Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (276)
  • Beijing ; : O'Reilly  (198)
  • Indianapolis, IN : Cisco Press  (78)
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: Your first step into the world of IP telephony No IP telephony experience required Includes clear and easily understood explanations Makes learning easy Your first step to the world of IP telephony begins here! Learn how voice and data communications merge in voice-over-IP technology Use this reader-friendly guide to understand the benefits of this technology Explore real-life applications and theories through case studies in every chapter Welcome to the world of voice over IP We use either a telephone or e-mail for much of our day-to-day communication. Today, these two worlds are merging, and companies can place phone calls over their existing data network infrastructures using a technology called voice over IP (VoIP). No prior experience with VoIP technology is required Voice over IP First-Step is anyone's introduction to the world of VoIP networks. The concepts in this book are presented in plain language, so you don't need in-depth background knowledge to comprehend the technologies covered. If you work with data networks, if you work with telephony networks, if you're a home user interested in how VoIP can reduce your monthly phone bill, or if the concept of VoIP simply intrigues you, this book is for you.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco SNRS exam 642-502 Attack threats Router management and administration Authentication, Authorization, and Accounting (AAA) and Cisco Secure Access Control Server RADIUS and TACACS+ Cisco IOS® Firewall feature set Securing networks with Cisco routers Mitigating Layer 2 attacks IPsec and Easy Virtual Private Network (VPN) Security Device Manager (SDM) CCSP SNRS Exam Certification Guide is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the SNRS exam. Network security engineers Greg Bastien, Sara Nasseh, and Christian Degu share preparation hints and test-taking tips, helping you identify areas of weakness and improve your knowledge of router and switch security. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCSP SNRS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Foundation summary information gives you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful test engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP SNRS Exam Certification Guide is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press®. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains an electronic copy of the book and over 200 practice questions for the SNRS exam, all available in study mode, test mode, and flash card format. Includes a FREE 45-Day Online Edition T...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: An introduction to network attack mitigation with IPS Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the "big picture"? What are the best practices related to IPS? How is IPS deployed, and what should be considered prior to a deployment? Intrusion Prevention Fundamentals offers an introduction and in-depth overview of Intrusion Prevention Systems (IPS) technology. Using real-world scenarios and practical case studies, this book walks you through the lifecycle of an IPS project-from needs definition to deployment considerations. Implementation examples help you learn how IPS works, so you can make decisions about how and when to use the technology and understand what "flavors" of IPS are available. The book will answer questions like: Whether you are evaluating IPS technologies or want to learn how to deploy and manage IPS in your network, this book is an invaluable resource for anyone who needs to know how IPS technology works, what problems it can or cannot solve, how it is deployed, and where it fits in the larger security marketplace. Understand the types, triggers, and actions of IPS signatures Deploy, configure, and monitor IPS activities and secure IPS communications Learn the capabilities, benefits, and limitations of host IPS Examine the inner workings of host IPS agents and management infrastructures Enhance your network security posture by deploying network IPS features Evaluate the various network IPS sensor types and management options Examine real-world host and network IPS deployment scenarios This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques. Includes a FREE 45-Day Online Edition
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Field-proven MPLS designs covering MPLS VPNs, pseudowire, QoS, traffic engineering, IPv6, network recovery, and multicast Understand technology applications in various service provider and enterprise topologies via detailed design studies Benefit from the authors' vast experience in MPLS network deployment and protocol design Visualize real-world solutions through clear, detailed illustrations Design studies cover various operator profiles including an interexchange carrier (IXC), a national telco deploying a multiservice backbone carrying Internet and IP VPN services as well as national telephony traffic, an international service provider with many POPs all around the globe, and a large enterprise relying on Layer-3 VPN services to control communications within and across subsidiaries Design studies are thoroughly explained through detailed text, sample configurations, and network diagrams Definitive MPLS Network Designs provides examples of how to combine key technologies at the heart of IP/MPLS networks. Techniques are presented through a set of comprehensive design studies. Each design study is based on characteristics and objectives common to a given profile of network operators having deployed MPLS and discusses all the corresponding design aspects. The book starts with a technology refresher for each of the technologies involved in the design studies. Next, a series of design studies is presented, each based on a specific hypothetical network representative of service provider and enterprise networks running MPLS. Each design study chapter delivers four elements. They open with a description of the network environment, including the set of supported services, the network topology, the POP structure, the transmission facilities, the basic IP routing design, and possible constraints. Then the chapters present design objectives, such as optimizing bandwidth usage. Following these are details of all aspects of the network design, covering VPN, QoS, TE, network recovery, and-where applicable-multicast, IPv6, and pseudowire. The chapters conclude with a summary of the lessons that can be drawn from the design study so that all types of service providers and large enterprise MPLS architects can adapt aspects of the design solution to their unique network environment and objectives. Although network architects have many resources for seeking information on the concepts and protocols involved with MPLS, there is no single resource that illustrat...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 185 p. , ill. ; , 23 cm
    Keywords: Computer programming ; Java (Computer program language) ; Electronic books ; local
    Abstract: Bruce Tate, author of the Jolt Award-winning Better, Faster, Lighter Java has an intriguing notion about the future of Java, and it's causing some agitation among Java developers. Bruce believes Java is abandoning its base, and conditions are ripe for an alternative to emerge. In Beyond Java , Bruce chronicles the rise of the most successful language of all time, and then lays out, in painstaking detail, the compromises the founders had to make to establish success. Then, he describes the characteristics of likely successors to Java. He builds to a rapid and heady climax, presenting alternative languages and frameworks with productivity and innovation unmatched in Java. He closes with an evaluation of the most popular and important programming languages, and their future role in a world beyond Java. If you are agree with the book's premise--that Java's reign is coming to an end--then this book will help you start to build your skills accordingly. You can download some of the frameworks discussed and learn a few new languages. This book will teach you what a new language needs to succeed, so when things do change, you'll be more prepared. And even if you think Java is here to stay, you can use the best techniques from frameworks introduced in this book to improve what you're doing in Java today.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 350 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.26/8
    Keywords: Linux ; Electronic data processing ; Distributed processing ; High performance computing ; Operating systems (Computers) ; Parallel processing (Electronic computers) ; Electronic books ; local
    Abstract: To the outside world, a "supercomputer" appears to be a single system. In fact, it's a cluster of computers that share a local area network and have the ability to work together on a single problem as a team. Many businesses used to consider supercomputing beyond the reach of their budgets, but new Linux applications have made high-performance clusters more affordable than ever. These days, the promise of low-cost supercomputing is one of the main reasons many businesses choose Linux over other operating systems.This new guide covers everything a newcomer to clustering will need to plan, build, and deploy a high-performance Linux cluster. The book focuses on clustering for high-performance computation, although much of its information also applies to clustering for high-availability (failover and disaster recovery). The book discusses the key tools you'll need to get started, including good practices to use while exploring the tools and growing a system. You'll learn about planning, hardware choices, bulk installation of Linux on multiple systems, and other basic considerations. Then, you'll learn about software options that can save you hours--or even weeks--of deployment time.Since a wide variety of options exist in each area of clustering software, the author discusses the pros and cons of the major free software projects and chooses those that are most likely to be helpful to new cluster administrators and programmers. A few of the projects introduced in the book include: MPI, the most popular programming library for clusters. This book offers simple but realistic introductory examples along with some pointers for advanced use. OSCAR and Rocks, two comprehensive installation and administrative systems openMosix (a convenient tool for distributing jobs), Linux kernel extensions that migrate processes transparently for load balancing PVFS, one of the parallel filesystems that make clustering I/O easier C3, a set of commands for administering multiple systems Ganglia, OpenPBS, and cloning tools (Kickstart, SIS and G4U) are also covered. The book looks at cluster installation packages (OSCAR & Rocks) and then considers the core packages individually for greater depth or for folks wishing to do a custom installation. Guidelines for debugging, profiling, performance tuning, and managing jobs from multiple users round out this immensely useful book.
    Note: "A comprehensive getting started guide"--Cover. - Includes bibliographical references (p. 329-337) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 735 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.2762
    Keywords: Computer networks ; Programming ; Java (Computer program language) ; Electronic books ; local
    Abstract: The new third edition of this highly regarded introduction to Java networking programming has been thoroughly revised to cover all of the 100+ significant updates to Java Developers Kit (JDK) 1.5. It is a clear, complete introduction to developing network programs (both applets and applications) using Java, covering everything from networking fundamentals to remote method invocation (RMI). Java Network Programming , 3rd Edition includes chapters on TCP and UDP sockets, multicasting protocol and content handlers, servlets, multithreaded network programming, I/O, HTML parsing and display, the Java Mail API, and the Java Secure Sockets Extension. There's also significant information on the New I/O API that was developed in large part because of the needs of network programmers.This invaluable book is a complete, single source guide to writing sophisticated network applications. Packed with useful examples, it is the essential resource for any serious Java developer.
