Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Safari Tech Books Online  (176)
  • XML (Document markup language)  (73)
  • Computer security  (57)
  • Oracle (Computer file)  (48)
Datenlieferant
Materialart
Sprache
Erscheinungszeitraum
  • 1
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 467, [37] p. , ill. ; , 24 cm
    DDC: 005.7585
    Schlagwort(e): Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Kurzfassung: Oracle Database 10g Insider Solutions is a must-have reference guide for all Oracle professionals. It provides much-needed information on best practices, tips, and techniques in debugging, installation, deployment, and tuning of the Oracle 10g database. You can draw upon the experience and knowledge of these authors to find creative ways to put your Oracle database to work. The authors will also address common and not-so-common installation concerns, database administration, development, and tuning. Oracle Database 10g Insider Solutions will bring you the insider information that you can't get anywhere else.
    Anmerkung: "Covers release 2"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Electronic books ; local
    Kurzfassung: "When it comes to software security, the devil is in the details. This book tackles the details." --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies "McGraw's book shows you how to make the 'culture of security' part of your development lifecycle." --Howard A. Schmidt, Former White House Cyber Security Advisor "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the lunchroom wall." --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book's methods without radically changing the way you work. Inside you'll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development lifecycle with the touchpoints described in this book. Let this expert author show you how to build more secure software by building security in.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvii, 713 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Computer viruses ; Electronic books ; local
    Kurzfassung: "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." -Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code-and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies © Copyright Pearson Education. All rights reserved.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive book on Security Patterns, which are critical for secure programming. --Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your development efforts. --Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. --Judy Lin, Executive Vice President, VeriSign, Inc. Core Security Patterns provides a comprehensive patterns-driven approach and methodology for effectively incorporating security into your applications. I recommend that every application developer keep a copy of this indispensable security reference by their side. --Bill Hamilton, author of ADO.NET Cookbook , ADO.NET in a Nutshell , and NUnit Pocket Reference As a trusted advisor, this book will serve as a Java developers security handbook, providing applied patterns and design strategies for securing Java applications. --Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase Like Core J2EE Patterns , this book delivers a proactive and patterns-driven approach for designing end-to-end security in your applications. Leveraging the authors strong security experience, they created a must-have book for any designer/developer looking to create secure applications. --John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE Patterns Core Security Patterns is the hands-on practitioners guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisionin...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Harlow : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxi, 347 p. , ill. ; , 24 cm. +
    DDC: 005.8
    Schlagwort(e): Business enterprises ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Praise for J.C. Cannon's Privacy "A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between." -Peter Wayner, author of Translucent Databases "Cannon provides an invaluable map to guide developers through the dark forest created by the collision of cutting-edge software development and personal privacy." -Eric Fredericksen, Sr. Software Engineer, PhD., Foundstone, Inc. "Cannon's book is the most comprehensive work today on privacy for managers and developers. I cannot name any technical areas not covered. No practitioners should miss it." -Ray Lai, Principal Engineer, Sun Microsystems, Inc., co-author of Core Security Patterns and author of J2EE Platform Web Services "Every developer should care deeply about privacy and this is the best book I've read on the subject. Get it, read it, and live it." -Keith Ballinger, Program Manager, Advanced Web Services, Microsoft "J.C. Cannon's book demonstrates that information and communication technology can contribute in a significant way to restoring individual privacy and raises more awareness of the complexity and importance of this societal problem." -Dr. John J. Borking, Former Commissioner and Vice-President of the Dutch Data Protection Authority "If you are planning, implementing, coding, or managing a Privacy campaign in your company or your personal computing, there is no more relevant reference. J.C. Cannon nails the issues." -Rick Kingslan, CISSP, Microsoft MVP-Windows Server: Directory Services and Right Management, West Corporation "It's often been said that security is a process, not a product. Privacy is no different! Unlike other privacy books, J.C. Cannon's book has something valuable to convey to everyone involved in the privacy process, from executives to designers and developers, many of whom aren't thinking about privacy but should be." -Keith Brown, Co-founder of Pluralsight and author of The .NET Developer's Guide to Windows Security and Programming Windows Security "J.C. Cannon's new book on electronic privacy is an important addition to the available works in this emerging field of study and practice. Through many humorous (and occasionally frightening) examples of privacy gone wrong, J.C. helps you better understand how to protect your privacy and how to build privacy awareness into your organization and its development process. Keenly illustrating both the pros and cons of various privacy-e...
    Anmerkung: Includes bibliographical references (p. 319-326) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvi, 554 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.75/65
    Schlagwort(e): Oracle (Computer file) ; Database management ; Electronic books ; local
    Kurzfassung: Despite its wide availability and usage, few developers and DBAs have mastered the true power of Oracle SQL Plus. This bestselling book--now updated for Oracle 10g--is the only in-depth guide to this interactive query tool for writing SQL scripts. It's an essential resource for any Oracle user.The new second edition of Oracle SQL Plus: The Definitive Guide clearly describes how to perform, step-by-step, all of the tasks that Oracle developers and DBAs want to perform with SQL Plus--and maybe some you didn't realize you could perform.With Oracle SQL Plus: The Definitive Guide, you'll expertly: write and execute script files generate ad hoc reports extract data from the database query the data dictionary tables customize an SQL Plus environment and much more It also includes a handy quick reference to all of its syntax options and an often-requested chapter on SQL itself, along with a clear, concise, and complete introduction.This book is truly the definitive guide to SQLPlus. It's an indispensable resource for those who are new to SQL*Plus, a task-oriented learning tool for those who are already using it, and an immediately useful quick reference for every user. If you want to leverage the full power and flexibility of this popular Oracle tool, you'll need this book.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 238 p. , ill. ; , 24 cm
    Schlagwort(e): Linux ; Computer security ; Electronic books ; local
    Kurzfassung: The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: A readable and concrete explanation of SELinux concepts and the SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With SELinux , a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 1142 p. , ill. ; , 24 cm
    DDC: 005.4/476
    Schlagwort(e): Microsoft Windows server ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: "Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!" James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker Jamesaccusource.net "Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003." Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com "Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security." Bob Reinsch bob.reinsch@fosstraining.com " Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information." Richard Siddaway, MCSE rsiddaw@hotmail.com "Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security." Michael VonTungeln, MCSE, CTT mvontung@yahoo.com "I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it. Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all." Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net "R...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Anmerkung: Includes bibliographical references (p. [389]-395) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 445 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): FreeBSD ; OpenBSD ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure.FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems.Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate.Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 11
    Online-Ressource
    Online-Ressource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xii, 177 p. , ill. ; , 26 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer security ; Computers ; Access control ; Data protection ; Identity theft ; Electronic books ; local
    Kurzfassung: From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances shows you how to regain control of your life. You'll learn how to keep private information private, stop nosy bosses, get off that incredibly annoying mailing list, and more. Unless you know what data is available about you and how to protect it, you're a sitting duck. Computer Privacy Annoyances is your guide to a safer, saner, and more private life. Written by privacy pro Dan Tynan, and based on interviews with privacy experts from all over the globe, Computer Privacy Annoyances serves up real-world advice in bite-sized portions that will help you stop the snoops in their tracks. The book even addresses non-computing threats, from telemarketer-cum-stalkers, thieves at your mailbox, nosy folks in your HR department, cell phone eavesdroppers, and more. The key areas covered include: Privacy at Home Privacy on the Net Privacy at Work Privacy in Public Privacy and Uncle Sam Privacy in the Future Daniel Tynan has written about Internet privacy and security for nearly a decade. His work has appeared in more than 40 national publications. As executive editor at PC World , Tynan edited a special issue on Internet Privacy that won a Grand Neal Award and was a finalist for a National Magazine Award. He has won more than a dozen other honors, including nine Neals, four Maggies, and two Computer Press Association Awards.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxii, 747 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Electronic books ; local
    Kurzfassung: In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company. Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. This shorter version of the original work omits much mathematical formalism, making it more accessible for professionals and students who have a less formal mathematical background, or for readers with a more practical than theoretical interest.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 13
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Data protection ; Electronic books ; local
    Kurzfassung: The Definitive Guide to Protecting Enterprise Data Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecycle Management , leading industry consultant Tom Petrocelli presents a systematic, coherent approach to planning and implementing cost-effective data protection. This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy. Coverage includes A complete, unique framework for considering and planning data protection Understanding storage technology from the standpoint of data protection Architecting more effective backup/restore solutions Using remote copy and replication to keep data synchronized and support immediate failover to hot sites Leveraging core computer security concepts and strategies to protect your most critical data Securing your entire storage infrastructure, not just servers Using policy-driven data protection and Data Lifecycle Management (DLM) to improve security and reduce cost Using ILM to identify your highest-value data and choose the right ways to protect it Data Protection and Information Lifecycle Management is an indispensable resource for IT executives who must plan and implement strategies for data protection; administrators who must protect data on a day-to-day basis; and product managers, consultants, and marketers responsible for crafting superior data-security solutions.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 14
    Online-Ressource
    Online-Ressource
    Sebastapol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 714 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Electronic books ; local
    Kurzfassung: Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computerinteraction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security & Usability groups 34 essays into six parts: Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems--how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems--methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The ...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 15
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 381 p. , ill. ; , 23 cm
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computer security ; United States ; Management ; Data protection ; Data protection ; Management ; Electronic books ; local
    Kurzfassung: Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization's aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board. Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow fin...
    Anmerkung: "Understand the total cost of ownership and return on investment for network security solutions"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 16
    Online-Ressource
    Online-Ressource
    San Jose, Calif. ; : Novell Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 533 p. , ill. ; , 23 cm
    Ausgabe: 3rd ed. /
    DDC: 005.8
    Schlagwort(e): Linux (Computer file) ; Computer security ; Electronic books ; local
    Kurzfassung: An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall optimization along with some advanced concepts including customizing the Linux kernel to enhance security.The third edition, while distribution neutral, has been updated for the current Linux Kernel and provides code examples for Red Hat, SUSE, and Debian implementations. Don't miss out on the third edition of the critically acclaimed Linux Firewalls .
    Anmerkung: Previous ed.: published as by Robert L. Ziegler. Indianapolis, Ind.: New Riders, 2001
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 17
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. ; : O'Reilly Media | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 324 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.
    Anmerkung: "Writing, hacking, and modifying security tools"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 18
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 270 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysis But the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.
    Anmerkung: "Solutions and examples for Snort administrators"--Cover. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 19
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.8
    Schlagwort(e): Microsoft Windows (Computer file) ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: "It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding." --Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible." --Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight. "Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine. "Understanding the ultimate attacker's tool provides ...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 20
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 647 p. , ill. ; , 23 cm
    Serie: Prentice Hall series in computer networking and distributed systems
    DDC: 005.8
    Schlagwort(e): Computer crimes ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to come "This is a truly outstanding book-enormous technical wealth and beautifully written." -Warwick Ford "Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!" -Harlan Carvey, CISSP "This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." -Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it! This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes: Solutions and examples that cover both UNIX® and Windows® Practical, time-tested, real-world actions you can take to secure your systems Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly! Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home compu...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 21
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 581 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Enterprise Java™ Security: Building Secure J2EE™ Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java™ 2 Platform, Enterprise Edition (J2EE), and Java™ 2 Platform, Standard Edition (J2SE™), security architectures and offers practical solutions and usage patterns to address the challenges of Java security. To aid developers who need to build secure J2EE applications, Enterprise Java™ Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP™), and Enterprise JavaBeans™ (EJB™)-technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security. Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology. The relationship between Java and cryptographic technologies is covered in great detail, including: Java Cryptography Architecture (JCA) Java Cryptography Extension (JCE) Public-Key Cryptography Standards (PKCS) Secure/Multipurpose Internet Mail Extensions (S/MIME) Java Secure Socket Extension (JSSE)
    Anmerkung: Includes bibliographical references (p. 563) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 22
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxx, 540 p. , ill. ; , 24 cm. +
    DDC: 005.72
    Schlagwort(e): Microsoft Office ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Co-authors are the world-renowned inventor of markup languages and a developer of the W3C XML Schema specification Detailed coverage of Office 2003 Professional XML features, plus all the XML knowledge you need to use them Learn to edit your XML document with Word, analyze its data with Excel, store it with Access, and publish it to the Web with FrontPage® Build dynamic custom XML forms with the remarkable new InfoPath™ 2003-structured data collection with word processing flexibility From the Foreword by Jean Paoli, Microsoft XML Architect and co-editor of the W3C XML specification: "XML enabled the transfer of information from server to server and server to client, even in cross-platform environments. But the desktop, where documents are created and analyzed by millions of information workers, could not easily participate. Business-critical information was locked inside data storage systems or individual documents, forcing companies to adopt inefficient and duplicative business processes. "This is a book on re-inventing the way millions of people write and interact with documents. It succeeds in communicating the novel underlying vision of Office 2003 XML while focusing on task-oriented, hands-on skills for using the product." Desktop XML affects every Office 2003 Professional Edition user! It transforms millions of desktop computers from mere word processors into rich clients for Web services, editing front-ends for XML content management systems, and portals for XML-based application integration. And this book shows you how to benefit from it. You'll learn exactly what XML can do for you, and you'll master its key concepts, all in the context of the Office products you already know and use. With 200 tested and working code and markup examples and over 150 screenshots and illustrations from the actual shipped product (not betas), you'll see step by step how: Office users can share documents more easily, without error-prone rework, re-keying, or cut-and-paste. Office data from your documents can be captured for enterprise databases. Office documents can be kept up-to-date with live data from Web Services and enterprise data stores. Office solutions can overcome traditional limitations by using XML and Smart Documents. BONUS XML SKILLS SECTION! All the XML expertise you'll need, adapted for Office 2003 users from the best-selling Charles F. Goldfarb's XML Handbook, Fifth Edition : the XML language, XML Schema, XPath, XSLT, Web services ... and m...
