Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2020-2024  (37)
  • 2000-2004  (1,776)
  • Safari Tech Books Online  (1,548)
  • Safari, an O’Reilly Media Company
Datasource
Material
Language
Years
Year
Subjects(RVK)
  • 1
    Title: 파이토치로 배우는 자연어 처리 : 딥러닝을 이용한 자연어 처리 애플리케이션 구축
    Author, Corporation: 라오, 델립
    ISBN: 9791162244333
    Language: English
    Pages: 1 online resource (296 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: I chaeg eun ja yeon eo cheo li mich dib leo ning al go li jeum hag seub e pil yo han nae yong eul da lun da. tto han pa i to chi leul sa yong hae ja yeon eo cheo li gwa jeong e seo jig myeon hal su iss neun mun je wa da yang han teg seu teu leul pyo hyeon ha neun ae peul li ke i syeon eul gu chug ha neun bang beob eul bo yeo jun da. Dib leo ning mich ja yeon eo cheo li gi cho bu teo nan do si kwon seu mo del ling kka ji swib go ppa leu ge ig hyeo bo ja.
    Abstract: 이 책은 자연어 처리 및 딥러닝 알고리즘 학습에 필요한 내용을 다룬다. 또한 파이토치를 사용해 자연어 처리 과정에서 직면할 수 있는 문제와 다양한 텍스트를 표현하는 애플리케이션을 구축하는 방법을 보여준다. 딥러닝 및 자연어 처리 기초부터 난도 시퀀스 모델링까지 쉽고 빠르게 익혀보자.
    Note: Online resource; Title from title page (viewed June 1, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (540 pages)
    Edition: 4th edition
    Keywords: Electronic books ; local
    Abstract: Why is PHP the most widely used programming language on the web? This updated edition teaches everything you need to know to create effective web applications using the latest features in PHP 7.3. You’ll start with the big picture and then dive into language syntax, programming techniques, and other details, using examples that illustrate both correct usage and common idioms. If you have a working knowledge of HTML and CSS, authors Kevin Tatroe and Peter MacIntyre provide style tips and practical programming advice in a clear, concise manner to help you become a top-notch PHP programmer. Get an overview of what’s possible when you use PHP programs Learn language fundamentals, including data types, variables, operators, and flow control statements Explore functions, strings, arrays, and objects Apply common web application techniques, such as form processing, data validation, session tracking, and cookies Interact with relational databases like MySQL or NoSQL databases such as MongoDB Generate dynamic images, create PDF files, and parse XML files Learn secure scripts, error handling, performance tuning, and other advanced topics Get a quick reference to PHP core functions and standard extensions
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (224 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Serverless is a revolution in the way organizations build and deploy software. With this hands-on guide, Java engineers will learn how to use their language experience in the new world of serverless computing. You’ll discover how this cloud computing model can drastically reduce the complexity in developing and operating applications while reducing costs and time to market. Engineering leaders John Chapin and Mike Roberts guide you through the process of developing serverless applications using AWS Lambda, Amazon’s event-driven, serverless computing platform. You’ll learn how to prepare the development environment, program Lambda functions, and deploy and operate your serverless software. Chapters includes exercises to help you through each aspect of the process. Get an introduction to serverless, functions-as-a-service, and AWS Lambda Learn how to deploy working Lambda functions to the cloud Program Lambda functions and learn how to get data in and out Build and package Java-based Lambda code and dependencies Create serverless applications by building a serverless API and data pipeline Test your serverless applications using automated techniques Apply advanced techniques to build production-ready applications
    Note: Online resource; Title from title page (viewed February 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (200 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Threat modeling is one of the most essential—and most misunderstood—parts of the development lifecycle. Whether you’re a security practitioner or application developer, this book will help you gain a better understanding of core concepts and how to apply them to your practice to protect your systems from threats. Authors Izar Tarandach and Matthew Coles walk you through the myriad ways to approach and execute threat modeling. Contrary to popular belief, the process takes neither incredibly advanced security knowledge nor an unmanageable amount of effort. But it’s critical for spotting and addressing potential concerns in a cost-effective way before the code’s written and it’s too late to find a solution. Find out why threat modeling is important and how it can make you and your team better, more well-rounded architects and developers Learn the most effective ways to integrate threat modeling into your development lifecycle Use the results of a threat modeling exercise on other aspects of the system lifecycle
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (232 pages)
    Edition: 7th edition
    Keywords: Electronic books ; local
    Abstract: For web developers and other programmers interested in using JavaScript, this bestselling book provides the most comprehensive JavaScript reference section on the market. The seventh edition represents a significant update, with new material for ECMAScript 2017 (ES8), and new chapters on language-specific features. JavaScript: The Definitive Guide is ideal for experienced programmers who want to learn the programming language of the web, and for current JavaScript programmers who want to master it.
    Note: Online resource; Title from title page (viewed July 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (94 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If you want to build an enterprise-quality application that uses natural language text, but aren’t sure where to begin or what tools to use, this practical guide will help get you started. You’ll explore special concerns for developing text-based applications, such as performance. Alex Thomas, data scientist at Indeed, shows software engineers and data scientists how to build scalable NLP applications using deep learning and the Apache Spark NLP library. Through concrete examples, practical and theoretical explanations, and hands-on exercises for using NLP on the Spark processing framework, this book teaches you everything from NLP basics to applications of powerful modern techniques. Process text in a distributed environment using Spark NLP, a production-ready library for NLP built on Spark Create, tune, and deploy your own word embeddings Adapt your NLP applications to multiple languages Use text in machine learning and deep learning Learn why these techniques work from a machine learning, linguistic, and practical point of view
    Note: Online resource; Title from title page (viewed July 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (800 pages)
    Edition: 3rd edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Want to create devices that interact with the physical world? This cookbook is perfect for anyone who wants to experiment with the popular Arduino microcontroller and programming environment. You’ll find more than 200 tips and techniques for building a variety of objects and prototypes such as IoT solutions, environmental monitors, location and position-aware systems, and products that can respond to touch, sound, heat, and light. You don’t need to have mastered Arduino or programming to get started. Updated for the Arduino 1.5 release, the recipes in this third edition include practical examples and guidance to help you begin, expand, and enhance your projects right away—whether you’re an engineer, designer, artist, student, or hobbyist. Get up to speed on the Arduino board and essential software concepts quickly Learn basic techniques for reading digital and analog signals Use Arduino with a variety of popular input devices and sensors Drive visual displays, generate sound, and control several types of motors Interact with devices that use remote controls, including TVs and appliances Learn techniques for handling time delays and time measurement Apply advanced coding and memory-handling techniques
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (93 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Statistical methods are a key part of data science, yet few data scientists have formal statistical training. Courses and books on basic statistics rarely cover the topic from a data science perspective. The second edition of this practical guide—now including examples in Python as well as R—explains how to apply various statistical methods to data science, tells you how to avoid their misuse, and gives you advice on what’s important and what’s not. Many data scientists use statistical methods but lack a deeper statistical perspective. If you’re familiar with the R or Python programming languages, and have had some exposure to statistics but want to learn more, this quick reference bridges the gap in an accessible, readable format. With this updated edition, you’ll dive into: Exploratory data analysis Data and sampling distributions Statistical experiments and significance testing Regression and prediction Classification Statistical machine learning Unsupervised learning
    Note: Online resource; Title from title page (viewed May 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (375 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If you want to build, iterate and scale NLP systems in a business setting and to tailor them for various industry verticals, this is your guide. Consider the task of building a chatbot or text classification system at your organization. In the beginning, there may be little or no data to work with. At this point, a basic solution that uses rule based systems or traditional machine learning will be apt. As you accumulate more data, more sophisticated—and often data intensive—ML techniques can be used including deep learning. At each step of this journey, there are dozens of alternative approaches you can take. This book helps you navigate this maze of options.
    Note: Online resource; Title from title page (viewed May 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    ISBN: 9781492043423 , 1492043427 , 9781492043409 , 1492043400
    Language: English
    Pages: 1 online resource (500 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    DDC: 005.12
    Keywords: Software architecture ; Software architecture Vocational guidance ; Electronic books ; local ; Architecture logicielle ; Architecture logicielle ; Orientation professionnelle
    Abstract: Although salary surveys worldwide regularly identify software architect as one of the top ten best jobs, no decent guides exist to help developers become architects. Until now. This practical guide provides the first comprehensive overview of software architecture’s many aspects. You’ll examine architectural characteristics, architectural patterns, component determination, diagramming and presenting architecture, evolutionary architecture, and many other topics. Authors Neal Ford and Mark Richards help you learn through examples in a variety of popular programming languages, such as Java, C#, JavaScript, and others. You’ll focus on architecture principles with examples that apply across all technology stacks.
    Note: Online resource; Title from title page (viewed February 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (451 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Much has changed in technology over the past decade. Data is hot, the cloud is ubiquitous, and many organizations need some form of automation. Throughout all these transformations, Python has become one of the most popular languages in the world. This practical guide shows you how to use Python for everyday Linux systems administration tasks with today’s most useful DevOps tools, including Docker, Kubernetes, and Terraform. Learning how to interact and automate with Linux is an essential skill for millions of professionals. Python makes it much easier. With this book, you’ll learn how to develop software and solve problems using containers, as well as how to monitor, instrument, load-test, and operationalize your software. If you’re looking for effective ways to "get stuff done" in Python, this is your guide. Automate several tasks using Python Work more efficiently by using a smaller subset of the language Use continuous integration systems to increase software quality Mix shell and Python commands to solve problems
    Note: Online resource; Title from title page (viewed January 3, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (350 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Most applications today are distributed in some fashion. Monitoring the health and performance of these distributed architectures requires a new approach. Enter distributed tracing, a method of profiling and monitoring applications—especially those that use microservice architectures. There’s just one problem: distributed tracing can be hard. But it doesn’t have to be. With this practical guide, you’ll learn what distributed tracing is and how to use it to understand the performance and operation of your software. Key players at LightStep walk you through instrumenting your code for tracing, collecting the data that your instrumentation produces, and turning it into useful, operational insights. If you want to start implementing distributed tracing, this book tells you what you need to know. You’ll learn: The pieces of a distributed tracing deployment: Instrumentation, data collection, and delivering value Best practices for instrumentation (the methods for generating trace data from your service) How to deal with or avoid overhead, costs, and sampling How to work with spans (the building blocks of request-based distributed traces) and choose span characteristics that lead to valuable traces Where distributed tracing is headed in the future
    Note: Online resource; Title from title page (viewed June 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (300 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Data is getting bigger, arriving faster, and coming in varied formats—and it all needs to be processed at scale for analytics or machine learning. How can you process such varied data workloads efficiently? Enter Apache Spark. Updated to emphasize new features in Spark 2.x., this second edition shows data engineers and scientists why structure and unification in Spark matters. Specifically, this book explains how to perform simple and complex data analytics and employ machine-learning algorithms. Through discourse, code snippets, and notebooks, you’ll be able to: Learn Python, SQL, Scala, or Java high-level APIs: DataFrames and Datasets Peek under the hood of the Spark SQL engine to understand Spark transformations and performance Inspect, tune, and debug your Spark operations with Spark configurations and Spark UI Connect to data sources: JSON, Parquet, CSV, Avro, ORC, Hive, S3, or Kafka Perform analytics on batch and streaming data using Structured Streaming Build reliable data pipelines with open source Delta Lake and Spark Develop machine learning pipelines with MLlib and productionize models using MLflow Use open source Pandas framework Koalas and Spark for data transformation and feature engineering
    Note: Online resource; Title from title page (viewed June 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (250 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Learn the skills necessary to design, build, and deploy applications powered by machine learning. Through the course of this hands-on book, you’ll build an example ML-driven application from initial idea to deployed product. Data scientists, software engineers, and product managers with little or no ML experience will learn the tools, best practices, and challenges involved in building a real-world ML application step-by-step. Author Emmanuel Ameisen, who worked as a data scientist at Zipcar and led Insight Data Science’s AI program, demonstrates key ML concepts with code snippets, illustrations, and screenshots from the book’s example application. The first part of this guide shows you how to plan and measure success for an ML application. Part II shows you how to build a working ML model, and Part III explains how to improve the model until it fulfills your original vision. Part IV covers deployment and monitoring strategies. This book will help you: Determine your product goal and set up a machine learning problem Build your first end-to-end pipeline quickly and acquire an initial dataset Train and evaluate your ML model and address performance bottlenecks Deploy and monitor models in a production environment
    Note: Online resource; Title from title page (viewed February 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (250 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With Early Release ebooks, you get books in their earliest form—the authors' raw and unedited content as they write—so you can take advantage of these technologies long before the official release of these titles. This book will enable you to apply graph thinking to solve complex problems. If you want to learn how to build architectures for extracting value for your domain’s complex problems, then this book is for you. You’ll learn how to think about your data as a graph, and how to determine if graph technology is right for your application. The book describes techniques for scalable, real-time, and multimodel architectures that solve complex problems, and shows how companies are successfully applying graph thinking in distributed production environments. Authors Denise Koessler Gosnell and Matthias Broecheler also introduce the Graph Schema Language, a set of terminology and visual illustrations to normalize how graph practitioners communicate conceptual graph models, graph schema, and graph database design.
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (150 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: If you’re among the Python developers put off by Asyncio’s complexity, it’s time to take another look. Asyncio is complicated because it aims to solve problems in concurrent network programming for both framework developers and end-user developers like you. The features you need to consider are a small subset of the whole Asyncio API, but picking out the right features is the tricky part. That’s where this practical book comes in. Veteran Python developer Caleb Hattingh helps end-user developers gain a basic understanding of Asyncio’s building blocks—enough to get you started writing simple event-based programs. You’ll learn why Asyncio offers a safer alternative to preemptive multitasking (threading) and how this API provides a simple way to support thousands of simultaneous socket connections. Get a critical comparison of Asyncio and threading for concurrent network programming Take an Asyncio walkthrough, including a quickstart guide to help you hit the ground looping with event-based programming Learn the difference between Asyncio features for end-user developers and those for framework developers Understand Asyncio’s new async/await language syntax, including coroutines and task and future APIs Get detailed case studies (with code) of some popular Asyncio-compatible third-party libraries
    Note: Online resource; Title from title page (viewed March 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (58 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Yablonski, Jon Laws of UX
    RVK:
    Keywords: Electronic books ; local ; Webdesign ; Grafikdesign ; Mensch-Maschine-Kommunikation ; Benutzerfreundlichkeit ; Verhaltenspsychologie
    Abstract: Every designer today should learn the fundamentals of psychology. Instead of forcing users to conform to a product design or experience, designers need to learn how users behave and interact with various digital interfaces. This guide provides some key principles from psychology to help you design more intuitive, human-centered products and experiences. Humans have an underlying blueprint for how we perceive and process the world around us, and through simple lessons in psychology, this guide will help you define this blueprint.