    Note: Includes index. - Previous ed.: Beijing; Sebastopol, Calif.: O'Reilly, 2000
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention System Secure your endpoint systems with host IPS Build and manipulate policies for the systems you wish to protect Learn how to use groups and hosts in the Cisco Security Agent architecture and how the components are related Install local agent components on various operating systems Explore the event database on the management system to view and filter information Examine Cisco Security Agent reporting mechanisms for monitoring system activity Apply Application Deployment Investigation to report on installed applications, hotfixes, and service packs Collect detailed information on processes and see how they use and are used by system resources Create and tune policies to control your environment without impacting usability Learn how to maintain the Cisco Security Agent architecture, including administrative access roles and backups Cisco Security Agent presents a detailed explanation of Cisco Security Agent, illustrating the use of host Intrusion Prevention Systems (IPS) in modern self-defending network protection schemes. At the endpoint, the deployment of a host IPS provides protection against both worms and viruses. Rather than focusing exclusively on reconnaissance phases of network attacks a host IPS approaches the problem from the other direction, preventing malicious activity on the host by focusing on behavior. By changing the focus to behavior, damaging activity can be detected and blocked-regardless of the attack. Cisco Security Agent is an innovative product in that it secures the portion of corporate networks that are in the greatest need of protection-the end systems. It also has the ability to prevent a day-zero attack, which is a worm that spreads from system to system, taking advantage of vulnerabilities in networks where either the latest patches have not been installed or for which patches are not yet available. Cisco Security Agent utilizes a unique architecture that correlates behavior occurring on the end systems by monitoring clues such as file and memory access, process behavior, COM object access, and access to shared libraries as well as other important indicators. Cisco Security Agent is the first book to explore the features and benefits of this powerful host IPS product. Divided into seven parts, the book provides a detailed overview of Cisco Security Agent features and deployment scenarios. Part...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxi, 548 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: A smart collection of insider tips and tricks, Windows XP Hacks , Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes extensive coverage of hot-button issues such as: security web browsing controlling the control panel removing uninstallable XP components pop-up ads You'll also find timesaving hacks for file distribution; digital media, such as iTunes; and high-visibility web software, services, and exploits that have emerged since the book's last edition. Each hack in the book can be read easily in just a few minutes, saving countless hours of searching for the right answer.Now completely revised and updated to cover Service Pack 2 (SP2), the second edition of this bestseller carefully breaks down the new features that come with SP2, including IE pop-up blocker, Windows Firewall, and the new wireless client.Written by Preston Gralla, the compact and affordable Windows XP Hacks , Second Edition provides direct, hands-on solutions that can be applied to the challenges facing XP beginners, as well as the more experienced power user. Each year, Windows XP is pre-installed on 90 million PCs worldwide, making it the world's most popular operating system.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 381 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 621.389/3
    Keywords: Home entertainment systems ; Home video systems ; Stereophonic sound systems ; Electronic books ; local
    Abstract: It might be the long lines at the theater, the $4.00 for a small bag of popcorn, or the cutting-edge technology that's now so readily available to the home market. Whatever the reason, the home theater market today is booming like the soundtrack to Star Wars! Want proof? A Google search for home theater reveals over three million results. Yikes! It's simply undeniable: More and more people prefer watching their favorite movies, television shows, and videos from the comfort of their own sofas and couches. What's also undeniable is the inexperience of most people who choose to install or upgrade their home theaters. Until now, the knowledge, technique, and experiences of those who've encountered similar conditions to yours could only be accessed through laborious web searches, stacks of magazines, and water cooler conversations. Home Theater Hacks from O'Reilly is the perfect remedy for this group. A smart collection of insider tips and tricks, Home Theater Hacks covers home theater installation from start to finish, purchase to experience. Just imagine: no frustrating trial-and-error process and better yet, no expensive appointments with installation experts. Home Theater Hacks prevents both by imparting down-and-dirty technique not found anywhere else. The book begins with a quick glossary of terms so you can speak the lingo when you go shopping, and then dives right into hush-hush, insider tricks. It's all covered where to find the right audio and video components, how to deal with speakers and wiring, understanding cable connectivity, mastering remote controls, how to fully grasp TiVo, and so much more. And to top it off, each of these insider tips is presented in a concise yet delightfully entertaining style. Bringing the Jurassic Park dinosaurs into your living room has never been so easy! A seasoned veteran with numerous O'Reilly titles under his belt, author Brett McLaughlin leaves no stone unturned in helping you customize your home theater experience to your own personal environment.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: x, 329 p. , ill. ; , 25 cm. +
    Keywords: Digital video ; Editing ; Electronic books ; local
    Abstract: Apple's DVD Studio Pro, released in 2001, provided a low-cost, professional solution for home and small business DVD authoring. Today, the highly sophisticated yet easy-to-use DVD Studio Pro 3 allows independent filmmakers, video producers, trainers, event videographers, and enthusiasts to create professional-grade DVDs on the Macintosh platform. Pair the program with DVD Studio Pro 3: In the Studio , and you've got everything you need to embrace the digital video revolution.This indispensable book gives you the tools and know-how to master DVD Studio Pro 3. Oversized and in full color, the highly visual DVD Studio Pro 3: In the Studio is ideal for Macintosh ProApps developers--those who use Final Cut Pro 4 and Shake 3--as well as for prosumer and professional filmmakers who wish to transfer their projects to DVDs. The book goes well beyond the program's features list to demystify the entire process of DVD design and authoring.Author Marc Loy, who has been using DVD Studio Pro since its inception, goes beyond a simple discussion about the DVD Studio Pro 3 interface and entices readers to experience the program's powerful capabilities as they create eye-catching, innovative DVD designs. He covers the actual protocols involved with the DVD files and filesystems, pixel aspect ratio issues, and common "gotchas" using both still and motion media. He also delivers plenty of tips and tricks for using dynamic buttons. DVD Studio Pro 3: In the Studio explores most everything you need and want to know, including importing from Photoshop and Final Cut Pro, making motion video menus available, effective looping of video and audio, adding multilingual menus and subtitles, encoding rules for DVDs, scripting, and mass duplication hunts. DVD Studio Pro 3: In the Studio is a professional-level book for anyone who's serious about creating high-impact, professional-level DVDs to make your unique vision a digital video reality.
    Note: One DVD inside back cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 291 p. , ill. (some col.) ; , 23 cm
    Edition: 1st ed.
    DDC: 004.165
    Keywords: Apple Computer, Inc. ; Macintosh Division ; History ; Computer industry ; United States ; History ; Macintosh (Computer) ; Electronic books ; local
    Abstract: There was a time, not too long ago, when the typewriter and notebook ruled, and the computer as an everyday tool was simply a vision. Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the groundbreaking Macintosh computer was born. The book traces the development of the Macintosh, from its inception as an underground skunkworks project in 1979 to its triumphant introduction in 1984 and beyond. The stories in Revolution in the Valley come on extremely good authority. That's because author Andy Hertzfeld was a core member of the team that built the Macintosh system software, and a key creator of the Mac's radically new user interface software. One of the chosen few who worked with the mercurial Steve Jobs, you might call him the ultimate insider. When Revolution in the Valley begins, Hertzfeld is working on Apple's first attempt at a low-cost, consumer-oriented computer: the Apple II. He sees that Steve Jobs is luring some of the company's most brilliant innovators to work on a tiny research effort the Macintosh. Hertzfeld manages to make his way onto the Macintosh research team, and the rest is history. Through lavish illustrations, period photos (many never before published), and Hertzfeld's vivid first-hand accounts, Revolution in the Valley reveals what it was like to be there at the birth of the personal computer revolution. The story comes to life through the book's portrait of the talented and often eccentric characters who made up the Macintosh team. Now, over 20 years later, millions of people are benefiting from the technical achievements of this determined and brilliant group of people.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 439 p. , ill. ; , 24 cm
    Keywords: eBay (Firm) ; Internet auctions ; Electronic books ; local
    Abstract: It's the undisputed king of Internet auction sites. It's a global bazaar offering a range of goods from Antiques to Zulu Daisies. Cars, clothing, collectibles: you name it, and it's likely that you can find on eBay. But along with the vast selection of goods available, buyers and sellers also encounter all the other elements that markets are known for: tricks and swindlers, overpriced goods, deceptive labeling, small print, recycled items marked as new, and the occasional rare priceless find or undiscovered treasure.Seasoned eBay traders know that to successfully buy and sell within this mega-shopping platform, you need to understand the system. Unfortunately, the secrets of the site are often tightly held by other buyers and sellers seeking a competitive edge. But what if you're a newcomer? Or an experienced trader who wants to make the jump to power buyer or seller? eBay: The Missing Manual gives you the inside information you'll need to become an eBay expert.Buyers will find the most effective ways to find you want and pay prices that are sure to bring a smile to your face. And you'll get authoritative advice on strategic bidding: how to watch for elusive items, time your bids to take the competition by surprise, and--above all--avoid paying more than you ought to.Sellers will get sure-fire tips from eBay veterans who have discovered ways to ramp up their own auctions and sell at the highest possible prices. From the smallest details, such as how to take and post the most effective photos of your goods, to pricing strategies, inventory management, and shipping methods, this user-friendly manual will help you make more money on eBay. Whether you're selling a single item or running fulltime business on the site, you'll find tips to help you do it more effectively.As in any community, problems and disputes arise, and you'll learn how other eBayers resolve such troubles or work around them. eBay: The Missing Manual has gems of wisdom for everyone from total novices to more experienced traders. If you're looking to improve your eBay auction experience, you'll savor the tips and trick revealed in this guided exploration.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network. Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization's network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks. Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks. Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources. "This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade." -...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xx, 374 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Local area networks (Computer networks) ; Telecommunication ; Switching systems ; Electronic books ; local
    Abstract: The essential guide for understanding Ethernet switched networks Understand various Ethernet technologies from 10BASE-T to Gigabit Ethernet Learn about common switching modes, paths, and architectures Delve into the Cisco Catalyst switch architecture and examine the various Catalyst switch models, including the 6000/6500, 4500, and 3750 Become familiar with VLAN concepts, including types of trunks, VLAN Trunking Protocol (VTP), and private VLANs Understand Multilayer Switching (MLS) and the various hardware components that make MLS work Learn how to configure Cisco Catalyst switches in both native and hybrid mode Implement QoS on Cisco Catalyst switches Deploy multicast features and protocols, including PIM, IGMP snooping, and CGMP Utilize data link layer features such as BPDU Guard, BPDU Filter, Root Guard, Loop Guard, RSTP, and MST Evaluate design and configuration best practices Learn how to manage LANs and troubleshoot common problems Local-area networks (LANs) are becoming increasingly congested and overburdened because of a dramatic increase in traffic, faster CPUs and operating systems, and more network-intensive applications. Many organizations that use network and computing technology use LAN switching to take advantage of high-speed traffic forwarding and improved performance of traditional Ethernet technologies that don't require costly wiring upgrades or time-consuming host reconfiguration. Cisco LAN Switching Fundamentals provides administrators of campus networks with the most up-to-date introduction to LAN switching within a traditional Ethernet environment. Cisco LAN Switching Fundamentals presents an in-depth look at modern campus network requirements. It provides an easy-to-understand introduction to LAN switching best practices using Cisco Catalyst switches. This book provides you with a wealth of details on the architecture, operation, and configuration of the Cisco Catalyst family of switches. You learn about a wide range of topics, including quality of service (QoS), multicast, Rapid Spanning Tree Protocol (RSTP), Multiple Spanning Tree (MST), private virtual LANs (VLANs), and configuration using the native and hybrid software interfaces. Design advice and configuration examples are discussed liberally throughout the book to provide you with the best perspective on effective deployment techniques. Finally, the book wraps up with a discussion of steps necessary to troubleshoot common problems and optimize LAN performance. ...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 478 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.
