Java DataBase Connectivity (JDBC) Add a Web interface using servlets and JSPs Add a GUI using Sun's Abstract Window Toolkit (AWT) and IBM's SWT Deploy EJBs in Linux The authors conclude by demonstrating how a hierarchy of budgets can be created, tracked, and shared with Concurrent Versions System (CVS). A companion Website includes all source code and a link to each tool described. Java™ Application Development on Linux® can propel you from a standing start to the full-speed development and deployment of Java applications on Linux.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 647 p. , ill. ; , 23 cm
    Series Statement: Prentice Hall series in computer networking and distributed systems
    DDC: 005.8
    Keywords: Computer crimes ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to come "This is a truly outstanding book-enormous technical wealth and beautifully written." -Warwick Ford "Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!" -Harlan Carvey, CISSP "This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." -Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it! This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes: Solutions and examples that cover both UNIX® and Windows® Practical, time-tested, real-world actions you can take to secure your systems Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly! Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home compu...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 298 , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xiii, 271 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.1/17
    Keywords: Java (Computer program language) ; Microsoft .NET ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0672330164 ISBN-13: 9780672330162 The Object-Oriented Thought Process, Second Edition will lay the foundation in object-oriented concepts and then explain how various object technologies are used. Author Matt Weisfeld introduces object-oriented concepts, then covers abstraction, public and private classes, reusing code, and devloping frameworks. Later chapters cover building objects that work with XML, databases, and distributed systems (including EJBs, .NET, Web Services and more).Throughout the book Matt uses UML, the standard language for modeling objects, to provide illustration and examples of each concept.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 739 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at security design with three included case studies Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way. Beginning where other security books leave off, Network Security Architectures shows you how the various technologies that make up a security system can be used together to improve your network's security. The technologies and best practices you'll find within are not restricted to a single vendor but broadly apply to virtually any network system. This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy. You'll review detailed desig...
    Note: Includes "Glossary of terms" (p. [673]-677). - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 1437 p. , ill. ; , 24 cm. +
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Microsoft .NET ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Designed for system administrators, this definitive, supremely organized reference delivers in-depth solutions, tips, and tools for deploying, managing, and troubleshooting Windows Server 2003-all in a concise, fast-answers format.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Java (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Bridge the gap between the Microsoft .NET Framework and Java 2 Enterprise Edition (J2EE) by implementing the best interoperability solutions available today-and by learning to build compatible solutions and workarounds of your own.
    Note: Includes index. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xviii, 727 p. , ill. ; , 24 cm. +
    DDC: 005.4/3
    Keywords: Linux ; Virtual computer systems ; Virtual storage (Computer science) ; Electronic books ; local
    Abstract: Finally, a comprehensive guide to the Linux VM! VM's behavior affects every Linux kernel subsystem and dramatically impacts overall performance. But until now, there was only one way to understand VM: study the poorly documented source one line at a time. Now there's an easier, faster alternative. This book describes VM in unprecedented detail, presenting both theoretical foundations and a line-by-line source code commentary. It systematically covers everything from physical memory description to out-of-memory management. Coverage includes: Linux VM 2.4 architecture in depth-with diagrams and call graphs Physical memory description, page tables, address spaces, and memory allocation High memory, swapping, shared memory, and much more Expert guidance for analyzing the code of any open source project New Linux 2.6 kernel features in every chapter Well organized and superbly written, Understanding the Linux Virtual Memory Manager will be indispensable to every kernel programmer and researcher. CD-ROM INCLUDED Complete VM Learning Lab! Contains the author's new toolkit for exploring VM, including a browsable version of kernel source, CodeViz call graph generator; and VMRegress for analyzing and benchmarking VM. Also includes all code commentary in HTML, PDF, and plain text formats.
    Note: Includes bibliographical references (p. 707-709) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Beijing ; : O'Reilly Media, Inc. | Boston, MA :Safari,
    Language: English
    Pages: xii, 297 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.26/8
    Keywords: Linux ; Operating systems (Computers) ; Wireless communication systems ; Electronic books ; local
    Abstract: In Linux Unwired , you'll learn the basics of wirelesscomputing, from the reasons why you'd want to go wireless in thefirst place, to setting up your wireless network or accessingwireless data services on the road. The book provides a completeintroduction to all the wireless technologies supported by Linux.You'll learn how to install and configure a variety of wirelesstechnologies to fit different scenarios, including an office orhome network and for use on the road. You'll also learn how to getWi-Fi running on a laptop, how to use Linux to create your ownaccess point, and how to deal with cellular networks, Bluetooth,and Infrared. Other topics covered in the book include: Connecting to wireless hotspots Cellular data plans you can use with Linux Wireless security, including WPA and 802.1x Finding and mapping Wi-Fi networks with kismet and gpsd Connecting Linux to your Palm or Pocket PC Sending text messages and faxes from Linux through yourcellular phone Linux Unwired is a one-stop wireless information source foron-the-go Linux users. Whether you're considering Wi-Fi as asupplement or alternative to cable and DSL, using Bluetooth tonetwork devices in your home or office,or want to use cellular dataplans for access to data nearly everywhere, this book will show youthe full-spectrum view of wireless capabilities of Linux, and howto take advantage of them.
    Note: "A complete guide to wireless configuration"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xvi, 792 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: I am more than satisfied (actually impressed) with how much system administration is possible from Webmin. Comprehensive and convenient, just about any administration I've done is covered here, along with several areas that I've hesitated to explore. --Karel Baloun, Sr. Software Engineer, Looksmart, Ltd. Easy, browser-based Linux/UNIX administration with Webmin--step by step Webmin gives you an easy, browser-based solution for virtually any day-to-day Linux/UNIX administration task. Now, there's a definitive Webmin guide for every beginning-to-intermediate sysadmin. Written by Webmin's primary developer, Managing Linux Systems with Webmin delivers authoritative, step-by-step coverage of the latest version of Webmin, from basic installation to centrally managing multiple servers. Coverage includes: How Webmin works--and how to install and secure it Using Webmin to configure basic system services, including filesystems, users/groups, and printing Configuring Apache, Sendmail, Squid, Samba, MySQL, PostgreSQL, FTP services, and more Cluster modules: configuring multiple systems from one master server Webmin modules: configuring Webmin itself Full API documentation and instructions for writing your own Webmin modules and themes Jamie Cameron walks you through more than 50 essential Webmin tasks--offering all the background you need, step-by-step instructions, extensive screen captures, and listings of the underlying configuration files that are being modified. Whether you're new to Linux/UNIX system administration or you simply want an alternative to the command line, Managing Linux Systems with Webmin will be an indispensable resource.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 390 p. , ill. ; , 24 cm. +
    Edition: 1st ed.