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (300 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With Early Release ebooks, you get books in their earliest form—the author's raw and unedited content as he or she writes—so you can take advantage of these technologies long before the official release of these titles. JavaScript is the little scripting language that could. Once used chiefly to add interactivity to web browser windows, JavaScript is now a primary building block of powerful and robust applications. In this practical book, new and experienced JavaScript developers will learn how to use this language to create APIs as well as web, mobile, and desktop applications. Author and engineering leader Adam D. Scott covers technologies such as Node.js, GraphQL, React, and React Native. Ideal for developers who want to build full stack applications and web development beginners looking to bootstrap a startup, this book shows you how to create a single CRUD-style application that will work across several platforms. Explore GraphQL's simple process for querying data Learn about shared authentication for APIs, web apps, and native applications Build universal web applications with React and Next.js that perform and render on the server Use React Native to write cross-platform applications for iOS and Android that compile to native code Learn how to write desktop applications with Electron
    Note: Online resource; Title from title page (viewed March 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (280 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: As Python continues to grow in popularity, projects are becoming larger and more complex. Many Python developers are now taking an interest in high-level software architecture patterns such as hexagonal/clean architecture, event-driven architecture, and strategic patterns prescribed by domain-driven design (DDD). But translating those patterns into Python isn’t always straightforward. With this practical guide, Harry Percival and Bob Gregory from MADE.com introduce proven architectural design patterns to help Python developers manage application complexity. Each pattern is illustrated with concrete examples in idiomatic Python that explain how to avoid some of the unnecessary verbosity of Java and C# syntax. You’ll learn how to implement each of these patterns in a Pythonic way. Architectural design patterns include: Dependency inversion, and its links to ports and adapters (hexagonal/clean architecture) Domain-driven design’s distinction between entities, value objects, and aggregates Repository and Unit of Work patterns for persistent storage Events, commands, and the message bus Command Query Responsibility Segregation (CQRS) Event-driven architecture and reactive microservices
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (51 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking—until now. This practical guide provides both defensive and offensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a product security lead at Salesforce.com, introduces three pillars of web application security: recon, offense, and defense. You’ll learn methods for effectively researching and analyzing modern web applications—including those you don’t have direct access to. You’ll also learn how to apply countermeasures to your own applications in order to prevent or mitigate risk from hackers. Ideal as a reference guide or educational text, this book helps you: Explore common vulnerabilities that plague today's web applications Learn essential hacking techniques that attackers use for exploiting applications Map and document web applications for which you do not have direct access Hack your application by applying the OWASP 10 exploits and other attacks Learn how to code your application to protect against the attacks you’ve identified Get practical tips to help you improve the overall security of your web products Develop and deploy your own customized exploits that can bypass many defenses
    Note: Online resource; Title from title page (viewed June 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (150 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Operators are a way of packaging, deploying, and managing Kubernetes applications. A Kubernetes application doesn’t just run on Kubernetes; it’s composed and managed in Kubernetes terms. Operators add application-specific operational knowledge to a Kubernetes cluster, making it easier to automate complex, stateful applications and to augment the platform. Operators can coordinate application upgrades seamlessly, react to failures automatically, and streamline repetitive maintenance like backups. Think of Operators as site reliability engineers in software. They work by extending the Kubernetes control plane and API, helping systems integrators, cluster administrators, and application developers reliably deploy and manage key services and components. Using real-world examples, authors Jason Dobies and Joshua Wood demonstrate how to use Operators today and how to create Operators for your applications with the Operator Framework and SDK. Learn how to establish a Kubernetes cluster and deploy an Operator Examine a range of Operators from usage to implementation Explore the three pillars of the Operator Framework: the Operator SDK, the Operator Lifecycle Manager, and Operator Metering Build Operators from the ground up using the Operator SDK Build, package, and run an Operator in development, testing, and production phases Learn how to distribute your Operator for installation on Kubernetes clusters
    Note: Online resource; Title from title page (viewed March 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (300 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Early system administration required in-depth knowledge of a variety of services on individual systems. Now, the job is increasingly complex and different from one company to the next with an ever-growing list of technologies and third-party services to integrate. How does any one individual stay relevant in systems and services? This practical guide helps anyone in operations—sysadmins, automation engineers, IT professionals, and site reliability engineers—understand the essential concepts of the role today. Collaboration, automation, and the evolution of systems change the fundamentals of operations work. No matter where you are in your journey, this book provides you the information to craft your path to advancing essential system administration skills. Author Jennifer Davis provides examples of modern practices and tools with recommended materials to advance your skills. Topics include: Development and testing: Version control, fundamentals of virtualization and containers, testing, and architecture reviewDeploying and configuring services: Infrastructure management, networks, security, storage, serverless, and release managementScaling administration: Monitoring and observability, capacity planning, log management and analysis, and security and compliance
    Note: Online resource; Title from title page (viewed July 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (37 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Learn how to build a serverless real-world application in the cloud that’s reliable, secure, maintainable, and can handle millions of users. If you have experience building traditional web applications, this practical guide shows you how to get started with serverless. Cloud engineer Wietse Venema takes you through the steps necessary to build serverless applications with Cloud Run, a container-based serverless platform on Google Cloud. Through the course of the book, you’ll learn how to become productive with serverless technology. You will build and explore several example applications that highlight different parts of the serverless stack, using (light) frontend technology and Go on the back end. You can also follow the lessons in the book using your own project on Google Cloud Platform. You’ll learn how to: Build a serverless application with Google’s Cloud Run and Firestore Approach testing and development Handle user management and authentication Combine serverless with a traditional relational database Run and monitor production services Integrate your application with external APIs
    Note: Online resource; Title from title page (viewed July 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (450 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Coding and testing are generally considered separate areas of expertise. In this practical book, Java expert Scott Oaks takes the approach that anyone who works with Java should be equally adept at understanding how code behaves in the Java Virtual Machine—including the tunings likely to help performance. This updated second edition helps you gain in-depth knowledge of Java application performance using both the JVM and the Java platform. Developers and performance engineers alike will learn a variety of features, tools, and processes for improving the way Java 8 and 11 LTS releases perform. While the emphasis is on production-supported releases and features, this book also features previews of exciting new technologies such as ahead-of-time compilation and experimental garbage collections. Understand how various Java platforms and compilers affect performance Learn how Java garbage collection works Apply four principles to obtain best results from performance testing Use the JDK and other tools to learn how a Java application is performing Minimize the garbage collector’s impact through tuning and programming practices Tackle performance issues in Java EE and SE APIs Improve Java-driven database application performance
    Note: Online resource; Title from title page (viewed February 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (275 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Companies are spending billions on machine learning projects, but it’s money wasted if the models can’t be deployed effectively. In this practical guide, Hannes Hapke and Catherine Nelson walk you through the steps of automating a machine learning pipeline using the TensorFlow ecosystem. You’ll learn the techniques and tools that will cut deployment time from days to minutes, so that you can focus on developing new models rather than maintaining legacy systems. Data scientists, machine learning engineers, and DevOps engineers will discover how to go beyond model development to successfully productize their data science projects, while managers will better understand the role they play in helping to accelerate these projects. The book also explores new approaches for integrating data privacy into machine learning pipelines. Understand the machine learning management lifecycle Implement data pipelines with Apache Airflow and Kubeflow Pipelines Work with data using TensorFlow tools like ML Metadata, TensorFlow Data Validation, and TensorFlow Transform Analyze models with TensorFlow Model Analysis and ship them with the TFX Model Pusher Component after the ModelValidator TFX Component confirmed that the analysis results are an improvement Deploy models in a variety of environments with TensorFlow Serving, TensorFlow Lite, and TensorFlow.js Learn methods for adding privacy, including differential privacy with TensorFlow Privacy and federated learning with TensorFlow Federated Design model feedback loops to increase your data sets and learn when to update your machine learning models
    Note: Online resource; Title from title page (viewed August 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (210 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: How can startups successfully scale customer acquisition and revenue growth with a lean team? Out-of-the-box acquisition solutions from Facebook, Google, and others provide a good start, but the companies that can tailor those solutions to meet their specific needs, objectives, and goals will come out winners. With this practical book, author Lomit Patel shows you how to use AI and machine learning (ML) to provide an operational layer atop those acquisition solutions to deliver meaningful results for your company. You’ll learn how to adapt, customize, and personalize cross-channel user journeys to help your company attract and maintain customers. Learn how AI and ML can support the customer acquisition efforts of a lean startup Dive into Customer Acquisition 3.0, an initiative for gaining and retaining customers Explore ways to use ML for marketing purposes Understand the key metrics for determining the growth of your startup Determine the right strategy to foster user acquisition in your company Manage the increased complexity and risk inherent in AI projects
    Note: Online resource; Title from title page (viewed March 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Language: English
    Pages: 1 online resource (600 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Can a system ever truly be considered reliable if it isn't fundamentally secure? In two previous O'Reilly books, experts from Google showed how reliability is fundamental to service design. Site Reliability Engineering and The Site Reliability Workbook demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain software systems. Security is also crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, reliability, and availability. In a world where most products are connected to the internet, and with cloud technologies and machine learning becoming more prevalent, enabling security by default is increasingly important. This book shares best practices to help an organization of any size design scalable and reliable systems that are fundamentally secure. It also offers insights into how teams across an organization can collaborate on security and reliability. Specifically, you'll learn about: Design Strategies Implementation and Operations Preparing for the Worst: Detection and Response Scaling Security and the Organization
    Note: Online resource; Title from title page (viewed March 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (300 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Every day, companies struggle to scale critical applications. As traffic volume and data demands increase, these applications become more complicated and brittle, exposing risks and compromising availability. And with the popularity of software as a service, scaling has never been more important. Updated with an expanded focus on modern architecture paradigms such as microservices and cloud computing, this practical guide provides techniques for building systems that can handle huge quantities of traffic, data, and demand without affecting the quality your customers expect. Author Lee Atchison shows architects, managers, and directors in both engineering andoperations organizations how to build applications at scale that run more smoothly and reliably and meet the needs of your customers. See how scaling affects the availability of your services, why that matters, and how to improve it Dive into a modern service-based application architecture that ensures high availability and reduces the effects of service failures Explore the Single Team Owned Service Architecture paradigm (STOSA)—a model for scaling your development organization as your application scales Understand, measure, and mitigate risk in your systems Use the cloud to build highly scalable applications
    Note: Online resource; Title from title page (viewed June 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (50 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The future will be increasingly decentralized. As the publicity surrounding bitcoin and blockchain has shown, decentralized technology and distributed business models are already popular. Yet the disruptive potential of this technology is obscured by hype and misconceptions in equal measure. In this detailed guide, Lorne Lantz and Daniel Cawrey distill the complex ideas behind blockchain into an easily digestible reference that shows what is really going on under the hood. Finance and technology professionals will learn how a blockchain works as they explore the evolution and current state of cryptocurrencies, and the function of smart contracts. If you’re evaluating whether to invest your time in the cryptocurrency and blockchain industry, this book is for you. Get beyond the buzzwords and discover what the technology has to offer. Learn why Bitcoin was fundamentally important to the birth of blockchain Explore altcoin and altchain successes and failures, to see what can be done with blockchains and cryptocurrencies Understand the challenges of scaling a blockchain and forking a blockchain project See what Ethereum offers beyond Bitcoin Examine how the money flows in crypto markets Discover why, how, and where governments are intervening in the cryptocurrency and blockchain industry Understand the perspectives of real-world practitioners in the space