    Note: "A system administrator's guide to hetrogeneous networking"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 377 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/762
    Keywords: Apache (Computer file : Apache Group) ; Application software ; Development ; Java (Computer program language) ; Open source software ; Electronic books ; local
    Abstract: As a Java developer, you're always looking for tools to help in your web and application development. Maybe you've heard of the Jakarta Commons open source Java tools. The Jakarta Commons is an open source Jakarta subproject where developers create and maintain a collection of twenty-plus independent Java components and utilities that serve useful purposes. Jakarta Commons packages include utilities for web, XML, networking, building and testing applications, and some that help other packages work better together. Jakarta Commons packages are designed to be reusable. Each one is a time saver by itself, and when used in combination the results can be very powerful. But in searching for information on the Jakarta Commons tools, you find it hard to locate documentation relevant to your needs. You don't have lots of time to spend searching for information on a specific Jakarta Commons tool to determine what it does and how to incorporate it in your code. If you are looking for a single source for clear information and samples on how to use the Jakarta Commons tools, then the Jakarta Commons Cookbook is for you. The Jakarta Commons Cookbook summarizes each of the available Jakarta Commons packages and contains practical and efficient recipes for making the most out of the Jakarta Commons open source Java tools. You don't have to be an expert, since the book explains how and why to use a utility, pitfalls to avoid, and where to look for additional information on Jakarta Commons utilities. It introduces design possibilities and explores combining Jakarta Commons utilities in novel assemblies to create complex applications. The book offers detailed code samples and insider tips--making it a valuable resource whether you are an expert Java developer or a novice. If you want to quickly learn how to use Jakarta Commons timing-saving utilities or have an invaluable resource for Jakarta Commons questions and techniques, then the Jakarta Commons Cookbook is for you.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 316 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Keywords: Ant (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Abstract: Soon after its launch, Ant succeeded in taking the Java world by storm, becoming the most widely used tool for building applications in Java environments. Like most popular technologies, Ant quickly went through a series of early revision cycles. With each new version, more functionality was added, and more complexity was introduced. Ant evolved from a simple-to-learn build tool into a full-fledged testing and deployment environment. Ant: The Definitive Guide has been reworked, revised and expanded upon to reflect this evolution. It documents the new ways that Ant is being applied, as well as the array of optional tasks that Ant supports. In fact, this new second edition covers everything about this extraordinary build management tool from downloading and installing, to using Ant to test code. Here are just of a few of the features you'll find detailed in this comprehensive, must-have guide: Developing conditional builds, and handling error conditions Automatically retrieving source code from version control systems Using Ant with XML files Using Ant with JavaServer Pages to build Web applications Using Ant with Enterprise JavaBeans to build enterprise applications Far exceeding its predecessor in terms of information and detail, Ant: The Definitive Guide , 2nd Edition is a must-have for Java developers unfamiliar with the latest advancements in Ant technology. With this book at your side, you'll soon be up to speed on the premiere tool for cross-platform development.Author Steve Holzner is an award-winning author who s been writing about Java topics since the language first appeared; his books have sold more than 1.5 million copies worldwide.
    Note: Includes index. - Prev. ed. by Jesse Tilly and Eric M. Burke, pub. May 2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 401 p. , ill. ; , 23 cm
    Keywords: TCP/IP (Computer network protocol) ; Electronic books ; local
    Abstract: Your first step into the world of TCP/IP No TCP/IP experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding TCP/IP begins here! Learn TCP/IP basics Discover the power of TCP/IP components and subcomponents Use hands-on activities to understand TCP/IP Benefit from examples that illustrate the power of TCP/IP Welcome to the world of TCP/IP! TCP/IP is the world's de facto communications protocol. It is the official protocol of the Internet and, consequently, has become the predominant communications protocol suite in many private networks and internetworks. No TCP/IP experience needed! TCP/IP First-Step explores TCP/IP concepts in a reader-friendly manner that assumes no previous experience. Learn about packetized data transfer, open networking, reference models, and standards bodies. Understand the architecture of the TCP/IP protocol suite and learn about its components, functions, and respective uses. TCP/IP First-Step helps you understand TCP/IP's role in the network. Learn more about the First-Step Series at www.ciscopress.com/firststep.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    ISBN: 1587052024
    Language: English
    Pages: p. ; , cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: A detailed examination of interior routing protocols -- completely updated in a new edition A complete revision of the best-selling first edition--widely considered a premier text on TCP/IP routing protocols A core textbook for CCIE preparation and a practical reference for network designers, administrators, and engineers Includes configuration and troubleshooting lessons that would cost thousands to learn in a classroom and numerous real-world examples and case studies Praised in its first edition for its approachable style and wealth of information, this new edition provides readers a deep understanding of IP routing protocols, teaches how to implement these protocols using Cisco routers, and brings readers up to date protocol and implementation enhancements. Routing TCP/IP, Volume 1 , Second Edition, includes protocol changes and Cisco features that enhance routing integrity, secure routers from attacks initiated through routing protocols, and provide greater control over the propagation of routing information for all the IP interior routing protocols. Routing TCP/IP, Volume 1 , Second Edition, provides a detailed analysis of each of the IP interior gateway protocols (IGPs). Its structure remains the same as the best-selling first edition, though information within each section is enhanced and modified to include the new developments in routing protocols and Cisco implementations. What's New In This Edition? The first edition covers routing protocols as they existed in 1998. The new book updates all covered routing protocols and discusses new features integrated in the latest version of Cisco IOS Software. IPv6, its use with interior routing protocols, and its interoperability and integration with IPv4 are also integrated into this book. Approximately 200 pages of new information are added to the main text, with some old text removed. Additional exercise and solutions are also included.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize a data center site Learn how to lay out key infrastructure objects within the data center for greatest efficiency, from buffer zones to server rows Apply proven installation methods by studying sample illustrations of both overhead and under-floor systems Extract the best practices and design strategies for both in-room and standby electrical infrastructure Avoid accidental downtime, improve productivity, and ensure user safety Safeguard and streamline your network infrastructure with a well-organized physical hierarchy Understand the special challenges of retrofitting overburdened server environments Implement solutions from a wide array of sample illustrations and examples of essential data center signage Safeguard servers with operations standards for people working in or visiting the data center Download templates used by Cisco to design its data centers, customizable to square footage and geography Avoid excess construction costs by designing a data center that meets your needs today and for many years to come All data centers are unique, but they all share the same mission: to protect your company's valuable information. Build the Best Data Center Facility for Your Business answers your individual questions in one flexible step-by-step reference guide. Benefit from the author's concise and practical approach to data center design and management. The author distills this complex topic by sharing his first-hand and worldwide experience and expertise. Regardless of your experience level, you can fill your knowledge gaps on how to safeguard your company's valuable equipment and intellectual property. This easy-to-navigate book is divided into two parts: Part I covers data center design and physical infrastructure details, and Part II covers data center management and operations. You can also access supplementary online materials for installation instructions, which include customizable data center design templates, written cabling specifications, and sample drawings. If you need a starting point for designing your first data center, regardless of size; if you need to prepare yourself with comprehensive strategies to retrofit or improve an existing one; or if you need proven methods to manage a d...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 357 p. , ill. ; , 25 cm
    DDC: 621.3893
    Keywords: Computer sound processing ; Multimedia systems ; Music ; Computer network resources ; Music ; Computer programs ; Sound ; Recording and reproducing ; Digital techniques ; Electronic books ; local
    Abstract: Join the digital audio revolution! Tens of millions of users are embracing digital music, and with Digital Audio Essentials , you can, too. Nearly every personal computer built in the last few years contains a CD-burning drive; MP3 and other portable player sales dominate the consumer electronics industry; and new networkable stereo equipment lets you use your digital music collection to power your home entertainment system. Whether it's downloading music, ripping CDs, organizing, finding, and creating higher quality music files, buying music players and accessories, or constructing a home stereo system, Digital Audio Essentials helps you do get it done. An indispensable reference for music enthusiasts, digital archivists, amateur musicians, and anyone who likes a good groove, Digital Audio Essentials helps you avoid time-consuming, costly trial and error in downloading audio files, burning CDs, converting analog music to digital form, publishing music to and streaming from the Web, setting up home stereo configurations, and creating your own MP3 and other audio files. The book--for both Mac and PC users--includes reliable hardware and software recommendations, tutorials, resources, and file sharing, and it even explains the basics of the DMCA and intellectual property law. You may (or may not) already know the basics of ripping CDs or downloading music, but Fries will show you so much more--including advice on the multitude of MP3 players on the market, stereo options, file formats, quality determinations, and the legalities of it all. Both a timely, entertaining guide and an enduring reference, this is the digital audio handbook you need to make the most of your expanding digital music collection.
    Note: "A comprehensive guide to creating, recording, editing, and sharing music and other audio"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 554 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.75/65
    Keywords: Oracle (Computer file) ; Database management ; Electronic books ; local
    Abstract: Despite its wide availability and usage, few developers and DBAs have mastered the true power of Oracle SQL Plus. This bestselling book--now updated for Oracle 10g--is the only in-depth guide to this interactive query tool for writing SQL scripts. It's an essential resource for any Oracle user.The new second edition of Oracle SQL Plus: The Definitive Guide clearly describes how to perform, step-by-step, all of the tasks that Oracle developers and DBAs want to perform with SQL Plus--and maybe some you didn't realize you could perform.With Oracle SQL Plus: The Definitive Guide, you'll expertly: write and execute script files generate ad hoc reports extract data from the database query the data dictionary tables customize an SQL Plus environment and much more It also includes a handy quick reference to all of its syntax options and an often-requested chapter on SQL itself, along with a clear, concise, and complete introduction.This book is truly the definitive guide to SQLPlus. It's an indispensable resource for those who are new to SQL*Plus, a task-oriented learning tool for those who are already using it, and an immediately useful quick reference for every user. If you want to leverage the full power and flexibility of this popular Oracle tool, you'll need this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 280 p. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.13
    Keywords: GNU Emacs ; Make (Computer file) ; Utilities (Computer programs) ; Electronic books ; local
    Abstract: The utility simply known as make is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, make still turns up to this day as the central engine in most programming projects; it even builds the Linux kernel. In the third edition of the classic Managing Projects with GNU make , readers will learn why this utility continues to hold its top position in project build software, despite many younger competitors. The premise behind make is simple: after you change source files and want to rebuild your program or other output files, make checks timestamps to see what has changed and rebuilds just what you need, without wasting time rebuilding other files. But on top of this simple principle, make layers a rich collection of options that lets you manipulate multiple directories, build different versions of programs for different platforms, and customize your builds in other ways. This edition focuses on the GNU version of make , which has deservedly become the industry standard. GNU make contains powerful extensions that are explored in this book. It is also popular because it is free software and provides a version for almost every platform, including a version for Microsoft Windows as part of the free Cygwin project. Managing Projects with GNU make , 3rd Edition provides guidelines on meeting the needs of large, modern projects. Also added are a number of interesting advanced topics such as portability, parallelism, and use with Java. Robert Mecklenburg, author of the third edition, has used make for decades with a variety of platforms and languages. In this book he zealously lays forth how to get your builds to be as efficient as possible, reduce maintenance, avoid errors, and thoroughly understand what make is doing. Chapters on C++ and Java provide makefile entries optimized for projects in those languages. The author even includes a discussion of the makefile used to build the book.
    Note: Includes index. - Rev. ed. of: Managing projects with Make / Andrew Oram and Steve Talbott
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Language: English
    Pages: xviii, 615 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 004.5/6
    Keywords: Linux device drivers (Computer programs) ; Electronic books ; local
    Abstract: Device drivers literally drive everything you're interested in--disks, monitors, keyboards, modems--everything outside the computer chip and memory. And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic Linux Device Drivers from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.Over the years the book has helped countless programmers learn: how to support computer peripherals under the Linux operating system how to develop and write software for new hardware under Linux the basics of Linux operation even if they are not expecting to write a driver The new edition of Linux Device Drivers is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.