    Anmerkung: "CD-ROM with full-function trial of Microsoft InfoPath 2003"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 23
    Sprache: Englisch
    Seiten: p. cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Computer security ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Inside Java™ 2 Platform Security , the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java experts at Sun Microsystems, provides a detailed look into the central workings of the Java security architecture and describes tools and techniques for successful implementation on even the most demanding network computing environment. While Java has always provided a stronger security model than other platforms, this book reviews all the methods and practices required to improve security without sacrificing functionality. With tips on how to customize, extend, and refine the Java security architecture, users will have everything they need to protect their information assets from both external and internal threats. This book's in-depth coverage encompasses security architecture, deployment, customization, new developments, and much more. Security fundamentals Secure class loading Specifying fine-grained security policy Enforcing security policy with AccessController, SecurityManager, and more Digital certificates, certification paths, signed code, JAAS, and other authentication measures Java-based cryptography with code examples JSSE, Java GSS-API, and RMI for network security Previews of other platforms for security, including Java Card, J2ME and Jini Designed for both the system administrator and software practitioner, this book delivers vital knowledge for building and maintaining a secure system using the Java 2 platform. With detailed code and usage examples throughout, Inside Java™ 2 Platform Security, Second Edition , is an indispensable resource for all platform security needs. The Java™ Series is supported, endorsed, and authored by the creators of the Java technology at Sun Microsystems, Inc. It is the official place to go for complete, expert, and definitive information on Java technology. The books in this Series provide the inside information you need to build effective, robust, and portable applications and applets. The Series is an indispensable resource for anyone targeting the Java™ 2 platform.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 24
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 486 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 006.7/4
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: As developers know, the beauty of XML is that it is extensible, even to the point that you can invent new elements and attributes as you write XML documents. Then, however, you need to define your changes so that applications will be able to make sense of them and this is where XML schema languages come into play. RELAX NG (pronounced relaxing), the Regular Language Description for XML Core--New Generation is quickly gaining momentum as an alternative to other schema languages. Designed to solve a variety of common problems raised in the creation and sharing of XML vocabularies, RELAX NG is less complex than The W3C's XML Schema Recommendation and much more powerful and flexible than DTDs.RELAX NG is a grammar-based schema language that's both easy to learn for schema creators and easy to implement for software developers In RELAX NG , developers are introduced to this unique language and will learn a no-nonsense method for creating XML schemas. This book offers a clear-cut explanation of RELAX NG that enables intermediate and advanced XML developers to focus on XML document structures and content rather than battle the intricacies of yet another convoluted standard. RELAX NG covers the following topics in depth: Introduction to RELAX NG Building RELAX NG schemas using XML syntax Building RELAX NG schemas using compact syntax, an alternative non-XML syntax Flattening schemas to limit depth and provide reusability Using external datatype libraries with RELAX NG W3C XML Schema regular expressions Writing extensible schemas Annotating schemas Generating schemas form different sources Determinism and datatype assignment and much more.If you're looking for a schema language that's easy to use and won't leave you in a labyrinth of obscure limitations, RELAX NG is the language you should be using. And only O'Reilly's RELAX NG gives you the straightforward information and everything else you'll need to take advantage of this powerful and intelligible language.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 25
    Online-Ressource
    Online-Ressource
    Beijing : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 689 p. , ill. ; , 23 cm
    Ausgabe: 3rd ed.
    Serie: In a nutshell
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: If you're a developer working with XML, you know there's a lot to know about XML, and the XML space is evolving almost moment by moment. But you don't need to commit every XML syntax, API, or XSLT transformation to memory; you only need to know where to find it. And if it's a detail that has to do with XML or its companion standards, you'll find it--clear, concise, useful, and well-organized--in the updated third edition of XML in a Nutshell .With XML in a Nutshell beside your keyboard, you'll be able to: Quick-reference syntax rules and usage examples for the core XML technologies, including XML, DTDs, Xpath, XSLT, SAX, and DOM Develop an understanding of well-formed XML, DTDs, namespaces, Unicode, and W3C XML Schema Gain a working knowledge of key technologies used for narrative XML documents such as web pages, books, and articles technologies like XSLT, Xpath, Xlink, Xpointer, CSS, and XSL-FO Build data-intensive XML applications Understand the tools and APIs necessary to build data-intensive XML applications and process XML documents, including the event-based Simple API for XML (SAX2) and the tree-oriented Document Object Model (DOM) This powerful new edition is the comprehensive XML reference. Serious users of XML will find coverage on just about everything they need, from fundamental syntax rules, to details of DTD and XML Schema creation, to XSLT transformations, to APIs used for processing XML documents. XML in a Nutshell also covers XML 1.1, as well as updates to SAX2 and DOM Level 3 coverage. If you need explanation of how a technology works, or just need to quickly find the precise syntax for a particular piece, XML in a Nutshell puts the information at your fingertips.Simply put, XML in a Nutshell is the critical, must-have reference for any XML developer.
    Anmerkung: "A desktop quick reference"--Cover. - "Covers XML 1.1 & XInclude"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 26
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly Media, Inc. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 262 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.75/85
    Schlagwort(e): Oracle (Computer file) ; Application software ; Development ; Client/server computing ; Computer software ; Development ; Database management ; Computer programs ; Relational databases ; Web servers ; Electronic books ; local
    Kurzfassung: The new Oracle Application Server offers a wide range of functionality, including Java runtime and development tools, portal development tools, business intelligence, single sign-on identify management, and much more. It's so powerful and complex, in fact, that many people who use the product (or are considering using it) are familiar with only a portion of the entire range of its capabilities. The choices can be overwhelming. Few people grasp how the larger issues--such as the interplay between components or the various architectural choices in the product--play out in the Oracle Application Server. This new guide provides the perfect introduction to the Oracle Application Server for users of any level. Regardless of which of the server's capabilities you use, you'll benefit from this tightly focused, all-in-one technical overview. It's written for anyone who is concerned with using and managing web servers, doing Java development and deployment, using Oracle's own tools--like Forms and Reports, using or developing for Oracle Portal, or those who use and administer business intelligence, mobile or integration software. Divided into three concise sections, the book covers server basics, core components, and server functionality. The book leads with the history of Oracle Application Server, its architecture, management, standards, and third-party support for languages and tools such as Java, Perl, and HTTP. The next section covers Oracle's web server, containers for Java web caching, and the server's security features. And finally, the book discusses HTML development, Java development, and Oracle development. Although the book refers mainly to Oracle Application Server 10g, the authors also describe features in earlier product releases where necessary, particularly Oracle9i Application Server. More comprehensible than a large reference and more detailed than a primer, the book provides a foundation for understanding and using Oracle Application Server effectively and efficiently. Readers concentrate on the most important issues and components of the server, focusing primarily on principles rather than syntax. Designed to be the ideal first OracleAS book, Oracle Application Server 10g Essentials offers Oracle application developers and administrators everything they need to know about this powerful server.
    Anmerkung: "Architecture and components"--Cover. - Includes bibliographical references (p. 233-240) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 27
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 291 p. , ill. ; , 23 cm
    DDC: 005.75/6
    Schlagwort(e): Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Kurzfassung: Fast, easy automation for every Oracle 9 i and 10 g DBA! Quick access to real-world examples Installation, database creation, management, monitoring, tuning, and backup/recovery Oracle Universal Installer (OUI), Oracle Net Configuration Assistant (NetCA), and Oracle Database Configuration Assistant (DBCA) The fast, practical Oracle 9 i /10 g automation reference for every DBA! Automate Oracle-and save your time for more important tasks! This is the Oracle automation reference every working Oracle DBA needs... concise, straightforward, and incredibly easy to use . Discover proven solutions for automating installation, database creation, management, monitoring, tuning, backup/recovery, and more. Keep this book by your desk, near your server...wherever you need fast, reliable automation solutions right now ! Master scripting for both Oracle 9 i and Oracle 10 g ! Use Oracle Universal Installer to create response files for automating any installation Use Oracle Network Configuration Assistant (NetCA) to configure network components during installation Use Oracle Database Configuration Assistant (DBCA) to create and clone databases, and to reverse engineer them into templates and scripts Manage files and tablespaces, tune memory, perform backup/recovery, schedule automated administration tasks, and more Extend and customize any script to your own needs Includes concise reference to Perl DBI and its Oracle-specific components-with real-world examples and syntax
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 28
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 388 p. , ill. ; , 23 cm
    Schlagwort(e): Microsoft InfoPath ; Business ; Forms ; Computer programs ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Microsoft InfoPath 2003 Kick Start builds upon the reader's knowledge of the Microsoft Office system to enable them to get right to work making productive use of InfoPath. It is targeted specifically at the early adopters - developers who will use their knowledge of XML and Web development to build sophisticated applications with InfoPath front ends. However it is also, carefully structured to enable "front line" InfoPath users to quickly glean the information they need to be productive when developing their own InfoPath forms - and when working with developers to create more involved InfoPath applications.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 29
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: 355 p. , ill. ; , 24 cm
    DDC: 006.7/4
    Schlagwort(e): Query languages (Computer science) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: XQuery Kick Start delivers a concise introduction to the XQuery standard, and useful implementation advice for developers needing to put it into practice. The book starts by explaining the role of XQuery in the XML family of specifications, and its relationship with XPath. The authors then explain the specification in detail, describing the semantics and data model, before moving to examples using XQuery to manipulate XML databases and document storage systems. Later chapters discuss Java implementations of XQuery and development tools that facilitate the development of Web sites with XQuery. This book is up to date with the latest XQuery specifications, and includes coverage of new features for extending the XQuery language.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 30
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 366 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): Hypertext systems ; XML (Document markup language) ; XPath (Computer program language) ; Electronic books ; local
    Kurzfassung: XPath is to XML as SQL is to databases: XML applications need XPath to locate specific data within an XML document for further processing with other XML applications such as XSLT, XQuery, XPointer, XLink and DOM level 3. With XPath, these applications offer developers a full toolkit for transforming, linking, and searching XML data. Developers need to understand XPath to fully exploit XML in their applications, and they have few resources beyond the W3C specification. XPath Kick Start will examine every aspect of XPath in detail, including its influence on and use with these other XML standards. With each technique illustrated with real-world examples, the book starts with coverage of the essentials of XPath, including nodes, expressions, functions and operators. The second half of the book details XPath in practice - from manipulating XML data to transforming, linking and querying XML documents.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 31
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 298 , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 32
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 455 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 006.7/4
    Schlagwort(e): Application program interfaces (Computer software) ; Microsoft .NET Framework ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: If you're seeking ways to build network-based applications or XML-based web services, Microsoft provides most of the tools you'll need. XML is integrated into the .NET Framework and Visual Studio .NET, but if you want to get a grasp on how .NET and XML actually work together, that's a different story. With .NET & XML , you can get under the hood to see how the .NET Framework implements XML, giving you the skills to write understandable XML-based code that interoperates with code written with other tools, and even other languages. .NET & XML starts by introducing XML and the .NET Framework, and then teaches you how to read and write XML before moving on to complex methods for manipulating, navigating, transforming, and constraining it. To demonstrate the power of XML in .NET, author Niel Bornstein builds a simple hardware store inventory system throughout the book. As you move from chapter to chapter, you'll absorb increasingly complex information until you have enough knowledge to successfully program your own XML-based applications. This tutorial also contains a quick reference to the API, plus appendices present additional .NET assemblies that you can use to work with XML, and how to work with the .NET XML configuration file format. One study puts the potential market for new software based on XML at or near $100 billion over the next five years. The .NET Framework gives you a way to become a part of it. But to use XML and .NET effectively, you need to understand how these two technologies work together. This book gives you the insight to take full advantage of the power the two provide.
    Anmerkung: "Understanding the code and markup behind the wizards"--Cover. - Includes biblographic references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 33
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 006.7/6
    Schlagwort(e): Application software ; Development ; Internet programming ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Praise for XForms: XML Powered Web Forms "XForms is an exciting new technology for designing Web forms in an elegant and accessible way. Raman's book provides strong motivations for flexibility in the design of human-machine interactions, and explains how to use XForms to this end in crystal-clear prose." - Eve Maler XML Standards Architect, Sun Microsystems "Interactive forms technology is the logical evolution of Web user interface design. XForms represents a significant leap forward in that evolution." - Sean McGrath CTO, Propylon "The greatest strength of this book is the skill with which T. V. Raman links the XForms technology with the larger context of the Web. The limitations of HTML forms, the ways in which XForms provides a better foundation for Web and Web service user interfaces, and the opportunities for an XForms-powered Web that is accessible to all users and devices are outlined and brought together in a compelling way." - Michael Champion Advisory Research and Development Specialist, Software AG "Raman's book gives the reader an excellent explanation of the emerging W3C XForms recommendation. It's a well-organized and well-written book that begins with a gentle introduction to the concepts that motivated the development of XForms and then provides a reasonable overview of the relevant XML technology related to XForms. Most of the book covers XForms components: user interface controls, model properties, functions, actions, and events. It concludes with XForms as a Web service, offering multi-modal access and accessibility. In light of the October 2003 deadline for U.S. federal agencies to comply with the mandate of the Government Paperwork Elimination Act (GPEA) to give citizens the opportunity to provide information online, this important technical work comes none too soon. As T. V. masterfully elucidates, XForms provides the 'last mile' in 'connecting users to their data.' Insightfully, he also observes 'the document is the human interface' to data-an understanding without which the challenge to make eGov services 'citizen-centered' simply cannot and will not be met." - Owen Ambur Cofounder and Cochair, XML Working Group, U.S. CIO Council "I found the author's straightforward style quite comfortable and informative. I heartily recommend this book, especially for government XML developers interested in the broader area of E-Forms. Understanding XForms is key to developing robust and flexible E-Forms solutions that separate cont...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 34
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 605 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Schlagwort(e): Business ; Computer programs ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: "This volume offers relentlessly pragmatic solutions to help your business applications get the most out of XML, with a breezy style that makes the going easy. Mike has lived this stuff; he has a strong command of the solutions and the philosophy that underlies them." --Eve Maler, XML Standards Architect, Sun Microsystems Businesses running legacy applications that do not support XML can face a tough choice: Either keep their legacy applications or switch to newer, XML-enhanced applications. XML presents both challenges and opportunities for organizations as they struggle with their data. Does this dilemma sound familiar? What if you could enable a legacy application to support XML? You can. In Using XML with Legacy Business Applications, e-commerce expert Michael C. Rawlins outlines usable techniques for solving day-to-day XML-related data exchange problems. Using an easy-to-understand cookbook approach, Rawlins shows you how to build XML support into legacy business applications using Java and C++. The techniques are illustrated by building converters for legacy formats. Converting CSV files, flat files, and X12 EDI to and from XML will never be easier! Inside you'll find: A concise tutorial for learning to read W3C XML schemas An introduction to using XSLT to transform between different XML formats Simple, pragmatic advice on transporting XML documents securely over the Internet For developers working with either MSXML with Visual C++ or Java and Xerces: See Chapter 3 for a step-by-step guide to enabling existing business applications to export XML documents See Chapter 2 for a step-by-step guide to enabling existing business applications to import XML documents See Chapter 5 for code examples and tips for validating XML documents against schemas See Chapter 12 for general tips on building commerce support into an application For end users who need a simple and robust conversion utility: See Chapter 7 for converting CSV files to and from XML See Chapter 8 for converting flat files to and from XML See Chapter 9 for converting X12 EDI to and from XML See Chapter 11 for tips on how to use these techniques together for complex format conversions The resource-filled companion Web site (www.rawlinsecconsulting.com/booksupplement) includes executable versions of the utilities described in the book, full source code in C++ and Java, XSLT stylesheets, bug fixes, sample input and output files, and more. 0321154940B07142003
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 35
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 411 p. , ill. ; , 23 cm
    Ausgabe: 3rd ed.