    DDC: 005.446
    Keywords: Linux ; Java (Computer program language) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The Java Desktop System (TM), from Sun Microsystems, is a modern system for all kinds of users, novice through expert. As an unusually robust, well-integrated desktop system, it may become the first to fulfill the promise of mass adoption for open source. JDS brings Linux and other open source software up to a level of usability that makes them suitable for the enormous base of Personal Computer users including office workers, students, mobile and home users. It behaves pretty much the way a Windows or Mac user would expect, but with many more powerful features. JDS has seen widespread adoption in the United States, Britain, China, and elsewhere. This book is the ideal guide to JDS: it is clear and direct, but loaded with insights from authors who have spent time working with, supporting, and enhancing the system. Tom Adelstein is an award winning polymath system designer; Sam Hiser is a respected business consultant with an itch that led him to become the marketing project lead for OpenOffice.org. Both are advocates for open source and founders of the Open Government Interoperability Project, members of the Open Source Software Institute and contributors to the JDShelp.org project. This book carefully covers such housekeeping chores as setting up networking, updates, and backups. Then it enters into great depth concerning the key productivity tools every user needs: email, web browsing, instant messaging, word processing, spreadsheets, and slide presentations. A number of chapters and appendices concerning useful tools, including things you can add to your system, rounds out this remarkably useful book. It has plenty to offer the new user as well as the seasoned Linux professional.
    Note: "Linux for prime time with the Java Desktop System"--Cover. - CD-ROM contains Sun Microsystem's Java Desktop System. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 269 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Note: "Intrusion detection with open source tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 828 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. The Cisco Intrusion Detection Sensors and Management options work as a united system to provide detection, notification, and aggressive lockdown to malicious network breaches. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS), Second Edition , offers in-depth configuration and deployment information for the reliable and intensive intrusion detection solutions from Cisco Systems. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over the use of both the host-based and network-based IDS options (as well as the Cisco Threat Response functionality) by presenting a consolidated all-inclusive reference on all of the current Cisco IDS sensor platforms and management platforms. Chapter overviews bring you quickly up to speed and help you get to work right away. Configuration examples are designed to show you how to make the most of your IDS system, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with the CIDS sensor and management platforms or a study guide for the 642-531 exam, CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, supports your effective use of the Cisco IDS. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, an...
    Note: Includes index. - Rev. ed. of: Cisco secure intrusion detection system. c2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 745 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxix, 553 p. , ill. ; , 23 cm. +
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques-straight from members of the Microsoft Security Team.
    Note: Includes bibliographical references (p. 515-526) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Computer software ; Development ; Computer software ; Testing ; Microsoft .NET ; Electronic books ; local
    Abstract: Apply the concepts and techniques of Test-Driven Development to building Microsoft .NET-connected applications. Two experts in agile software development demonstrate by example how to use tests to drive lean, efficient coding and better design.
    Note: Title from title screen. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xi, 705 p. , ill. ; , 23 cm. +
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Join an estimated 85% of the U.S. Linux market in using Red Hat's Linux distributions by learning it from a Fedora authority. Sams Teach Yourself Red Hat Fedora 4 All in One is a starter kit that will help you install, configure, and use Red Hat's Fedora 4 distribution and desktop applications. The easy-to-understand, step-by-step instructions will also show you how to: Use the OpenOffice.org productivity suite and other leading applications. Troubleshoot hardware issues and install new components. Set up a small Linux-based network to share files and resources. Also included is a DVD, which will provide you with the complete Fedora Core Linux distribution, OpenOffice.org desktop suite, and the leading applications for e-mail, Web browsing, and graphics. Find out how you can safely and reliably use Linux and Linux-based applications to accomplish your day-to-day work in the office and at home with Sams Teach Yourself Red Hat Fedora 4 All in One .
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvi, 412 p. ; , 23 cm
    DDC: 005.4/32
    Keywords: Linux ; UNIX Shells ; Electronic books ; local
    Abstract: According to IDC, over 170,000 new servers were shipped in the first quarter of 2003. That also means that there were potentially more than 170,000 people like you charged with administering these systems without the proper knowledge or training to do so. Linux Shell Scripting with Bash will help you learn to not only get your system up and running quickly by employing the Bash shell, but it will also show you professional scripting solutions through the use of structured programming and standard Linux development tools. The book focuses on the Linux environment, which the shell relies on to function, and the robust Linux tool set, making this book ideal for learning shell scripting. Real-world scripts are included that are readable, extendable and easy to debug. This book is an asset to any Linux user.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Note: Includes bibliographical references (p. 321-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 407 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Microsoft Visual Basic for Windows ; BASIC (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Praise for The Visual Basic .NET Programming Language "There is no substitute to getting the inside scoop directly from a book written by the father of a programming language such as Bjarne Stroustrup for C++, James Gosling for Java and Alan Cooper for the original version of Visual Basic. Paul Vick, the father of Visual Basic .NET, explains the whys and hows of this exciting new language better than any other human being on the planet." - Ted Pattison , Barracuda.NET " The Visual Basic .NET Programming Language includes nuances that in all my use and study of VB .NET, I haven't seen discussed anywhere else. For example, I learned that you can use the Imports statement to import an Enum name, so that you needn't refer to the enum in all its uses. In addition, I learned that the dictionary lookup operator, '!', works in VB .NET-I thought this one had been retired. In any case, if you're searching for a book that covers all the language syntax issues, and more, Paul Vick's book is a great place to look." - Ken Getz , Senior Consultant, MCW Technologies, LLC "This book is an excellent stepping stone for Visual Basic developers wanting to get their toes wet in the .NET waters. Paul's presentation of the core topics all VB developers should tackle first is clear, concise, and unlike other books in the genre, does not overwhelm the reader. The VB6 vs. VB.NET task-oriented approach guides you through the new language and OO features, and then moves to basic threading and other CLR topics-as well as to the key points in the COM to .NET transition-in a well thought-out sequence. If you've been holding out on VB .NET, this is a great book to get you started." - Klaus H. Probst, Sr. Consultant/Architect, Spherion Technology Services, Microsoft MVP "There is no shortage of VB .NET books in the market, but this is the only book straight from the creators. While that is an excellent reason in itself for reading this book, it is the brevity and clarity of the content, along with the examples, that makes this book a must-have." - Amit Kalani , Developer "Overall, I liked this book and it definitely benefited me. I learned new things I didn't see anywhere else and I'll certainly put these to good use in the future. Paul's book makes a great reference manual for intermediate and advanced VB .NET developers." - Philip Williams , System Engineer, LDC Direct "This book contains a lot of great information I have seen nowhere else and addresses issues that other boo...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Language: English
    Pages: xiv, 378 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Web services ; Web sites ; Security measures ; Electronic books ; local
    Abstract: Comprehensive coverage is given in this up-to-date and practical guide to Web services security--the first to cover the final release of new standards SAML 1.1 and WS-Security. Rosenberg and Remy are security experts who co-founded GeoTrust, the #2 Web site certificate authority.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams ; | Boston, MA :Safari,
    Language: English
    Pages: ix, 320 p. , ill. ; , 24 cm