    Note: On t.p. of previous ed. Alessandro Rubini's name appeared first. - Includes bibliographical references (p. 575-577) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 734 p. , ill. ; , 24 cm
    Keywords: Computer networks ; Design and construction ; Computer networks ; Management ; Quality control ; Electronic books ; local
    Abstract: Best-practice QoS designs for protecting voice, video, and critical data while mitigating network denial-of-service attacks Understand the service-level requirements of voice, video, and data applications Examine strategic QoS best practices, including Scavenger-class QoS tactics for DoS/worm mitigation Learn about QoS tools and the various interdependencies and caveats of these tools that can impact design considerations Learn how to protect voice, video, and data traffic using various QoS mechanisms Evaluate design recommendations for protecting voice, video, and multiple classes of data while mitigating DoS/worm attacks for the following network infrastructure architectures: campus LAN, private WAN, MPLS VPN, and IPSec VPN Quality of Service (QoS) has already proven itself as the enabling technology for the convergence of voice, video, and data networks. As business needs evolve, so do the demands for QoS. The need to protect critical applications via QoS mechanisms in business networks has escalated over the past few years, primarily due to the increased frequency and sophistication of denial-of-service (DoS) and worm attacks. End-to-End QoS Network Design is a detailed handbook for planning and deploying QoS solutions to address current business needs. This book goes beyond discussing available QoS technologies and considers detailed design examples that illustrate where, when, and how to deploy various QoS features to provide validated and tested solutions for voice, video, and critical data over the LAN, WAN, and VPN. The book starts with a brief background of network infrastructure evolution and the subsequent need for QoS. It then goes on to cover the various QoS features and tools currently available and comments on their evolution and direction. The QoS requirements of voice, interactive and streaming video, and multiple classes of data applications are presented, along with an overview of the nature and effects of various types of DoS and worm attacks. QoS best-practice design principles are introduced to show how QoS mechanisms can be strategically deployed end-to-end to address application requirements while mitigating network attacks. The next section focuses on how these strategic design principles are applied to campus LAN QoS design. Considerations and detailed design recommendations specific to the access, distribution, and core layers of an enterprise campus network are presented. Private WAN QoS design is discussed in the ...
    Note: Subtitle on cover: Quality of service in LANs, WANs, and VPNs. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xx, 238 p. , ill. ; , 23 cm
    DDC: 004.6/2
    Keywords: Wireless communication systems ; Electronic books ; local
    Abstract: Your First-Step into the World of Wireless Networks No experience required! Gain an understanding of wireless networking basics with this reader friendly guide The first book anyone should read about wireless networks with step-by-step instruction Learn from an author experienced in and known for writing to a generalist wireless audience with a clear, simple-to-understand style As a basic introduction to wireless networking, Wireless Networks First-Step assumes that readers have no previous wireless experience. The book provides an overview of wireless networking, along with details of applicable standards and technologies. Newcomers to wireless technologies will find practical information along with an abundance of examples. Case studies throughout the chapters provide real-world implementation examples, presented in a non-technical fashion. Implementation details are discussed only to the extent that readers can identify what type of wireless network may be appropriate for their needs. Wireless Networks First-Step , written by Jim Geier, begins with a basic introduction to wireless networks and an explanation of radio wave communications. It then reviews different types of wireless networks including WPANs (wireless personal area networks), WLANs (wireless local area networks), wireless MANs (metropolitan area networks), and WWANs (wireless wide area networks). The final section covers security threats to wireless networks, and solutions to combat these threats. 158720111903232004
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 310 p. , ill. ; , 24 cm
    Keywords: Intranets (Computer networks) ; Web servers ; Electronic books ; local
    Abstract: Want to work more efficiently and effectively? Want to improve productivity? Microsoft is betting that you do. That's why it created Windows SharePoint Services--a set of collaboration tools that helps organizations increase individual and team productivity by enabling them to create web sites for information sharing and document collaboration.Through these team-oriented web sites, users capture and share ideas, and work together on documents, tasks, contacts, etc.--either among themselves or with partners and customers. And if you have Windows 2003 Server, then you already have SharePoint, since it's built right in. But before you can enjoy the benefits of SharePoint, you need to know how to turn it on, set it up, and get your applications working with it. Essential Sharepoint will help you do just that. It's not only the most complete guide for setting up and using these increasingly popular sites, but it also explains in detail the integration that makes SharePoint exciting. Everything you need to know about SharePoint is covered, including: hosting choices administration customization integration with Microsoft Office developing new SharePoint functionality when to use SharePoint portal server Essential Sharepoint covers all the key topics for getting up and running with this powerful and popular set of collaboration tools. And it's not just for members of the IT staff. This comprehensive guide is for anyone in an organization who wants to explore Microsoft SharePoint in order to foster collaboration with other users.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 233 p. , ill. ; , 24 cm
    DDC: 006.776
    Keywords: QuickTime ; Java (Computer program language) ; Electronic books ; local
    Abstract: QuickTime Java (QJT) is a terrific multimedia toolkit, but it's also terrifying to the uninitiated. Java developers who need to add audio, video, or interactive media creation and playback to their applications find that QTJ is powerful, but not easy to get into. In fact, when it comes to class-count, QuickTime Java is nearly as large as all of Java 1.1. Once you learn the entire scope of Apple's QuickTime software, you really appreciate the problem. At its simplest, QuickTime allows Mac and Windows users to play audio and video on their computers. But QuickTime is many things: a file format, an environment for media authoring, and a suite of applications that includes browser plug-ins for viewing media within a web page, a PictureViewer for working with still pictures, QuickTime Streaming Server for delivering streaming media files on the Internet in real time, and QuickTime Broadcaster for delivering live events on the Internet. Among others. As if that weren't daunting enough, the javadocs on QJT are wildly incomplete, and other books on the topic are long out of date and not well regarded, making progress with QTJ extremely difficult. So what can you do? Our new hands-on guide, QuickTime Java: A Developer's Notebook , not only catches up with this technology, but de-mystifies it. This practical "all lab, no lecture" book is an informal, code-intensive workbook that offers the first real look at this important software. Like other titles in our Developer's Notebook series, QuickTime Java: A Developer's Notebook is for impatient early adopters who want get up to speed on what they can use right now. It's deliberately light on theory, emphasizing example over explanation and practice over concept, so you can focus on learning by doing. QuickTime Java: A Developer's Notebook gives you just the functionality you need from QTJ. Even if you come to realize that 95% of the API is irrelevant to you, this book will help you master the 5% that really counts.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 1224 p. , ill. ; , 23 cm
    Edition: 5th ed.
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Object-oriented programming (Computer science) ; Web servers ; Electronic books ; local
    Abstract: With more than 700,000 copies sold to date, Java in a Nutshell from O'Reilly is clearly the favorite resource amongst the legion of developers and programmers using Java technology. And now, with the release of the 5.0 version of Java, O'Reilly has given the book that defined the "in a Nutshell" category another impressive tune-up. In this latest revision, readers will find Java in a Nutshell , 5th Edition, does more than just cover the extensive changes implicit in 5.0, the newest version of Java. It's undergone a complete makeover--in scope, size, and type of coverage--in order to more closely meet the needs of the modern Java programmer. To wit, Java in a Nutshell , 5th Edition now places less emphasis on coming to Java from C and C++, and adds more discussion on tools and frameworks. It also offers new code examples to illustrate the working of APIs, and, of course, extensive coverage of Java 5.0. But faithful readers take comfort: it still hasn't lost any of its core elements that made it such a classic to begin with. This handy reference gets right to the heart of the program with an accelerated introduction to the Javaprogramming language and its key APIs--ideal for developers wishing to start writing code right away. And, as was the case in previous editions, Java in a Nutshell , 5th Edition is once again chock-full of poignant tips, techniques, examples, and practical advice. For as longas Java has existed, Java in a Nutshell has helped developers maximize the capabilities of the program's newest versions. And this latest edition is no different.
    Note: "Covers Java 5.0"--Cover p. [1]. - Contains an accelerated introduction to Java for C and C++ programmers who want to learn the language fast. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 519 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Swing (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Abstract: Swing Hacks helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. If you're a Java developer looking to build enterprise applications with a first-class look and feel, Swing is definitely one skill you need to master. This latest title from O'Reilly is a reference to the cool stuff in Swing. It's about the interesting things you learn over the years--creative, original, even weird hacks--the things that make you say, "I didn't know you could even do that with Swing!" Swing Hacks will show you how to extend Swing's rich component set in advanced and sometimes non-obvious ways. The book touches upon the entire Swing gamut-tables, trees, sliders, spinners, progress bars, internal frames, and text components. Detail is also provided on JTable/JTree, threaded component models, and translucent windows. You'll learn how to filter lists, power-up trees and tables, and add drag-and-drop support. Swing Hacks will show you how to do fun things that will directly enhance your own applications. Some are visual enhancements to make your software look better. Some are functional improvements to make your software do something it couldn't do before. Some are even just plain silly, in print only to prove it could be done. The book will also give you give you a small glimpse of the applications coming in the future. New technology is streaming into the Java community at a blistering rate, and it gives application developers a whole new set of blocks to play with. With its profusion of tips and tricks, Swing Hacks isn't just for the developer who wants to build a better user interface. It's also ideally suited for client-side Java developers who want to deliver polished applications, enthusiasts who want to push Java client application boundaries, and coders who want to bring powerful techniques to their own applications. Whatever your programming needs, Swing Hacks is packed with programming lessons that increase your competency with interface-building tools.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: Your complete guide to building your information technology career in any economy The IT Career Builder's Toolkit features market-focused skills and proven methods you can use to jump-start and advance your career. While other books cover just the mechanics of preparing your résumé, writing a cover letter, and interviewing, this book provides all that plus additional insight from IT career development expert, Matt Moran, to help you plan and create a rewarding IT career over the long term. The toolkit approach allows you to use this book to suit your unique needs: Are you new to the IT field? Benefit by reading the book cover to cover. Just need to fine-tune your IT career? Choose a topic and dive in. Understand and prepare for the various and changing factors that affect your career in both positive and negative ways. Learn how to Present the value of your technical skills in the job market Position yourself as the primary commodity of your career Remove the guesswork out of job searches Highlight on-the-job skills and gain meaningful professional exposure The companion CD-ROM includes career management tools such as résumé and cover letter templates, forms to track important contacts, and self-assessment tools. Start or further your consulting career with sample proposals, opportunity tracking forms, and a time-tracking and billing database. Financial tools, including budget and cash-flow summary worksheets, help you gain financial well-being. Use the Value-Added Technologist presentation to gain a clear understanding of the career-building process and how to use the toolkit to build a dynamic career. Most of all, have fun! Every year, people advance along the path to career stardom. Let Matt help you to be one of them through his career philosophy "Do not accept mediocrity as a career objective-demand more of yourself." "I want you to see the [toolkit] techniques as one more set of skills to adopt in your overall career development program. They are skills, just like your technical skills, that you will use daily during your career. Just as you adopt new technical skills, use the toolkit to define those soft skills that you must learn and put to use. The result will be a more well-rounded and complete professional skill-set." ~ Matthew Moran, from the Introduction Companion CD-ROM The CD-ROM contains valuable tools, forms, spreadsheets, and documents that work with the Toolkit to help you master key areas of your career development.