    DDC: 005.75/85
    Schlagwort(e): Oracle (Computer file) ; Computer software ; Development ; Relational databases ; Electronic books ; local
    Kurzfassung: Complete tutorial for database developers! Thorough coverage of PL/SQL Practical "cookbook" techniques Effectively create and manage complex databases with Oracle! Systems and database expert Kevin Owens explores PL/SQL, Oracle's answer to the Structured Query Language (SQL), and teaches you what you need to know to build robust and complex databases for your business. Using easy-to-follow instructions and examples, this book presents techniques to take advantage of Oracle features such as triggers and stored procedures-features that allow your databases to incorporate business rules which are easy to manage and modify as the business evolves. Topics covered include: Viewing constraints in the data dictionary Complex rule enforcement PL/SQL program units and language features Data types and composite structure Error handling and exceptions Inter-process communications Declarative constraints, including primary key, unique, foreign key, check, and much more Programming Oracle Triggers and Stored Procedures, Third Edition, is an invaluable resource for database developers, designers, and project leaders looking to build and maintain truly intelligent, complex databases
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 36
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 252 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Biometric identification ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application. In Biometrics for Network Security , biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes: An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
    Anmerkung: Includes bibliographical references (p. 239-241) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 37
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 460 p. , ill. ; , 23 cm
    DDC: 005.72
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Developers and system administrators alike are uncovering the true power of XML, the Extensible Markup Language that enables data to be sent over the Internet from one computer platform to another or one application to another and retain its original format. Flexible enough to be customized for applications as diverse as web sites, electronic data interchange, voice mail systems, wireless devices, web services, and more, XML is quickly becoming ubiquitous. XML Hacks is a roll-up-your-sleeves guide that distills years of ingenious XML hacking into a complete set of practical tips, tricks, and tools for web developers, system administrators, and programmers who want to go far beyond basic tutorials to leverage the untapped power of XML.With plenty of useful real-world projects that illustrate how to define, read, create, and manipulate XML documents, XML Hacks shows readers how to put XML's power to work on the Internet and within productivity applications. Each Hack in this book can be read easily in a few minutes, saving programmers and administrators countless hours of searching for the right answer. And this is an O'Reilly Hacks book, so it's not just practical, imminently useful, and time-saving. It's also fun.From Anatomy of an XML Document to Exploring SOAP Messages XML Hacks shows you how to save time and accomplish more with fewer resources. If you want much more than the average XML user--to explore and experiment, do things you didn't know you could do with XML, discover clever shortcuts, and show off just a little--this invaluable book is a must-have.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 38
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 269 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Anmerkung: "Intrusion detection with open source tools"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 39
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 327 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.13/3
    Schlagwort(e): MySQL (Electronic resource) ; Object-oriented programming (Computer science) ; PHP (Computer program language) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: If you're using PHP 4, then chances are good that an upgrade to PHP 5 is in your future. The more you've heard about the exciting new features in PHP 5, the sooner that upgrade is probably going to be. Although an in-depth, soup-to-nuts reference guide to the language is good to have on hand, it's not the book an experienced PHP programmer needs to get started with the latest release. What you need is a lean and focused guide that answers your most pressing questions: what's new with the technology, what's different, and how do I make the best use of it? In other words, you need a copy of Upgrading to PHP 5 . This book is targeted toward PHP developers who are already familiar with PHP 4. Rather than serve as a definitive guide to the entire language, the book zeroes in on PHP 5's new features, and covers these features definitively. You'll find a concise appraisal of the differences between PHP 4 and PHP 5, a detailed look at what's new in this latest version, and you'll see how PHP 5 improves on PHP 4 code. See PHP 4 and PHP 5 code side-by-side, to learn how the new features make it easier to solve common PHP problems. Each new feature is shown in code, helping you understand why it's there, when to use it, and how it's better than PHP 4. Short, sample programs are included throughout the book. Topics covered in Upgrading to PHP 5 include: The new set of robust object-oriented programming features An improved MySQL extension, supporting MySQL 4.1, prepared statements, and bound parameters Completely rewritten support for XML: DOM, XSLT, SAX, and SimpleXML Easy web services with SOAP SQLite, an embedded database library bundled with PHP 5 Cleaner error handling with exceptions Other new language features, such as iterators, streams, and more. Upgrading to PHP 5 won't make you wade through information you've covered before. Written by Adam Trachtenberg, coauthor of the popular PHP Cookbook , this book will take you straight into the heart of all that's new in PHP 5. By the time you've finished, you'll know PHP 5 in practice as well as in theory.
    Anmerkung: "All that's new in PHP 5, covers MySQL 4.1"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 40
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 472 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.75/85
    Schlagwort(e): Oracle (Computer file) ; SQL (Computer program language) ; Electronic books ; local
    Kurzfassung: The vast majority of Oracle SQL books discuss some syntax, provide the barest rudiments of using Oracle SQL, and perhaps include a few simple examples. It might be enough to pass a survey course, or give you some buzz words to drop in conversation with real Oracle DBAs. But if you use Oracle SQL on a regular basis, you want much more. You want to access the full power of SQL to write queries in an Oracle environment. You want a solid understanding of what's possible with Oracle SQL, creative techniques for writing effective and accurate queries, and the practical, hands-on information that leads to true mastery of the language. Simply put, you want useful, expert best practices that can be put to work immediately, not just non-vendor specific overview or theory.Updated to cover the latest version of Oracle, Oracle 10g, this edition of the highly regarded Mastering Oracle SQL has a stronger focus on technique and on Oracle's implementation of SQL than any other book on the market. It covers Oracle s vast library of built-in functions, the full range of Oracle SQL query-writing features, regular expression support, new aggregate and analytic functions, subqueries in the SELECT and WITH clauses, multiset union operators, enhanced support for hierarchical queries: leaf and loop detection, and the CONNECT_BY_ROOT operator, new partitioning methods (some introduced in Oracle9i Release 2), and the native XML datatype, XMLType. Mastering Oracle SQL , 2nd Edition fills the gap between the sometimes spotty vendor documentation, and other books on SQL that just don't explore the full depth of what is possible with Oracle-specific SQL. For those who want to harness the untapped (and often overlooked) power of Oracle SQL, this essential guide for putting Oracle SQL to work will prove invaluable.
    Anmerkung: "Covers Oracle database 10g"--Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 41
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly Media Inc. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: x, 204 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Apache (Computer file : Apache Group) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Web developers rely on XML to separate data from presentation and create a consistent templating system for a web site. Although limited XML-to-HTML conversion is possible within some browsers, web developers creating dynamic or complex sites will find server-side XML transformation a necessity. Unfortunately, until recently, there have been few XML tools available for server-side XML transformation or authoring. AxKit, a mod_perl and Apache-based XML content delivery solution, was designed to meet that need with a cost-effective and efficient plugin architecture. AxKit allows the developer to quickly design modules to create faster web sites, and deliver them in a wide variety of media formats. AxKit also takes care of caching so the developer doesn't have to worry about it. AxKit meets the demands of the web developer nicely, but, as with any new toolkit, there is a learning curve. For developers who want to flatten that learning curve and get right to work with AxKit, XML Publishing with AxKit provides detailed information on how to install, configure, and deploy AxKit effectively. The first book solely devoted to AxKit, XML Publishing with AxKit also offers a concise and focused look at how to create XSLT and XPathScript-based pipelines for XML data transfer. This solidly useful new book presents web programmers with the hands-on knowledge they need to get really creative with AxKit. It features a thorough introduction to XSP (extensible Server Pages), which applies the concepts of Server Pages technologies (embedded code, tag libraries, etc) to the XML world, and covers integrating AxKit with other tools such as Template Toolkit, Apache:: Mason, Apache::ASP, and plain CGI. The book also includes invaluable reference sections on configuration directives, XPathScript, and XSP. With XML Publishing with AxKit , web developers will have all the tools they need to deliver complex XML-based systems quickly, the power to develop their own systems for style sheet negotiation, and the flexibility to design completely new style sheet languages. XML Publishing with AxKit gives those new to XML all the background and the courage they need to jump right in and deploy AxKit. And it gives XML-savvy professionals everything they need to hit the ground running.
    Anmerkung: "Managing Web content with Perl & XML"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 42
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 374 p. , ill. ; , 24 cm
    Ausgabe: 3rd ed.
    DDC: 005.75/85
    Schlagwort(e): Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Kurzfassung: An enormous system comprising myriad technologies, options, and releases, Oracle's complexities have spawned numerous areas of specialization. For each area of specialization there are equally specialized how-to books and manuals. O'Reilly's Oracle Essentials claims a unique place among these books. Rather than focusing on one area, the book explains the foundational concepts of the Oracle technology and the core technical and business aspects of using it.The new edition of this classic book, Oracle Essentials, 3rd Edition: Oracle Database 10 g, distills a vast amount of knowledge into an easy-to-read volume covering every aspect of the Oracle database. Readers of all levels will learn about Oracle's features and technologies, including the product line, architecture, data structures, networking, concurrency, tuning, and much more.Featuring focused text, abundant illustrations, and helpful hints, the new edition offers a valuable overview of Oracle's Database 10 g --the industry's first database to support grid computing. Recent releases such as Oracle 9 i and 8 i are also covered. The book contains chapters on: Oracle products, options, and overall architecture for Oracle 10 g and prior recent releases Installing and running Oracle: how to configure, start up, and shut down the database, and various networking issues Oracle data structures, datatypes, and ways of extending datatypes, with an introduction to Oracle objects (e.g., tables, views, indexes) Managing Oracle: security, the Oracle Enterprise Manager, fragmentation and reorganization, and backup and recovery Oracle performance: characteristics of disk, memory, and CPU tuning Multi-user concurrency, online transaction processing (OLTP), and high availability Hardware architectures (e.g., SMP, MPP, NUMA) and their impact on Oracle Data warehousing and distributed databases Network deployment: using Oracle as an Internet computing platform and for grid computing What's new in Oracle 10 g : a summary of the database changes described in the book Oracle Essentials, 3rd Edition: Oracle Database 10 g was written for anyone whose job involves managing or building systems using Oracle DBMS technology or working with staff that uses Oracle technology. This book is the perfect all-in-one source for understanding the complexities and capabilities of Oracle.
    Anmerkung: "What you need to know about oracle database architecture and features"--Cover. - Includes bibliographical references (p. 347-355) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 43
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Electronic books ; local
    Kurzfassung: When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and respond to such attacks and breaches. The Effective Incident Response Team is the first complete guide to forming and managing a Computer Incident Response Team (CIRT). In this book, system and network administrators and managers will find comprehensive information on establishing a CIRT's focus and scope, complete with organizational and workflow strategies for maximizing available technical resources. The text is also a valuable resource for working teams, thanks to its many examples of day-to-day team operations, communications, forms, and legal references. IT administrators and managers must be prepared for attacks on any platform, exploiting any vulnerability, at any time. The Effective Incident Response Team will guide readers through the critical decisions involved in forming a CIRT and serve as a valuable resource as the team evolves to meet the demands of ever-changing vulnerabilities. Inside, readers will find information on: Formulating reactive or preventative operational strategy Forming, training, and marketing the CIRT Selecting penetration-testing, intrusion-detection, network-monitoring, and forensics tools Recognizing and responding to computer incidents and attacks, including unauthorized access, denial-of-service attacks, port scans, and viruses Tracking, storing, and counting incident reports and assessing the cost of an incident Working with law enforcement and the legal community Benefiting from shared resources Scrutinizing closed incidents to further prevention Offering services such as user-awareness training, vulnerability and risk assessments, penetration testing, and architectural reviews Communicating the CIRT's return on investment through management reporting 0201761750B10062003
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 44
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 247 p. , ill. ; , 25 cm
    Ausgabe: 1st ed.
    DDC: 004.22
    Schlagwort(e): Computer architecture ; Web services ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Large IT organizations increasingly face the challenge of integrating various web services, applications, and other technologies into a single network. The solution to finding a meaningful large-scale architecture that is capable of spanning a global enterprise appears to have been met in ESB, or Enterprise Service Bus. Rather than conform to the hub-and-spoke architecture of traditional enterprise application integration products, ESB provides a highly distributed approach to integration, with unique capabilities that allow individual departments or business units to build out their integration projects in incremental, digestible chunks, maintaining their own local control and autonomy, while still being able to connect together each integration project into a larger, more global integration fabric, or grid. Enterprise Service Bus offers a thorough introduction and overview for systems architects, system integrators, technical project leads, and CTO/CIO level managers who need to understand, assess, and evaluate this new approach. Written by Dave Chappell, one of the best known and authoritative voices in the field of enterprise middleware and standards-based integration, the book drills down into the technical details of the major components of ESB, showing how it can utilize an event-driven SOA to bring a variety of enterprise applications and services built on J2EE, .NET, C/C++, and other legacy environments into the reach of the everyday IT professional.With Enterprise Service Bus , readers become well versed in the problems faced by IT organizations today, gaining an understanding of how current technology deficiencies impact business issues. Through the study of real-world use cases and integration patterns drawn from several industries using ESB--including Telcos, financial services, retail, B2B exchanges, energy, manufacturing, and more--the book clearly and coherently outlines the benefits of moving toward this integration strategy. The book also compares ESB to other integration architectures, contrasting their inherent strengths and limitations.If you are charged with understanding, assessing, or implementing an integration architecture, Enterprise Service Bus will provide the straightforward information you need to draw your conclusions about this important disruptive technology.