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Visual Basic .NET Kick Start is a rapid-progression tutorial that presents Visual Basic .NET to working programmers already familiar with another programming language or tool. This book speeds through basic concepts and focuses on practical examples showing the advantages of Visual Basic .NET in ASP programming, application design and creation, and .NET Web Services development. Because previous versions of Visual Basic are so prevalent, this book pays special attention to issues developers face when moving from VB to VB.NET. Although Visual Basic .NET Kick Start assumes no knowledge of the .NET Framework, it skips the handholding and basic programming instruction associated with entry-level tutorials. Full of code examples, tips, and professional insights, this book is about maximum payoff with minimum effort for the working programming who wants to use Visual Basic .NET now.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.7/2
    Keywords: Microsoft .NET ; Web site development ; Web sites ; Design ; Electronic books ; local
    Abstract: The complete software developer's guide to working in .NET environments Praise for .NET Patterns: "Was both insightful and comprehensive. It's great to see these patterns presented within the context of many architectural dilemmas facing the vastly interconnected enterprise. Web service architects are sure to see enormous value in this text." -Ed Draper, Microsoft Patterns have proven to be practical tools for the programmer who knows how to use them. In .NET Patterns , distributed computing and .NET expert Christian Thilmany presents both an introduction to patterns for programmers working in the .NET environment and a library of patterns unique to the .NET platform. Part of John Vlissides' critically acclaimed Addison-Wesley Software Patterns Series, .NET Patterns extends the proven concept of design patterns into the arena of .NET design and development. Now, .NET developers can depend on patterns to provide solutions to recurring problems in software design. In addition to covering both lower and higher level programming with patterns, this book also includes helpful primers on XML and web services, as well as thorough coverage of debugging, exceptions, error handling, and architecture. Whether you're working in .NET environments or transitioning to .NET environments, you'll find .NET Patterns a comprehensive resource for software solutions.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xv, 392 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Abstract: "As usual, Keith masterfully explains complex security issues in down-to-earth and easy-to-understand language. I bet you'll reach for this book often when building your next software application." --Michael Howard, coauthor, Writing Secure Code "When it comes to teaching Windows security, Keith Brown is 'The Man.' In The .NET Developer's Guide to Windows Security, Keith has written a book that explains the key security concepts of Windows NT, Windows 2000, Windows XP, and Windows Server 2003, and teaches you both how to apply them and how to implement them in C# code. By organizing his material into short, clear snippets, Brown has made a complicated subject highly accessible." --Martin Heller, senior contributing editor at Byte.com and owner of Martin Heller & Co. "Keith Brown has a unique ability to describe complex technical topics, such as security, in a way that can be understood by mere mortals (such as myself). Keith's book is a must read for anyone attempting to keep up with Microsoft's enhancements to its security features and the next major version of .NET." --Peter Partch, principal software engineer, PM Consulting "Keith's book is a collection of practical, concise, and carefully thought out nuggets of security insight. Every .NET developer would be wise to keep a copy of this book close at hand and to consult it first when questions of security arise during application development." --Fritz Onion, author of Essential ASP.NET with Examples in C# The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Windows Server 2003, Windows XP, and Windows 2000. Author Keith Brown crystallizes his application security expertise into 75 short, specific guidelines. Each item is clearly explained, cross-referenced, and illustrated with detailed examples. The items build on one another until they produce a comprehensive picture of what tools are available and how developers should use them. The book highlights new features in Windows Server 2003 and previews features of the upcoming version 2.0 of the .NET Framework. A companion Web site includes the source code and examples used throughout the book. Topics covered include: Kerberos authentication Access control Impersonation Network security Constrained delegation Protocol transition Securing enterprise servi...
    Note: Includes bibliographical references (p. 379-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 456 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Microsoft .NET ; Object-oriented programming (Computer science) ; Software patterns ; UML (Computer science) ; Electronic books ; local
    Abstract: Steven John Metsker explains how to use C# as an object-oriented language, using design patterns to create clean code while taking advantage of the extensive Microsoft(R) .NET Framework Class Libraries. For all 23 classic "Gang of Four" design patterns, Metsker offers detailed code examples utilizing C# and the .NET Framework--as well as programming exercises crafted to help you rapidly build expertise. His exercises and explanations make extensive use of the Unified Modeling Language, helping you build your skills in this standard notation. Design patterns covered include: Interfaces: Adapter, Facade, Composite, and Bridge Responsibility: Singleton, Observer, Mediator, Proxy, Chain of Responsibility, and Flyweight Construction: Builder, Factory Method, Abstract Factory, Prototype, and Memento Extensions: Decorator, Iterator, and Visitor If you've already used design patterns in other languages, Design Patterns in C# will deepen your understanding, build your confidence, and help you apply them to any C# project. If you're a Microsoft programmer who's new to design patterns, this book will be an ideal practical introduction. www.awprofessional.com/patterns/ ADDISON-WESLEY PROFESSIONAL Pearson Education ISBN: 0-321-12697-1
    Note: Includes bibliographical references (p. 439-440) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 252 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Biometric identification ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application. In Biometrics for Network Security , biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes: An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
    Note: Includes bibliographical references (p. 239-241) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Indianapolis, IN : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xiv, 490 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/32
    Keywords: Linux ; Electronic data processing personnel ; Certification ; Operating systems (Computers) ; Certification ; Study guides ; Electronic books ; local
    Abstract: This official Novell Press Study Guide is your key to reviewing the fundamentals of installing, running, and administering SUSE LINUX so that you can pass Novell Practicum: 050-069, Novell's Certified Linux Professional exam, and become a Novell CLP. Expert trainer and curriculum developer Emmett Dulaney brings you the practical knowledge, tested techniques, real-world scenarios, and hands-on lab exercises you need to help you get the CLP certification from Novell.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 531 , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xii, 416 p. , ill. ; , 24 cm
    Keywords: Computer programming ; Microsoft .NET ; Electronic books ; local
    Abstract: 'Microsoft .NET Kick Start' answers the essential questions ¿What is .NET?¿ and ¿What can .NET do for me?¿ from the developer¿s perspective. Expert author Hitesh Seth explains the .NET platform¿its core components, development tools, and programming model¿so you¿ll be ready to build professional .NET applications in no time. 'Microsoft .NET Kick Start' puts .NET into perspective, explaining how .NET differs from other development platforms. You¿ll learn about the consistent .NET programming model for Web, desktop, wireless, and speech applications. You¿ll also see how .NET is tightly integrated with XML and Web service technologies and standards. Hitesh Seth¿s insights and tips, along with dozens of practical examples that you can put to use immediately, will have you up and running at full speed in nothing flat. In this book, you'll: - Program with Visual Studio .NET and your choice of language including C#, Visual Basic .NET, Visual C++, Visual J#, and more - Understand the Common Language Runtime (CLR) - Work with the .NET Framework class library - Develop .NET Windows desktop applications, Web applications, Web services, wireless applications, and speech applications - Integrate and interoperate with existing COM and Win32 applications - Incorporate the Windows Server System into .NET, including SharePoint Portal Server and BizTalk Server - Leverage Microsoft Office System 2003 applications with .NET applications - Learn best practices for .NET application development with blueprints and case studies
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Redmond, WA : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 689 p. , ill. ; , 23 cm
    DDC: 005.2/76
    Keywords: Active server pages ; Internet programming ; Microsoft .NET ; Web servers ; Electronic books ; local
    Abstract: The complete guide to developing professional, reusable ASP.NET server controls and components-direct from the insiders who developed the technology. Web Forms-the Page and Control Framework at the heart of ASP.NET-makes it easier to develop dynamic Web applications. But you can go beyond the controls that ship with ASP.NET-and power up your Web sites and applications-by creating your own server controls. You can also develop and distribute your own controls for commercial use. This comprehensive guide, direct from key insiders who really know the technology, combines conceptual and architectural details with practical, how-to information and real-world code samples to show exactly how to create custom, reusable, professional-quality server controls with rich design-time functionality. It also provides essential information about configuration and the HTTP runtime, packaging, deployment, debugging, and developing controls that incorporate XML Web services, plus other vital topics. And it introduces the ASP.NET Web Matrix tool for creating Web applications and for using server controls. Visit the catalog page for Developing Microsoft® ASP.NET Server Controls and ComponentsVisit the errata page for Developing Microsoft® ASP.NET Server Controls and ComponentsDownload the supplemental electronic content for Developing Microsoft® ASP.NET Server Controls and Components