    Note: Online resource; Title from title page (viewed October 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (56 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Level up with Tableau to build eye-catching, easy-to-interpret data visualizations. In this follow-up guide to 2018’s Practical Tableau, author Ryan Sleeper takes you through a collection of unique tips and tutorials for using this popular software. Beginning to advanced Tableau users will learn how to go beyond Show Me to make better data charts and learn dozens of tricks to improve both the author and user experience. Featuring many tutorials he designed himself, Ryan shows you how to create charts that empower Tableau users to explore, understand, and derive value from their data. He also shares many of his favorite tricks that enabled him to become a Tableau Zen Master, Tableau Public Visualization of the Year author, and Tableau Iron Viz Champion. Learn what’s new in Tableau since Practical Tableau was released in 2018 Examine unique new charts—timelines, custom gauges, and leapfrog charts—plus innovations such as highlight tables, scatter plots, and maps Get tips that can help make a Tableau developer’s life easier Understand what developers can do to make users’ lives easier
    Note: Online resource; Title from title page (viewed July 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Cisco Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (372 pages)
    Edition: 1st edition
    DDC: 004.6
    Keywords: Computer networks Study guides Examinations ; Internetworking (Telecommunication) Study guides Examinations ; Electronic data processing personnel Certification ; Electronic books ; local ; Réseaux d'ordinateurs - Examens - Guides de l'étudiant ; Interconnexion de réseaux (Télécommunications) - Examens - Guides de l'étudiant
    Abstract: Preparing for the CCNA® exam? Here are all the CCNA-level commands you need in one condensed, portable resource. The CCNA Portable Command Guide, Fifth Edition , is filled with valuable, easy-to-access information and is portable enough for use whether you're in the server room or the equipment closet. This book has been completely updated to cover topics in the CCNA 200-301 exams. Use this quick reference resource to help you memorize commands and concepts as you work to pass the CCNA exam. The guide summarizes all certification-level Cisco IOS® Software commands, keywords, command arguments, and associated prompts, providing you with tips and examples of how to apply the commands to real-world scenarios. Configuration examples throughout the book provide you with a better understanding of how these commands are used in simple network designs. Ten topics this guide covers are: TCP/IP An Introduction to Cisco Devices Configuring a Router Routing Switching Implementing a Wireless LAN Network Administration and Troubleshooting Managing IP Services WANs Network Security
    Abstract: "CCNA 200-301 Portable Command Guide is filled with valuable, easy-to-access information-and it's portable enough to use whether you're in the server room or the equipment closet. The guide summarizes all CCNA certification-level Cisco IOS Software commands, keywords, command arguments, and associated prompts, providing you with tips and examples of how to apply the commands to real-world scenarios. Throughout, configuration examples give you a better understanding of how these commands are used in simple network designs. This book has been completely updated to cover topics in the new 200-301 exam. Use this quick reference resource to help you memorize commands and concepts as you work to pass the CCNA certification exam. Coverage includes: ·Network Fundamentals: IPv4 addressing, subnetting, VLSM, route summarization, IPv6 addressing, cables/connections, CLI ·LAN Switching Technologies: Switch configuration, VLANs, VLAN trunking protocol, inter-VLAN communication, STP, EtherChannel, CDP, LLDP ·Routing Technologies: Router configuration, static routing, OSPF ·IP Services: DHCP, NAT, NTP ·Security Fundamentals: Layer 2 security, ACL traffic management, device monitoring and hardening ·Wireless Technologies: Configuring and securing a WLAN AP ·Quick, offline access to all CCNA commands for research and solutions ·Logical how-to topic groupings for a one-stop resource ·Great for review before CCNA certification exams ·Compact size makes it easy to carry with you wherever you go ·"Create Your Own Journal" section with blank, lined pages enables you to personalize the book for your needs. This book is part of the Cisco Press Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco certification exams. Titles in the Cisco Press Certification Self-Study Product Family are part of a recommended learning program from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press."--Amazon.com
    Note: Online resource; Title from title page (viewed January 1, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (87 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Your Python code may run correctly, but you need it to run faster. By exploring the fundamental theory behind design choices, the updated edition of this practical guide, expanded and enhanced for Python 3, helps you gain a deeper understanding of Python’s implementation. You’ll learn how to locate performance bottlenecks and significantly speed up your code in high-data-volume programs. How can you take advantage of multicore architectures or clusters? Or build a system that can scale up and down without losing reliability? Experienced Python programmers and students alike will learn concrete solutions to these and other issues, along with war stories from companies that use high-performance Python for social media analytics, productionized machine learning, and other situations. Get a better grasp of NumPy, Cython, and profilers Learn how Python abstracts the underlying computer architecture Understand performant pandas Use profiling to find bottlenecks in CPU time and memory usage Write efficient programs by choosing appropriate data structures Speed up matrix, vector, and even tensor computations Use tools to compile Python down to machine code, on CPUs and GPUs Manage multiple I/O and computational operations concurrently Convert multiprocessing code to run on a local or remote cluster Deploy code faster using tools like Docker Solve large problems while using less RAM Get real-life stories and lessons from Python programmers
    Note: Online resource; Title from title page (viewed June 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (66 pages)
    Edition: 3rd edition
    Keywords: Electronic books ; local
    Abstract: Imagine what you could do if scalability wasn't a problem. With this hands-on guide, you’ll learn how the Cassandra database management system handles hundreds of terabytes of data while remaining highly available across multiple data centers. This third edition—updated for Cassandra 4.0—provides the technical details and practical examples you need to put this database to work in a production environment. Authors Jeff Carpenter and Eben Hewitt demonstrate the advantages of Cassandra’s nonrelational design, with special attention to data modeling. If you’re a developer, DBA, or application architect looking to solve a database scaling issue or future-proof your application, this guide helps you harness Cassandra’s speed and flexibility. Understand Cassandra’s distributed and decentralized structure Use the Cassandra Query Language (CQL) and cqlsh—the CQL shell Create a working data model and compare it with an equivalent relational model Develop sample applications using client drivers for languages including Java, Python, and Node.js Explore cluster topology and learn how nodes exchange data
    Note: Online resource; Title from title page (viewed July 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (600 pages)
    Edition: 4th edition
    Keywords: Electronic books ; local
    Abstract: Java continues to grow and evolve, and this Cookbook continues to evolve in tandem. This book helps to get you up to speed right away with hundreds of hands-on recipes across a broad range of Java topics. You’ll learn useful techniques for everything from string handling and functional programming to network communication. Each recipe includes self-contained code solutions that you can freely use, along with a discussion of how and why they work. If you are familiar with the basics of the Java language, this cookbook will bolster your knowledge of the language in general and its many recent changes and how to apply them in your day-to-day development. Recipes include: Methods for compiling, running, and debugging “Packaging” Java classes and building applications Manipulating, comparing, and rearranging text Regular expressions for string- and pattern-matching Handling numbers, dates, and times Structuring data with collections, arrays, and other types Object-oriented and functional programming techniques Input/Output, Directory and filesystem operations Network programming on both client and server Processing JSON for data interchange Multithreading and concurrency Using Java in Big Data applications Interfacing Java with other languages The 4th Edition of this book has been updated to cover changes through Java 12 and includes new recipes for Big Data and data science.
    Note: Online resource; Title from title page (viewed April 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This book presents a new approach to risk management that enables executives to think systematically and strategically about future risks and deal proactively with threats to their competitive advantages in an ever more volatile, uncertain, complex, and ambiguous world. Organizations typically manage risks through traditional tools such as insurance and risk mitigation; some employ enterprise risk management, which looks at risk holistically throughout the organization. But these tools tend to focus organizational attention on past actions and compliance. Executives need to tackle risk head-on as an integral part of their strategic planning process, not by looking in the rearview mirror. Strategic Risk Management (SRM) is a forward-looking approach that helps teams anticipate events or exposures that fundamentally threaten or enhance a firm's position. The authors, experts in both business strategy and risk management, define strategic risks and show how they differ from operational risks. They offer a road map that describes architectural elements of SRM (knowledge, principles, structures, and tools) to show how leaders can integrate them to effectively design and implement a future-facing SRM program. SRM gives organizations a competitive advantage over those stuck in outdated risk management practices. For the first time, it enables them to look squarely out the front windshield.
    Note: Online resource; Title from title page (viewed January 21, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Sams | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Sams Teach Yourself SQL in 10 Minutes offers straightforward, practical answers when you need fast results. By working through the book’s 22 lessons of 10 minutes or less, you’ll learn what you need to know to take advantage of the SQL language. Lessons cover IBM DB2, Microsoft SQL Server and SQL Server Express, MariaDB, MySQL, Oracle and Oracle express, PostgreSQL, and SQLite. Full-color code examples help you understand how SQL statements are structured Tips point out shortcuts and solutions Cautions help you avoid common pitfalls Notes explain additional concepts, and provide additional information 10 minutes is all you need to learn how to… Use the major SQL statements Construct complex SQL statements using multiple clauses and operators Retrieve, sort, and format database contents Pinpoint the data you need using a variety of filtering techniques Use aggregate functions to summarize data Join two or more related tables Insert, update, and delete data Create and alter database tables Work with views, stored procedures, and more
    Note: Online resource; Title from title page (viewed January 8, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (52 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With a new generation of services and frameworks, frontend and mobile developers can use their existing skill set to build full stack applications by leveraging the cloud. Developers can build robust applications with production-ready features such as authentication, APIs, data layers, machine learning, chatbots, and AR scenes more easily than ever by taking advantage of these new serverless and cloud technologies. This practical guide explains how. Nader Dabit, developer advocate at Amazon Web Services, shows developers how to build full stack applications using React, AWS, GraphQL, and the Amplify Framework. You’ll learn how to create and incorporate services into your client applications while exploring general best practices, deployment strategies, continuous integration and delivery, and rich media management along the way. Learn how to build applications that solve real problems Understand what is (and isn’t) possible when using these technologies Examine how authentication works—and learn the difference between authentication and authorization Discover how serverless functions work and why they’re important Use GraphQL in your application—and learn why it’s important Learn how to build full stack applications on AWS
    Note: Online resource; Title from title page (viewed November 25, 2020)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781931836197
    Language: English
    Pages: 1 online resource (608 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market. * This book will provide readers with unparalleled information on installing, confiuguring, and troubleshooting ISA Server 2004 by teaching readers to: * Deploy ISA Server 2004 in small businesses and large organizations. * Learn how to configure complex DMZ configurations using ISA Server 2004's new network awareness features and built-in multinetworking capabilities. * Learn how to take advantage of ISA Server 2004's new VPN capabilities!
    Note: Online resource; Title from title page (viewed December 31, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (2 pages)
    Keywords: Electronic books ; local
    Abstract: Leadership, however, has traditionallybeen viewed as an art, but the notion that leadership can also be a science deserves a closer look.
    Note: Online resource; Title from title page (viewed April 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (352 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order t
    Note: Online resource; Title from title page (viewed September 29, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (2 pages)
    Keywords: Electronic books ; local
    Abstract: Some senior executives who were schooled in less technologically oriented times break into a cold sweat at the mere sight of a computer. But organizations can take steps to help such leaders overcome the social stigma without sneaking around.
    Note: Online resource; Title from title page (viewed June 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (6 pages)
    Keywords: Electronic books ; local
    Abstract: Evaluating the impact of an organization's efforts to develop leaders is challenging. However, if the evaluation is set up properly, it will not only improve development efforts, and thereby the quality of leadership, but also contribute to the effectiveness of the organization.
    Note: Online resource; Title from title page (viewed February 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (2 pages)
    Keywords: Electronic books ; local
    Abstract: The common wisdom is that children are the best learners because they haven't become too set in their ways, and that the older people get the less adept at learning they become. Don Prince shares stories that seem to prove otherwise.
    Note: Online resource; Title from title page (viewed June 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Center for Creative Leadership | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (5 pages)
    Keywords: Electronic books ; local
    Abstract: Here's a primer for leaders on how to approach sustainability.
    Note: Online resource; Title from title page (viewed April 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Berrett-Koehler Publishers | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (96 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: From the novice to the most experienced and senior project manager, triple constraint issues are at the core of the most crucial decisions about a project. The Triple Constraints in Project Management explores the triangle of time, cost, and performance that bounds the universe within which every project must be accomplished – and shows how controlling the hierarchy of constraints can mean the difference between success and failure on virtually any project.