    Anmerkung: Includes bibliographical references (p. 235-238) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 45
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 392 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Microsoft Windows (Computer file) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Kurzfassung: "As usual, Keith masterfully explains complex security issues in down-to-earth and easy-to-understand language. I bet you'll reach for this book often when building your next software application." --Michael Howard, coauthor, Writing Secure Code "When it comes to teaching Windows security, Keith Brown is 'The Man.' In The .NET Developer's Guide to Windows Security, Keith has written a book that explains the key security concepts of Windows NT, Windows 2000, Windows XP, and Windows Server 2003, and teaches you both how to apply them and how to implement them in C# code. By organizing his material into short, clear snippets, Brown has made a complicated subject highly accessible." --Martin Heller, senior contributing editor at Byte.com and owner of Martin Heller & Co. "Keith Brown has a unique ability to describe complex technical topics, such as security, in a way that can be understood by mere mortals (such as myself). Keith's book is a must read for anyone attempting to keep up with Microsoft's enhancements to its security features and the next major version of .NET." --Peter Partch, principal software engineer, PM Consulting "Keith's book is a collection of practical, concise, and carefully thought out nuggets of security insight. Every .NET developer would be wise to keep a copy of this book close at hand and to consult it first when questions of security arise during application development." --Fritz Onion, author of Essential ASP.NET with Examples in C# The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Windows Server 2003, Windows XP, and Windows 2000. Author Keith Brown crystallizes his application security expertise into 75 short, specific guidelines. Each item is clearly explained, cross-referenced, and illustrated with detailed examples. The items build on one another until they produce a comprehensive picture of what tools are available and how developers should use them. The book highlights new features in Windows Server 2003 and previews features of the upcoming version 2.0 of the .NET Framework. A companion Web site includes the source code and examples used throughout the book. Topics covered include: Kerberos authentication Access control Impersonation Network security Constrained delegation Protocol transition Securing enterprise servi...
    Anmerkung: Includes bibliographical references (p. 379-380) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 46
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 745 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 47
    Online-Ressource
    Online-Ressource
    Bejing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 567 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.72
    Schlagwort(e): Microsoft Office ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: In Microsoft's Office 2003, users experience the merger of the power of the classic Office suite of applications with the fluidity of data exchange inherent in XML. With XML at its heart, the new version of Microsoft's desktop suite liberates the information stored in millions of documents created with Office software over the past fifteen years, making it available to a wide variety of programs. Office 2003 XML offers an in-depth exploration of the relationship between XML and Office 2003, examining how the various products in the Office suite both produce and consume XML. Developers will learn how they can connect Microsoft Office to others systems, while power users will learn to create and analyze XML documents using familiar Office tools. The book begins with an overview of the XML features included in the various Office 2003 components, and explores in detail how Word, Excel, and Access interact with XML. This book covers both the user interface side, creating interfaces so that users can comfortably (and even unknowingly) work with XML, and the back end, exposing Office information to other processes. It also looks at Microsoft's new InfoPath application and how it fits with the rest of Office. Finally, the book's appendices introduce various XML technologies that may be useful in working with Office, including XSLT, W3C XML Schema, RELAX NG, and SOAP. Office 2003 XML provides quick and clear guidance to a anyone who needs to import or export information from Office documents into other systems. Both XML programmers and Office power will learn how to get the most from this powerful new intersection between Office 2003 and XML.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 48
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Anmerkung: Includes bibliographical references (p. 321-326) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 49
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 536 p. , ill. ; , 24 cm
    DDC: 006.7/4
    Schlagwort(e): Computer architecture ; Web services ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Web services is the integration technology preferred by organizations implementing service-oriented architectures. I would recommend that anybody involved in application development obtain a working knowledge of these technologies, and I'm pleased to recommend Erl's book as a great place to begin. -Tom Glover, Senior Program Manager, Web Services Standards, IBM Software Group, and Chairman of the Web Services Interoperability Organization (WS-I). An excellent guide to building and integrating XML and Web services, providing pragmatic recommendations for applying these technologies effectively. The author tackles numerous integration challenges, identifying common mistakes and providing guidance needed to get it right the first time. A valuable resource for understanding and realizing the benefits of service-oriented architecture in the enterprise. -David Keogh, Program Manager, Visual Studio Enterprise Tools, Microsoft. Leading-edge IT organizations are currently exploring second generation web service technologies, but introductory material beyond technical specifications is sparse. Erl explains many of these emerging technologies in simple terms, elucidating the difficult concepts with appropriate examples, and demonstrates how they contribute to service-oriented architectures. I highly recommend this book to enterprise architects for their shelves. -Kevin P. Davis, Ph. D., Software Architect. Service-oriented integration with less cost and less risk The emergence of key second-generation Web services standards has positioned service-oriented architecture (SOA) as the foremost platform for contemporary business automation solutions. The integration of SOA principles and technology is empowering organizations to build applications with unprecedented levels of flexibility, agility, and sophistication (while also allowing them to leverage existing legacy environments). This guide will help you dramatically reduce the risk, complexity, and cost of integrating the many new concepts and technologies introduced by the SOA platform. It brings together the first comprehensive collection of field-proven strategies, guidelines, and best practices for making the transition toward the service-oriented enterprise. Writing for architects, analysts, managers, and developers, Thomas Erl offers expert advice for making strategic decisions about both immediate and long-term integration issues. Erl addresses a broad spectrum of integration challenges, covering...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 50
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvi, 426 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): JavaBeans ; Computer security ; Java (Computer program language) ; Servlets ; Web services ; Electronic books ; local
    Kurzfassung: J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place, at the right time, and in the right way. Kumar covers every significant J2SE and J2EE security mechanism, presenting practical implementation techniques for the entire J2EE project lifecycle: analysis, design, development, deployment and operations. The book's example-rich coverage includes: Implementing cryptography with the JCA (Java Cryptography Architecture) and JCE (Java Cryptography Extension) security APIs Building PKI systems with Java: implementing X.509 certificates, Certification Authorities, Certificate Revocation Lists, and repositories Java security managers, policy files, and JAAS: implementing access control based on code origin, code signer and user credentials Securing the wire: Using SSL and the JSSE API to secure data exchange over unprotected networks Ensuring XML message integrity, authentication, and confidentiality with the standards: XML Signature & XML Encryption using the VeriSign TSIK, and Infomosaic SecureXML libraries Addressing security issues in RMI-based distributed applications Developing and deploying servlets and EJBs for authenticated and secure access Securing Web services with transport- and message-based security: SSL for transport-based and WS Security for message-based security Covering security aspects of best-of-breed products: Apache Tomcat, Apache Axis, and BEA WebLogic Server.
    Anmerkung: Includes bibliographical references (p. 413-414) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 51
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxv, 762 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.13/3
    Schlagwort(e): C (Computer program language) ; C++ (Computer program language) ; Computer security ; Computer software ; Development ; Electronic books ; local
    Kurzfassung: Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult. Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code. It contains a wealth of solutions to problems faced by those who care about the security of their applications. It covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering. The rich set of code samples provided in the book's more than 200 recipes will help programmers secure the C and C++ programs they write for both Unix® (including Linux®) and Windows® environments. Readers will learn: How to avoid common programming errors, such as buffer overflows, race conditions, and format string problems How to properly SSL-enable applications How to create secure channels for client-server communication without SSL How to integrate Public Key Infrastructure (PKI) into applications Best practices for using cryptography properly Techniques and strategies for properly validating input to programs How to launch programs securely How to use file access mechanisms properly Techniques for protecting applications from reverse engineering The book's web site supplements the book by providing a place to post new recipes, including those written in additional languages like Perl, Java, and Python. Monthly prizes will reward the best recipes submitted by readers. Secure Programming Cookbook for C and C++ is destined to become an essential part of any developer's library, a code companion developers will turn to again and again as they seek to protect their systems from attackers and reduce the risks they face in today's dangerous world.
    Anmerkung: "Covers Unix and Windows"--Cover. - "Recipes for cryptography, authentication, networking, input validation & more"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 52
    Online-Ressource
    Online-Ressource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 696 p. , ill. ; , 23 cm
    DDC: 005.7/2
    Schlagwort(e): Microsoft .NET ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Get the expert advice you need to succeed in building .NET-connected applications with XML! XML is everywhere in the Microsoft .NET Framework, from Remoting to Web services, and from data access to configuration. Learn about the extensive XML core classes in .NET and find out how to program against its parser in this in-depth guide-written by an expert programming author and consultant on cutting-edge technologies such as Microsoft ASP.NET and Microsoft ADO.NET. You'll find authoritative explanations of technologies such as schemas, transformations, and XPath, plus extensive discussion of data access issues such as synchronization and serialization, the DiffGram format, and the XML extensions in Microsoft SQL Server™ 2000. Along the way, you'll learn exactly how to get the best performance out of XML in the .NET world. You'll also get answers to common questions such as, "When should I use XML Web services instead of Remoting?".
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 53
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxvii, 1071 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Schlagwort(e): Java (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Praise for Elliotte Rusty Harold's Processing XML with Java ™ "The sophistication and language are very appropriate for Java and XML application developers. You can tell by the way the author writes that he too is a developer. He delves very deeply into the topics and has really taken things apart and investigated how they work. I especially like his coverage of 'gotchas,' pitfalls, and limitations of the technologies." - John Wegis , Web Engineer, Sun Microsystems, Inc. "Elliotte has written an excellent book on XML that covers a lot of ground and introduces current and emerging technologies. He helps the novice programmer understand the concepts and principles of XML and related technologies, while covering the material at a level that's deep enough for the advanced developer. With a broad coverage of XML technologies, lots of little hints, and information I haven't seen in any other book on the topic, this work has become a valuable addition to my technical library." - Robert W. Husted , Member, Technical Staff, Requisite Technology, Inc. "The code examples are well structured and easy to follow. They provide real value for someone writing industrial-strength Java and XML applications. The time saved will repay the cost of this book a hundred times over. "The book also contains more of the pearls of wisdom we've come to expect from Elliotte Rusty Harold-the kind of pointers that will save developers weeks, if not months, of time." - Ron Weber , Independent Software Consultant Written for Java programmers who want to integrate XML into their systems, this practical, comprehensive guide and reference shows how to process XML documents with the Java programming language. It leads experienced Java developers beyond the basics of XML, allowing them to design sophisticated XML applications and parse complicated documents. Processing XML with Java™ provides a brief review of XML fundamentals, including XML syntax; DTDs, schemas, and validity; stylesheets; and the XML protocols XML-RPC, SOAP, and RSS. The core of the book comprises in-depth discussions on the key XML APIs Java programmers must use to create and manipulate XML files with Java. These include the Simple API for XML (SAX), the Document Object Model (DOM), and JDOM (a Java native API). In addition, the book covers many useful supplements to these core APIs, including XPath, XSLT, TrAX, and JAXP. Practical in focus, Processing XML with Java™ is filled with over two hundred examples that ...
    Anmerkung: Includes bibliographical references (p. 989-991) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 54
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxi, 492 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Web sites ; Security measures ; Electronic books ; local
    Kurzfassung: "Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems and shopping carts, and critical vulnerabilities associated with URLs. This book is a virtual battle plan that will help you identify and eliminate threats that could take your Web site off line..." --From the Foreword by William C. Boni, Chief Information Security Officer, Motorola "Just because you have a firewall and IDS sensor does not mean you aresecure; this book shows you why." --Lance Spitzner, Founder, The Honeynet Project Whether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. Organizations using Web-based business applications are increasingly at risk. Web Hacking: Attacks and Defense is a powerful guide to the latest information on Web attacks and defense. Security experts Stuart McClure (lead author of Hacking Exposed ), Saumil Shah, and Shreeraj Shah present a broad range of Web attacks and defense. Features include: Overview of the Web and what hackers go after Complete Web application security methodologies Detailed analysis of hack techniques Countermeasures What to do at development time to eliminate vulnerabilities New case studies and eye-opening attack scenarios Advanced Web hacking concepts, methodologies, and tools "How Do They Do It?" sections show how and why different attacks succeed, including: Cyber graffiti and Web site defacements e-Shoplifting Database access and Web applications Java™ application servers; how to harden your Java™ Web Server Impersonation and session hijacking Buffer overflows, the most wicked of attacks Automated attack tools and worms Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. Web Hacking informs from the trenches. Experts show you how to connect the dots--how to put the stages of a Web hack together so you can best defend against them. Written for maximum brain absorption with unparalleled technical content and battle-tested analysis, Web Hacking will help you combat potentially costly security threats and attacks. 0201761769B07192002
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 55
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. ; : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxi, 404 p. , ill. ; , 24 cm
    DDC: 025.04
    Schlagwort(e): Business enterprises ; Directories ; Web sites ; Directories ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Explains business registry paradigm, competitive landscape, and UDDI registry technology Demonstrates how to incorporate UDDI in the Web services lifecycle Describes business modeling techniques, tModels, publishing and inquiry interactions and advanced architectures using UDDI Contains extensive examples and sample codeÑincluding both Java and .NET and detailed case studies in B2E, B2B, and B2C application areas A comprehensive guide to UDDI including business modeling, service publishing, inquiry, and beyond. Now there is an essential guide to using this breakthrough standard in real-world Web services development, deployment, and integration. UDDI: Building Registry-based Web Services Solutions contains examples in both Java and .NET paradigms. Experts Naresh Apte and Toral Mehta start with the fundamentals of business registries and Web services ecosystems. Next, using realistic case studies and sample code, they illuminate every facet of UDDI-based Web services lifecycle. Coverage includesÑ UDDI-based business registries: value proposition and key challenges How UDDI fits into the Web services paradigm Business modeling for registries: tModels, service providers/consumers, service bindings, and more Publishing and discovering business entities, service interactions, and services-including discussion on UDDI data structures UDDI-related API specificationsÑincluding language-specific APIs such as UDDI4J, , and UDDI .NET SDK Best practices for registry-based solution development Comparative survey of competitive initiatives and technologies such as ebXML, CORBA, J2EE, and .NET Building sophisticated solutions that draw on UDDIÕs most advanced features Enhancements in Version 3.0 specification
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 56
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: vi, 121 p. ; , 18 cm
    Ausgabe: 2nd ed.