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xviii, 600 p. , ill. ; , 24 cm
    DDC: 005.2/82
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The definitive guide to Linux processes and IPC for programmers and system administrators Pipes, message queues, semaphores, shared memory, RPC, sockets, the /proc filesystem, and much more In-depth coverage of multithreading with POSIX compliant LinuxThreads Contains dozens of detailedprogram examples (GNU C/C++ 2.96/Red Hat Linux 7.3 & 8.0) Raves for Gray's companion UNIX® volume! "Concepts I only vaguely understood now make complete sense to me! The sample code and exercises are so good,they seem to clamp down on the concepts like a vise grip..."-S. Lee Henry, Johns HopkinsUniversity The expert, example-rich guide to Linuxprocesses and IPC Serious Linux software developers need a sophisticated understanding of processes, system level programming andinterprocess communication techniques. Now, John Shapley Gray, author of the widely praised Interprocess Communicationin UNIX, Second Edition, zeroes in on the core techniques Linux uses to manage processes and IPC. With exceptionalprecision and great clarity, Gray explains what processes are, how they're generated, how they access their environments,how they communicate- and how to use them to build robust, high-performance systems . Includes extensive coverage of named/unnamed pipes, message queues, semaphores, and shared memory. Provides C++ classes for System V IPC facilities. Offers an in-depth introduction to socket-basedcommunication. Demystifies Linux's /proc file system. Illuminates the LinuxThreads POSIX threadimplementation and its use in multithreaded applications. Provides valuable tips and warnings, plus insight intokey differences amongst Linux and Unix implementations. Includes problem sets and illustrations designed toreinforce key concepts. Gray presents dozens of standalone program examples; all compiled with the GNU C/C++ compiler 2.96 & 3.2, and fullytested on PC platforms running Red Hat Linux 7.3 & 8.0. http://authors.phptr.com/gray/
    Note: Includes bibliographical references (p. 587-590) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 391 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Embedded computer systems ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux® is being adopted by an increasing number of embedded systems developers, who have been won over by its sophisticated scheduling and networking, its cost-free license, its open development model, and the support offered by rich and powerful programming tools. While there is a great deal of hype surrounding the use of Linux in embedded systems, there is not a lot of practical information. Building Embedded Linux Systems is the first in-depth, hard-core guide to putting together an embedded system based on the Linux kernel. This indispensable book features arcane and previously undocumented procedures for: Building your own GNU development toolchain Using an efficient embedded development framework Selecting, configuring, building, and installing a target-specific kernel Creating a complete target root filesystem Setting up, manipulating, and using solid-state storage devices Installing and configuring a bootloader for the target Cross-compiling a slew of utilities and packages Debugging your embedded system using a plethora of tools and techniques Details are provided for various target architectures and hardware configurations, including a thorough review of Linux's support for embedded hardware. All explanations rely on the use of open source and free software packages. By presenting how to build the operating system components from pristine sources and how to find more documentation or help, this book greatly simplifies the task of keeping complete control over one's embedded operating system, whether it be for technical or sound financial reasons.Author Karim Yaghmour, a well-known designer and speaker who is responsible for the Linux Trace Toolkit, starts by discussing the strengths and weaknesses of Linux as an embedded operating system. Licensing issues are included, followed by a discussion of the basics of building embedded Linux systems. The configuration, setup, and use of over forty different open source and free software packages commonly used in embedded Linux systems are also covered. uClibc, BusyBox, U-Boot, OpenSSH, thttpd, tftp, strace, and gdb are among the packages discussed.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 599 p. , ill. ; , 23 cm. +
    DDC: 005.1/17
    Keywords: ActiveX ; Application software ; Development ; Internet programming ; Microsoft .NET ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: Written by experts on the Microsoft® .NET programming platform, ADO.NET in a Nutshell delivers everything .NET programmers will need to get a jump-start on ADO.NET technology or to sharpen their skills even further. In the tradition of O'Reilly's In a Nutshell Series, ADO.NET in a Nutshell is the most complete and concise source of ADO.NET information available.ADO.NET is the suite of data access technologies in the .NET Framework that developers use to build applications services accessing relational data and XML. Connecting to databases is a fundamental part of most applications, whether they are web, Windows®, distributed, client/server, XML Web Services, or something entirely different. But ADO.NET is substantially different from Microsoft's previous data access technologies--including the previous version of ADO--so even experienced developers need to understand the basics of the new disconnected model before they start programming with it.Current with the .NET Framework 1.1, ADO.NET in a Nutshell offers one place to look when you need help with anything related to this essential technology, including a reference to the ADO.NET namespaces and object model. In addition to being a valuable reference, this book provides a concise foundation for programming with ADO.NET and covers a variety of issues that programmers face when developing web applications or Web Services that rely on database access. Using C#, this book presents real world, practical examples that will help you put ADO.NET to work immediately.Topics covered in the book include: An Introduction to ADO.NET Connections, Commands and DataReaders Disconnected Data Advanced DataSets Transactions DataViews and Data Binding XML and the DataSet Included with the book is a Visual Studio .NET add-in that integrates the entire reference directly into your help files. When combining ADO.NET in a Nutshell with other books from O'Reilly's .NET In a Nutshell series, you'll have a comprehensive, detailed and independent reference collection that will help you become more productive.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 492 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Web sites ; Security measures ; Electronic books ; local
    Abstract: "Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems and shopping carts, and critical vulnerabilities associated with URLs. This book is a virtual battle plan that will help you identify and eliminate threats that could take your Web site off line..." --From the Foreword by William C. Boni, Chief Information Security Officer, Motorola "Just because you have a firewall and IDS sensor does not mean you aresecure; this book shows you why." --Lance Spitzner, Founder, The Honeynet Project Whether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. Organizations using Web-based business applications are increasingly at risk. Web Hacking: Attacks and Defense is a powerful guide to the latest information on Web attacks and defense. Security experts Stuart McClure (lead author of Hacking Exposed ), Saumil Shah, and Shreeraj Shah present a broad range of Web attacks and defense. Features include: Overview of the Web and what hackers go after Complete Web application security methodologies Detailed analysis of hack techniques Countermeasures What to do at development time to eliminate vulnerabilities New case studies and eye-opening attack scenarios Advanced Web hacking concepts, methodologies, and tools "How Do They Do It?" sections show how and why different attacks succeed, including: Cyber graffiti and Web site defacements e-Shoplifting Database access and Web applications Java™ application servers; how to harden your Java™ Web Server Impersonation and session hijacking Buffer overflows, the most wicked of attacks Automated attack tools and worms Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. Web Hacking informs from the trenches. Experts show you how to connect the dots--how to put the stages of a Web hack together so you can best defend against them. Written for maximum brain absorption with unparalleled technical content and battle-tested analysis, Web Hacking will help you combat potentially costly security threats and attacks. 0201761769B07192002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xlvii, 1565 p. , ill. ; , 24 cm. +