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The all-in-one practical guide to supporting your Cisco network Provides detailed tips for using freeware and open-source tools readily available from the Internet, including the reasons behind choosing a particular tool Refer to a single source for common Cisco network administration issues Dedicated section for network security aids administrators in effectively dealing with security issues Deploy fully functional RADIUS and TACACS+ for servers for controlling access to Cisco devices Deploy Linux- and Windows-based syslog servers to centrally collect syslog information generated by Cisco devices Deploy Linux- and Windows-based network monitoring systems to monitor interface traffic through Cisco devices including routers, switches, VPN concentrators, and Cisco PIX® firewalls Use the trending feature of network monitoring systems for long-term network analysis and capacity planning Automatically detect and report configuration changes on Cisco IOS® Software-based devices and Cisco PIX firewalls Deploy Cisco-based VPNs in mixed environments using Linux- and Windows-based VPN servers Network Administrators Survival Guide solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco® networks using freeware tools. It is a single reference source that explains particular issues, their significance for administrators, and the installation and configuration process for the tools. The solutions are Cisco centric and provide detail not available in generic online information. Network Administrators Survival Guide emphasizes solutions for network managers and administrators of small to medium-sized businesses and enterprises. Each chapter is broadly based on a network administration function, starting with an overview of the topic, followed by the methodology involved to accomplish that function. This includes the tools available, why they are the right choice, and their installation, configuration, and usage methods. For any given function, Network Administrators Survival Guide covers both Windows- and Linux-based tools as appropriate. Most of the Windows-based tools offer the advantage of GUI for ease of use, whereas the Linux-based tools are command-line based and can be used in automated scripts. Both are significant for network administrators. Based on author Anand Deveriya's extensive field experience, this practical guide to maintaining Cisco networks will save you signifi...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Exposes the inner workings of Cisco CallManager to help you maximize your Cisco IP Communications solution Read new content on QSIG, SIP trunks, video support, hunt lists and line groups, time-of-day routing, and new features added in CallManager releases 3.2, 3.3, 3.4, 4.0, and 4.1 Review content from the first edition that has been fully revised and updated to CallManager release 4.1 Learn how to deploy and manage a CallManager solution Understand the components that make up CallManager call routing through the use of basic to advanced examples that solve enterprise call routing problems Gain a full understanding of how CallManager manages media resources and processes information for conferencing, transcoding, annunciation, and more Learn detailed information about North American and international dial plans, trunk and station devices, media resources, and much more Cisco CallManager Fundamentals , Second Edition, provides examples and reference information about Cisco® CallManager, the call-processing component of the Cisco IP Communications solution. Cisco CallManager Fundamentals uses examples and architectural descriptions to explain how CallManager processes calls. This book details the inner workings of CallManager so that those responsible for designing and maintaining a Voice over IP (VoIP) solution from Cisco Systems® can understand the role each component plays and how they interrelate. This book is the perfect resource to supplement your understanding of CallManager. You'll learn detailed information about dial plan management and call routing, hardware and software components, media processing, call detail records, system management and monitoring, and the history of CallManager. The authors, all members of the original team that developed and implemented the CallManager software and documentation from its early stages, also provide a list of features and Cisco solutions that integrate with CallManager. This second edition of Cisco CallManager Fundamentals covers software releases through release 4.1. With this book, you will gain a deeper understanding of the system and find answers to questions not available in any other source. This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 3rd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco IPS exam 642-532 The official study guide helps you master all the topics on the IPS exam, including: IPS concepts Command-line interface (CLI) and IPS Device Manager (IDM) configuration modes Basic sensor and IPS signature configuration IPS signature engines Sensor tuning IPS event monitoring Sensor maintenance Verifying system configuration Using the Cisco IDS Module (IDSM) and Cisco IDS Network Module Capturing network traffic CCSP IPS Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the IPS exam. Cisco Security Test Engineer Earl Carter shares preparation hints and test-taking tips, helping you identify areas of weakness and improve your Intrusion Prevention System (IPS) knowledge. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCSP IPS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary materials make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP IPS Exam Certification Guide is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains an electronic copy of the book and more than 200 practice questions for the IPS ex...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The practical guide to building resilient and highly available IP networks Learn from an all-in-one introduction to new features and developments in building a resilient IP network Enable your organization to meet internal service-level agreements (SLAs) for mission-critical resources Understand how a resilient IP network can help in delivering mission-critical information such as video and voice services Work with configuration examples that are based on real-world issues and customer requirements Get tips and best practices from field personnel who have worked on some of the largest networks with stringent uptime requirements and SLAs More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is of utmost importance to companies and their service providers. The challenges for the professionals responsible for these networks include ensuring that the network remains up all the time, keeping abreast of the latest technologies that help maintain uptime, and reacting to ever-increasing denial-of-service (DoS) attacks. Building Resilient IP Networks helps you meet those challenges. This practical guide to building highly available IP networks captures the essence of technologies that contribute to the uptime of networks. You gain a clear understanding of how to achieve network availability through the use of tools, design strategy, and Cisco IOS® Software. With Building Resilient IP Networks , you examine misconceptions about five-nines availability and learn to focus your attention on the real issues: appreciating the limitations of the protocols, understanding what has been done to improve them, and keeping abreast of those changes. Building Resilient IP Networks highlights the importance of having a modular approach to building an IP network and, most important, illustrates how a modular design contributes to a resilient network. You learn how an IP network can be broken down to various modules and how these modules interconnect with one another. Then you explore new network resiliency features that have been developed recently, categorized with respect to the design modules. Building Resilient IP Networks is relevant to both enterprise and service provider customers of all sizes. Regardless of whether the network connects to the Internet, fortifying IP networks for maximum uptime and prevention of attacks is mandatory for anyone's b...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution A complete resource for understanding VPN components and VPN design issues Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients Discover troubleshooting tips and techniques from real-world scenarios based on the author's vast field experience Filled with relevant configurations you can use immediately in your own network With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs. Part I, "VPNs," introduces the topic of VPNs and discusses today's main technologies, including IPsec. It also spends an entire chapter on SSL VPNs, the newest VPN technology and one that Cisco has placed particular emphasis on since 2003. Part II, "Concentrators," provides detail on today's concentrator products and covers site-to-site and remote-access connection types with attention on IPsec and WebVPN. Part III covers the Cisco VPN Client versions 3.x and 4.x along with the Cisco3002 Hardware Client. Cisco IOS® routers are the topic of Part IV, covering scalable VPNs with Dynamic Multipoint VPN, router certificate authorities, and router remote access solutions. Part V explains Cisco PIX and Cisco ASA security appliances and their roles in VPN connectivity, including remote access and site-to-site connections. In Part VI, a case study shows how a VPN solution is best implemented in the real world using a variety of Cisco VPN products in a sample network. This security book is part of the Cisco Press® Networking Technology Serie...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A complete configuration manual for MPLS, MPLS VPNs, MPLS TE, QoS, Any Transport over MPLS (AToM), and VPLS Understand the crucial Cisco commands for various MPLS scenarios Understand fundamentals of MPLS operation and learn to configure basic MPLS in Frame Relay and ATM-based environments Master fundamentals of MPLS VPN operation including Multiprotocol BGP (MBGP) operation, VPNv4 route exchange, and basic MPLS VPN configuration in the provider network Understand and configure various PE-CE routing protocols in MPLS VPN networks Understand MPLS VPN provisioning in an Inter-provider VPN (Inter-AS) and Carrier Supporting Carrier (CSC) environment Learn MPLS TE and its advanced features Examine AToM with configuration examples for like-to-like and any-to-any L2 VPN implementations and VPLS components and operation, VPLS configuration and verification, and VPLS topologies Learn about MPLS QoS, including configuration and implementation of uniform and short pipe modes MPLS Configuration on Cisco IOS Software is a complete and detailed resource to the configuration of Multiprotocol Label Switching (MPLS) networks and associated features. Through its practical, hands-on approach, you'll become familiar with MPLS technologies and their configurations using Cisco IOS® Software. MPLS Configuration on Cisco IOS Software covers basic-to-advanced MPLS concepts and configuration. Beyond its emphasis on MPLS, you'll learn about applications and deployments associated with MPLS, such as traffic engineering (TE), Layer 2 virtual private networks (VPN), and Virtual Private LAN Service (VPLS). You'll receive practical guidance and deployment scenarios that can be enhanced by re-creation of the setups and configurations demonstrated within this book. You'll move quickly from a brief overview of MPLS technology and basic MPLS configuration on Cisco® routers to more advanced topics. Several chapters provide instruction on VPN connectivity options, including implementing Border Gateway Protocol (BGP) in MPLS VPNs. You'll receive configuration guidelines for advanced MPLS implementations such as MPLS TE, quality of service (QoS), and extranet VPNs. You'll learn about implementation of Layer 2 VPNs versus Layer 3 VPNs with Cisco Any Transport over MPLS (AToM). And you'll see demonstrations of implementing VPLS on Cisco routers complete with the configurations and platform support. "I highly recommend MPLS Configuration on Cisco IOS Software as required reading for th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A comprehensive guide to analyzing the business rationale for WLANs Evaluate the business rationale behind the deployment of WLANs, including return on investment (ROI), net present value, payback period, and total cost of ownership Develop a robust execution plan to deploy and operate the WLAN Understand the high-level technical issues of deploying and managing your WLAN from a business decision-maker's perspective Maximize the positive impact of supplementary and complementary services such as voice, video, and guest WLAN access Identify potential security threats and develop strategies to mitigate attacks Learn methodological and technical best practices from WLAN deployment case studies featuring real-world, enterprise-class businesses and institutions Gather information easily by referring to quick reference sheets and appendixes covering an antenna overview, a high-level sample project plan, checklists, and flowcharts Businesses today are increasingly adopting wireless LANs (WLANs) as a primary data transport mechanism. To determine when and how to effectively deploy WLANs, business managers, project managers, and IT executives need a clear, holistic evaluation of the business benefits and risks behind this complex technology solution. The Business Case for Enterprise-Class Wireless LANs helps you make the right decisions by explaining the business value and cost of investing in a WLAN-from security and architecture to deployment and application. Using a lifecycle perspective, this guide covers the value proposition, cost justification, and alignment of security, design, and operational components within the business. Written in an approachable style, The Business Case for Enterprise-Class Wireless LANs provides a baseline analysis of WLAN technologies for a large-scale deployment and includes concise real-world case studies with checklists and flowcharts that you can adapt for your needs. By recognizing the obstacles and advantages of implementing a WLAN from a strategic and justified business perspective, you can apply the economic benefits to your organization and ensure a timely and efficient deployment of your organization's WLAN. This volume is in the Network Business Series offered by Cisco Press®. Books in this series provide IT executives, decision makers, and networking professionals with pertinent information about today's most important technologies and business strategies.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network. Securing Your Business with Cis...