    Note: Online resource; Title from title page (viewed July 1, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781932266658
    Language: English
    Pages: 1 online resource (550 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking the Code dives right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations is included in both the Local and Remote Code sections of the book. The book is accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD also contains a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions simplify exploit and vulnerability tool development to an extent never before possible with publicly available software. Learn to quickly create security tools that ease the burden of software testing and network administration Find out about key security issues regarding vulnerabilities, exploits, programming flaws, and secure code development Discover the differences in numerous types of web-based attacks so that developers can create proper quality assurance testing procedures and tools Learn to automate quality assurance, management, and development tasks and procedures for testing systems and applications Learn to write complex Snort rules based solely upon traffic generated by network tools and exploits
    Note: Online resource; Title from title page (viewed May 10, 2004)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 958 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Electronic data processing personnel ; Certification ; Telecommunication ; Switching systems ; Examinations ; Study guides ; Telecommunications engineers ; Certification ; Study guides ; Electronic books ; local
    Abstract: Gain necessary hands-on experience implementing CCNP BCMSN concepts with this practical lab guide Lab configurations include explanations of equipment set-up and execution Valuable reference tool for Catalyst switches, including shortcuts, caveats, and application of the most advanced features Real-world scenarios represent the whole range of CCNP BCMSN 642-811 exam topics CCNP Practical Studies: Switching (CCNP Self-Study) provides CCNP candidates with an in-depth, hands-on experience in configuring Cisco Catalyst switches. This practical guide shows intermediate level networkers how to apply the theoretical knowledge they have gained through CCNP coursework and exam preparation. Configuration labs performed within this book will cover all technologies tested on the BCMSN 642-811 exam, as well as a number of real world scenarios that will test users' overall understanding of multilayer switching. The labs come complete with full explanations, highlighting why the chosen commands and techniques are recommended. In addition to applicable labs, this book also provides general information on various switching technologies, as well as tips, tricks, shortcuts, and caveats for deploying Cisco switching gear in production environments. This book also includes exercises (similar to traditional mathematics exercises) that will help readers internalize, practice, and memorize certain concepts and thought processes necessary to successfully deploy a switched network. Part of the Practical Studies series from the Cisco Press, CCNP Practical Studies: Switching provides self-study based hands-on experience. As such, it can be used in conjunction with other Cisco Press titles and is an excellent companion to instructor-led training from a Cisco Learning Partner.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications Evaluate market drivers for Layer 2 VPNs Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3 Grasp the essentials of Layer 2 LAN and WAN technologies Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching Understand the operation and application of Virtual Private LAN Services (VPLS) Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. As part of its new Unified VPN Suite, Cisco Systems® now offers next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco® Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs. Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HD...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, traffic filtering, user authentication, content filtering, application inspection, and traffic shunning Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Control access and manage activity on the Cisco IOS firewall Configure a Cisco firewall to act as an IDS sensor Every organization has data, facilities, and workflow processes that are critical to their success. As more organizations make greater use of the Internet, defending against network attacks becomes crucial for businesses. Productivity gains and returns on company investments are at risk if the network is not properly defended. Firewalls have emerged as the essential foundation component in any network security architecture. Cisco ASA and PIX Firewall Handbook is a guide for the most commonly implemented features of the popular Cisco Systems® firewall security solutions. This is the first book to cover the revolutionary Cisco ASA and PIX® version 7 security appliances. This book will help you quickly and easily configure, integrate, and manage the entire suite of Cisco® firewall products, including Cisco ASA, PIX version 7 and 6.3, the Cisco IOS router firewall, and the Catalyst Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Shaded thumbtabs mark each section for quick reference and each section provides information in a concise format, with background, configuration, and example...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A guide to successful deployment of the Cisco IP Telephony solution Real-world case studies from the Cisco design consulting engineers who developed the PDIOO process provide practical advice on all stages of successful IPT deployment Concise understanding of the PDIOO phases enables architects and engineers to successfully deploy the Cisco IPT solution Division of the process into PDIOO phases provides a logical and defined guide for network engineers and architects as they proceed through each of the phases in deploying the Cisco IPT solution Includes detailed questionnaires for each phase of deployment in the PDIOO cycle-a great aid in understanding customer networks and requirements Network infrastructure design, call processing infrastructure design and applications, and voice-mail system design are covered in depth Cisco® IP Telephony (IPT) solutions are being deployed at an accelerated rate, and network architects and engineers need to understand the various phases involved in successful deployment: planning, design, implementation, operation, and optimization (PDIOO). On the road to that understanding, those involved need to collect information for each phase of deployment, and then follow through with the best architecture, deployment model, and implementation based on the data collected. Cisco IP Telephony: Planning, Design, Implementation, Operation, and Optimization is a guide for network architects and engineers as they deploy the Cisco IPT solution. With this book, you will master the PDIOO phases of the IPT solution, beginning with the requirements necessary for effective planning of a large-scale IPT network. From there, you'll follow a step-by-step approach to choose the right architecture and deployment model. Real-world examples and explanations with technical details, design tips, network illustrations, and sample configurations illustrate each step in the process of planning, designing, implementing, operating, and optimizing a chosen architecture based on information you have collected. In-depth instruction on each PDIOO phase provides specific details about the tasks involved and best practices for successful implementation of the IPT solution. This book also contains predesigned questionnaires and PDIOO assistance tools that help you determine the requirements of each phase of the PDIOO cycle. Authors Ramesh Kaza and Salman Asadullah have been involved with Cisco IPT solutions from the beginning and have planned, design...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 820 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Examinations ; Study guides ; Telecommunications engineers ; Certification ; Study guides ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. In addition to acting as a key study aid for the CCSP SECUR 642-501 exam, this book will be an invaluable theory and configuration guide for years to come. CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a Cisco authorized, self-paced learning tool that helps you gain mastery over all security techniques and technologies, including newer topics such as Cisco Easy VPN and Security Device Manager (SDM). Chapter overviews bring you quickly up to speed on technologies you can use to secure your network. Configuration examples are designed to show you how to make Cisco IOS devices secure, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with Cisco IOS security or a study guide for the 642-501 exam, CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is the reference you are looking for. CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is part of a recommended learning path from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products fro...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 474 p. , ill. ; , 24 cm
    DDC: 004.6/2
    Keywords: Routers (Computer networks) ; Examinations ; Study guides ; Telecommunication ; Switching systems ; Examinations ; Study guides ; Electronic books ; local
    Abstract: Six comprehensive CCIE routing and switching labs to hone configuration and troubleshooting skills Prepare for the CCIE lab exams and hone your configuration and troubleshooting skills with six complete practice scenarios that cover: Frame Relay configuration 3550 switch configuration ATM PVC and SVC configuration IP routing protocol configuration, including RIPv2, EIGRP, OSPF, and IS-IS Route redistribution IBGP and EBGP configuration IP multicast Security IP and IOS features DLSw over Ethernet Voice over IP The CCIE program is designed to help individuals, companies, industries, and countries succeed in the networked world by distinguishing the top echelon of internetworking experts. CCIE candidates must not only demonstrate knowledge of a broad range of subject matter at an advanced level but also prove their ability to analyze complex problems and pose solutions in time critical settings. CCIE Routing and Switching Practice Labs provides a series of complete practice labs that mirror the difficult CCIE hands-on lab exam. Written by a CCIE program manager and a CCIE engineer, this book lays out six unique end-to-end scenarios that are both complex and realistic, providing you with the practice needed to prepare for your lab examination and develop critical-thinking skills that are essential for resolving complex, real-world routing and switching problems. CCIE Routing and Switching Practice Labs does not waste time covering conceptual knowledge found in other manuals but focuses exclusively on six complex scenarios. The structure of each chapter is the same, covering a broad range of topics. Each chapter starts with a set of pre-lab tasks and general guidelines that outline instructions for each exercise. This is followed by the timed practice exam questions. Each chapter then wraps up with an Ask the Proctor section that provides hints and clues to the solutions and a Lab Debrief, which analyzes the answer to each question. The companion CD-ROM contains solutions for all of the labs, including configurations and common show command output from all the devices in the topology. "This book possesses solid and practical guidance for anyone pounding away at the keyboard whether it is for the pursuit of the CCIE or the pursuit of the source of a real problem." -Kathe Saccenti, CCIE Product Manager, Cisco Systems, Inc. CCIE Routing and Switching Practice Labs is part of a customized learning path from Cisco Systems that includes simulation and ha...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Maximize the performance and availability of network applications and the network infrastructure with application performance management Understand how to identify applications critical to your business model Identify basic application characteristics and how they can be optimized for transmission Understand the principle of proactive planning in order to maintain the delivery criteria necessary for your business critical applications Improve service delivery and outsourcing decisions by utilizing meaningful SLAs Identify and solve network application performance problems, saving valuable time and money Includes real-world case studies that cover design and performance issues The astounding growth of computer networking in recent years has been characterized by the struggle of network managers to keep pace with the demand for network resources. As more and more users, running more and more applications, demand increased network bandwidth and performance, network managers find themselves adding expensive capacity in an effort to satisfy the needs of their customers. Yet networks remain congested, and applications continue to run slowly. Moreover, new aggressive applications, an ever expanding set of business stakeholders, and demands for greater reliability and security compound this struggle. Optimizing Applications on Cisco Networks takes a practical look at how application performance management can assist in the end-to-end application delivery model by proactively identifying hot spots within an organization. This book covers network dependent application delivery, with an emphasis on optimizing the underlying infrastructure, procedures, and methodologies to aid and measure delivery. The book also covers applications, delivery techniques, and QoS protocols. Use Optimizing Applications on Cisco Networks to identify and profile business critical applications, define and establish service-level criteria, and ensure that these system configurations are continually assessed to maintain the desired level of service. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 860 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Firewalls (Computer security) ; Examinations ; Study guides ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-521 foundation learning Gain proficiency with new features of PIX Firewall version 6.3, including OSPF, 802.1Q VLANs, NAT-T, and more Learn the ins and outs of the PIX product family and its complete feature set Use the PIX Device Manager (PDM) 3.0 to configure and manage the PIX Firewall Use advanced techniques to control traffic on your network using ACLs (access control lists), content filtering, and object groups Improve security using PIX Firewall attack guards, intrusion detection, and shunning features Learn about techniques and security considerations for configuring OSPF on PIX Firewall version 6.3 Configure scalable site-to-site and client remote access VPNs using the PIX Firewall version 6.3 Configure high-availability solutions using stateful and LAN-based failover techniques Use logical interfaces and 802.1Q trunks to scale your PIX Firewall implementation Master enterprise management and maintenance techniques using CiscoWorks Management Center for Firewalls 1.2 and Auto Update Server 1.1 Configure the PIX Firewall Services Module (FWSM) The use of firewalls-devices residing at the network perimeter to protect against intrusion-is an essential building block to even the most basic security program. Cisco Systems has continued the support and development of the PIX OS to provide networks top-notch security while maintaining compatibility with the latest standards and protocols. Now offered in many models, the PIX Firewall is perfectly suited to meet the requirements of small offices (501 model), medium to large businesses (506E, 515E, and 525 models), and large enterprise and service provider customers (525 and 535 models and the Firewall Services Module). CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA) , Second Edition, offers in-depth configuration and deployment information for this popular and versatile firewall solution. CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA) , Second Edition, teaches you the skills needed to configure and operate the PIX Firewall product family. Chapter overviews bring you quickly up to speed and help you get to work right away. Lab exercises and scenario-based solutions allow you to adapt configurations to your network for rapid implementation, helping you make the most of your PIX Firewall. Chapter-ending review questions test your knowledge. PIX Device Manager (PDM) configuration procedures are presented to complement extensive...
    Note: Includes bibliographical references (p. [837]-841) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 455 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 004.67/8
    Keywords: Electronic data processing personnel ; Certification ; Extranets (Computer networks) ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-511 foundation learning Understand the underlying principles of VPNs Learn about and identify proper implementation of remote access and site-to-site VPNs Identify the features, functions, and benefits of the Cisco VPN 3000 Concentrator Series Configure and test a remote access VPN using preshared keys on the Cisco VPN 3000 Concentrator Work with the RIP and OSPF dynamic routing protocols Gain proficiency with the VPN Client Firewall Apply digital certificates on the Cisco VPN 3000 Concentrator Use the Cisco 3002 Hardware Client to configure and test a remote access VPN Implement advanced VPN client features such as load balancing, reverse route injection, and the appropriate use of backup servers Configure LAN-to-LAN VPNs on the Cisco 3000 Concentrator Offer granular user-level security with user and unit authentication Learn how to use VPN through NAT and resolve real-world implementation challenges Provide a sound level of support and administration skills for day-to-day management of a VPN 3000 Concentrator-based VPN by utilizing the tools resident in the Concentrator CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN) , Second Edition, is a complete reference for professionals who intend to work with virtual private networks (VPNs) using IPSec. It includes detailed coverage of the VPN 3000 Concentrator, a scalable remote access platform that offers encryption, high availability, and superior performance. In addition to acting as a valuable study aid for the CCSP CSVPN 642-511 exam, this book is an invaluable theory and configuration guide for the VPN 3000 series of products, with its thorough coverage of concentrators, hardware clients, and software clients. CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over all techniques and technologies related to Cisco Systems VPN products. Chapter overviews bring you quickly up to speed and prepare you to get to work on securing your network. Detailed configuration examples allow you to take advantage of Cisco VPN products in no time. Unique chapter-ending review questions reinforce key concepts and test your knowledge. Whether you are seeking a reference guide to plan, administer, and maintain a VPN based upon the Cisco VPN 3000 Concentrator or are looking for a study guide for the 642-511 exam, CCSP Self-Study: Cisco Secure Virtual P...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 828 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. The Cisco Intrusion Detection Sensors and Management options work as a united system to provide detection, notification, and aggressive lockdown to malicious network breaches. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS), Second Edition , offers in-depth configuration and deployment information for the reliable and intensive intrusion detection solutions from Cisco Systems. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over the use of both the host-based and network-based IDS options (as well as the Cisco Threat Response functionality) by presenting a consolidated all-inclusive reference on all of the current Cisco IDS sensor platforms and management platforms. Chapter overviews bring you quickly up to speed and help you get to work right away. Configuration examples are designed to show you how to make the most of your IDS system, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with the CIDS sensor and management platforms or a study guide for the 642-531 exam, CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, supports your effective use of the Cisco IDS. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, an...