    DDC: 005.75/85
    Schlagwort(e): Oracle (Computer file) ; PL/SQL (Computer program language) ; Relational databases ; Electronic books ; local
    Kurzfassung: Like most PL/SQL programmers, you've found Oracle PL/SQL Programming to be a reference book you can't do without. Packed with examples and recommendations, it's a book that has helped everyone, from Oracle Forms developers to database administrators, make the most of PL/SQL. But you can't always carry it with you, and even at your desk there are times when you just need a reminder, a quick answer to a problem you're up against. For times like those, PL/SQL experts Stephen Feuerstein, Bill Pribyl, and Chip Dawes have written a new edition of Oracle PL/SQL Language Pocket Reference . Updated for Oracle9i, this little book is easy to take with you and use anywhere for quick problem solving. The second edition of the Oracle PL/SQL Language Pocket Reference boils down the most vital information from Oracle PL/SQL Programming into a convenient quick reference to PL/SQL basics. This compact book will be indispensable for new and seasoned Oracle database developers alike. It summarizes features available in Oracle9i and provides essential information on PL/SQL block structure, fundamental language elements, control statements, and use of procedures, functions, packages, triggers, Oracle objects, external procedures, and methods of calling Java classes from PL/SQL. O'Reilly's Pocket References have become a favorite among developers and database administrators everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point in your work and need to get to a solution quickly, the new edition of Oracle PL/SQL Language Pocket Reference is the book you'll want to have.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 57
    Online-Ressource
    Online-Ressource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Sprache: Englisch
    Schlagwort(e): Microsoft Visual BASIC ; BASIC (Computer program language) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Kurzfassung: This resource provides best practices, step-by-step code walk-throughs, and concise explanations of key security terms, issues, and jargon to help developers create and run secure code with Visual Basic.
    Anmerkung: Includes index. - Includes link to companion web site. - Title from title screen
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 58
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 385 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Mac OS ; Computer networks ; Security measures ; Computer security ; Macintosh (Computer) ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.
    Anmerkung: Includes bibliographical references (p. 361-369) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 59
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: vii, 297 p. , ill. ; , 23 cm
    DDC: 005.7585
    Schlagwort(e): Oracle (Computer file) ; Application software ; Database design ; Electronic books ; local
    Kurzfassung: TOAD Handbook is a guide for developing Oracle applications and administering Oracle databases with TOAD. Starting with installation and configuration, the book covers the TOAD SQL editors in depth, including dozens of helpful, undocumented features. Later chapters discuss reporting and exporting data and using several add-on tools designed to enhance TOAD development. Along the way, the authors provide critical insights into the workings of TOAD and how developers can use it to make the most of their applications. Includes a foreword by Jim McDaniel, the inventor of TOAD.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 60
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 945 p. , ill. ; , 23 cm. +
    Ausgabe: 4th ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.
    Anmerkung: Includes bibliographical references (p. [731]-759) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 61
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: vii, 292 p. , ill. ; , 21 cm
    DDC: 005.7/2
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: XML is the de-facto standard for manipulating and sharing data among applications. It is supported by every major programming tool and language, including Java, Microsoft .NET, Oracle, SQL Server, etc. All professional developers and administrators - even those who don't intend to build XML applications - need a basic understanding of it just to read and maintain data they receive and process. Many of them don't have the time for a thick reference book or detailed tutorial. Sams Teach Yourself XML in 10 Minutes quickly covers the basics of XML and its family of related concepts, including basic syntax, DTDs, XML Schema, DOM, SAX, XSL, and XPath. Each topic is illustrated with an example to ensure readers' understanding.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 62
    Online-Ressource
    Online-Ressource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 768 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Computer security ; Data encryption (Computer science) ; Electronic books ; local
    Kurzfassung: Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process-from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors-two battle-scarred veterans who have solved some of the industry's toughest security problems-provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft .NET security, and Microsoft ActiveX development, plus practical checklists for developers, testers, and program managers.
    Anmerkung: Includes bibliographical references (p. 741-745) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 63
    Sprache: Englisch
    Seiten: xxxvi, 641 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Schlagwort(e): Database management ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: "This is an excellent book that combines a practical and analytical look at the subject." -Leo Korman, Principal Software Engineer, KANA Software As organizations begin to employ XML within their information-management and exchange strategies, data management issues pertaining to storage, retrieval, querying, indexing, and manipulation increasingly arise. Moreover, new information-modeling challenges also appear. XML Data Management -with its contributions from experts at the forefront of the XML field-addresses these key issues and challenges, offering insights into the advantages and drawbacks of various XML solutions, best practices for modeling information with XML, and developing custom, in-house solutions. In this book, you will find discussions on the newest native XML databases, along with information on working with XML-enabled relational database systems. In addition, XML Data Management thoroughly examines benchmarks and analysis techniques for performance of XML databases. Topics covered include: The power of good grammar and style in modeling information to alleviate the need for redundant domain knowledge Tamino's XML storage, indexing, querying, and data access features The features and APIs of open source eXist Berkeley DB XML's ability to store XML documents natively IBM's DB2 Universal Database and its support for XML applications Xperanto's method of addressing information integration requirements Oracle's XMLType for managing document centric XML documents Microsoft SQL Server 2000's support for exporting and importing XML data A generic architecture for storing XML documents in a relational database X007, XMach-1, XMark, and other benchmarks for evaluating XML database performance Numerous case studies demonstrate real-world problems, industry-tested solutions, and creative applications of XML data management solutions. Written for both XML and relational database professionals, XML Data Management provides a promising new approach to data management, one that is sure to positively impact the way organizations manage and exchange information. 0201844524B01302003
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 64
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xli, 1084 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Electronic books ; local
    Kurzfassung: "This is an excellent text that should be read by every computer security professional and student." -Dick Kemmerer, University of California, Santa Barbara. "This is the most complete book on information security theory, technology, and practice that I have encountered anywhere!" -Marvin Schaefer, Former Chief Scientist, National Computer Security Center, NSA This highly anticipated book fully introduces the theory and practice of computer security. It is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference filled with valuable information for even the most seasoned practitioner. In this one extraordinary volume the author incorporates concepts from computer systems, networks, human factors, and cryptography. In doing so, he effectively demonstrates that computer security is an art as well as a science. Computer Security: Art and Science includes detailed discussions on: The nature and challenges of computer security The relationship between policy and security The role and application of cryptography The mechanisms used to implement policies Methodologies and technologies for assurance Vulnerability analysis and intrusion detection Computer Security discusses different policy models, and presents mechanisms that can be used to enforce these policies. It concludes with examples that show how to apply the principles discussed in earlier sections, beginning with networks and moving on to systems, users, and programs. This important work is essential for anyone who needs to understand, implement, or maintain a secure network or computer system. 0201440997B10252002
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 65
    Online-Ressource
    Online-Ressource
    Boston, MA : ProQuest Information and Learning Company | Boston, MA :Safari,
    Sprache: Englisch
    Paralleltitel: Erscheint auch als
    Schlagwort(e): Computer security ; Cryptography ; Microsoft .NET ; Electronic books ; local
    Kurzfassung: Learn how to make your .NET applications secure! Security and cryptography, while always an essential part of the computing industry, have seen their importance increase greatly in the last several years. Microsoft's .NET Framework provides developers with a powerful new set of tools to make their applications secure. NET Security and Cryptography is a practical and comprehensive guide to implementing both the security and the cryptography features found in the .NET platform. The authors provide numerous clear and focused examples in both C# and Visual Basic .NET, as well as detailed commentary on how the code works. They cover topics in a logical sequence and context, where they are most relevant and most easily understood. All of the sample code is available online at . This book will allow developers to: Develop a solid basis in the theory of cryptography, so they can understand how the security tools in the .NET Framework function Learn to use symmetric algorithms, asymmetric algorithms, and digital signatures Master both traditional encryption programming as well as the new techniques of XML encryption and XML signatures Learn how these tools apply to ASP.NET and Web Services security
    Anmerkung: ELECTRONIC BOOK. - From: ProQuest--Title screen. - Title from title screen. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 66
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 309 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Electronic books ; local
    Kurzfassung: "This is a really good book ... it spells out the motherhood and apple pie of information security in a highly readable way." -Warwick Ford, CTO, VeriSign, Inc. "An excellent security read! Breaks down a complex concept into a simple and easy-to-understand concept." -Vivek Shivananda, President Redefine your organization's information security Learn to think and act like a top security guru! Understand the founding principles of security itself and make better decisions Make your security solutions more effective, easily manageable, and less costly! Make smarter, more informed security decisions for your company Organizations today commit ever-increasing resources to information security, but are scarcely more secure than they were four or five years ago! By treating information security like an ordinary technological practice-that is, by throwing money, a handful of the latest technologies, and a lineup of gurus at the problem-they invariably wind up with expensive, but deeply flawed, solutions. The only way out of this trap is to change one's way of thinking about security: to grasp the reasoning, philosophy, and logic that underlie all successful security efforts. In Inside the Security Mind: Making the Tough Decisions , security expert Kevin Day teaches you how to approach information security the way the top gurus do-as an art, rather than a collection of technologies. By applying this discipline, your solutions will be more secure and less burdensome in time, expense, and effort. The first part of the book explains the practice of breaking security decisions down into a set of simple rules. These rules may then be applied to make solid security decisions in almost any environment. In the second part, Day uses a series of practical examples to illustrate exactly how the discipline works in practice. Additional material covers: Designing an enterprise security plan, including perimeter/firewall and Internal defenses, application, system, and hardware security Ongoing security measures-recurring audits, vulnerability maintenance, logging and monitoring, and incident response, plus risk assessment Choosing between open source and proprietary solutions; and wired, wireless, and virtual private networks This book is essential reading for anyone working to keep information secure. Technical and non-technical IT professionals alike can apply Day's concepts and strategies to become security gurus, while seasoned practitioners will benefit from th...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 67
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 745 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Schlagwort(e): Oracle (Computer file) ; Application software ; Development ; Internet programming ; PL/SQL (Computer program language) ; Electronic books ; local
    Kurzfassung: The hands-on, rapid-mastery guide to Oracle PL/SQL Web development. Start building Oracle 9i PL/SQL Web applications-hands on Covers the entire development lifecycle, from design to deployment Provides instruction for PL/SQL Server Pages, the PL/SQL Web Toolkit, and the Oracle 9i Application Server Introduces Web basics-HTML, JavaScript, basic UNIX and FTP, and image handling Reviews PL/SQL and SQL concepts Includes practical tips and troubleshooting help Leverage your SQL and PL/SQL experience to build powerful data-driven Web and e-business applications-starting right now! In this book, a team of Columbia University PL/SQL instructors cover the core pieces of what you need to know, from preliminary configuration to deployment of dynamic, data-driven applications. You'll find practical examples, hands-on exercises, and dozens of practical tips and solutions designed to save you time, effort, and frustration. One step at a time, discover how to: Configure Oracle's Internet Application Server Control Web applications and servers remotely Build Oracle Web applications with PL/SQL Create dynamic, data-driven pages Test, debug, troubleshoot, and deploy your applications Maintain and optimize running Web applications Whether you've been writing simple queries or complex PL/SQL code, this book takes your database development skills onto the Web-and into the future!