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 1587055740 ISBN-13: 9781587055744 Cisco authorized self-study book for CCDP® 642-871 architectures foundation learning Prepare for the CCDP ARCH exam 642-871 with the Cisco authorized self-study guide. This book teaches you how to: Understand the composition and deployment of the Cisco AVVID framework in network design Understand the composition and role of the Enterprise Composite Network Model in enterprise network design Design enterprise campus networks and their edge network connectivity to the Internet Understand and implement network management solutions in the network Integrate new technologies designed to enhance network performance and availability in the enterprise, such as high availability, QoS, multicasting, and storage and content networking Design and implement appropriate security solutions for enterprise networks Deploy wireless technologies within the enterprise Implement and design IP telephony solutions for the enterprise network CCDP Self-Study: Designing Cisco Network Architectures (ARCH) is a Cisco® authorized self-paced learning tool. By presenting a structured format for the conceptual and intermediate design of AVVID network infrastructures, this book teaches you how to design solutions that scale from small to large enterprise networks and take advantage of the latest technologies. Whether you are preparing for the CCDP® certification or simply want to gain a better understanding of how to architect network solutions over intelligent network services to achieve effective performance, scalability, and availability, you will benefit from the foundation information presented in this book. This comprehensive book provides detailed information and easy-to-grasp tutorials on a broad range of topics related to architecture and design, including security, fine-tuning routing protocols, switching structures, and IP multicasting. To keep pace with the Cisco technological developments and new product offerings, this study guide includes coverage of wireless networking, the SAFE Blueprint, content networking, storage networking, quality of service (QoS), IP telephony, network management, and high availability networks. Design examples and sample verification output demonstrate implementation techniques. Configuration exercises, which appear in every chapter, provide a practical review of key concepts to discuss critical issues surrounding network operation. Chapter-ending revie...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The all-in-one guide to modern routed and switched campus network design Understand the network design process and network design models Learn how switches are used in network design Design an IP addressing plan and select appropriate IP routing protocols Apply network security design principles to boost network security Enable WLANs to improve workforce mobility Examine QoS design requirements and tools Unleash the power of voice transport over data networks, including VoIP and IP telephony Use content networking to provide content to users quickly and efficiently Learn how to integrate network management protocols and tools into network designs Understand how to effectively integrate IP multicast, high availability, storage networking, and IPv6 into your network designs Over the past decade, campus network design has evolved many times as new technologies have emerged and business needs have changed. For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and content networking, their core infrastructures must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step. Campus Network Design Fundamentals is an all-in-one guide to key technologies that can be integrated into network design. The book provides insight into why each technology is important and how to apply this knowledge to create a campus network that includes as many or as few of today's productivity-enhancing applications as are needed in your environment. Topics covered throughout the book include network design process and models, switching, IP routing, quality of service (QoS), security, wireless LANs (WLANs), voice transport, content networking, network management, IPv6, IP multicast, increasing network availability, and storage networking. Sample network designs are included through-out, and the book concludes with a comprehensive case study that illustrates the design process and solutions for headquarters, branch offices, and home office/remote users. Whether you need an overview of modern campus technologies or seek advice on how to design switched and routed networks that securely support these technologies, this book is your comprehensive resource to the foundations upon which all modern-day campus networks are based. This book is part of the Cisco Press® Fundament...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Identify, mitigate, and respond to network attacks Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI) Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM) Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network. This new family of adaptive security appliances also controls network activity and application traffic and delivers flexible VPN connectivity. The result is a powerful multifunction network security device that provides the security breadth and depth for protecting your entire network, while reducing the high deployment and operations costs and complexities associated with managing multiple point products. Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a practitioner's guide to planning, deploying, and troubleshooting a comprehensive security plan with Cisco ASA. The book provides valuable insight and deployment examples and demonstrates how adaptive identification and mitigation services on Cisco ASA provide a sophisticated security solution for both large and small network environments. The book contains many useful sample configurations, proven design scenarios, and discussions of debugs that help you understand how to get the most out of Cisco ASA in your own network. "I have found this book really highlights the practical aspects needed for building real-world security. It offers the insider's guidance needed to plan, implement, configure, and troubleshoot the Cisco ASA in customer environments and demonstrates the potential and power of Self-Defending Networks." -Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems® This security book is part of th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Identify, analyze, and resolve current and potential network security problems Learn diagnostic commands, common problems and resolutions, best practices, and case studies covering a wide array of Cisco network security troubleshooting scenarios and products Refer to common problems and resolutions in each chapter to identify and solve chronic issues or expedite escalation of problems to the Cisco TAC/HTTS Flip directly to the techniques you need by following the modular chapter organization Isolate the components of a complex network problem in sequence Master the troubleshooting techniques used by TAC/HTTS security support engineers to isolate problems and resolve them on all four security domains: IDS/IPS, AAA, VPNs, and firewalls With the myriad Cisco® security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. Cisco Network Security Troubleshooting Handbook can single-handedly help you analyze current and potential network security problems and identify viable solutions, detailing each step until you reach the best resolution. Through its modular design, the book allows you to move between chapters and sections to find just the information you need. Chapters open with an in-depth architectural look at numerous popular Cisco security products and their packet flows, while also discussing potential third-party compatibility issues. By following the presentation of troubleshooting techniques and tips, you can observe and analyze problems through the eyes of an experienced Cisco TAC or High-Touch Technical Support (HTTS) engineer or determine how to escalate your case to a TAC/HTTS engineer. Part I starts with a solid overview of troubleshooting tools and methodologies. In Part II, the author explains the features of Cisco ASA and Cisco PIX® version 7.0 security platforms, Firewall Services Module (FWSM), and Cisco IOS® firewalls. Part III covers troubleshooting IPsec Virtual Private Networks (IPsec VPN) on Cisco IOS routers, Cisco PIX firewalls with embedded VPN functionalities, and the Cisco 3000 Concentrator. Troubleshooting tools and techniques on the Authentication, Authorization, and Accounting (AAA) framework are discussed thoroughly on routers, Cisco PIX firewalls, and Cisco VPN 3000 concentrators in Part IV. Part IV also covers troubleshooting Cisco Secure ACS on Windows, the server-side component of the AAA framework. IDS/IPS troubleshooting...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    ISBN: 9780596517168 , 0596517165 , 0596005040
    Language: English
    Pages: xxxv, 816 p. , ill. ; , 24 cm
    Parallel Title: Erscheint auch als
    DDC: 384.5/35
    Keywords: Flash (Computer file) ; Mobile communication systems ; Multimedia communications ; Electronic books ; local ; Flash (Computer file) ; Mobile communication systems ; Multimedia communications ; Réseaux multimédias ; TECHNOLOGY & ENGINEERING ; Mobile & Wireless Communications ; Flash (Logiciel) ; Radiocommunications mobiles
    Abstract: With the advent of Flash Communication Server MX (FCS), Macromedia believes that it's on the edge of a breakthrough in how people think about the Internet. FCS has been designed to provide web developers with the means to add polished interactive audio and video features to their sites, the sort of features that users have come to expect. Naturally, the process of efficiently integrating rich media into applications, web sites, and web content is a complex one, to say the least. That's where Programming Flash Communication Server factors in. As the foremost reference on FCS, it helps readers understand how FCS can facilitate: Video on demand Live webcasts Video chat and messaging Shared desktop conferences Live auctions Interactive whiteboard presentations Workflow collaboration Multi-user games Programming Flash Communication Server not only explains how to use the pre-built FCS components to construct a simple application, it also explains the architecture so that developers can program custom components to make even more advanced applications. In addition, the book explains how to truly optimize performance, and talks about considerations for networked applications as well as the media issues pertaining to FCS. Programming Flash Communication Server gives developers a sorely needed leg up on this potentially intimidating technology. It lets users develop cool web applications ranging from direct dating experiences with real-time video, to pre-recorded corporate presentations, to news services with video and audio, and much more. At last, the ability to build web sites with rich interactive features--minus the complex downloads and installation hassles--is a reality. And now, with Programming Flash Communication Server from O'Reilly by your side, you can do more quickly and easily than you ever dreamed possible.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 299 p. ; , 23 cm
    Edition: 1st ed.
    DDC: 302.23/0973
    Keywords: Facts and Comparisons electronic resources ; Digital media ; United States ; Internet ; Political aspects ; United States ; Internet ; Social aspects ; United States ; Mass media and technology ; United States ; Online journalism ; United States ; Web publishing ; United States ; Electronic books ; local
    Abstract: " We the Media , has become something of a bible for those who believe the online medium will change journalism for the better." -Financial Times Big Media has lost its monopoly on the news, thanks to the Internet. Now that it's possible to publish in real time to a worldwide audience, a new breed of grassroots journalists are taking the news into their own hands. Armed with laptops, cell phones, and digital cameras, these readers-turned-reporters are transforming the news from a lecture into a conversation. In We the Media , nationally acclaimed newspaper columnist and blogger Dan Gillmor tells the story of this emerging phenomenon and sheds light on this deep shift in how we make--and consume--the news. Gillmor shows how anyone can produce the news, using personal blogs, Internet chat groups, email, and a host of other tools. He sends a wake-up call tonewsmakers-politicians, business executives, celebrities-and the marketers and PR flacks who promote them. He explains how to successfully play by the rules of this new era and shift from "control" to "engagement." And he makes a strong case to his fell journalists that, in the face of a plethora of Internet-fueled news vehicles, they must change or become irrelevant. Journalism in the 21st century will be fundamentally different from the Big Media oligarchy that prevails today. We the Media casts light on the future of journalism, and invites us all to be part of it. Dan Gillmor is founder of Grassroots Media Inc., a project aimed at enabling grassroots journalism and expanding its reach. The company's first launch is Bayosphere.com, a site "of, by, and for the San Francisco Bay Area." Dan Gillmor is the founder of the Center for Citizen Media, a project to enable and expand reach of grassroots media. From 1994-2004, Gillmor was a columnist at the San Jose Mercury News , Silicon Valley's daily newspaper, and wrote a weblog for SiliconValley.com. He joined the Mercury News after six years with the Detroit Free Press . Before that, he was with the Kansas City Times and several newspapers in Vermont. He has won or shared in several regional and national journalism awards. Before becoming a journalist he played music professionally for seven years.
    Note: "Web site directory": p. 251-257. - Includes bibliographical references (p. 261-279) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 531 , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 327 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: MySQL (Electronic resource) ; Object-oriented programming (Computer science) ; PHP (Computer program language) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Abstract: If you're using PHP 4, then chances are good that an upgrade to PHP 5 is in your future. The more you've heard about the exciting new features in PHP 5, the sooner that upgrade is probably going to be. Although an in-depth, soup-to-nuts reference guide to the language is good to have on hand, it's not the book an experienced PHP programmer needs to get started with the latest release. What you need is a lean and focused guide that answers your most pressing questions: what's new with the technology, what's different, and how do I make the best use of it? In other words, you need a copy of Upgrading to PHP 5 . This book is targeted toward PHP developers who are already familiar with PHP 4. Rather than serve as a definitive guide to the entire language, the book zeroes in on PHP 5's new features, and covers these features definitively. You'll find a concise appraisal of the differences between PHP 4 and PHP 5, a detailed look at what's new in this latest version, and you'll see how PHP 5 improves on PHP 4 code. See PHP 4 and PHP 5 code side-by-side, to learn how the new features make it easier to solve common PHP problems. Each new feature is shown in code, helping you understand why it's there, when to use it, and how it's better than PHP 4. Short, sample programs are included throughout the book. Topics covered in Upgrading to PHP 5 include: The new set of robust object-oriented programming features An improved MySQL extension, supporting MySQL 4.1, prepared statements, and bound parameters Completely rewritten support for XML: DOM, XSLT, SAX, and SimpleXML Easy web services with SOAP SQLite, an embedded database library bundled with PHP 5 Cleaner error handling with exceptions Other new language features, such as iterators, streams, and more. Upgrading to PHP 5 won't make you wade through information you've covered before. Written by Adam Trachtenberg, coauthor of the popular PHP Cookbook , this book will take you straight into the heart of all that's new in PHP 5. By the time you've finished, you'll know PHP 5 in practice as well as in theory.