    Note: Includes index. - Rev. ed. of: Cisco secure intrusion detection system. c2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM. Design and implement effective network solutions by mastering the design process that is used by successful networking professionals Understand the diversity of solutions for the SMB environment, avoiding the pitfalls of the one-size-fits-all approach Create effective and customizable security solutions across the spectrum of SMB types and sizes Exploit the trend of universal communications convergence by expanding into the VoIP market with the Cisco IP Telephony and unified communication solutions Break into the fast-growing CRM marketplace with the Cisco CRM integration solutions Implement wireless LAN solutions that facilitate productivity and workforce optimization In today's business world, investing in technology solutions that improve productivity and save money is critical, but the road to a modern, technology-driven business is full of pitfalls. Cisco Network Design Solutions for Small-Medium Businesses zeros in on critical solutions for networking professionals who are deploying computer networks within a small-medium business (SMB). You'll learn about core networking issues and associated solutions, including security, IP telephony, unified communications, customer relations management (CRM), wireless LANs, and more within this complete design guide. Cisco Network Design Solutions for Small-Medium Businesses is separated into two parts. Part I helps you explore the network design process, survey the SMB landscape, and identify your network requirements from the edge to the core for an effective solution implementation. Part II delves into security, CRM, IP telephony, unified messaging, IP/TV, and wireless LAN solutions, which can save businesses critical time and money. For networking professionals, Cisco Network Design Solutions for Small-Medium Businesses is a one-stop reference and design guide for the effective implementation of SMB networking solutions that enhance the bottom-line. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 292 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    DDC: 004.67
    Keywords: Computer networks ; Management ; Network performance (Telecommunication) ; Electronic books ; local
    Abstract: Learn about the technologies that drive fast broadband access in the first mile and master the design of first mile access networks Understand the motivating forces behind first mile access networks and learn about the technology and business requirements for first mile access solutions Master the design of passive optical networks (PON) Build EPON solutions and differentiate them from BPON and GPON Enhance bandwidth capacity in the access area using CWDM technology Learn about and design DSL and power-line communication (PLC) networks Discover the use of WiFi in the first mile and study the subsystems involved in a WiFi solution Learn the importance of management in first mile access networks and create a business case for diverse first mile access networks First Mile Access Networks and Enabling Technologies provides a platform for showcasing first mile access technologies and associated network solutions. Using this book, you learn about the bandwidth bottleneck within the first mile and explore the resulting business prospects. Benefit from a thorough and thoughtful discussion of the business case for the first mile, which helps you approach the issue from multiple perspectives. Examine multiple access technologies, understand the diversity of solutions within this area, and take your solutions further using sound and unique management techniques. Utilize the solid and tested implementation method provided by this book to remove networking anomalies, such as the digital divide. This book helps you understand and capitalize on the market opportunity presented by the first mile. First Mile Access Networks and Enabling Technologies covers multiple technologies, protocols, and business methods and can be used to understand the growth of first mile access networks and resulting business opportunities. This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 517 p. , ill. ; , 24 cm. +
    DDC: 004.6
    Keywords: Computer networks ; Security measures ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Internetworking (Telecommunication) ; Examinations ; Study guides ; Electronic books ; local
    Abstract: Seven comprehensive CCIE security labs to hone configuration and troubleshooting skills Prepare for the CCIE Security lab exam and hone your security configuration and troubleshooting skills with seven complete practice scenarios that cover: Basic device configuration Routing configuration ISDN configuration Cisco PIX Firewall configuration VPN configuration, including IPSec, GRE, L2TP, and PPTP VPN-3000 Concentrator configuration Intrusion Detection System (IDS) 42xx Appliance configuration Cisco IOS Firewall configuration AAA configuration Advanced security issues IP services and protocol-independent features Security violations The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. Today's network administrators and managers are under big pressure to satisfy ever-increasing demands from customers, suppliers, and employees for 100 percent network resource availability and access to applications and data. The end result is that the cost of a network security breach has never been higher. Accordingly, the demand for networking professionals with expert-level network security configuration and troubleshooting skills is also great. The Cisco Systems CCIE Security certification is a prestigious program that sets the professional benchmark for internetworking expertise, validating proficiency with advanced technical skills required to design, configure, and maintain a wide range of network security technologies. CCIE Security Practice Labs provides a series of complete practice labs that mirror the difficult hands-on lab exam. Written by a CCIE Security engineer and Cisco Systems CCIE proctor, this book lays out seven end-to-end scenarios that are both complex and realistic, providing you with the practice needed to prepare for your lab examination and develop critical-thinking skills that are essential for resolving complex, real-world security problems. While many engineers are able to configure single technologies in standalone environments, most will struggle when dealing with integrated technologies in heterogeneous environments. CCIE Security Practice Labs consists of seven full-blown labs. The book does not waste time covering conceptual knowledge found in other security manuals, but focuses exclusively on these complex scenarios. The structure of each chapter is the same, covering a broad range of sec...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Hands-on techniques for enabling authentication, authorization, and accounting Understand the security concepts behind the AAA framework Learn message formats, communication, and message encryption using the TACACS+ and RADIUS protocols Configure and troubleshoot AAA on Cisco routers Understand where to position and install the CSACS in your network Explore and customize the CSACS interface Configure CSACS user accounts, user groups, and shared profile components Add AAA clients and manage network connections Configure external databases and perform database replication and backup Explore the various reports and logs available in CSACS Learn how AAA models apply to service provider environments Install and configure Cisco Access Registrar As network infrastructures evolve, it is increasingly important that access to vital corporate resources is vigilantly monitored and controlled. The Cisco identity management solutions, including Cisco Secure Access Control Server (CSACS), address this requirement, enabling security, control, and administration of the growing population of users that connect to corporate networks. CSACS, an essential component of the Cisco Identity Based Networking Services (IBNS) architecture, extends access security by combining authentication, user and administrator access, and policy control from a centralized identity-networking framework. This allows greater flexibility and mobility, increased security, and user productivity gains. Cisco Access Control Security provides you with the skills needed to configure authentication, authorization, and accounting (AAA) services on Cisco devices. Separated into three parts, this book presents hard-to-find configuration details of centralized identity networking solutions. Part I provides an overview of the AAA architecture, complete with discussions of configuring Cisco routers for AAA. Part II addresses enterprise AAA management with CSACS, including installation, configuration, and management details. Part III looks at service provider AAA management with Cisco Access Registrar. Full of detailed overviews, diagrams, and step-by-step instructions for enabling essential access control solutions, Cisco Access Control Security is a practical tool that can help enforce assigned access policies and simplify user management. "This book manages the rare combination of being highly accurate and technically astute, while maintaining an easy readability and flow. It is a great guide for s...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 498 p. , ill. ; , 24 cm
    Keywords: Fiber optics ; Handbooks, manuals, etc ; Fiber optics ; Metropolitan area networks (Computer networks) ; Optical communications ; Handbooks, manuals, etc ; Optical communications ; Electronic books ; local
    Abstract: Plan, design, and configure high-speed fiber-optic networks Coverage includes: Configuring ONS 15454 and ONS 15327 platforms Architecture for building Metropolitan Ethernet Transparent LAN Services (TLS) Packet over SONET (PoS) network design, configuration, and verification Inner workings of dense wavelength division multiplexing (DWDM), including operability with the ONS 15216 product family Principles of Dynamic Packet Transport (DPT) SONET background, including structures, components, and network design Bonus case studies, which challenge you to select equipment and design a metro optical network Fiber-optic networking has several significant advantages over traditional wired and wireless networks: optical signals can travel much farther than electrical signals, are more secure, are resistant to electromagnetic interference, and have the potential to provide bandwidth in the terabits per second range (1000 Gbps). Service providers must satisfy the always-increasing networking demands of customers while keeping costs to a minimum. Optical networks must meet the challenge of supporting multiple types of transmissions including voice, video, and data traffic. Although time-division multiplexing (TDM) has provided a growth path for services, it is more constrained than IP + Optical strategies like the Cisco Dynamic Packet Transport (Resilient Packet Ring). The Cisco Systems® end-to-end IP + Optical networking strategy provides an intelligent converged network in which optical infrastructures can be used to their fullest potential. While most reference books focus on the theory involved in SONET and optical infrastructures, Cisco Self-Study: Building Cisco Metro Optical Networks (METRO) focuses on the practical application of planning and configuring optical networks that involve SONET, DWDM, Metropolitan Ethernet, Packet over SONET, and Dynamic Packet Transport (Resilient Packet Ring). Cisco Self-Study: Building Cisco Metro Optical Networks (METRO) is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. This volume is in the Certification Self-Study Series offered by Cisco Press. Books in this series provide officially deve...
    Note: "Plan, design, and configure high-speed fiber-optic networks"--Cover. - Includes bibliographical references (p. 483) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "Whether you're a Techie, Architect, or a Project Manager, this masterpiece of tricks and traps will help you plan, test, and implement your Citrix environment." -Chris Walter, Senior Consultant, CGI "Whether you are a terminal services veteran or entirely new to the world of remote desktop, Mathers makes it easy to understand everything from the initial Terminal Services project planning to the complete network and management implementation. This book is definitely something a Terminal Services administrator is going to want to have handy." -Matthew Harris, Microsoft Windows Server MVP - Terminal Server This book brings together all the insights, knowledge, and step-by-step guidance you need to deliver robust, scalable, and stable server-based computing solutions with Microsoft Windows Terminal Services and Citrix MetaFrame Presentation Server 3.0. Building on two best-selling previous editions, expert consultant Todd W. Mathers has fully updated this book to cover both Windows Server 2003 and Windows 2000 Server environments. Drawing on nearly a decade of experience, Mathers addresses the entire project lifecycle, from needs assessment through planning, testing, deployment, and support. He covers the full spectrum of deployments, from Terminal Services for small businesses through enterprise-class Terminal Services/Citrix server farms. Along the way, Mathers presents proven examples and best practices for virtually every challenge, from server security to group policies, patch management to automated client deployment. Coverage includes Terminal Services and Citrix MetaFrame: how they relate, and how to determine what you need Common implementation traps and "gotchas"-and how to avoid them Planning client hardware/software, server hardware, networking, hotfix distribution, and more Step-by-step installation, including service-pack integration and answer files Detailed checklists and tuning techniques for optimizing performance and stability New Windows Server 2003 licensing requirements: overcoming the misinterpretations Expanded coverage of security in both Terminal Services and Citrix environments New and improved solutions for client drive and printer mapping Interoperability between MetaFrame 1.8 and MetaFrame Presentation Server 3.0 User profile and account creation, configuration, and management RDP and ICA client configuration, in detail Application compatibility: using Terminal Services' application support features Using Session Dir...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: Novell ZENworks 6.5 is a comprehensive set of integrated tools that automate IT management and business processes across the lifecycle of desktops, laptops, servers and handhelds across diverse server and client platforms. The Novell ZENworks 6.5 Suite Administrator's Handbook is a solid reference guide to all the new features of ZENworks 6.5. It includes descriptions of all the ZENworks 6.5 components, as well as the new features from the merged products. Packed with detailed information on how to install, efficiently use and troubleshoot ZENworks 6.5 in an enterprise environment, Novell ZENworks 6.5 Suite Administrator's Handbook is sure to be the only guide you need to maximize your ZENworks 6.5 experience.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Do you find yourself singing in the shower, pretending your shampoo bottle is your microphone and your towel is your guitar? Do you tap out drum rhythms with your pen at work? Now you can channel your musical energy using The MacAddict Guide to Making Music with GarageBand , the Mac software program that can turn you into a virtual recording star. MacAddict's focused, no-olds-barred approach is evident in this musical tutorial. Learn about pre-recorded loops that enable you to sound like you're singing with a symphony orchestra even if you can't actually play a single instrument. Or, if you are instrumentally-inclined, you will also learn how to hook up your instruments to record your own sound and later use GarageBand to edit and mix it for truly professional results. MacAddict is the authoritative voice in the Mac community and The MacAddict Guide to Making Music with GarageBand is the only book they endorse. It is sure to become the only book you'll need to learn how to unleash your inner rock star.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: Expanding Choice: Moving to Linux and Open Source with Novell Open Enterprise Server is a concise, authoritative guide for IT professionals to help evaluate and implement Novell's open source technologies. You will be able to understand and assess the advantages of open source technologies through the discussion of specific, customer-tested implementation strategies for both open source and traditional software. You will also review the benefits and costs of both open source and closed source software systems. Find out how Novell's new Open Enterprise Server combines the choice and flexibility of SUSE Linux with the reliability of Novell's proven networking software in Expanding Choice: Moving to Linux and Open Source with Novell Open Enterprise Server .
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Indianapolis, IN : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xiv, 490 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/32
    Keywords: Linux ; Electronic data processing personnel ; Certification ; Operating systems (Computers) ; Certification ; Study guides ; Electronic books ; local
    Abstract: This official Novell Press Study Guide is your key to reviewing the fundamentals of installing, running, and administering SUSE LINUX so that you can pass Novell Practicum: 050-069, Novell's Certified Linux Professional exam, and become a Novell CLP. Expert trainer and curriculum developer Emmett Dulaney brings you the practical knowledge, tested techniques, real-world scenarios, and hands-on lab exercises you need to help you get the CLP certification from Novell.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xi, 705 p. , ill. ; , 23 cm. +
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Join an estimated 85% of the U.S. Linux market in using Red Hat's Linux distributions by learning it from a Fedora authority. Sams Teach Yourself Red Hat Fedora 4 All in One is a starter kit that will help you install, configure, and use Red Hat's Fedora 4 distribution and desktop applications. The easy-to-understand, step-by-step instructions will also show you how to: Use the OpenOffice.org productivity suite and other leading applications. Troubleshoot hardware issues and install new components. Set up a small Linux-based network to share files and resources. Also included is a DVD, which will provide you with the complete Fedora Core Linux distribution, OpenOffice.org desktop suite, and the leading applications for e-mail, Web browsing, and graphics. Find out how you can safely and reliably use Linux and Linux-based applications to accomplish your day-to-day work in the office and at home with Sams Teach Yourself Red Hat Fedora 4 All in One .
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Indianapolis, IN : SAMS | Boston, MA :Safari,
    Language: English
    Pages: ix, 317 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Why should new versions of mission-critical technologies mean starting from scratch? If you already know how to use Microsoft Windows Server 2000 or NT, leverage those skills to quickly become an expert on Microsoft Windows Server 2003. Microsoft Windows Server 2003 Delta Guide skips the basics and moves straight to what's new and what has changed. The result? You save time and money while preparing yourself for the next generation of Microsoft Server! Skip the basic concepts and move straight to what's new and different. Focus on learning advanced new technologies, techniques, and concepts. Use topic-focused chapters to quickly upgrade the skills you use the most. See important security changes that can affect server upgrades. Master new techniques for installing, administering, and securing servers. Build headless servers using Emergency Management Services. Take advantage of powerful new Group Policy capabilities.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Language: English
    Pages: xiv, 378 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Web services ; Web sites ; Security measures ; Electronic books ; local
    Abstract: Comprehensive coverage is given in this up-to-date and practical guide to Web services security--the first to cover the final release of new standards SAML 1.1 and WS-Security. Rosenberg and Remy are security experts who co-founded GeoTrust, the #2 Web site certificate authority.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxii, 1094 p. , ill. (some col.) ; , 23 cm. +
    DDC: 006.6/86
    Keywords: Adobe Photoshop ; Computer graphics ; Electronic books ; local
    Abstract: Gary Bouton has made Inside Photoshop CS a perennial best-seller due to the loyalty of his audience. A lot of people simply love the way Gary explains what Photoshop is all about. In this revised edition, Gary truly puts the outsider "inside", demystifying such intangibles as pixels, color wheel, resolution, line screens, and more of vital information for the hobbyists and professional. He covers all the new features and adds expert tips and tricks for the digital photographer. Critics and readers alike have noted that Bouton's writing style makes difficult, technical topics easy to understand -- as if they were being guided by a close friend or mentor.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 343 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 332.178
    Keywords: PayPal (Firm) ; Electronic commerce ; Electronic funds transfers ; Electronic books ; local
    Abstract: If you've bought or sold items through eBay, or through hundreds of other online sites, then you're familiar with PayPal, the online payment service. With PayPal, a valid email address, and a credit card or bank account, you can easily send and receive payments online. Not a bank or financial institution itself, PayPal describes its service as one that builds on the financial infrastructure of bank accounts and credit cards, and using advanced propriety fraud prevention systems, creates a safe, global, real-time payment solution. Put simply, PayPal provides the means for people to conduct financial transactions online, instantly and securely.But there's more to PayPal than meets the eye. PayPal Hacks shows you how to make the most of PayPal to get the most out of your online business or transactions. Authors Shannon Sofield of Payloadz.com and PayPal evangelist David Nielsen guide you through the rigors of using and developing with PayPal. Whether you're building an ecommerce site using PayPal as a transaction provider, or simply trying to pay for an eBay auction without getting burned, PayPal Hacks will give you the skinny on this leading global online payment service.The collection of tips and tricks in PayPal Hacks shows you how to find or even build the right tools for using PayPal to buy and sell on eBay or as a transaction provider for ecommerce on your own site. Written for all PayPal users, from those just starting out to those developing sophisticated ecommerce sites, this book begins with the basics such as setting up your account, then moves quickly into specific tips and tools for buyers, sellers, and developers.With PayPal Hacks, you can: Learn extra steps to help protect yourself while buying or selling on eBay Save time and money with advanced tips and undocumented features Learn dozens of easy-to-follow procedures to help you request and receive payments and fill orders Use PayPal to handle subscriptions, affiliate systems, and donations Create and customize your customers' checkout process Effortlessly integrate PayPal's shopping cart system into your own website Implement digital fulfillment with Instant Payment Notification (IPN) and Payment Data Transfer (PDT) Develop and distribute ecommerce applications with the PayPal API Each hack consists of a task to be accomplished or a creative solution to a problem, presented in a clear, logical, and task-oriented format. PayPal Hacks provides the tools and details necessary to ma...