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 68
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 662 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.75/65
    Schlagwort(e): Oracle (Computer file) ; PL/SQL (Computer program language) ; Relational databases ; Electronic books ; local
    Kurzfassung: Build Oracle PL/SQL applications-now. Fully updated for Oracle 9i No Oracle PL/SQL experience necessary. Real-life labs and "Test Your Thinking" Q&As Start developing applications with Oracle PL/SQL-fast. This integrated book-and-Web learning solution teaches all the Oracle PL/SQL skills you need, hands on, through real-world labs, exercises, projects, and a complete Web-based training site. Completely updated for Oracle 9i, it covers all the fundamentals-and a whole lot more. Master PL/SQL syntax, iterative and conditional control, scoping, anchored datatypes, cursors, triggers, security, tables, and packaging-plus powerful new techniques for working with exceptions, cursors, collections, and records. Your free Web-based training module includes a Virtual Study Lounge where you can interact with other learners, work on new projects, and get updates. Totally integrated with a FREE, state-of-the-art Oracle 9i learning Web site. Every Prentice Hall Oracle Interactive Workbook is fully integrated with its own exclusive Web site, giving you all this and more: "Test Your Thinking" project solutions and detailed explanations Additional self-review exercises with instant feedback and explanations An exclusive Virtual Study Lounge where you can interact with other students. Just the facts. No endless, boring discussions here. You'll learn hands on through practical exercises, self-review questions, and real-world answers. Exclusive "Test Your Thinking" projects guarantee you'll go beyond rote knowledge to really master the subject. It's an integrated learning system that's proven to work. Dozens of exercises cover the real-world tasks that matter most. Hundreds of self-review questions and answers make sure you understand.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 69
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 420 p. ; , 24 cm
    DDC: 005.1
    Schlagwort(e): Oracle (Computer file) ; Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: The hands-on tutorial for Java developers who want to integrate their applications with the industy leading Oracle 8i and 9i databases. Provides an introduction to database design, including the essentials of SQL, to get Java programmers started with Oracle comfortably, confidently and quickly! Covers important Java database technologies, such as JDBC and JDO-step-by-step, with examples. Covers both Oracle 8i and 9I-including new 9i features, such as object-relational features, all highlighted with examples.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 70
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 208 p. , ill. ; , 24 cm
    DDC: 005.75/85
    Schlagwort(e): Oracle (Computer file) ; Data warehousing ; Electronic books ; local
    Kurzfassung: The definitive, real-world guide to Oracle data warehousing Maximizing performance, flexibility, and manageability in production environments Hardware/software architectures, star schema design, partitioning, and more Industrial strength data loading and query optimization techniques By the world-renowned architect of 7-Eleven's multi-terabyte datawarehouse Maximize Oracle data warehouse performance, flexibility, and manageability Oracle DBAs finally have a definitive guide to every aspect of designing, constructing, tuning, and maintaining star schema data warehouses with Oracle 8i and 9i. Bert Scalzo, one of the world's leading Oracle data warehousing experts, offers practical, hard-won lessons and breakthrough techniques for maximizing performance, flexibility, and manageability in any production environment. Coverage includes: Data warehousing fundamentals for DBAs--including what a data warehouse isn't Planning software architecture: business intelligence, user interfaces, Oracle versions, OS platforms, and more Planning hardware architecture: CPUs, memory, disk space, and configuration Radically different star schema design for radically improved performance Tuning ad-hoc queries for lightning speed Industrial-strength data loading techniques Aggregate tables: maximizing performance benefits, minimizing complexity tradeoffs Improving manageability: The right ways to partition Data warehouse administration: Backup/recovery, space and extent management, updates, patches, and more
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 71
    Online-Ressource
    Online-Ressource
    Beijing : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 208 p. ; , 24 cm
    Paralleltitel: Erscheint auch als
    DDC: 005.7/2
    Schlagwort(e): Metadata ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: RSS is sprouting all over the Web, connecting weblogs and providing news feeds. Originally developed by Netscape in 1999, RSS (which can stand for RDF Site Summary, Rich Site Summary, or Really Simple Syndication) is an XML-based format that allows web developers to describe and syndicate web site content. Using RSS files allows developers to create a data feed that supplies headlines, links, and article summaries from a web site. Other sites can then incorporate them into their pages automatically. Although RSS is in widespread use, people struggle with its confusing and sometimes conflicting documentation and versions. Content Syndication with RSS is the first book to provide a comprehensive reference to the specifications and the tools that make syndication possible. Content Syndication with RSS offers webloggers, developers, and the programmers who support them a thorough explanation of syndication in general and RSS in particular. Written for web developers who want to offer XML-based feeds of their content, as well as developers who want to use the content that other people are syndicating, the book explores and explains metadata interpretation, different forms of content syndication, and the increasing use of web services in this field. This concise volume begins with an introduction to content syndication on the Internet: its purpose, limitations, and traditions, and answers the question of why would you consider "giving your content away" like this? Next, the book delves into the architecture of content syndication with an overview of the entire system, from content author to end user on another site. You'll follow the flow of data: content, referral data, publish-and-subscribe calls, with a detailed look at the protocols and standards possible at each step. Topics covered in the book include: Creating XML syndication feeds with RSS 0.9x and 2.0 Beyond headlines: creating richer feeds with RSS 1.0 and RDF metadata Using feeds to enrich a site or find information Publish and subscribe: intelligent updating News aggregators, such as Meerkat, Syndic8, and Newsisfree, and their web services Alternative industry-centric standards If you're interested in producing your own RSS feed, this step-by-step guide to implementation is the book you'll want in hand.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 72
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 215 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.7/2
    Schlagwort(e): Application software ; Development ; HTML (Document markup language) ; Internet programming ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: The use of forms on the web is so commonplace that most user interactions involve some type of form. XForms--a combination of XML and forms--offers a powerful alternative to HTML-based forms. By providing excellent XML integration, including XML Schema, XForms allows developers to create flexible, web-based user-input forms for a wide variety of platforms, including desktop computers, handhelds, information appliances, and more. XForms Essentials is an introduction and practical guide to the new XForms specification. Written by Micah Dubinko, a member of the W3C XForms working group and an editor of the specification, the book explains the how and why of XForms, showing readers how to take advantage of them without having to write their own code. You'll learn how to integrate XForms with both HTML and XML vocabularies, and how XForms can simplify the connection between client-based user input and server-based processing. XForms Essentials begins with a general introduction to web forms, including information on history and basic construction of forms. The second part of the book serves as a reference manual to the XForms specification. The third section offers additional hints, guidelines, and techniques for working with XForms. Topics covered in the book include: creating XForms files in a text or XML editor converting existing forms (electronic or paper) to XForms collecting XML data from users in a user-friendly way reducing the amount of JavaScript needed within browser interfaces increasing the security and reliability of your current forms system by combining client-side and server-side checks into a common code base creating interactive websites using the latest standard technology XForms Essentials focuses on the practical application of XForms technology. If you work with forms, HTML, or XML information, XForms Essentials will provide you with a much simpler route to more sophisticated interactions with users.
    Anmerkung: "Gathering and managing XML information"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 73
    Online-Ressource
    Online-Ressource
    Beijing, [China] ; : O'Reilly & Associates | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 906 p. , ill. ; , 23 cm
    Schlagwort(e): Oracle (Computer file) ; Relational databases ; Computer programs ; Electronic books ; local
    Kurzfassung: Introduced a quarter-century ago, the Oracle database remains the leading enterprise relational database management system (RDBMS) in the world. Oracle is a complex system, offering a myriad of products, languages, and tools. Frequent updates, releases, and editions complicate the ability of Oracle users to keep up with the huge amounts of frequently changing information about the database and its capabilities.The goal of Oracle in a Nutshell is to pull together the most essential information on Oracle architecture, syntax, and user interfaces. The content and format of this book, an admirable addition to O'Reilly's respected In-a-Nutshell line, combine to boil down vital Oracle commands, language constructs, parameters, and file formats in a succinct and highly accessible desktop reference. Oracle in a Nutshell covers the information that database administrators PL/SQL and Java developers, and system, network, and security administrators need as they manage Oracle databases and write code for these databases. It includes: Oracle Foundations--Overview of the Oracle architecture (memory structures and fundamental concepts), Oracle's various editions and packaging options, summary of the initialization file parameters and data dictionary views, and fundamentals of Oracle's concurrency scheme, security mechanisms (privileges, profiles, roles), and networking files (TNSNAMES.ORA, SQLNET.ORA, LISTENER.ORA, DAP.ORA, NAMES.ORA, CMAN.ORA) and options. Oracle Languages--Syntax summary for SQL language statements, SQL function calls PL/SQL language statements and characteristics, PL/SQL built-in package headers, and Java (JDBC and SQLJ) interfaces to the Oracle database. Oracle Tools--Commands provided with SQL Plus, SQL Loader, Import and Export, Oracle Recovery Manager (RMAN) and other backup/recovery methods, Oracle Enterprise Manager, and various performance tuning tools (Explain Plan, TKPROF, AUTOTRACE, UTLBSTAT, UTLESTAT, Statspack). Appendixes--Summary of Oracle datatypes, operators, expressions, conditions, numeric and date formats, and resources for additional reading.
    Anmerkung: Includes bibliographical references (p. 853-855) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 74
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxix, 954 p. , ill. ; , 24 cm
    Ausgabe: 3rd ed.
    DDC: 005.8
    Schlagwort(e): UNIX (Computer file) ; Computer security ; Internet ; Congresses ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more. Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.
    Anmerkung: Includes bibliographical references (p. 873-895) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 75
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 340 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rules and known exploits. The lack of usable information made using Snort a frustrating experience. The average Snort user needs to learn how to actually get their systems up-and-running. Snort Intrusion Detection provides readers with practical guidance on how to put Snort to work. Opening with a primer to intrusion detection and Snort, the book takes the reader through planning an installation to building the server and sensor, tuning the system, implementing the system and analyzing traffic, writing rules, upgrading the system, and extending Snort.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 76
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 202 p. , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Electronic books ; local
    Kurzfassung: Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable government and military computers --at an alarming rate. Despite their myriad manifestations and different targets, nearly all attacks have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding , by Mark G. Graff and Ken vanWyk, looks at the problem of bad code in a new way. Packed with advice based on the authors' decades of experience in the computer security field, this concise and highly readable book explains why so much code today is filled with vulnerabilities, and tells readers what they must do to avoid writing code that can be exploited by attackers. Writing secure code isn't easy, and there are no quick fixes to bad code. To build code that repels attack, readers need to be vigilant through each stage of the entire code lifecycle: Architecture: during this stage, applying security principles such as "least privilege" will help limit even the impact of successful attempts to subvert software. Design: during this stage, designers must determine how programs will behave when confronted with fatally flawed input data. The book also offers advice about performing security retrofitting when you don't have the source code -- ways of protecting software from being exploited even if bugs can't be fixed. Implementation: during this stage, programmers must sanitize all program input (the character streams representing a programs' entire interface with its environment -- not just the command lines and environment variables that are the focus of most security analysis). Testing: during this stage, programs must be checked using both static code checkers and runtime testing methods -- for example, the fault injection systems now available to check for the presence of such flaws as buffer overflow. Operations: during this stage, patch updates must be installed in a timely fashion. In early 2003, sites that had diligently applied Microsoft SQL Server updates were spared the impact of the Slammer worm that did serious damage to thousands of systems. Beyond the technical, Secure Coding sheds new light on the economic, psychological, and sheer practical reasons why...
    Anmerkung: Includes bibliographical references (p. 185-194) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 77
    Online-Ressource
    Online-Ressource
    Boston : Addison Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.7/2
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Praise for Effective XML "This is an excellent collection of XML best practices: essential reading for any developer using XML. This book will help you avoid common pitfalls and ensure your XML applications remain practical and interoperable for as long as possible." - Edd Dumbill , Managing Editor, XML.com and Program Chair, XML Europe "A collection of useful advice about XML and related technologies. Well worth reading both before, during, and after XML application development." - Sean McGrath , CTO, Propylon "A book on many best practices for XML that we have been eagerly waiting for." - Akmal B. Chaudhri , Editor, IBM developerWorks "The fifty easy-to-read items cover many aspects of XML, ranging from how to use markup effectively to what schema language is best for what task. Sometimes controversial, but always relevant, Elliotte Rusty Harold's book provides best practices for working with XML that every user and implementer of XML should be aware of." - Michael Rys , Ph.D., Program Manager, SQL Server XML Technologies, Microsoft Corporation " Effective XML is an excellent book with perfect timing. Finally, an XML book everyone needs to read! Effective XML is a fount of XML best practices and solid advice. Whether you read Effective XML cover to cover or randomly one section at a time, its clear writing and insightful recommendations enlighten, entertain, educate, and ultimately improve the effectiveness of even the most expert XML developer. I'll tell you what I tell all my coworkers and customers: You need this book." - Michael Brundage , Technical Lead, XML Query Processing, Microsoft WebData XML Team "This book provides great insight for all developers who write XML software, regardless of whether the software is a trivial application-specific XML processor or a fullblown W3C XML Schema Language validator. Mr. Harold covers everything from a very important high-level terminology discussion to details about parsed XML nodes. The well-researched comparisons of currently available XML-related software products, as well as the key criteria for selecting between XML technologies, exemplify the thoroughness of this book." - Cliff Binstock , Author, The XML Schema Complete Reference If you want to become a more effective XML developer, you need this book. You will learn which tools to use when in order to write legible, extensible, maintainable and robust XML code. Page 36: How do you write DTDs that are independent of namespace prefixes? Pa...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 78
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxix, 603 p. , ill. ;c 24 cm.
    DDC: 005.7/2
    Schlagwort(e): Metadata ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: The explosive growth of the World Wide Web is fueling the need for a new generation of technologies for managing information flow, data, and knowledge. This developer's overview and how-to book provides a complete introduction and application guide to the world of topic maps, a powerful new means of navigating the World Wide Web's vast sea of information. With contributed chapters written by today's leading topic map experts, XML Topic Maps is designed to be a "living document" for managing information across the Web's interconnected resources. The book begins with a broad introduction and a tutorial on topic maps and XTM technology. The focus then shifts to strategies for creating and deploying the technology. Throughout, the latest theoretical perspectives are offered, alongside discussions of the challenges developers will face as the Web continues to evolve. Looking forward, the book's concluding chapters provide a road map to the future of topic map technology and the Semantic Web in general. Specific subjects explored in detail include: Topic mapping and the XTM specification Using XML Topic Maps to build knowledge repositories Knowledge Representation, ontological engineering, and topic maps Transforming an XTM document into a Web page Creating enterprise Web sites with topic maps and XSLT Open source topic map software XTM, RDF, and topic maps Semantic networks and knowledge organization Using topic maps in education Topic maps, pedagogy, and future perspectives Featuring the latest perspectives from today's leading topic map experts, XML Topic Maps provides the tools, techniques, and resources necessary to plot the changing course of information management across the World Wide Web. 0201749602B08282002
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 79
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvii, 577 p. , ill. ; , 24 cm. +
    DDC: 005.2/76
    Schlagwort(e): Microsoft Visual BASIC ; Internet programming ; Microsoft .NET Framework ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: "You are holding in your hands my favorite book on Web services and .NET. What else can I say? Buy this book now, and be prepared for a new way of coding!" -Keith Ballinger, Program Manager for XML Web Services, Microsoft "If you've been searching for a book that goes beyond the Web services hype, and distills the benefits of the actual platform, look no further, you've found the right one." -Aaron Skonnard, Instructor and Author, DevelopMentor Real World XML Web Services is the Visual Basic programmer's definitive guide to designing and building Web services. It provides developers with a comprehensive understanding of Web services, covering everything from basic concepts and solutions to interoperability problems. This book begins with a concise and practical introduction to Web services and the foundation on which they are built, including Web Services Description Language (WSDL) and Simple Object Access Protocol (SOAP). Readers learn, by example, how to use each tool for developing Web services, starting with the SOAP Toolkit and the .NET framework. Visual Basic programmers discover how to: Use XML Schema to define Web service messages Use SOAP for messaging and Remote Procedure Calls (RPC) Read and modify WSDL documents Build Web services with the SOAP Toolkit Create and invoke Web services using the .NET framework Implement SOAP headers and use SOAP Fault Develop interface-based Web services Handle data in .NET Web services, including objects, arrays, and DataSets Use SOAP extensions to build reusable infrastructure for security and compression Use Universal Description Discovery and Integration (UDDI) at design time and run time Understand the architecture of other popular toolkits, such as Apache SOAP for Java, and learn how to solve interoperability problems The book closes by walking the reader through the creation of a Web service with .NET and Visual Basic 6 clients. Real World XML Web Services empowers Visual Basic programmers to design and build the next generation of applications using Web services. 0201774259B08192002
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 80
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 529 p. , ill. ; , 23 cm
    DDC: 005.75/85
    Schlagwort(e): Oracle (Computer file) ; Database management ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Kurzfassung: The Oracle SQL every DBA needs-fast and easy! Covers all the core day-to-day tasks DBAs are responsible for Quick access to SQL commands, operators, functions, data dictionary views, and more Includes dozens of easy-to-understand syntax diagrams The fast, practical Oracle SQL reference for every Oracle DBA! If you're a working Oracle DBA, here's the Oracle SQL reference you've been searching for-simple, straightforward, and incredibly easy to use! There's no faster way to discover the exact syntax you need...refresh your memory about that option you haven't used lately...find the name of that view you know exists...start using that new Oracle 9 i feature you haven't tried yet. Keep it by your desk, near your server...wherever you need fast, reliable answers right this minute! Covers Oracle SQL through Oracle9 i Release 2 Clear, well-organized tables of operators, functions, format models, privileges, and reserved words Complete command reference: syntax and options for every Oracle SQL command Standard "railroad" syntax diagrams make it easy to write correct syntax Handy listings of data dictionary views and dynamic performance tables
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 81
    Online-Ressource
    Online-Ressource
    Sebastopol, CA ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxv, 388 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.75/85
    Schlagwort(e): Oracle (Computer file) ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Kurzfassung: Oracle system performance inefficiencies often go undetected for months or even years--even under intense scrutiny--because traditional Oracle performance analysis methods and tools are fundamentally flawed. They're unreliable and inefficient.Oracle DBAs and developers are all too familiar with the outlay of time and resources, blown budgets, missed deadlines, and marginally effective performance fiddling that is commonplace with traditional methods of Oracle performance tuning. In this crucial book, Cary Millsap, former VP of Oracle's System Performance Group, clearly and concisely explains how to use Oracle's response time statistics to diagnose and repair performance problems. Cary also shows how "queueing theory" can be applied to response time statistics to predict the impact of upgrades and other system changes. Optimizing Oracle Performance eliminates the time-consuming, trial-and-error guesswork inherent in most conventional approaches to tuning. You can determine exactly where a system's performance problem is, and with equal importance, where it is not, in just a few minutes--even if the problem is several years old. Optimizing Oracle Performance cuts a path through the complexity of current tuning methods, and streamlines an approach that focuses on optimization techniques that any DBA can use quickly and successfully to make noticeable--even dramatic--improvements.For example, the one thing database users care most about is response time. Naturally, DBAs focus much of their time and effort towards improving response time. But it is entirely too easy to spend hundreds of hours to improve important system metrics such as hit ratios, average latencies, and wait times, only to find users are unable to perceive the difference. And an expensive hardware upgrade may not help either.It doesn't have to be that way. Technological advances have added impact, efficiency, measurability, predictive capacity, reliability, speed, and practicality to the science of Oracle performance optimization. Optimizing Oracle Performance shows you how to slash the frustration and expense associated with unraveling the true root cause of any type of performance problem, and reliably predict future performance.The price of this essential book will be paid back in hours saved the first time its methods are used.