    Note: "All that's new in PHP 5, covers MySQL 4.1"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 831 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Electronic books ; local
    Abstract: Easy to learn and use, the C# language is targeted at developers for Microsoft's .NET platform who've worked with a C-like language before, such as C, C++, or Java. There's no shortage of excellent tutorials and documentation to help new developers get a handle on the language, such as O'Reilly's Learning C# or Programming C# . But when you need practical answers to the day-to-day questions you run up against, a tutorial isn't going to do the trick. The C# Cookbook gets straight to the heart of the problem with code recipes collected especially for developers working on the .NET platform. The C# Cookbook offers a definitive collection of solutions and examples for this new programming language. Recipes range from simple tasks to the more complex, and are organized with respect to the types of problems you'll need to solve as you progress in your experience as a C# programmer. Nearly every recipe contains a complete, documented code sample showing you how to solve the specific problem, as well as a discussion of how the underlying technology works and a discussion of alternatives, limitations, and other considerations where appropriate. The recipes in the C# Cookbook are organized into seventeen chapters, each of which focuses on a particular topic in creating C# solutions. Among the topics covered, you'll find: Numeric data types in C# Strings and characters Classes and structures Exception handling Delegates and events Regular expressions Data structures and algorithms Networking Security Unsafe Code You don't need to be an experienced C# or .NET developer to use this book. The C# Cookbook is designed for users of all levels with recipes targeted at the real-world developer who needs to solve problems now, not learn lots of theory first. With this guide, all developers will be able to learn and improve their mastery of both the language and the .NET Framework Class Libraries.
    Note: "The definitive collection of solutions and examples"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 193 , ill., forms ; , 24 cm
    Edition: 1st ed.
    DDC: 346.0482
    Keywords: Computer software industry ; Licenses ; Copyright ; Computer programs ; Free computer software ; law and legislation ; Open source software ; Law and legislation ; Electronic books ; local
    Abstract: If you've held back from developing open source or free software projects because you don't understand the implications of the various licenses, you're not alone. Many developers believe in releasing their software freely, but have hesitated to do so because they're concerned about losing control over their software. Licensing issues are complicated, and both the facts and fallacies you hear word-of-mouth can add to the confusion. Understanding Open Source and Free Software Licensing helps you make sense of the different options available to you. This concise guide focuses on annotated licenses, offering an in-depth explanation of how they compare and interoperate, and how license choices affect project possibilities. Written in clear language that you don't have to be a lawyer to understand, the book answers such questions as: What rights am I giving up? How will my use of OS/FS licensing affect future users or future developers? Does a particular use of this software--such as combining it with proprietary software--leave me vulnerable to lawsuits?Following a quick look at copyright law, contracts, and the definition of "open source," the book tackles the spectrum of licensing, including: The MIT (or X), BSD, Apache and Academic Free licenses The GPL, LGPL, and Mozilla licenses The QT, Artistic, and Creative Commons licenses Classic Proprietary licenses Sun Community Source license and Microsoft Shared Source project The book wraps up with a look at the legal effects--both positive and negative--of open source/free software licensing.Licensing is a major part of what open source and free software are all about, but it's still one of the most complicated areas of law. Even the very simple licenses are tricky. Understanding Open Source and Free Software Licensing bridges the gap between the open source vision and the practical implications of its legal underpinnings. If open source and free software licenses interest you, this book will help you understand them. If you're an open source/free software developer, this book is an absolute necessity.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Language: English
    Pages: xvii, 374 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Abstract: An enormous system comprising myriad technologies, options, and releases, Oracle's complexities have spawned numerous areas of specialization. For each area of specialization there are equally specialized how-to books and manuals. O'Reilly's Oracle Essentials claims a unique place among these books. Rather than focusing on one area, the book explains the foundational concepts of the Oracle technology and the core technical and business aspects of using it.The new edition of this classic book, Oracle Essentials, 3rd Edition: Oracle Database 10 g, distills a vast amount of knowledge into an easy-to-read volume covering every aspect of the Oracle database. Readers of all levels will learn about Oracle's features and technologies, including the product line, architecture, data structures, networking, concurrency, tuning, and much more.Featuring focused text, abundant illustrations, and helpful hints, the new edition offers a valuable overview of Oracle's Database 10 g --the industry's first database to support grid computing. Recent releases such as Oracle 9 i and 8 i are also covered. The book contains chapters on: Oracle products, options, and overall architecture for Oracle 10 g and prior recent releases Installing and running Oracle: how to configure, start up, and shut down the database, and various networking issues Oracle data structures, datatypes, and ways of extending datatypes, with an introduction to Oracle objects (e.g., tables, views, indexes) Managing Oracle: security, the Oracle Enterprise Manager, fragmentation and reorganization, and backup and recovery Oracle performance: characteristics of disk, memory, and CPU tuning Multi-user concurrency, online transaction processing (OLTP), and high availability Hardware architectures (e.g., SMP, MPP, NUMA) and their impact on Oracle Data warehousing and distributed databases Network deployment: using Oracle as an Internet computing platform and for grid computing What's new in Oracle 10 g : a summary of the database changes described in the book Oracle Essentials, 3rd Edition: Oracle Database 10 g was written for anyone whose job involves managing or building systems using Oracle DBMS technology or working with staff that uses Oracle technology. This book is the perfect all-in-one source for understanding the complexities and capabilities of Oracle.
    Note: "What you need to know about oracle database architecture and features"--Cover. - Includes bibliographical references (p. 347-355) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: l, 1078 p. , ill. ; , 24 cm
    Edition: 4th ed.
    Series Statement: Networking technology series
    DDC: 004.6
    Keywords: Computer networks ; Handbooks, manuals, etc ; Internetworking (Telecommunication) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: The updated edition of the best-selling all-in-one networking reference provides coverage of essential and cutting-edge technologies Concise overviews of technologies essential to networking professionals at all levels, from novice to expert. New chapters include coverage of important topics like VoIP and EAP Coverage of cutting edge technologies like optical networking and storage Authored by Cisco Systems, worldwide leader in networking for the Internet. Internetworking Technologies Handbook , Fourth Edition, is a comprehensive reference that enables networking professionals to understand and implement contemporary internetworking technologies. Master the terms, concepts, technologies, and devices used in today's networking industry. Learn how to incorporate internetworking technologies into a LAN/WAN environment. Complete with new and updated chapters on security, storage, optical networking, scalability, and speed, this book is a complete and up-to-date reference to the topics that are essential to all networking professionals, regardless of expertise. Readers will obtain a greater understanding of LAN and WAN networking, particularly the hardware, protocols, and services involved. Fundamental technology information is provided on a broad range of integral systems and services, including detailed descriptions, review questions to ensure concept comprehension and retention, and additional resources for further study. Coverage is also extended not only to new networking concepts, but also to older, legacy systems, providing a more realistic picture of the real-world networking environments in which professionals operate. Tools and guidelines for optimizing system performance will increase productivity and improve efficiency, helping the reader make more intelligent, cost-efficient decisions for their networks. Cisco Systems, Inc. is the worldwide leader in networking for the Internet. Cisco solutions, which include industry-leading publications from Cisco Press, educate and a provide competitive advantage to customers through more efficient and timely exchange of information, leading to cost saving, process efficiencies, and closer business relationships. These solutions form the networking foundation for many organizations worldwide.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 809 p. , ill. ; , 24cm
    DDC: 621.382/7
    Keywords: Optical communications ; Optoelectronics ; Electronic books ; local
    Abstract: A comprehensive guide to understanding and configuring multiservice DWDM, SONET, and SDH architectures Optical Network Design and Implementation provides in-depth coverage of the following: DS1/DS3/E1/E3 over SONET/SDH IEEE 802.17 Resilient Packet Ring (RPR) Fast/Gigabit Ethernet over SONET/SDH VRF virtual private networks Double-tagged 802.1Q VPNs SAN transport, FICON, and Fibre Channel over SONET/SDH DWDM infrastructures Analysis of DWDM, SONET, and SDH architectures Multiservice optical networking has multiple applications in service provider and enterprise environments. To help you make the most of these applications, Optical Network Design and Implementation provides a complete reference of technology solutions for next-generation optical networks. The book explains the differences among various MAN technologies, getting you up to speed on the solutions you need to use. Optical Network Design and Implementation contains a broad range of technical details on multiservice optical networking and covers optical networking theory, design, and configuration by providing informative text, illustrations, and examples. It can be used as a reference for anyone designing, implementing, or supporting an optical network. Even if you're not using Cisco ONS equipment, this book can increase your awareness and understanding of optical technologies and provide you with detailed design concepts and rules for building highly scalable multiservice optical networks. This book covers the entire spectrum of optical networking technologies from the physical layer to the network layer. If you are a network architect, network manager, or a consultant who designs, deploys, operates, or troubleshoots multiservice optical and DWDM networks, Optical Network Design and Implementation is your comprehensive guide to optical networking. "This represents the first book that offers a comprehensive and technical guide to unique IP+Optical innovations with Cisco COMET." -Jayshree V. Ullal, Senior Vice President, Optical Networking Group Cisco Systems, Inc. This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers. 158705105203152004
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Language: English
    Pages: x, 179 p. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.6'92
    Keywords: Electronic mail systems ; Electronic books ; local
    Abstract: If you had a list of the words used to describe sendmail, they'd probably include reliable, flexible, configurable, complex, monolithic, and daunting. But you're not likely to find the word easy. Even seasoned sendmail pros are sometimes frustrated by the intricacies of sendmail's configuration files. With a little determination and the help of a good reference book, like sendmail , Third Edition, you can master this demanding program. But when there's a significant point release, like sendmail V8.13, where do you turn? An excellent companion to our popular sendmail , Third Edition, the sendmail 8.13 Companion provides a timely way to document the improvements in V8.13 in parallel with its release. The book highlights the important changes in the latest update to sendmail, pointing out not just what is handy or nice to have, but what's critical in getting the best behavior from sendmail. This is especially important now that spam is on the rise, and because mobile technology requires roving laptops to use encrypted connections. Not surprisingly, many of the changes and additions to V8.13 have been driven by the ongoing fight against spam. Anyone concerned about spam--and who isn't?--will benefit greatly by upgrading to V8.13 sendmail. Among its many enhancements, V8.13 includes new routines that support the SPF sending site authentication standard (in the Milter library), simultaneous connection control, high connection rate control, and finer tuning of SASL parameters. The additions to the Milter library, alone, make upgrading worthwhile, but sendmail's connection control makes it a no-brainer. The key to understanding them is the sendmail 8.13 Companion . The book is divided into twenty-five chapters that parallel the chapters in the third edition of the sendmail book. For instance, if you're interested in Options configuration (Chapter 24 in sendmail), you'll turn to Chapter 24 in your companion volume to find out what's new in V8.13. For a simple dot release (8.12 to 8.13), V8.13 sendmail has added more features, options, and fundamental changes than any other single dot release has included. If you need to set up or manage sendmail, you'll want this companion volume close at hand. Even if you aren't ready to upgrade to V8.13, you'll find the key to understanding them is the sendmail 8.13 Companion a useful guide to understanding and staying current with the latest changes in sendmail.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 958 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Electronic data processing personnel ; Certification ; Telecommunication ; Switching systems ; Examinations ; Study guides ; Telecommunications engineers ; Certification ; Study guides ; Electronic books ; local