    Note: "100 industrial-strength tips & tools"--Cover. - Includes bibliographical references (p. xx-xxi) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xi, 279 p. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.13/3
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Distilling many years of Perl experience--including an insiders look at Perl development (the authors are members of the Perl 6 core development team)-- Perl 6 and Parrot Essentials , 2nd Edition is an unparalleled preview of major changes in the widely-anticipated Perl 6. This sneak peek of what's coming in Perl includes succinct but thorough coverage of groundbreaking new developments in Parrot--the language-independent interpreter engine that will execute code written in the new Perl 6 language. Designed to be language independent, Parrot can be used to interpret other dynamic languages such as Python, Tcl, Ruby, and even Java. Perl 6 and Parrot Essentials also uncovers the most revolutionary change in the language itself--Apocalypse 12 on objects. The Apocalypse design documents (in the sense of "revealing", not "end-of-the-world") explain significant changes in new Perl 6 features, numbered according to the chapters in O'Reilly's landmark Camel book , Programming Perl . Apocalypse 12 is the result of cutting-edge research in object-oriented languages and is guaranteed to grab the attention of any serious Perl programmer. Perl 6 and Parrot Essentials also includes expanded coverage of Apocalypse 5 (regular expressions) and Apocalypse 6 (subroutines). Perl 6 and Parrot Essentials is the only book available to chart the course of the long but fruitful voyage of Perl 6. It reveals all the ingenious developments that will make Perl 6 more powerful and easier to use. Perl gurus and programmers alike will rely on this slim but essential book for both a clear view of the Perl horizon and to ensure they hit the ground running once this important new version of Perl is released.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xiii, 246 p. , ill. ; , 25 cm
    DDC: 621.3984
    Keywords: Computer input-output equipment ; Maintenance and repair ; Handbooks, manuals, etc ; Microcomputers ; Equipment and supplies ; Maintenance and repair ; Handbooks, manuals, etc ; Microcomputers ; Maintenance and repair ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Operating a personal computer requires more than just dealing with the PC itself. As anyone with even a modicum of computer experience can attest, there are all types of hardware devices which you must become familiar with disk drives, printers, monitors, and sound cards, just to name a few. And, naturally, each is fraught with its own set of bugs and snares. PC Hardware Annoyances , the latest installment of O'Reilly's highly successful Annoyances series, aims to optimize these peripheral systems by offering easy fixes to their most annoying traits. With over 40 titles to his credit, author Stephen Bigelow identifies all those annoyances that make you cringe in frustration. Then, through the use of snappy, entertaining, and practical solutions, he shows you how to clear each obstacle one step at a time. After that, the rest is up to you. Designed for PC users of all levels, this handy guide doesn't bore you with long dissertations on the workings of the technology at hand. Instead, it offers straightforward, easy-to-understand troubleshooting solutions. For maximum ease of use, PC Hardware Annoyances is broken up into several broad hardware categories. They include desktops, laptops and PDAs, graphics, sound, hard drives, CD/DVD drives, network, and printers and scanners. And while you may not use each of these accessories currently, chances are it's only a matter of time before you'll need their technological services whether it's for work or recreation. What makes PC Hardware Annoyances especially timely is the growing trend among computer owners to simply upgrade their PCs as they age, rather than replacing them altogether. With peripheral devices becoming increasingly affordable, there's no reason not to. But as with any do-it-yourself project, trouble lurks around the corner if you don't have the right guide. Having difficulty setting up your color inkjet printer? Trying to burn a music CD? Is your modem misbehaving? The remedy: PC Hardware Annoyances , of course!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 343 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: You've probably heard the buzz about Eclipse, the powerful open source platform that gives Java developers a new way to approach development projects. It's like a shiny new car--no longer content to just admire Eclipse, you're now itching to get in and drive. Eclipse is to Java developers what Visual Studio is to .NET developers--it's an integrated development environment (IDE) that combines a code editor, compiler, debugger, text editor, graphical user interface (GUI) builder, and other components into a single, user-friendly application. It provides a solid foundation that enables Java developers to construct and run integrated software-development tools for web development, application design, modeling, performance, testing, and much more. As with any extensive programming tool, however, there's a lot to learn. And there s no better guy than well-known Java expert Steve Holzner to teach you. An award-winning and best-selling author who has been writing about Java topics since the language first appeared, Holzner delivers just the kind of targeted, practical, everyday knowledge you need to hone your mastery of Eclipse. Perfect as a companion to an Eclipse programming tutorial (such as Holzner's own Eclipse , O'Reilly, April 2004) or an ideal stand-alone for all those developers who either don't want or don't need the tutorial approach, the Eclipse Cookbook contains task-oriented recipes for more than 800 situations you may encounter while using this new Java platform--from deploying a web application automatically to reverse engineering compiled code, from re-naming all references to a class across multiple packages to initializing the SWT JNI libraries. Each recipe in the ever-popular and utterly practical problem-solution-discussion format for O'Reilly cookbooks contains a clear and thorough description of the problem, a brief but complete discussion of a solution, and in-action examples illustrating that solution. The Eclipse Cookbook will satiate Java programmers at all levels who are ready to go beyond tutorials--far beyond writing plug-ins and extensions--and actually use the powerful and convenient Eclipse day to day.
    Note: "Covers Eclipse 3.0"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 236 p. , ill. ; , 25 cm. +
    DDC: 006.7'86
    Keywords: Flash (Computer file) ; Handbooks, manuals, etc ; Computer animation ; Handbooks, manuals, etc ; Web sites ; Design ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: If you believe the sky really is the limit when it comes to creating unparalleled user experiences and applications for the Web--then Macromedia Flash MX is sure to be your tool of choice. With Flash, you can integrate video, text, audio, and graphics into distinctive and compelling web content, stunningly interactive and expressive user interfaces, and rich applications for the Internet.Flash is all about helping you dramatically enhance the user experience. And Flash Out of the Box is all about helping you think outside of the box to get there--first, by diving into the Flash box and then becoming intimately acquainted with every nook and cranny of it.In Flash Out of the Box , you'll follow and work with a simple box through a "day in the life" style journey. You'll study, use, abuse, and transform the box as you move through exercises that teach you the basics of Flash, and much more, in an entertaining, unforgettable, task-oriented fashion. You'll learn to animate, work with video, load external assets, draw, mask, modularize, and many other things that will be essential as you move into more advanced techniques with other books. It's just you, Flash, and the box, mastering each technique along the way and adding others in a fashion that will let you practice and learn simultaneously.Most Flash tutorials you've looked at are tool-centric, focusing on Flash's individual features and how to use them (an approach that can quickly become tedious), whereas this innovative, engaging, and motivating book is uniquely user-centric. That means it concentrates on you and what you want and need to learn. Each successive lesson anticipates and builds upon your needs, capabilities, and questions as you evolve from Flash beginner to Flash master.Written in a fun and conversational tone, the highly accessible Flash Out of the Box makes learning Flash MX 2004 intuitive, logical, and, most of all, fun.
    Note: "A user-centric introduction to Flash MX 2004"--Pref. - "Contains exercises from the book and trial versions of Macromedia software, including Flash, Dreamweaver, and Fireworks"--CD-ROM. - "Learn a lot, learn it fast, create your project now"--Cover. - CD-ROM inside back cover. - Includes bibliographical references (p. 217-218) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 409 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.7/1376
    Keywords: Internet Relay Chat ; Electronic books ; local
    Abstract: IRC (Internet Relay Chat) may very well turn out to be the world's most successful hack. In 1988, Jarkko Oikarinen wrote the original IRC program at the University of Oulu, Finland. As he says in his foreword, "IRC started as one summer trainee's programming exercise. A hack grew into a software development project that hundreds of people participated in, and then became a worldwide environment where tens of thousands of people now spend time with each other. I have found many of my friends through IRC and learnt a significant part of my present software engineering knowledge while using and working with IRC. That would not have been possible without learning from code examples and hacks from others".IRC has continued to grow in popularity since its inception. Millions of people from all over the world now use IRC to chat with friends, discuss projects and collaborate on research. With a simple, clearly defined protocol, IRC has become one of the most accessible chat environments, with clients written for a multitude of operating systems. And IRC is more than just a simple chat system it is a network of intercommunicating servers, allowing thousands of clients to connect from anywhere in the world using the IRC protocol.While IRC is easy to get into and many people are happy to use it without being aware of what's happening under the hood, there are those who hunger for more knowledge, and this book is for them. IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net).Like all of our Hacks books, there are many different ways to use IRC Hacks . You can read the book from cover to cover, but you might be better served by picking an interesting item from the table of contents and just diving in.If you're relatively new to IRC, you should considering starting with a few hacks from each progressive chapter. Chapter 1 starts you off by showing you how to connect to IRC, while Chapter 2 acquaints you with the everyday concepts you'll need to use IRC effectively. Chapter 3 is all about users and channels, and introduces the first pieces of code. Chapter 4 shows you how to make useful enhancements to IRC clients.Chapter 5 is where you will learn the basics about creating IRC bots, with Chapters 6-...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 427 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.4/32
    Keywords: Berkeley BSD (Computer file) ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun."Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks , the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools--and even fun--for administrators and power users of BSD systems. BSD Hacks takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command.The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas: Customizing the User Environment Dealing with Files and Filesystems The Boot and Login Environments Backing Up Networking Hacks Securing the System Going Beyond the Basics Keeping Up-to-Date Grokking BSD If you want more than your average BSD user--you want to explore and experiment, unearth shortcuts, create useful tools, and come up with fun things to try on your own-- BSD Hacks is a must-have. This book will turn regular users into power users and system administrators into super system administrators.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 426 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Microsoft Windows server ; Security measures ; Handbooks, manuals, etc ; Computer networks ; Security measures ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: With the success of computer viruses like Slammer, security issues are now a top priority for Windows system administrators, right alongside day-to-day tasks such as setting up accounts and managing performance. If you use Windows 2003 Server at a small to medium-sized organization, or use Microsoft's Small Business Server, this thorough yet concise tutorial offers the hands-on advice you need for securing your network. Modern network operating systems include bundled services that range from traditional file and print sharing and Internet services to authentication, directory and remote access services each a potential security vulnerability as well as a capability. Securing Windows Server 2003 shows you how to put Windows security tools to work, and how to run the server's subsystems to protect users and resources. But that's just the beginning. Network security needs to be well thought-out, not treated as a fire drill when a threat occurs. This book focuses primarily on ways to plan and implement a secure operating environment. Microsoft security veteran Mike Danseglio uses real-world examples to show you how various security concepts relate to your own system, including: File System Security Group Policy and security templates Running secure code Authentication IP security Public Key Certificates and Public Key Infrastructure Smart Card technology DHCP and DNS security Internet Information Services security Active Directory security Remote access security Security audits Sending secure email, and more Many chapters include a debate, in which fictional protagonists discuss the pros and cons of a particular strategy or solution. These debates provide an objective look at competing methodologies, so you can select the solutions that best fit your network. Read this book cover to cover to create and implement a security plan, or use individual chapters as stand-alone lessons. Either way, Securing Windows Server 2003 will guide you safely through the morass of security threats.
    Note: "Hands-on advice for securing and implementing Windows server 2003"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 483 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 332.63/22/02854678
    Keywords: Electronic trading of securities ; Finance, Personal ; Investments ; Computer network resources ; Electronic books ; local
    Abstract: For the geek who's an investor, and the investor who's a geek, we present Online Investing Hacks , 100 industrial-strength, bleeding edge tips, tools and techniques for analyzing and managing online portfolios.Individual investors have become more computer-literate and technology-dependent than ever before. Whether you're looking for suitable investments, studying alternatives, or managing your portfolios, you need data. The Internet can be a goldmine of financial data and research, but today's online investors also use spreadsheets, databases, and financial applications to select, study and manage investments. If your proficiency has grown to the point where you crave industrial-strength tips and tools to turbo-charge your efforts, this is the book for you. Online Investing Hacks covers: Screening Investments Collecting Data Fundamental Analysis Technical Analysis Executing Trades Investing in Mutual Funds Portfolio Management Updating Stock Data Financial Planning Other books for managing online investing are either out of date, are for beginners and don't go beyond the most basic advice, or are so dull and boring they squeeze that last bit of fun out of the topic. Online Investing Hacks is for the customer who wants to know the latest techniques, to go beyond the basics, who gets jazzed by cool online tools and services, and who actually wants to have a bit of fun while trying to strike it rich (or at least not lose their shirt).
    Note: "100 industrial-strength tips & tools"--cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 247 p. , ill. ; , 25 cm
    Edition: 1st ed.