    Anmerkung: "A practitioner's guide to optimizing response time"--Cover. - Includes bibliographical references (p. 374-380) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 82
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 400 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 006.74
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: This second edition of the bestselling Learning XML provides web developers with a concise but grounded understanding of XML (the Extensible Markup Language) and its potential-- not just a whirlwind tour of XML.The author explains the important and relevant XML technologies and their capabilities clearly and succinctly with plenty of real-life projects and useful examples. He outlines the elements of markup--demystifying concepts such as attributes, entities, and namespaces--and provides enough depth and examples to get started. Learning XML is a reliable source for anyone who needs to know XML, but doesn't want to waste time wading through hundreds of web sites or 800 pages of bloated text.For writers producing XML documents, this book clarifies files and the process of creating them with the appropriate structure and format. Designers will learn what parts of XML are most helpful to their team and will get started on creating Document Type Definitions. For programmers, the book makes syntax and structures clear. Learning XML also discusses the stylesheets needed for viewing documents in the next generation of browsers, databases, and other devices. Learning XML illustrates the core XML concepts and language syntax, in addition to important related tools such as the CSS and XSL styling languages and the XLink and XPointer specifications for creating rich link structures. It includes information about three schema languages for validation: W3C Schema, Schematron, and RELAX-NG, which are gaining widespread support from people who need to validate documents but aren't satisfied with DTDs. Also new in this edition is a chapter on XSL-FO, a powerful formatting language for XML. If you need to wade through the acronym soup of XML and start to really use this powerful tool, Learning XML , will give you the roadmap you need.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 83
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxiv, 1162 p. , ill. ; , 23 cm
    DDC: 005.7/2
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Steven Holzner's friendly, easy-to-read style has turned this book (formerly known as Inside XML ) into the leading reference on XML. Unlike other XML books, this one is packed with hundreds of real-world examples, fully tested and ready to use! Holzner teaches you XML like no other author can, covering every major XML topic today and detailing the ways XML is used now--connecting XML to databases (both locally and on web servers), stying XML for viewing in today's web browsers, reading and parsing XML documents in browsers, writing and using XML schemas, creating graphical XML browsers, working with the Simple Object Access Protocol (SOAP), and a great deal more. Real World XML is designed to be the standard in XML coverage--more complete, and more accessible, than any other. "The author's approach is definitely bottom up, written in a highly personable tone. He makes efficient use of example code, which sets this book apart from many I have read in the past. His examples bring to life the code without overwhelming the reader, and he does not present any examples for which the reader has not been prepared. In addition, no prior knowledge of XML is assumed. As such, this is an excellent book for both beginners and intermediate level web designers and programmers. Experts, too, will find this book of value, due to its emphasis on real world applicability. Overall, this book will benefit all web developers and programmers, with a special emphasis on beginner and intermediate developers."--Donna A. Dulo, MS, MA, Senior Systems Engineer, U.S. Department of Defense "This book will provide a brilliant basis for anyone wishing to keep up to speed with the new XML developments."--Mr. Andrew Madden, Department of Computer Science, University of Wales "I found this book's strengths to be: its exhaustive specification reference for the conscientious developer; access to the official specs, which is key; the wide variety of choices provided for all aspects of XML; several alternatives provided for each editor, browser, parser, stylesheet transform engine, and programming language; and working examples that show the power of the tools used."--Jaime Ryan, Software Developer/Documentation Manager, Blue Titan Software
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 84
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xii, 415 p. , ill. ; , 24 cm
    Schlagwort(e): Application program interfaces (Computer software) ; Java (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: JAX: Java APIs for XML Kick Start covers the JAX APIs - fundamental for development of Java-based Web service applications as well as other e-Commerce applications requiring the exchange and manipulation of data. The book includes an overview of Web service fundamentals including SOAP, UDDI, and WSDL, all of which will be built upon in later examples. The book then covers the current set of JAX APIs for data processing, for messaging, for writing data to registries and for calling remote applications. Each API is covered from an architectural and implementation perspective, using real-world examples and case studies throughout to illustrate their usefulness. The author will demonstrate both Web service and traditional JAX applications, giving a complete picture of the uses of JAX. The final chapter looks ahead to new developments and new APIs in progress at Sun.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 85
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxix, 746 p. , ill. ; , 24 cm
    Ausgabe: 3rd ed.
    DDC: 005.8
    Schlagwort(e): Computer security ; Data protection ; Privacy, Right of ; Electronic books ; local
    Kurzfassung: The classic guide to information security-fully updated for the latest attacks and countermeasures Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike. This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats and vulnerabilities, and offers practical guidance for responding to them. Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more Security in Internet-based, distributed, desktop and traditional centralized applications New attacks, including scripted vulnerability probing, denial of service, and buffer overflows-with symptoms and cures Clear, accessible introduction to cryptography-without sophisticated math Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography Thoroughly revamped coverage of software engineering practices designed to enhance program security Expanded coverage of risk management, contingency planning, and security policies Detailed presentation of protection in general-purpose and trusted operating systems Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security. The companion website (http://www.phptr.com/pfleeger/) contains additional information, book updates, and instructor's resources.
    Anmerkung: Includes bibliographical references (p. 691-725) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 86
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    ISBN: 9780768664256 , 076866425X , 9781281084811 , 1281084816
    Sprache: Englisch
    Seiten: xv 842 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.7/2
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Special Edition Using XML, Second Edition gives developers a formal introduction to XML technology, starting with in-depth coverage of basic syntax and fundamental "pieces" of XML, including DTDs, Schemas, and Namespaces. The authors then cover various applications of XML, including transforming and displaying XML documents using CSS and XSL, locating data within XML documents using Xpath, Xlink and Xpointer, programming XML with SAX or DOM, including XML in Java or .NET applications, XML Scripting with Perl, XHTML and WML for presentation on traditional and hand-held Web browsers, and querying data or documents with Xquery. The final chapters cover technologies related to XML such as SVG, SMIL, and RDF, focusing on the practical features developers can put to use today.
    Anmerkung: Rev. ed. of: The complete idiot's guide to XML, c2000. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 87
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 575 p. , ill. ; , 23 cm
    DDC: 005.7/2
    Schlagwort(e): JavaServer pages ; Application software ; Development ; Web sites ; Design ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: The first Internet revolution was all about delivering information to people. We are now in the second revolution, which focuses on delivering information to systems. XML is the tool that makes this new revolution a reality, and Web services are the methods by which businesses will drive system-to-system communication. JSP(TM) and XML takes you beyond the basics, giving you practical advice and in-depth coverage. In the book, you'll learn the technologies and techniques needed to create your own Web services for use in JSP applications. Written by programmers for programmers, the book will help you successfully utilize these exciting technologies with minimal hassle and maximum speed. In JSP™ and XML you will: Learn how to use XML, XSLT, and XPath in your JSP site Program SAX to speed up your XML document processing Understand DOM to learn the W3C standard method of working with XML Coordinate cross-browser client-side XML utilization Understand the Web services alphabet Learn how to leverage Web services to simplify access to your data Learn how SOAP, WSDL, and UDDI integrate into Web Services Use JDOM and dom4J to easily work with XML files Design a balanced JSP site using XML Expand your knowledge of JSP to add new functionality to your Web pages Learn how to practically apply Servlet filters and listeners to a Web site Build dynamic JSP pages that can self- modify, making sites easier to maintain Understand how the new JSP XML syntax works Review the basics of database access within JSP Learn JSP tag library design and how tag libraries simplify using XML and Web Services
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 88
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvi, 452 p. ill. ; , 24 cm. +
    DDC: 005.8
    Schlagwort(e): Computer hackers ; Computer security ; Firewalls (Computer security) ; Electronic books ; local
    Kurzfassung: "The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute "One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture of the hacker in action." --From the Foreword by Marcus J. Ranum "From the basics of shrink-wrapped honeypots that catch script kiddies to the detailed architectures of next-generation honeynets for trapping more sophisticated bad guys, this book covers it all....This book really delivers new information and insight about one of the most compelling information security technologies today." --Ed Skoudis, author of Counter Hack, SANS instructor, and Vice President of Security Strategy for Predictive Systems Honeypots are unique technological systems specifically designed to be probed, attacked, or compromised by an online attacker. Implementing a honeypot provides you with an unprecedented ability to take the offensive against hackers. Whether used as simple "burglar alarms," incident response systems, or tools for gathering information about hacker motives and tactics, honeypots can add serious firepower to your security arsenal. Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. The book starts with a basic examination of honeypots and the different roles they can play, and then moves on to in-depth explorations of six specific kinds of real-world honeypots: BackOfficer Friendly, Specter™, Honeyd, Homemade honeypots, ManTrap®, and Honeynets. Honeypots also includes a chapter dedicated to legal issues surrounding honeypot use. Written with the guidance of three legal experts, this section explores issues of privacy, entrapment, and liability. The book also provides an overview of the Fourth Amendment, the Electronic Communications Privacy Act, the Wiretap Act, and the Pen/Trap Statute, with an emphasis on how each applies to honeypots. With this book you will gain an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment. You will arm yourself with the expertise needed to track attackers and learn about them on your own. Security professionals, researchers, law enforcement agents, and members of the intelligence and military communities will find this book indispensable. 0321108957B08282002
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 89
    Online-Ressource
    Online-Ressource
    Boston ; : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 224 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Schlagwort(e): Application software ; Development ; SQL (Computer program language) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: "Dan's book provides something that the formal standards and development manuals sorely lack: a context that helps developers understand how to use XML in their own projects." --Tim Kientzle, Independent Software Consultant XML and SQL: Developing Web Applications is a guide for Web developers and database programmers interested in building robust XML applications backed by SQL databases. It makes it easier than ever for Web developers to create and manage scalable database applications optimized for the Internet. The author offers an understanding of the many advantages of both XML and SQL and provides practical information and techniques for utilizing the best of both systems. The book explores the stages of application development step by step, featuring a real-world perspective and many examples of when and how each technology is most effective. Specific topics covered include: Project definition for a data-oriented application Creating a bullet-proof data model DTDs (document type definitions) and the design of XML documents When to use XML, and what parts of your data should remain purely relational Related standards, such as XSLT and XML Schema How to use the XML support incorporated into Microsoft's SQL Server™ 2000 The XML-specific features of J2EE™ (Java™ 2 Enterprise Edition) Throughout this book, numerous concrete examples illustrate how to use each of these powerful technologies to circumvent the other's limitations. If you want to use the best part of XML and SQL to create robust, data-centric systems then there is no better resource than this book. 0201657961B10152001
    Anmerkung: Includes bibliographical references (p. 209-210) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 90
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 480 p. , ill. ; , 23 cm. +
    Ausgabe: 1st ed.