    DDC: 005.4/469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: A Practical Guide to Red Hat® Linux® 8 provides everyone--new users to experienced programmers--with the knowledge and skills they need to master Linux. Written by best-selling author Mark Sobell, this book is a clear, thorough, and logically organized tutorial and reference. Part I is a comprehensive tutorial that introduces the basics of GNU/Linux. It explains how to use the basic utilities, the filesystem, and many features of the shell command interpreter. Illustrations and step-by-step examples demonstrate how each command works. Part II covers more advanced topics, such as graphical user interfaces (GUIs), networking, text editors, programming tools, system administration, the new features of Red Hat Linux version 8, and the three major shells, including shell scripts. Part III is a detailed reference to more than 85 GNU/Linux utilities. This authoritative guide includes: Instructions for users and administrators covering security and RH features, including Red Hat Network (RHN), Red Hat system administration tools, and Red Hat Package Manager (RPM). A full chapter on the use and customization of the Red Hat default GNOME 2 desktop manager and the new Metacity window manager A full chapter on how to use and customize the KDE 3 desktop environment Lucid descriptions of utilities illustrated by many practical examples Detailed coverage of the Linux programming environment and tools, including the C compiler, make, and source code management In-depth discussion of networking and the Internet, including types of networks, secure network utilities, and distributed computing An emphasis on security issues throughout, including highlighted warnings and a dedicated appendix Extensive information and full-length examples about using shells interactively and as programming tools, with chapters on the Bourne Again Shell (bash), the TC Shell (tcsh), and the Z Shell (zsh) Appendixes covering regular expressions, online resources, security, and POSIX standards A comprehensive glossary of more than five hundred words and phrases Helpful features such as tips, cautions, and security alerts supplement the lessons of the text. The companion Web site (http://www.sobell.com) provides useful links, downloadable examples and illustrations, answers to selected review exercises, additional exercises and programs, and updates to the book. The accompanying CD-ROMs contain Red Hat Linux version 8.0. 0201703130B11262002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 696 p. , ill. ; , 23 cm
    DDC: 005.7/2
    Keywords: Microsoft .NET ; XML (Document markup language) ; Electronic books ; local
    Abstract: Get the expert advice you need to succeed in building .NET-connected applications with XML! XML is everywhere in the Microsoft .NET Framework, from Remoting to Web services, and from data access to configuration. Learn about the extensive XML core classes in .NET and find out how to program against its parser in this in-depth guide-written by an expert programming author and consultant on cutting-edge technologies such as Microsoft ASP.NET and Microsoft ADO.NET. You'll find authoritative explanations of technologies such as schemas, transformations, and XPath, plus extensive discussion of data access issues such as synchronization and serialization, the DiffGram format, and the XML extensions in Microsoft SQL Server™ 2000. Along the way, you'll learn exactly how to get the best performance out of XML in the .NET world. You'll also get answers to common questions such as, "When should I use XML Web services instead of Remoting?".
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Application software ; Development ; COM (Computer architecture) ; Microsoft .NET ; Electronic books ; local
    Abstract: Providing both theoretical and practical approaches, this in-depth programming guide explains how to interoperate between COM/COM+ and Microsoft® .NET. Coverage includes writing COM and COM+ code, disconnected applications, and new technologies in .NET.
    Note: Includes index. - Includes link to companion website. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xx, 340 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rules and known exploits. The lack of usable information made using Snort a frustrating experience. The average Snort user needs to learn how to actually get their systems up-and-running. Snort Intrusion Detection provides readers with practical guidance on how to put Snort to work. Opening with a primer to intrusion detection and Snort, the book takes the reader through planning an installation to building the server and sensor, tuning the system, implementing the system and analyzing traffic, writing rules, upgrading the system, and extending Snort.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 286 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 004.68
    Keywords: Computer networks ; Security measures ; Wireless communication systems ; Security measures ; Wireless communication systems ; Standards ; Electronic books ; local
    Abstract: It's an increasingly wired world, but many people are finding that the best way to get connected is to do away with wires entirely. From cable replacement to universal Internet connectivity, wireless technology is changing the way we connect to our machines and to each other. As with any new technology, buying your gear is only the first step. Understanding how to make the best use of it is another story. Wireless Hacks offers 100 industrial-strength tips about wireless networking, contributed by experts who apply what they know in the real world every day. Each Hack can be read in just a few minutes, but can save you hours of research. Inside, you will find a wealth of useful techniques for making the most out of wireless technology, including: Making sense of the alphabet soup of the 802.11 standards, and understanding which technology makes sense for your solving particular problem Using Bluetooth, mobile radios, mobile data networks, and other exotic methods to keep you connected, no matter where you are Practical methods for detecting, analyzing, and monitoring wireless networks Extending the range of your network, and making the best possible use of the available radio spectrum Designing and building your own antennas Engineering long distance network links that span several miles Understanding the security issues of wireless networking, and protecting yourself and your users from unauthorized access and eavesdropping Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: v. 〈1 〉 , ill. ; , 24 cm
    DDC: 005.13
    Keywords: Component software ; Microsoft .NET ; Programming languages (Electronic computers) ; Electronic books ; local
    Abstract: "Don taught me stuff I didn't know about my own product! And I bet he'll teach you something, too." -From the Foreword by James Miller, Lead Program Manager, Common Language Runtime, Microsoft Corporation Essential .NET, Volume 1 , provides everything developers need to take full advantage of the power of Microsoft .NET. This book describes, in depth, the glue of the .NET Framework: the Common Language Runtime (CLR). Box and Sells explain the inner workings of the CLR-the rationale behind its design, the problems it solves, and the role of type in CLR programming-and show readers how to build better applications using the .NET Framework while gaining a more complete understanding of how the CLR works. The book is packed with the practical detail and expert advice only Don Box can provide. Topics covered include: CLR's evolution Assemblies in the .NET Framework The CLR type system Programming with type Objects and values Methods Explicit method invocation Application domains Security Interoperability Essential .NET, Volume 1 , is an authoritative guide to the Microsoft .NET Common Language Runtime. Books in the Microsoft .NET Development Series are written and reviewed by the principal authorities and pioneering developers of the Microsoft .NET technologies, including the Microsoft .NET development team and DevelopMentor. Books in the Microsoft .NET Development Series focus on the design, architecture, and implementation of the Microsoft .NET initiative to empower developers and students everywhere with the knowledge they need to thrive in the Microsoft .NET revolution. 0201734117B10042002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 765 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: To thoroughly understand what makes Linux tick and why it's so efficient, you need to delve deep into the heart of the operating system--into the Linux kernel itself. The kernel is Linux--in the case of the Linux operating system, it's the only bit of software to which the term "Linux" applies. The kernel handles all the requests or completed I/O operations and determines which programs will share its processing time, and in what order. Responsible for the sophisticated memory management of the whole system, the Linux kernel is the force behind the legendary Linux efficiency. The new edition of Understanding the Linux Kernel takes you on a guided tour through the most significant data structures, many algorithms, and programming tricks used in the kernel. Probing beyond the superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Relevant segments of code are dissected and discussed line by line. The book covers more than just the functioning of the code, it explains the theoretical underpinnings for why Linux does things the way it does. The new edition of the book has been updated to cover version 2.4 of the kernel, which is quite different from version 2.2: the virtual memory system is entirely new, support for multiprocessor systems is improved, and whole new classes of hardware devices have been added. The authors explore each new feature in detail. Other topics in the book include: Memory management including file buffering, process swapping, and Direct memory Access (DMA) The Virtual Filesystem and the Second Extended Filesystem Process creation and scheduling Signals, interrupts, and the essential interfaces to device drivers Timing Synchronization in the kernel Interprocess Communication (IPC) Program execution Understanding the Linux Kernel , Second Edition will acquaint you with all the inner workings of Linux, but is more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. If knowledge is power, then this book will help you make the most of your Linux system.