    DDC: 004.22
    Keywords: Computer architecture ; Web services ; XML (Document markup language) ; Electronic books ; local
    Abstract: Large IT organizations increasingly face the challenge of integrating various web services, applications, and other technologies into a single network. The solution to finding a meaningful large-scale architecture that is capable of spanning a global enterprise appears to have been met in ESB, or Enterprise Service Bus. Rather than conform to the hub-and-spoke architecture of traditional enterprise application integration products, ESB provides a highly distributed approach to integration, with unique capabilities that allow individual departments or business units to build out their integration projects in incremental, digestible chunks, maintaining their own local control and autonomy, while still being able to connect together each integration project into a larger, more global integration fabric, or grid. Enterprise Service Bus offers a thorough introduction and overview for systems architects, system integrators, technical project leads, and CTO/CIO level managers who need to understand, assess, and evaluate this new approach. Written by Dave Chappell, one of the best known and authoritative voices in the field of enterprise middleware and standards-based integration, the book drills down into the technical details of the major components of ESB, showing how it can utilize an event-driven SOA to bring a variety of enterprise applications and services built on J2EE, .NET, C/C++, and other legacy environments into the reach of the everyday IT professional.With Enterprise Service Bus , readers become well versed in the problems faced by IT organizations today, gaining an understanding of how current technology deficiencies impact business issues. Through the study of real-world use cases and integration patterns drawn from several industries using ESB--including Telcos, financial services, retail, B2B exchanges, energy, manufacturing, and more--the book clearly and coherently outlines the benefits of moving toward this integration strategy. The book also compares ESB to other integration architectures, contrasting their inherent strengths and limitations.If you are charged with understanding, assessing, or implementing an integration architecture, Enterprise Service Bus will provide the straightforward information you need to draw your conclusions about this important disruptive technology.
    Note: Includes bibliographical references (p. 235-238) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 243 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Java (Computer program language) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Sometimes the simplest answer is the best. Many Enterprise Java developers, accustomed to dealing with Java's spiraling complexity, have fallen into the habit of choosing overly complicated solutions to problems when simpler options are available. Building server applications with "heavyweight" Java-based architectures, such as WebLogic, JBoss, and WebSphere, can be costly and cumbersome. When you've reached the point where you spend more time writing code to support your chosen framework than to solve your actual problems, it's time to think in terms of simplicity.In Better, Faster, Lighter Java , authors Bruce Tate and Justin Gehtland argue that the old heavyweight architectures are unwieldy, complicated, and contribute to slow and buggy application code. As an alternative means for building better applications, the authors present two "lightweight" open source architectures: Hibernate--a persistence framework that does its job with a minimal API and gets out of the way, and Spring--a container that's not invasive, heavy or complicated.Hibernate and Spring are designed to be fairly simple to learn and use, and place reasonable demands on system resources. Better, Faster, Lighter Java shows you how they can help you create enterprise applications that are easier to maintain, write, and debug, and are ultimately much faster.Written for intermediate to advanced Java developers, Better, Faster, Lighter Java , offers fresh ideas--often unorthodox--to help you rethink the way you work, and techniques and principles you'll use to build simpler applications. You'll learn to spend more time on what's important. When you're finished with this book, you'll find that your Java is better, faster, and lighter than ever before.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Sebastopol, CA : Pogue Press/O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: x, 349 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 006.5
    Keywords: iTunes ; iPod (Digital music player) ; Electronic books ; local
    Abstract: The iPod is the world's bestselling music player. But if you think that it's just a music player, then you must think Clark Kent is just a newspaperman. In this freshly updated edition, New York Times tech columnist J. D. Biersdorfer blows open the secret doors of this gleaming, chrome-and-white beauty. With humor and authority, she lays bare an astonishing collection of useful tips, tricks, and shortcuts like these: iPod as PalmPilot . The iPod can suck in your calendar, address book, to-do list, and notes from a Mac or PC, and then display them at the touch of a button. It also doubles as an alarm clock and stopwatch. iPod as hard drive . You can use your iPod to carry gigantic files from place to place. iPod as e-book . The iPod makes an excellent book reader, capable of scrolling through recipes, driving directions, and even Web pages. iPod as GameBoy . The iPod's games are perfect time-killers for waiting rooms, bus rides, and the Department of Motor Vehicles. iPod & iTunes: The Missing Manual , 2nd Edition is much more than it seems, too. It not only covers all iPod models for both Mac and Windows, including the iPod Mini, it's also the ultimate guide to the iTunes software, MusicMatch Jukebox, and the new iTunes Music Store for both Mac and Windows. No matter what kind of music moves you, iPod & iTunes: The Missing Manual , 2nd Edition will help you get much more out of your iPod--and much more into it.
    Note: "Covers iTunes Music Store (Mac & PC) and the iPod Mini"--Cover. - "Juiciest secrets of Apple's pocket virtuoso"--Cover. - Includes index. - Rev. ed. of: iPod : the missing manual / J.D. Biersdorfer. 2003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 269 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Note: "Intrusion detection with open source tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media, Inc. | Boston, MA :Safari,
    Language: English
    Pages: xvi, 278 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.72
    Keywords: Adobe Acrobat ; PDF (Computer file format) ; Portable document software ; Text processing (Computer science) ; Electronic books ; local
    Abstract: PDF--to most of the world it stands for that rather tiresome format used for documents downloaded from the web. Slow to load and slower to print, hopelessly unsearchable, and all but impossible to cut and paste from, the Portable Document Format doesn't inspire much affection in the average user. But PDFs done right is another story. Those who know the ins and outs of this format know that it can be much more than electronic paper. Flexible, compact, interactive, and even searchable, PDF is the ideal way to present content across multiple platforms. PDF Hacks unveils the true promise of Portable Document Format, going way beyond the usual PDF as paged output mechanism. PDF expert Sid Steward draws from his years of analyzing, extending, authoring, and embellishing PDF documents to present 100 clever hacks--tools, tips, quick-and-dirty or not-so-obvious solutions to common problems. PDF Hacks will show you how to create PDF documents that are far more powerful than simple representations of paper pages. The hacks in the book cover the full range of PDF functionality, from the simple to the more complex, including generating, manipulating, annotating, and consuming PDF information. You'll learn how to manage content in PDF, navigate it, and reuse it as necessary. Far more than another guide to Adobe Acrobat, the book covers a variety of readily available tools for generating, deploying, and editing PDF. The little-known tips and tricks in this book are ideal for anyone who works with PDF on a regular basis, including web developers, pre-press users, forms creators, and those who generate PDF for distribution. Whether you want to fine-tune and debug your existing PDF documents or explore the full potential the format offers, PDF Hacks will turn you into a PDF power user.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xix, 331 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.117
    Keywords: Java (Computer program language) ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: When Object Oriented programming (OO) first appeared, it was a revelation. OO gave developers the ability to create software that was more flexible and robust, but as time went on and applications became more sophisticated, too, certain areas of "traditional" OO architectures were found wanting. Aspect-oriented programming (AOP) addresses those issues by extending the OO approach even further.Many developers are interested in AOP--especially in AspectJ, the open source extension of the Java programming language that explicitly supports the AOP approach. Yet, although AspectJ is included with Eclipse, the increasingly popular open source IDE for Java, finding a practical and non-theoretical way to learn this language and other AOP tools and techniques has been a real problem.Until now. The AspectJ Cookbook offers a hands-on solution--in fact, several--with a wide variety of code recipes for solving day-to-day design and coding problems using AOP's unique approach.AOP allows the global properties of a program to determine how it's compiled into an executable program. Before AOP, important program design decisions were difficult to capture in actual code. Instead, the implementation of those design decisions--known as "aspects"--were scattered throughout, resulting in "tangled" code that was hard to develop and maintain. AOP has been compared to the manufacturing of cloth, in which threads are automatically interwoven. Without AOP, programmers must stitch the threads by hand.The AspectJ Cookbook shows readers why, and how, common Java development problems can be solved by using AOP techniques. With our popular problem-solution-discussion format, the book presents real world examples to demonstrate that AOP is more than just a concept; it's a development process that will benefit users in an immediate and visible manner.If you're interested in how AOP is changing the way software is developed, and how you can use AspectJ to make code more modular, easier to develop, maintain, evolve and deploy, this is the book that really delivers.
    Note: "Real-world Aspect-oriented programming with Java"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 450 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.3
    Keywords: Apache (Computer file : Apache Group) ; JavaServer pages ; Application software ; Development ; Internet programming ; Struts framework ; Web site development ; Electronic books ; local
    Abstract: While the look and feel of an enterprise web application is certainly important, developers usually find themselves spending far too much time on the front-end presentation before they can get to coding the good stuff--the business logic at the heart of the program. Jakarta Struts addresses this issue by combining Java Servlets, Java ServerPages (JSP), custom tags, and messaging resources (like Java Message Service) into a unified, re-usable framework. The result is a cooperative, synergistic platform that's efficient and suitable for independent developers, large development teams, and everyone in between. The Struts Framework has become a highly popular open source project, but there's still woefully little documentation on the technology. What does exist is far too basic and lacks critical information for developers like you writing today's complex web applications. The revised and expanded Programming Jakarta Struts , 2nd Edition covers everything the successful earlier edition did--including an overview of the concepts involved in writing web applications; installation and configuration instructions for getting Struts up and running; a thorough discussion of how Struts implements the Model-View-Controller (MVC) design paradigm (known as the Model 2 approach) and how to interface with that pattern in your own applications; Logging, Validation, and Exception Handling with Struts; using Tiles; writing internationalization and localization code using Struts; and practical, real-world best practices for web applications--as well as plenty more: now fully up to date with Struts 1.1, this edition covers the latest material on tag libraries and the new JavaServerFaces (JSF) APIs and even includes all-new chapters on JSF, JSTL/EL, and security. With each enterprise system he s developed, author Chuck Cavaness has spent many grueling hours learning invaluable lessons about Struts and figuring out the dos and the don'ts of building web applications. He saves you time and headaches by sharing that invaluable real-world experience here, with his realistic, practical, here's how to do it approach to using the Struts Framework to its fullest potential.
    Note: "Building Web applications with servlets and JSPs"--cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Beijing : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: 207 s. , ill.
    DDC: 005.7'2
    Keywords: Web services ; Web services ; sao ; Electronic books ; local
    Abstract: The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing with web services? Standard bodies may wrangle and platform vendors may preach, but at the end of the day what are the technologies that are actually in use, and how can developers incorporate them into their own applications? Those are the answers Real World Web Services delivers. It's a field guide to the wild and wooly world of non-trivial deployed web services.The heart of the book is a series of projects, demonstrating the use and integration of Google, Amazon, eBay, PayPal, FedEx, and many more web services. Some of these vendors have been extremely successful with their web service deployments: for example, eBay processes over a billion web service requests a month!The author focuses on building 8 fully worked out example web applications that incorporate the best web services available today. The book thoroughly documents how to add functionality like automating listings for auctions, dynamically calculating shipping fees, automatically sending faxes to your suppliers, using an aggregator to pull data from multiple news and web service feeds into a single format or monitoring the latest weblog discussions and Google searches to keep web site visitors on top of topics of interest-by integrating APIs from popular websites most people are already familiar with.For each example application, the author provides a thorough overview, architecture, and full working code examples.This book doesn't engage in an intellectual debate as to the correctness of web services on a theological level. Instead, it focuses on the practical, real world usage of web services as the latest evolution in distributed computing, allowing for structured communication via Internet protocols. As you ll see, this includes everything from sending HTTP GET commands to retrieving an XML document through the use of SOAP and various vendor SDKs.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 327 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: MySQL (Electronic resource) ; Object-oriented programming (Computer science) ; PHP (Computer program language) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Abstract: If you're using PHP 4, then chances are good that an upgrade to PHP 5 is in your future. The more you've heard about the exciting new features in PHP 5, the sooner that upgrade is probably going to be. Although an in-depth, soup-to-nuts reference guide to the language is good to have on hand, it's not the book an experienced PHP programmer needs to get started with the latest release. What you need is a lean and focused guide that answers your most pressing questions: what's new with the technology, what's different, and how do I make the best use of it? In other words, you need a copy of Upgrading to PHP 5 . This book is targeted toward PHP developers who are already familiar with PHP 4. Rather than serve as a definitive guide to the entire language, the book zeroes in on PHP 5's new features, and covers these features definitively. You'll find a concise appraisal of the differences between PHP 4 and PHP 5, a detailed look at what's new in this latest version, and you'll see how PHP 5 improves on PHP 4 code. See PHP 4 and PHP 5 code side-by-side, to learn how the new features make it easier to solve common PHP problems. Each new feature is shown in code, helping you understand why it's there, when to use it, and how it's better than PHP 4. Short, sample programs are included throughout the book. Topics covered in Upgrading to PHP 5 include: The new set of robust object-oriented programming features An improved MySQL extension, supporting MySQL 4.1, prepared statements, and bound parameters Completely rewritten support for XML: DOM, XSLT, SAX, and SimpleXML Easy web services with SOAP SQLite, an embedded database library bundled with PHP 5 Cleaner error handling with exceptions Other new language features, such as iterators, streams, and more. Upgrading to PHP 5 won't make you wade through information you've covered before. Written by Adam Trachtenberg, coauthor of the popular PHP Cookbook , this book will take you straight into the heart of all that's new in PHP 5. By the time you've finished, you'll know PHP 5 in practice as well as in theory.
    Note: "All that's new in PHP 5, covers MySQL 4.1"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 472 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: The vast majority of Oracle SQL books discuss some syntax, provide the barest rudiments of using Oracle SQL, and perhaps include a few simple examples. It might be enough to pass a survey course, or give you some buzz words to drop in conversation with real Oracle DBAs. But if you use Oracle SQL on a regular basis, you want much more. You want to access the full power of SQL to write queries in an Oracle environment. You want a solid understanding of what's possible with Oracle SQL, creative techniques for writing effective and accurate queries, and the practical, hands-on information that leads to true mastery of the language. Simply put, you want useful, expert best practices that can be put to work immediately, not just non-vendor specific overview or theory.Updated to cover the latest version of Oracle, Oracle 10g, this edition of the highly regarded Mastering Oracle SQL has a stronger focus on technique and on Oracle's implementation of SQL than any other book on the market. It covers Oracle s vast library of built-in functions, the full range of Oracle SQL query-writing features, regular expression support, new aggregate and analytic functions, subqueries in the SELECT and WITH clauses, multiset union operators, enhanced support for hierarchical queries: leaf and loop detection, and the CONNECT_BY_ROOT operator, new partitioning methods (some introduced in Oracle9i Release 2), and the native XML datatype, XMLType. Mastering Oracle SQL , 2nd Edition fills the gap between the sometimes spotty vendor documentation, and other books on SQL that just don't explore the full depth of what is possible with Oracle-specific SQL. For those who want to harness the untapped (and often overlooked) power of Oracle SQL, this essential guide for putting Oracle SQL to work will prove invaluable.