    Schlagwort(e): Cocoon (Electronic resource) ; Application software ; Development ; Internet programming ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Cocoon: Building XML Applications is the guide to the Apache Cocoon project. The book contains the much needed documentation on the Cocoon project, but it does not limit itself to just being a developer¿s handbook. The book motivates the use of XML and XML software (in particular open source software). It contains everything a beginner needs to get going with Cocoon as well as the detailed information a developer needs to develop new and exciting components to extend the XML publishing framework. Although each chapter builds upon the previous ones, the book is designed so that the chapters can also be read as individual guides to the topics they discuss. Varied "hands-on" examples are used to make the underlying concepts and technologies absolutely clear to anyone starting out with Cocoon. Chapters that detail the author¿s experience in building Internet applications are used to embed Cocoon into the "real world" and complete the picture. mdMatthew Langham and Carsten Ziegeler
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 91
    Online-Ressource
    Online-Ressource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 532 p. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Data encryption (Computer science) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Extensible Markup Language (XML) is the environment of choice for creating many of today's technologically sophisticated and security-sensitive Web applications. With Secure XML, developers now have the hands-on guide they need to combine a strong foundation in XML with proven, practical techniques for enabling the secure transmission of data across the Web. Broad-based and comprehensive, Secure XML fully documents every feature and issue involved with XML security. Opening with a complete introduction to XML, the book then provides detailed coverage of authentication, canonicalization, keying, encryption, algorithms, and more. Notes, background information, guidelines, and "soapbox," or heretical comments, expand on the book's practical focus throughout. In all, this book features the most comprehensive roadmap to digital security and XML encryption available. Topics covered in-depth include: XML basics-documents, namespaces, structures, DTDs and schemas, and stylesheets XPath, XPointer, and SOAP Digital cryptography basics--secret and public key ciphers, asymmetric keys, digital signatures, and certificates XML canonicalization, signatures, and authentication XML encryption Key management and combining encryption with signatures Cryptographic algorithms and noncryptographic algorithms Detailed and practical, this book provides reliable solutions for securing XML and for safeguarding information flow across today's sophisticated Web. 0201756056B06262002
    Anmerkung: Includes bibliographical references (p.495-506) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 92
    Online-Ressource
    Online-Ressource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxiii, 488 p. ; , 19 cm. +
    DDC: 005.75/65
    Schlagwort(e): Oracle (Computer file) ; PL/SQL (Computer program language) ; SQL (Computer program language) ; Electronic books ; local
    Kurzfassung: Concise and practical, this indispensable volume brings the world's most popular Relational Database Management System (RDBMS), its query language SQL, and its programming language PL/SQL into clear focus for today's busy database professional or business analyst. Covering the most commonly used Oracle features, Oracle SQL and PL/SQL Handbook is ideal for the developer or business user challenged with implementing, maintaining, and retrieving mission-critical data within the Oracle database environment. Broadly designed as both a basic reference and how-to, this book offers extensive coverage of Oracle's SQL language and database concepts, providing an excellent review for the Oracle certification exams. The initial chapters offer a complete introduction to the relational database environment, including a discussion of how to use the logical data model to understand the database. Oracle database objects are explored, along with uses of the Data Definition Language (DDL), the Data Control Language (DCL), and the Data Manipulation Language (DML). Later chapters offer complete coverage of the Select command used to retrieve information from the database. Also included are coverage of Oracle's new analytic functions, a chapter on performance-tuning techniqes needed for complex SQL, and a detailed overview of Oracle's PL/SQL language. In addition, many chapters provide practice questions designed to reinforce newly introduced concepts, as well as numerous examples of SQL techniques. The broad-based and comprehensive coverage also includes: Understanding the database using entity relationship diagrams and database schema diagrams Applying the Data Definition, Data Control, and Data Manipulation languages to create and maintain the database Using the SQL language to retrieve information from the database Creating special business information using Oracle's new analytic functions Making your SQL perform better with common troubleshooting techniques Producing business information with business objects Using Java with PL/SQL Authoritative and practical, Oracle SQL and PL/SQL Handbook provides today's administrator and business analyst alike with the most comprehensive sourcebook of solutions and techniques for improving their use of Oracle. 0201752948B07152002
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 93
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 512 p. , ill. ; , 24 cm. + 1 CD-ROM (4 3/4 in.)
    DDC: 005.8
    Schlagwort(e): Computer security ; Computers ; Access control ; Testing ; Electronic books ; local
    Kurzfassung: "This book covers not just the glamorous aspects such as the intrusion act itself, but all of the pitfalls, contracts, clauses, and other gotchas that can occur. The authors have taken their years of trial and error, as well as experience, and documented a previously unknown black art." --From the Foreword by Simple Nomad, Senior Security Analyst, BindView RAZOR Team Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from compromising systems and exploiting proprietary information. Hack I.T. introduces penetration testing and its vital role in an overall network security plan. You will learn about the roles and responsibilities of a penetration testing professional, the motivation and strategies of the underground hacking community, and potential system vulnerabilities, along with corresponding avenues of attack. Most importantly, the book provides a framework for performing penetration testing and offers step-by-step descriptions of each stage in the process. The latest information on the necessary hardware for performing penetration testing, as well as an extensive reference on the available security tools, is included. Comprehensive in scope Hack I.T. provides in one convenient resource the background, strategies, techniques, and tools you need to test and protect your system--before the real hackers attack. Specific topics covered in this book include: Hacking myths Potential drawbacks of penetration testing Announced versus unannounced testing Application-level holes and defenses Penetration through the Internet, including zone transfer, sniffing, and port scanning War dialing Enumerating NT systems to expose security holes Social engineering methods Unix-specific vulnerabilities, such as RPC and buffer overflow attacks The Windows NT Resource kit Port scanners and discovery tools Sniffers and password crackers Web testing tools Remote control tools Firewalls and intrusion detection systems Numerous DoS attacks and tools 0201719568B01042002
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 94
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 793 p. , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Microsoft .NET Framework ; Electronic books ; local
    Kurzfassung: In 1997, Microsoft embarked on a "bet the company" strategy that was to reinvent the way the company did business. Even before its release, .NET made major strides in reinventing the way that software developers viewed the software they wrote. Now that it is released, .NET and the .NET Framework will change the software development process for good. .NET Framework Security provides the ultimate high-end comprehensive reference to all of the new security features available in .NET. Through extensive code samples and step-by-step walkthroughs of configuration techniques, the reader is taken deep into the world of secure applications. Demonstrations of creating custom procedures and a full explanation of each aspect separate this book from many other "lecture books." Many of the concepts expressed in this book are not only viable in .NET, but on the Internet in general. These factors combined make this the one reference that every developer and system administrator should have. .NET Framework Security provides An extensive introduction to explanation of Code Access Security, the powerful new security system shipping in the .NET Framework Information on how to write and test safe applications using the .NET Framework Extensive coverage on how to effectively administer .NET Framework security In-depth introduction to the cryptography library shipping in the .NET Framework, including an introduction to XML digital signatures An overview of all of the new security features available in .NET Code samples that can be used to implement security on your own Web site or application Step-by-step guidelines for modifying the various configuration files associated with .NET, and an explanation of the elements involved Instructions for all of the aspects of security in the CLR and what it means How to use ASP.NET to create a secure application Explanations for using the CryptoAPI libraries to create your own custom functionality Guidelines on how to create secure network applications as well as applications that exist on the Internet Detailed examples of how to establish security parameters in IIS that relate to ASP.NET Instructions for administering .NET applications hosted in IE 067232184XB04232002
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 95
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: x, 196 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Schlagwort(e): Internet programming ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Referring to specific information inside an XML document is a little like finding a needle in a haystack: how do you differentiate the information you need from everything else? XPath and XPointer are two closely related languages that play a key role in XML processing by allowing developers to find these needles and manipulate embedded information. XPath describes a route for finding specific items by defining a path through the hierarchy of an XML document, abstracting only the information that's relevant for identifying the data. XPointer extends XPath to identify more complex parts of documents. The two technologies are critical for developers seeking needles in haystacks in various types of processing. XPath and XPointer fills an essential need for XML developers by focusing directly on a critical topic that has been covered only briefly. Written by John Simpson, an author with considerable XML experience, the book offers practical knowledge of the two languages that underpin XML, XSLT and XLink. XPath and XPointer cuts through basic theory and provides real-world examples that you can use right away.Written for XML and XSLT developers and anyone else who needs to address information in XML documents, the book assumes a working knowledge of XML and XSLT. It begins with an introduction to XPath basics. You'll learn about location steps and paths, XPath functions and numeric operators. Once you've covered XPath in depth, you'll move on to XPointer--its background, syntax, and forms of addressing. By the time you've finished the book, you'll know how to construct a full XPointer (one that uses an XPath location path to address document content) and completely understand both the XPath and XPointer features it uses. XPath and XPointer contains material on the forthcoming XPath 2.0 spec and EXSLT extensions, as well as versions 1.0 of both XPath and XPointer. A succinct but thorough hands-on guide, no other book on the market provides comprehensive information on these two key XML technologies in one place.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 96
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 200 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Application program interfaces (Computer software) ; Java (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: More Java developers today want to work with XML, the technology that enables data to be transported intact over the Internet, but they don't have time to become XML experts. If this describes you, then you'll appreciate data binding, the new way of converting XML documents into Java objects, so those documents can be worked on and manipulated like any other Java object, then converted back to XML This new title provides an in-depth technical look at XML Data Binding. The book offers complete documentation of all features in both the Sun Microsystems JAXB API and popular open source alternative implementations (Enhydra Zeus, Exolabs Castor and Quick). It also gets into significant detail about when data binding is appropriate to use, and provides numerous practical examples of using data binding in applications. As Author Brett McLaughlin says "Too many books are written about technologies by people who barely understand them. I've already written two data binding implementations (Zeus, and a previous one for IBM DeveloperWorks.) I've actually used data binding for longer than the official specification has been in existence, and I've really been able to dig into what it takes to code an effective data biding implementation, as well as use one correctly. This book is part user guide, part under-the-hood manual, and part use-case. It's a powerful combination, and one I think people need."
    Anmerkung: "Converting XML documents into Java objects"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 97
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: vi, 102 p. , ill. ; , 18 cm
    Ausgabe: 1st ed.
    DDC: 005.75/85
    Schlagwort(e): Oracle (Computer file) ; SQL (Computer program language) ; Electronic books ; local
    Kurzfassung: One of the most important challenges faced by Oracle database administrators and Oracle developers is the need to tune SQL statements so that they execute efficiently. Poorly tuned SQL statements are one of the leading causes of substandard database performance and poor response time. SQL statements that perform poorly result in frustration for users, and can even prevent a company from serving its customers in a timely manner. In this book, Mark Gurry shares his in-depth knowledge of Oracle's SQL statement optimizers. Mark's knowledge is the result of many hard-fought tuning battles during his many years of providing Oracle tuning services to clients. Mark provides insights into the workings of the rule-based optimizer that go well beyond what the rules tell you. Mark also provides solutions to many common problems that occur with both the rule-based and cost-based optimizers. In addition to the specific problem/solution scenarios for the optimizers, Mark provides a number of handy SQL tuning tips. He discusses the various optimizer hints, telling you when they can be used to good effect. Finally, Mark discusses the use of the DBMS_STATS package to manage database statistics, and the use of outlines to specify execution plans for SQL statements in third-party applications that you can't otherwise modify.
    Anmerkung: "Covers Oracle9i"--Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 98
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: viii, 111 p. ; , 18 cm
    Ausgabe: 1st ed.
    DDC: 005.75/85
    Schlagwort(e): Oracle (Computer file) ; Data recovery (Computer science) ; Electronic data processing ; Backup processing alternatives ; Relational databases ; Electronic books ; local
    Kurzfassung: Oracle RMAN Pocket Reference is a handy guide for DBAs who intend to use Oracle Recovery Manager for database backup and recovery. Because Recovery Manager (RMAN) is a relatively new tool, many DBAs are just becoming familiar with it. They will welcome a timely book that explains clearly and concisely how to use RMAN for common backup and recovery tasks that are infrequent, yet extremely vital. The first portion of the book is primarily task-oriented. After a short section on RMAN architecture, the book shows (in checklist style) how to perform common backup and recovery tasks such as: Implementing a recovery catalog Creating and running RMAN scripts Configuring input/output channels Taking a full database backup Backing up tablespaces and datafiles Taking incremental backups Recovering lost datafiles The second portion of the book consists of a handy syntax reference to the many RMAN commands. Having a quick reference to RMAN commands is a great convenience to DBAs who otherwise, often under the pressure of a recovery situation, would have to wade through Oracle's online documentation.
    Anmerkung: "Covers Oracle9i"--Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 99
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 455 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Jabber (Computer network protocol) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Jabber is a set of protocols expressed in XML, and an extensible framework that allows people and applications to exchange all sorts of information, from simple text messages to being used to extend the backbone of an enterprise data system. Jabber gives you the power to build applications that have identity, presence, and that can take part in conversations . Programming Jabber offers developers a chance to learn and understand the Jabber technology and protocol from an implementer's point of view. Detailed information of each part of the Jabber protocol is introduced, explained, and discussed in the form of mini-projects, or simple and extended examples. Programming Jabber provides this foundation by: Showing you how to install and configure the Jabber server Providing a detailed overview of the server architecture and configuration options Covering the core Jabber technologies such as XML streams and Jabber identifiers Referencing all of Jabber's XML namespaces Examining the client registration and authentication phases Showing how to deploy your own Jabber-based messaging solutions Demonstrating how to embed XML-RPC-style call mechanisms into Jabber Programming Jabber is divided into two parts. The first part serves as an introduction to Jabber; you'll learn about its features, why it's more than an IM system, and how to install and configure a Jabber server of your own. The second part provides detailed information about the Jabber protocol, and a series of practical examples, which can be used to solve everyday problems. The examples, in Perl, Python, and Java, use various Jabber features as a way of illustrating parts of the protocol. Programming Jabber provides the foundation and framework for developers to hit the ground running, and is the essential book on Jabber.
    Anmerkung: "Extending XML messaging"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 100
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 360 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.7/2
    Schlagwort(e): Python (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: If you are a Python programmer who wants to incorporate XML into your skill set, this is the book for you. Python has attracted a wide variety of developers, who use it either as glue to connect critical programming tasks together, or as a complete cross-platform application development language. Yet, because it is object-oriented and has powerful text manipulation abilities, Python is an ideal language for manipulating XML. Python & XML gives you a solid foundation for using these two languages together. Loaded with practical examples, this new volume highlights common application tasks, so that you can learn by doing. The book starts with the basics then quickly progresses to complex topics, like transforming XML with XSLT, querying XML with XPath, and working with XML dialects and validation. It also explores the more advanced issues: using Python with SOAP and distributed web services, and using Python to create scalable streams between distributed applications (like databases and web servers).The book provides effective practical applications, while referencing many of the tools involved in XML processing and Python, and highlights cross-platform issues along with tasks relevant to enterprise computing. You will find ample coverage of XML flow analysis and details on ways in which you can transport XML through your network.Whether you are using Python as an application language, or as an administrative or middleware scripting language, you are sure to benefit from this book. If you want to use Python to manipulate XML, this is your guide.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...