    Note: "Linux 2.4"--p. ix. - Includes bibliographical references (p. 707-709) and indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    [United States?] : IBM, International Technical Support Organization | Boston, MA :Safari,
    Language: English
    Pages: xiv, 443 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Web servers ; Electronic books ; local
    Abstract: System installation and administration Application case studies Cluster management For customers interested in Linux who need powerful and reliable servers to support their applications, IBM eServer pSeries offers 64-bit POWER servers to match their requirements at lower costs. Unlike other servers supporting solely high performance Linux needs, IBM eServer pSeries provides leadership price/performance with high reliability and a roadmap to provide the customer with investment protection. This IBM Redbook provides information and guidelines for how to deploy Linux on IBM eServer pSeries clusters. Topics covered include: System installation System administration Linux for pSeries RAS and problem determination Getting started with GPFS Cluster Systems Management (CSM) High Performance Computing case studies Commercial application case studies This redbook also includes hints and tips that illustrate particular observations discovered during the residency. Additional reference materials and Web sites have been included as well, to provide the reader with other sources of information necessary to implement Linux on pSeries clusters.
    Note: "December 2003.". - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Boston : Pearson Education | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.2/76
    Keywords: Computer software ; Development ; Microsoft .NET ; Electronic books ; local
    Abstract: Praise for .NET-A Complete Development Cycle "Excellent step-by-step walkthrough of software development with .NET for architects and programmers. Great explanation of current software development methodologies, and a wealth of practical examples using current techniques." - Phil Syme Technical Lead Watson Wyatt Worldwide Washington, D.C. "This book takes a unique approach to integrating real-world development examples to illustrate the phases and tasks of the software development lifecycle." - Jackie Goldstein Renaissance Computer Systems Ltd. and MSDN Regional Director "In this book the authors excel in presenting all aspects of the .NET development cycle in a format accessible to the beginner, and as a primer and reference for the experienced developer. It is exemplary in its encouragement of good software engineering technique from the outset by adhering to the Unified Process. This book is not only educational and informative, but working through it is fun!" - Dr. Oliver Downs Chief Scientist, Analytical Insights, Inc. http://www.analyticalinsights.com "As a software project manager, I found this book and accompanying CD to be a valuable aid to help sort out the practical application of .NET from all the hype." - Daniel Paulish Software engineering project manager with more than 20 years' experience .NET-A Complete Development Cycle is the first guide to combining the best software-engineering practices of the Unified Process with the ins and outs of the .NET architecture. The book begins with an overview of the principles of software engineering and then introduces Microsoft technologies such as Visual C#, Windows Forms (WinForms), ADO.NET, and ASP.NET. Central to this practical guide is a case study developing a working imaging application. As the authors lead readers through the complete lifecycle of this .NET development project, they teach effective software-engineering methodologies, including top strategies for requirements engineering, functional breakdown, design reviews, implementation, testing, and deployment. Readers will also learn how to make the most of tools such as the Unified Modeling Language (UML), GDI+, multithreading, Web Services Description Language (WSDL), Simple Object Access Protocol (SOAP), Universal Description, Discovery and Integration (UDDI), and versioning. By actively participating in this case study, readers become working members of the development team. They use their newly acquired knowledge to accomp...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall/PTR | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 430 p. , ill. ; , 24 cm
    DDC: 005.4/469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Leverage Linux on the mainframe for a true business advantage Covers zSeries and S/390 mainframes Contains over 100 pages of reference material Includes detailed examples and maximization techniques The complete mainframe guide to leveraging the power of Linux Linux on the Mainframe is the comprehensive guide to the fastest growing trend in IT. IBM's Linux experts present peerless instruction in the art of planning for and making the most of a Linux mainframe. This book's in-depth coverage includes virtualization, deployment, data management, debugging, security, systems management, application porting, and much more. Sample companies that demonstrate the strengths and potential shortcomings of Linux on the mainframe Complete business analysis, including Total Cost of Ownership, server consolidation techniques, and IT infrastructure simplification Examples of deploying middleware and other tools In-depth introductions to the latest trends, developments, and technologies related to Linux on the mainframe Background information on mainframes and Linux for the lay reader Key techniques for deploying Linux servers and building integrated server environments For anyone involved in the planning, deploying, management, or administration of a mainframe, Linux on the Mainframe is a vital resource.
    Note: Includes bibliographical references (p. 399-407) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xix, 487 p , 24 cm
    DDC: 005.2/76
    Keywords: Microsoft .NET ; Electronic books ; local
    Abstract: Find out how to migrate your legacy software to the powerful Microsoft .NET framework Provides for a complete, efficient, and elegant migration-with no surprises Covers the technologies you need: Visual Basic, Visual C++, and Active Server Pages Move to .NET-and bring your legacy apps along! Microsoft's .NET Web services platform offers a wide range of exciting new programming opportunities. The new methods found in .NET also mean you'll be in for a lot of aggravation and wasted time-unless you have a proven migration plan in place for your legacy applications. In Migrating to .NET , subject experts Dhananjay Katre, Prashant Halari, Narayana Rao Surapaneni, Manu Gupta, and Meghana Deshpande guide you every step of the way, from planning to migration to follow-through. Migrate legacy Visual Basic, Visual C++, and ASP applications to .NET Draws on the real-world experience of .NET migration experts Rich with code examples and case studies Covers component migration and interoperability issues Part of the integrated .NET series from Object Innovations and Prentice Hall PTR.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Abstract: This resource provides best practices, step-by-step code walk-throughs, and concise explanations of key security terms, issues, and jargon to help developers create and run secure code with Visual Basic.