    Note: "Covers Oracle database 10g"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxv, 1025 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.4/465
    Keywords: Mac OS ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Complete overview of Mac OS Jaguar (Mac OS X 10.2) including basic system and network administration features, hundreds of tips and tricks, with an overview of Mac OS X's Unix text editors and CVS.
    Note: Previous ed. gives McIntosh as first-named author. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 654 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.4469
    Keywords: Microsoft Windows server ; Handbooks, manuals, etc ; Microsoft .NET Framework ; Handbooks, manuals, etc ; Operating systems (Computers) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: With Windows Server 2003, Microsoft has the right server for a world now dominated by enterprise networks and web-based server applications. A number of significant improvements make this a more reliable server than Windows 2000, and those who switched have seen notable performance gains. Server 2003 is, in fact, a very competitive solution to Unix in terms of cost, performance, and application development productivity. But getting this server up and running, either as a stand-alone or as part of a multi-site, multi-server network, is a formidable task even for the most experienced system administrators. Our no-fluff guide gives you exactly what you need: all the nuts and bolts for installing, configuring, securing, and managing Server 2003. This focused and practical book clearly documents the complexities of this server, and offers hands-on advice for planning, implementing and growing Windows networks without trying to teach you how to be a system administrator. Learning Windows Server 2003 shows you how to create and manage user accounts (with particular attention to Active Directory), how to manage access to system resources such as printers and files, and how to configure and manage the server s plethora of major subsystems. The book goes into considerable detail about: Windows file and print services Active Directory IIS6 web server Group Policy and other security tools Patch management .NET Framework application server Windows Terminal Services (including their use in conjunction with Microsoft Office and the Small Business Edition) Various networking subsystems that ship with Server 2003 This highly instructive book also provides an introduction to clustering services, and thoroughly documents steps that should be taken to ensure the security of the server and its resources. Windows Server 2003 was designed to meet the needs of companies or organizations that rely on one or more internal computer networks, and our comprehensive reference is the ideal companion.
    Note: "The no-nonsense guide to administering Windows servers"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xxii, 372 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.52
    Keywords: Microsoft Word ; Handbooks, manuals, etc ; Word processing ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: As one of the applications in Microsoft Office, Word is the dominant word-processing program for both Windows and Mac users. Millions of people around the globe use it. But many, if not most, of them barely skim the surface of what is possible with Microsoft Word. Seduced by the application's supposed simplicity, they settle for just what's obvious--even if it doesn't satisfy their wants and needs. They may curse the wretched Bullets and Numbering buttons multiple times a day or take hours to change the font size of every heading in a lengthy report, yet they're reluctant to dig deeper to take advantage of Word's immense capabilities and limitless customization tools.Let Word Hacks be your shovel. Let it carve your way into Word and make this most popular and powerful application do precisely what you want it to do. Filled with insider tips, tools, tricks, and hacks, this book will turn you into the power user you always wanted to be. Far beyond a tutorial, Word Hacks assumes you have a solid working knowledge of the application and focuses on showing you exactly how to accomplish your pressing tasks, address your frequent annoyances, and solve even your most complex problems.Author Andrew Savikas examines Word's advanced (and often hidden) features and delivers clever, time-saving hacks on taming document bloat, customization, complex search and replace, Tables of Contents and indexes, importing and exporting files, tables and comments, and even using Google as a dictionary! With him as your guide, you'll soon be understanding--and hacking--Word in ways you never thought possible.Covering Word 2000, 2002 and Word 2003, Word Hacks exposes the inner workings of Word and releases your inner hacker; with it, you will be equipped to take advantage of the application s staggering array of advanced features that were once found only in page layout programs and graphics software and turning Word into your personal productivity powerhouse.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 691 s
    Edition: 2. ed.
    Keywords: Database management ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: SQL in a Nutshell applies the eminently useful "Nutshell" format to Structured Query Language (SQL), the elegant--but complex--descriptive language that is used to create and manipulate large stores of data. For SQL programmers, analysts, and database administrators, the new second edition of SQL in a Nutshell is the essential date language reference for the world's top SQL database products. SQL in a Nutshell is a lean, focused, and thoroughly comprehensive reference for those who live in a deadline-driven world.This invaluable desktop quick reference drills down and documents every SQL command and how to use it in both commercial (Oracle, DB2, and Microsoft SQL Server) and open source implementations (PostgreSQL, and MySQL). It describes every command and reference and includes the command syntax (by vendor, if the syntax differs across implementations), a clear description, and practical examples that illustrate important concepts and uses. And it also explains how the leading commercial and open sources database product implement SQL. This wealth of information is packed into a succinct, comprehensive, and extraordinarily easy-to-use format that covers the SQL syntax of no less than 4 different databases.When you need fast, accurate, detailed, and up-to-date SQL information, SQL in a Nutshell , Second Edition will be the quick reference you'll reach for every time. SQL in a Nutshell is small enough to keep by your keyboard, and concise (as well as clearly organized) enough that you can look up the syntax you need quickly without having to wade through a lot of useless fluff. You won't want to work on a project involving SQL without it.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 331 p. , ill. ; , 25 cm
    DDC: 621.3815
    Keywords: Electronic apparatus and appliances ; Electronic books ; local
    Abstract: Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and you'll have potential. Add a copy of Hardware Hacking Projects for Geeks and by the end of the weekend that Furby will be saying things you never imagined. From building an Internet toaster to creating a cubicle intrusion detection system, Hardware Hacking Projects for Geeks offers an array of inventive, customized electronics projects for the geek who can't help looking at a gadget and wondering how it might be "upgraded." Beginning with basic hacks, tools, and techniques for those who may not have a background in electronics, the book covers the tools of the hardware hacking trade and basic soldering techniques, then moves into more advanced hacking projects. Clear step-by-step instructions allow even those with no formal electronics- or hardware-engineering skills to hack real hardware in very clever ways. Hacks in the book are rated on a scale of difficulty, cost, and duration. Projects range from those that are truly useful to some things you may have never thought to do, but which are really cool, such as: Building your own arcade game Making radio-controlled cars play laser tag Building an automobile periscope Hacking an 802.11b antenna Building a building size display Perhaps you're an electronics hobbyist who likes to learn by doing. Maybe you hack software and want to see how the other half lives. Or, maybe you've never hacked at all, but you'd like to get started quickly with some projects that do something interesting from the start. If you're any of these, then Hardware Hacking Projects for Geeks will indulge your inner mad scientist. Using the projects in this book as a jumping point for other new and clever hacks, it won't be long before you're looking around, asking, "I wonder what I can improve next?"
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: "A refreshingly new approach toward improving use-case modeling by fortifying it with aspect orientation." - Ramnivas Laddad, author of AspectJ in Action "Since the 1980s, use cases have been a way to bring users into software design, but translating use cases into software has been an art, at best, because user goods often don't respect code boundaries. Now that aspect-oriented programming (AOP) can express crosscutting concerns directly in code, the man who developed use cases has proposed step-by-step methods for recognizing crosscutting concerns in use cases and writing the code in separate modules. If these methods are at all fruitful in your design and development practice, they will make a big difference in software quality for developers and users alike. - Wes Isberg, AspectJ team member "This book not only provides ideas and examples of what aspect-oriented software development is but how it can be utilized in a real development project." - MichaelWard, ThoughtWorks, Inc. "No system has ever been designed from scratch perfectly; every system is composed of features layered in top of features that accumulate over time. Conventional design techniques do not handle this well, and over time the integrity of most systems degrades as a result. For the first time, here is a set of techniques that facilitates composition of behavior that not only allows systems to be defined in terms of layered functionality but composition is at the very heart of the approach. This book is an important advance in modern methodology and is certain to influence the direction of software engineering in the next decade, just as Object-Oriented Software Engineering influenced the last." - Kurt Bittner, IBM Corporation "Use cases are an excellent means to capture system requirements and drive a user-centric view of system development and testing. This book offers a comprehensive guide on explicit use-case-driven development from early requirements modeling to design and implementation. It provides a simple yet rich set of guidelines to realize use-case models using aspect-oriented design and programming. It is a valuable resource to researchers and practitioners alike." - Dr. Awais Rashid, Lancaster University, U.K., and author of Aspect-Oriented Database Systems "AOSD is important technology that will help developers produce better systems. Unfortunately, it has not been obvious how to integrate AOSD across a project's lifecycle. This book shatters that ba...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Now every Java developer can leverage the immense power of AOP With AspectJ, Java developers can leverage the breakthrough power of Aspect-Oriented Programming (AOP) using a language they already know, within the comfortable, highly productive Eclipse development environment. In this book, AspectJ's lead developers help you master AOP's essential principles and techniques, as you use them to address your toughest software quality, productivity, and maintenance challenges. AOP improves the modularity of programs, making the code much closer to the design. It can dramatically reduce the time taken to implement common features and functions, improve quality, integrate plain-old Java objects with systems and services, create simpler, more reusable components, and much more besides. Drawing on their experience as tool developers, programmers, and mentors, the authors cover every facet of AOP development with AspectJ and Eclipse, from creating new projects through extending and documenting full-fledged applications. You'll find an authoritative tutorial covering the entire AspectJ language, a complete API reference, and realistic guidance on adopting AspectJ in your organization. No AOP or Eclipse experience necessary! Install and configure both Eclipse and the AspectJ Development Tools (AJDT) Discover how AOP can modularize and optimize everything from error checking to performance Craft new AspectJ applications and incorporate AOP capabilities into existing systems Build, debug, and document AspectJ applications Understand crucial AOP concepts, such as join points, pointcuts, advice, and inter-type declarations Master advanced techniques: Aspect libraries, linking with compiled .class files, visualization, aspect-oriented design, and more The accompanying website, www.awprofessional.com/title/0321245873, is full of samples, examples, and source code to help you start writing Java-based AOP software today. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 418 p. , ill. ; , 23 cm. +
    DDC: 005.13/3
    Keywords: Application software ; Development ; Internet programming ; Java (Computer program language) ; Web servers ; Web site development ; Java (Langage de programmation) ; Logiciels d'application ; Développement ; Programmation sur Internet ; Serveurs Web ; Sites Web ; Développement ; Electronic books ; local
    Abstract: Written by Sun Microsystems' Java™ BluePrints team, Designing Web Services with the J2EE™ 1.4 Platform is the authoritative guide to the best practices for designing and integrating enterprise-level Web services using the Java 2 Platform, Enterprise Edition (J2EE) 1.4. This book provides the guidelines, patterns, and real-world examples architects and developers need in order to shorten the learning curve and start building robust, scalable, and portable solutions. The authors use the Java Adventure Builder application to bring the design process to life and help illustrate the use of Java APIs for XML Processing (JAXP), Java APIs for XML-Based RPC (JAX-RPC), and other Web service and Java-XML technologies. Key topic coverage includes: Web service requirements and design issues Support for Web services provided by the J2EE 1.4 platform Designing and implementing Web service end points Writing efficient Web service client applications Designing and developing XML-based applications Integrating applications and data using Web services The J2EE platform security model as it applies to Web services A coherent programming model for designing and developing Web service endpoints and clients Designing Web Services with the J2EE™ 1.4 Platform provides the insight, advice, and detail that make it easier to create effective Web service applications using the J2EE 1.4 platform.
    Note: Includes bibliographical references (p. xx-xxii) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Note: Includes bibliographical references (p. 321-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    San Jose, CA : Adobe | Boston, MA :Safari,
    Language: English
    Pages: ix, 690 p. , ill. (some col.) ; , 24 cm. +
    DDC: 006.6/86
    Keywords: Adobe Photoshop ; Computer graphics ; Electronic books ; local
    Abstract: Photoshop is one of those programs that's so cool you just want to dive right in and start creating--but by plunging in head-first, without any guidance, you're likely to miss a lot. There's a solution: With this book, you learn by doing, getting your feet wet immediately as you progress through a series of hands-on projects that build on your growing Photoshop knowledge. Simple step-by-step instructions, review questions at the end of each chapter, and a companion CD with all of the book's project files make learning a breeze as the Adobe Creative Team takes you on a self-paced tour of the image-editing powerhouse. Completely revised to cover all of Photoshop CS's new features (including a new file browser, nonsquare pixel support, Layer comps for creating design variations, and more), the book starts with an introductory tour of the software and then progresses on through lessons on everything from Photoshop's interface to more complex topics like color management, Web graphics, and photo retouching.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: v. 〈1〉 , ill. ; , 25 cm. +
    DDC: 005.2/768
    Keywords: Microsoft .NET Framework ; Electronic books ; local
    Abstract: Edited by a Lead Program Manager on Microsoft's .NET Framework team, .NET Framework Standard Library Annotated Reference, Volume 1, is the definitive reference for the .NET Framework base class library. This book utilizes extensive annotations and code samples from the creators of the technology to move beyond the online documentation and provide .NET developers with a dictionary-style reference to the most-used parts of the Framework. This volume covers a subset of the ISO CLI Standards, including the Base Class Library and the Extended Numerics Library. In the printed book you will find informative overviews of each namespace covered and an easy-to-follow alphabetic reference of types in the standard, including type-level descriptions, sample code with output, and annotations from the design team and standardization committee. With the ECMA and ISO standards as its core, this book includes: Annotations from key members of the Microsoft design team and the Standardization committee. Comments cover everything from design rationale and history to common problems and shortcomings. An overview of each namespace, describing its functionality and the inheritance hierarchy of types it defines. Type descriptions. Each type is covered in its own chapter, with a detailed description of how the type is to be used and a quick reference of the C# declaration syntax for all members defined on the type. Also noted: which members are only available in the Microsoft implementation of the .NET Framework, which are not available in the .NET Compact Framework, and which are only available in V1.1 of the .NET Framework. Code samples. Types are illustrated by fully compilable code samples with output included. Reference tabs and an exhaustive index, which allow readers to quickly and easily navigate the text. Reusable source code for more than one thousand samples. All code has been tested with versions 1.0, 1.1, and the 2.0 technical preview of the .NET Framework, and, where appropriate, with the .NET Compact Framework.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...