    Note: Includes index. - Includes link to companion web site. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 979 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 006.7/882
    Keywords: Active server pages ; Internet programming ; Microsoft .NET ; Web site development ; Electronic books ; local
    Abstract: ASP.NET in a Nutshell is a concise, one-volume reference to everything you need to make effective use of ASP.NET. An invaluable resource that goes beyond the published documentation to highlight little-known details, stress practical uses for particular features, and provide real-world examples that show how features can be used in a working application, ASP.NET in a Nutshell is the definitive guide for developers of both applications and web services. Updated for Visual Studio .NET 2003, the 2nd edition of this book includes fresh information on application and web service development, custom controls, data access, security, deployment, and error handling, new material on web application development for mobile devices, plus an overview of the class libraries. For developers who still use Microsoft's older ASP technology, this book also provides information for migrating to ASP.NET. The material in ASP.NET in a Nutshell is presented in three sections: A fast-paced introduction to ASP.NET that examines topics such as building ASP.NET applications, developing web services, creating custom controls and user controls for maximum code reuse, debugging and handling errors, understanding ASP.NET security, and configuring and deploying an ASP.NET application A detailed reference to the properties, methods, and events of the most frequently used ASP.NET classes which include the Page class and the new .NET classes, such as HttpApplicationState and HttpSessionState, which correspond to the intrinsic objects in classic ASP. Configuration settings in web.config are also documented A Quick Reference to the types (the classes, structures, interfaces, delegates, events, and enumerations) found in web-related namespaces to the .NET Framework Class Library. Like other books in the "In a Nutshell" series, ASP.NET in a Nutshell , 2nd Edition, offers the facts, including critical background information, in a no-nonsense manner that users will refer to again and again. With its wealth of up-to-date information, ASP.NET in a Nutshell is a book that web developers will refer to again and again.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 928 p. , ill. ; , 23 cm
    Edition: 4th ed.
    Series Statement: In a nutshell
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux in a Nutshell , now in its fourth edition, has won awards in the Linux community as the most indispensable book about Linux. It is an essential desktop reference for the commands that users of Linux utilize every day, with the depth of information and the practical, succinct "In a Nutshell" format that made the previous editions so popular. Comprehensive but concise, Linux in a Nutshell covers all substantial user, programming, administration, and networking commands for the most common Linux distributions. It's several quick references rolled into one: sed, gawk, RCS, CVS, vi, Emacs, bash, tcsh, regular expressions, package management, bootloaders, and desktop environments are all covered in this clear, to-the-point volume, along with core command-line utilities. The fourth edition continues to track the major changes in bootloaders, the GNOME and KDE desktops, and general Unix commands. Several commands related to CDs and music reflect the evolution of multimedia on Linux. Coverage has been added for GRUB, which has become the default bootloader on several Linux distributions, and for vim, the popular and feature-loaded extension to vi. The addition of several new options to the iptables firewall command and new commands related to DNSSEC and ssh show the book's value as a security tool. With this book, you no longer have to grope through long manpages and info documents for the information you need; you'll find it here in clear language and an easy-to-read format. Contents include: Programming, system administration, networking, and user commands with complete lists of options GRUB, LILO, and Loadlin bootloaders Shell syntax and variables for the bash, csh, and tcsh shells Pattern matching Emacs, vi, and vim editing commands sed and gawk commands The GNOME and KDE desktops and the fvwm2 window manager Red Hat and Debian package managers
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Filled with the ingredients developers need-code samples, instructions, and solutions to common problems-this book is the logical place for developers to start building projects and learning more about Visual Basic .NET.
    Note: Includes index. - Includes link to companion web site. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 672 p. , ill. ; , 24 cm
    Edition: 4th ed.
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: You're about to begin your first Linux installation. Or, you may have been using Linux for years and need to know more about adding a network printer or configuring for ADSL. Running Linux , now in its fourth edition, is the book you'll want to reach for. Widely recognized in the Linux community as the getting-started book that people need, it answers the questions and tackles configuration issues that frequently plague users, but are seldom addressed in other books. Running Linux has everything you'll need to understand, install, and start using Linux. The book doesn't draw the line at the OS, or the shell, or the GUI, or even at the point of essential applications. Rather, the authors, experienced Linux enthusiasts, have anticipated problem areas, selected stable and popular solutions, and provided clear discussions and instructions to ensure that you'll have a satisfying experience using Linux. The discussion is direct and complete enough to guide novice users while still providing the additional information experienced users will need to progress in their mastery of Linux. The fourth edition of Running Linux delves deeper into installation, configuring the windowing system, system administration, and networking. New topics include applications ready for prime time, basic security and firewalling, package management on Debian, sound configuration, ADSL, the GNOME desktop, the Postfix mail transfer agent, and the popular LAMP configuration that combines Apache, MySQL, and PHP. A solid foundation text for any Linux user, the book also includes additional resources for dealing with special requirements imposed by hardware, advanced applications, and emerging technologies. Whether you are using Linux on a home workstation or maintaining a network server, Running Linux will provide expert advice just when you need it.
    Note: Previous eds. entered under Walsh. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxi, 1344 p. , ill. ; , 24 cm
    DDC: 005.4/4769
    Keywords: Microsoft Windows server ; Microsoft .NET ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Inside Windows .NET Server contains comprehensive information on deploying, managing, and troubleshooting systems using both Windows .NET and its predecessor. Readers get the in-depth, practical knowledge they need to master the hundreds of complex and often frustrating features found in Windows .NET Server. Inside Windows .NET Server is structured around a production deployment of Windows .NET in a global enterprise. Each chapter contains a lively feature description followed by extensively illustrated procedures for setting up and managing each service. All along the way, Boswell includes proven advice for improving stability, performance, and security. Readers of Boswell's Inside Windows 2000 Server declared it to be the best resource on the market. Inside Windows .NET Server improves coverage of existing features while expanding the scope to include the new features and improvements that make Windows .NET a must-have upgrade.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 284 p. , ill. ; , 24 cm. +
    DDC: 005.2/76
    Keywords: Application software ; Testing ; Microsoft .NET ; Web site development ; Electronic books ; local
    Abstract: Find out how to test your Web applications for world-class performance and scalability. The shift from stand-alone desktop applications to Web-enabled applications that accommodate hundreds of thousands of simultaneous users makes performance testing critical. Find out how to make your Microsoft .NET-based applications perform as well as or better than traditional desktop applications with this book-written by the Microsoft team that tests and tunes hundreds of Web sites and Web-based applications. You'll learn how to take advantage of the best available tools to plan and execute performance tests, configure profile tools, analyze performance data from Microsoft Internet Information Services, Microsoft ASP.NET, managed code, the SQL tier, and more. You'll also learn how to use the testing methodology that Microsoft uses to stress test its own sites-some of the most popular, high-performance Web sites in the world.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xiii, 608 p. , ill. ; , 24 cm
    DDC: 005.2/768
    Keywords: Active server pages ; Microsoft Visual studio ; Microsoft .NET ; Web site development ; Electronic books ; local
    Abstract: Visual Studio .NET is the premier development environment for creating .NET applications. The environment includes specialized tools for working with databases, XML files, and XML Web services. Building applications with Visual Studio .NET is a very different experience than building ASP.NET applications with a standard text editor. Visual Studio .NET performs a lot of invisible work in the background, and the environment makes a number of assumptions about the best way to build applications. It is difficult for even an experienced ASP.NET developer to use Visual Studio .NET effectively without any guidance. This book helps readers understand and begin using this complicated environment.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 605 p. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.74
    Keywords: ActiveX ; Database design ; Microsoft .NET ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: Designed in the highly regarded O'Reilly Cookbook format, ADO.NET Cookbook is strikingly different from other books on the subject. It isn't bogged down with pages of didactic theory. The ADO.NET Cookbook focuses exclusively on providing developers with easy-to-find coding solutions to real problems. ADO.NET Cookbook is a comprehensive collection of over 150 solutions and best practices for everyday dilemmas. For each problem addressed in the book, there's a solution--a short, focused piece of code that programmers can insert directly into their applications. And ADO.NET Cookbook is more than just a handy compilation of cut-and-paste C# and VB.NET code. ADO.NET Cookbook offers clear explanations of how and why the code works, warns of potential pitfalls, and directs you to sources of additional information, so you can learn to adapt the problem-solving techniques to different situations. This is a painless way for developers who prefer to learn by doing to expand their skills and productivity, while solving the pressing problems they face every day. These time-saving recipes include vital topics like connecting to data, retrieving and managing data, transforming and analyzing data, modifying data, binding data to .NET user interfaces, optimizing .NET data access, enumerating and maintaining database objects, and maintaining database integrity. The diverse solutions presented here will prove invaluable over and over again, for ADO.NET programmers at all levels, from the relatively inexperienced to the most sophisticated.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 774 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Examinations ; Study guides ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. Lack of customer, partner, and employee access to e-commerce and data servers can impact both revenue and productivity. Even so, most networks do not have the proper degree of security. Network Security Principles and Practices provides an in-depth understanding of the policies, products, and expertise that brings organization to this extremely complex topic and boosts your confidence in the performance and integrity of your network systems and services. Written by a CCIE engineer who participated in the development of the CCIE Security exams, Network Security Principles and Practices is the first book that provides a comprehensive review of topics important to achieving CCIE Security certification. Network Security Principles and Practices is a comprehensive guide to network security threats and the policies and tools developed specifically to combat those threats. Taking a practical, applied approach to building security into networks, the book shows you how to build secure network architectures from the ground up. Security aspects of routing protocols, Layer 2 threats, and switch security features are all analyzed. A comprehe...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 221 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Parallel Title: Erscheint auch als
    DDC: 005.4/476
    Keywords: Linux ; Client/server computing ; Electronic books ; local
    Abstract: A competent system administrator knows that a Linux server is a high performance system for routing large amounts of information through a network connection. Setting up and maintaining a Linux server requires understanding not only the hardware, but the ins and outs of the Linux operating system along with its supporting cast of utilities as well as layers of applications software. There's basic documentation online but there's a lot beyond the basics you have to know, and this only comes from people with hands-on, real-world experience. This kind of "know how" is what we sought to capture in Linux Server Hacks . Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files. You'll learn alternative ways to do backups, how to use system monitoring tools to track system performance and a variety of secure networking solutions. Linux Server Hacks also helps you manage large-scale Web installations running Apache, MySQL, and other open source tools that are typically part of a Linux system.O'Reilly's new Hacks Series proudly reclaims the term "hacking" for the good guys. Hackers use their ingenuity to solve interesting problems. Rob Flickenger is an experienced system administrator, having managed the systems for O'Reilly Network for several years. (He's also into community wireless networking and he's written a book on that subject for O'Reilly.) Rob has also collected the best ideas and tools from a number of other highly skilled contributors.Written for users who already understand the basics, Linux Server Hacks is built upon the expertise of people who really know what they're doing.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Beijing : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 693 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Microsoft .NET ; Electronic books ; local
    Abstract: With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.The book works as both a comprehensive tutorial and reference to security issues for .NET application development, and contains numerous practical examples in both the C# and VB.NET languages. With Programming .NET Security , you will learn to apply sound security principles to your application designs, and to understand the concepts of identity, authentication and authorization and how they apply to .NET security. This guide also teaches you to: use the .NET run-time security features and .NET security namespaces and types to implement best-practices in your applications, including evidence, permissions, code identity and security policy, and role based and Code Access Security (CAS) use the .NET cryptographic APIs , from hashing and common encryption algorithms to digital signatures and cryptographic keys, to protect your data. use COM+ component services in a secure manner If you program with ASP.NET will also learn how to apply security to your applications. And the book also shows you how to use the Windows Event Log Service to audit Windows security violations that may be a threat to your solution.Authors Adam Freeman and Allen Jones, early .NET adopters and long-time proponents of an "end-to-end" security model, based this book on their years of experience in applying security policies and developing products for NASDAQ, Sun Microsystems, Netscape, Microsoft, and others. With the .NET platform placing security at center stage, the better informed you are, the more secure your project will be.
    Note: "Writing secure applications using C# or Visual Basic .NET"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 176 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; IEEE 802.11 (Standard) ; Wireless communication systems ; Security measures ; Electronic books ; local
    Abstract: Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your own secure wireless network. 802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent Privacy component of 802.11. You'll learn how to configure a wireless client and to set up a WAP using either Linux or Free BSD. You'll also find thorough information on controlling network access and encrypting client traffic. Beginning with an introduction to 802.11b in general, the book gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. Next, the book details the technical setup instructions needed for both the Linux and FreeBSD operating systems. Some of the topics covered include: Station Security for Linux, FreeBSD, Open BSD, Mac OS X and Windows Setting Up Access Point Security Gateway Security, including building Gateways, firewall Rules, Auditing, etc. Authentication and Encryption FreeBSD IPsec client and gateway configuration Linux IPsec client and gateway configuration 802.1x authentication 802.11 Security is a book whose time has come. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b-based systems, you'll want this book beside you every step of the way.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 458 p. , ill. ; , 24 cm
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Create killer applications using best practices for Visual Basic .NET! The same attributes that make Visual Basic .NET exceptionally productive and easy to use can also lead to unexpected problems, especially when you upgrade. Using standardized programming techniques can help you solve those problems so you can exploit all the power of rapid development-without creating hidden land mines in performance and maintainability. This book shows you proven practices to help you eliminate "voodoo" variables, create interfaces that make users more productive, write self-documenting code, simplify code modifications, and more. Each chapter illustrates common pitfalls and practical solutions with code samples-many from real-world projects. Whether you're writing just a few lines of code or working with a team to build an enterprise application, you'll learn how to use practical standards to develop better, more reliable code for every process.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 945 p. , ill. ; , 23 cm. +
    Edition: 4th ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.
    Note: Includes bibliographical references (p. [731]-759) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 253 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Access control ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need.Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting.In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations.If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
    Note: "Covers Unix and Windows"--Cover. - "Cross-platform authentication & single-sign-on"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...