    Abstract: Gain necessary hands-on experience implementing CCNP BCMSN concepts with this practical lab guide Lab configurations include explanations of equipment set-up and execution Valuable reference tool for Catalyst switches, including shortcuts, caveats, and application of the most advanced features Real-world scenarios represent the whole range of CCNP BCMSN 642-811 exam topics CCNP Practical Studies: Switching (CCNP Self-Study) provides CCNP candidates with an in-depth, hands-on experience in configuring Cisco Catalyst switches. This practical guide shows intermediate level networkers how to apply the theoretical knowledge they have gained through CCNP coursework and exam preparation. Configuration labs performed within this book will cover all technologies tested on the BCMSN 642-811 exam, as well as a number of real world scenarios that will test users' overall understanding of multilayer switching. The labs come complete with full explanations, highlighting why the chosen commands and techniques are recommended. In addition to applicable labs, this book also provides general information on various switching technologies, as well as tips, tricks, shortcuts, and caveats for deploying Cisco switching gear in production environments. This book also includes exercises (similar to traditional mathematics exercises) that will help readers internalize, practice, and memorize certain concepts and thought processes necessary to successfully deploy a switched network. Part of the Practical Studies series from the Cisco Press, CCNP Practical Studies: Switching provides self-study based hands-on experience. As such, it can be used in conjunction with other Cisco Press titles and is an excellent companion to instructor-led training from a Cisco Learning Partner.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 455 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 004.67/8
    Keywords: Electronic data processing personnel ; Certification ; Extranets (Computer networks) ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-511 foundation learning Understand the underlying principles of VPNs Learn about and identify proper implementation of remote access and site-to-site VPNs Identify the features, functions, and benefits of the Cisco VPN 3000 Concentrator Series Configure and test a remote access VPN using preshared keys on the Cisco VPN 3000 Concentrator Work with the RIP and OSPF dynamic routing protocols Gain proficiency with the VPN Client Firewall Apply digital certificates on the Cisco VPN 3000 Concentrator Use the Cisco 3002 Hardware Client to configure and test a remote access VPN Implement advanced VPN client features such as load balancing, reverse route injection, and the appropriate use of backup servers Configure LAN-to-LAN VPNs on the Cisco 3000 Concentrator Offer granular user-level security with user and unit authentication Learn how to use VPN through NAT and resolve real-world implementation challenges Provide a sound level of support and administration skills for day-to-day management of a VPN 3000 Concentrator-based VPN by utilizing the tools resident in the Concentrator CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN) , Second Edition, is a complete reference for professionals who intend to work with virtual private networks (VPNs) using IPSec. It includes detailed coverage of the VPN 3000 Concentrator, a scalable remote access platform that offers encryption, high availability, and superior performance. In addition to acting as a valuable study aid for the CCSP CSVPN 642-511 exam, this book is an invaluable theory and configuration guide for the VPN 3000 series of products, with its thorough coverage of concentrators, hardware clients, and software clients. CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over all techniques and technologies related to Cisco Systems VPN products. Chapter overviews bring you quickly up to speed and prepare you to get to work on securing your network. Detailed configuration examples allow you to take advantage of Cisco VPN products in no time. Unique chapter-ending review questions reinforce key concepts and test your knowledge. Whether you are seeking a reference guide to plan, administer, and maintain a VPN based upon the Cisco VPN 3000 Concentrator or are looking for a study guide for the 642-511 exam, CCSP Self-Study: Cisco Secure Virtual P...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 292 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    DDC: 004.67
    Keywords: Computer networks ; Management ; Network performance (Telecommunication) ; Electronic books ; local
    Abstract: Learn about the technologies that drive fast broadband access in the first mile and master the design of first mile access networks Understand the motivating forces behind first mile access networks and learn about the technology and business requirements for first mile access solutions Master the design of passive optical networks (PON) Build EPON solutions and differentiate them from BPON and GPON Enhance bandwidth capacity in the access area using CWDM technology Learn about and design DSL and power-line communication (PLC) networks Discover the use of WiFi in the first mile and study the subsystems involved in a WiFi solution Learn the importance of management in first mile access networks and create a business case for diverse first mile access networks First Mile Access Networks and Enabling Technologies provides a platform for showcasing first mile access technologies and associated network solutions. Using this book, you learn about the bandwidth bottleneck within the first mile and explore the resulting business prospects. Benefit from a thorough and thoughtful discussion of the business case for the first mile, which helps you approach the issue from multiple perspectives. Examine multiple access technologies, understand the diversity of solutions within this area, and take your solutions further using sound and unique management techniques. Utilize the solid and tested implementation method provided by this book to remove networking anomalies, such as the digital divide. This book helps you understand and capitalize on the market opportunity presented by the first mile. First Mile Access Networks and Enabling Technologies covers multiple technologies, protocols, and business methods and can be used to understand the growth of first mile access networks and resulting business opportunities. This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 808 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Extranets (Computer networks) ; Electronic books ; local
    Abstract: Master advanced troubleshooting techniques for IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Learn the step-by-step, end-to-end methodology essential for troubleshooting virtual private networks (VPNs) Gain the in-depth knowledge necessary for fast and efficient troubleshooting of IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Master advanced troubleshooting tools and techniques for all applicable VPN types Debug and fix IPSec site-to-site and remote access VPN issues, such as IKE (ISAKMP) phase 1 and phase 2 negotiation failure, ESP and AH traffic drops, certificate enrollment failures, and maximum transmission unit (MTU) problems Locate and resolve MPLS Layer-3 VPN problems, such as those involving route exchange and label switched path (LSP) failure, MPLS VPN over traffic engineering tunnels, and Multicast VPNs (MVPN) Discover solutions for issues in AToM and L2TPv3-based Layer-2 VPNs, including pseudowire setup failures, attachment circuit problems, and MTU issues Obtain answers for L2TPv2, PPTP, and L2F control connection establishment, session setup, PPP negotiation, and VPN performance issues Refer to specially designed flowcharts to identify issues and find solutions fast Consolidate VPN troubleshooting knowledge through bonus hands-on labs Read and understand detailed analysis of all relevant VPN show and debug command output Troubleshooting Virtual Private Networks presents a systematic troubleshooting methodology for network engineers, administrators, and architects tasked with managing and deploying Cisco IOS VPNs. With eight self-contained chapters designed to facilitate rapid and straightforward troubleshooting, this book provides detailed information on addressing all common and not-so-common issues with IPSec VPNs, MPLS Layer-3 VPNs, Any Transport over MPLS (AToM)-based Layer-2 VPNs, L2TP Version 3 (L2TPv3)-based Layer-2 VPNs, L2TP Version 2 (L2TPv2) VPNs, PPTP VPNs, and L2F VPNs. This book not only shows you how to correct problems but also how to avoid them in the first place with expert VPN configuration guidance and optimization tips. Each chapter in Troubleshooting Virtual Private Networks includes a step-by-step, end-to-end troubleshooting approach to a different VPN technology. In-depth technical discussions and configuration reviews orient you to the VPN technology and get you ready to work. To help you access the answers you need, you'll find flowcharts in ea...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 455 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 006.7/4
    Keywords: Application program interfaces (Computer software) ; Microsoft .NET Framework ; XML (Document markup language) ; Electronic books ; local
    Abstract: If you're seeking ways to build network-based applications or XML-based web services, Microsoft provides most of the tools you'll need. XML is integrated into the .NET Framework and Visual Studio .NET, but if you want to get a grasp on how .NET and XML actually work together, that's a different story. With .NET & XML , you can get under the hood to see how the .NET Framework implements XML, giving you the skills to write understandable XML-based code that interoperates with code written with other tools, and even other languages. .NET & XML starts by introducing XML and the .NET Framework, and then teaches you how to read and write XML before moving on to complex methods for manipulating, navigating, transforming, and constraining it. To demonstrate the power of XML in .NET, author Niel Bornstein builds a simple hardware store inventory system throughout the book. As you move from chapter to chapter, you'll absorb increasingly complex information until you have enough knowledge to successfully program your own XML-based applications. This tutorial also contains a quick reference to the API, plus appendices present additional .NET assemblies that you can use to work with XML, and how to work with the .NET XML configuration file format. One study puts the potential market for new software based on XML at or near $100 billion over the next five years. The .NET Framework gives you a way to become a part of it. But to use XML and .NET effectively, you need to understand how these two technologies work together. This book gives you the insight to take full advantage of the power the two provide.
    Note: "Understanding the code and markup behind the wizards"--Cover. - Includes biblographic references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Language: English
    Pages: xvi, 276 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/65
    Keywords: Database management ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: As users come to depend on MySQL, they find that they have to deal with issues of reliability, scalability, and performance--issues that are not well documented but are critical to a smoothly functioning site. This book is an insider's guide to these little understood topics.Author Jeremy Zawodny has managed large numbers of MySQL servers for mission-critical work at Yahoo!, maintained years of contacts with the MySQL AB team, and presents regularly at conferences. Jeremy and Derek have spent months experimenting, interviewing major users of MySQL, talking to MySQL AB, benchmarking, and writing some of their own tools in order to produce the information in this book.In High Performance MySQL you will learn about MySQL indexing and optimization in depth so you can make better use of these key features. You will learn practical replication, backup, and load-balancing strategies with information that goes beyond available tools to discuss their effects in real-life environments. And you'll learn the supporting techniques you need to carry out these tasks, including advanced configuration, benchmarking, and investigating logs.Topics include: A review of configuration and setup options Storage engines and table types Benchmarking Indexes Query Optimization Application Design Server Performance Replication Load-balancing Backup and Recovery Security
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 1228 p. , ill. ; , 23 cm
    DDC: 005.2/768
    Keywords: Microsoft Visual studio ; Microsoft Windows (Computer file) ; Application software ; Development ; C# (Computer program language) ; Microsoft .NET Framework ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: For those of you who develop standalone Windows applications for PCs and other devices, Microsoft's .NET Windows Forms provide a much better way to get it done. This new technology gives you more power and flexibility for a fraction of the effort compared to classic Win32 development, with a streamlined programming model that deals automatically with many tedious details that once plagued developers. As with most things .NET, the only hitch is the learning curve. But that's where acclaimed author Jesse Liberty makes the difference with Programming .NET Windows Applications . With this tutorial, you will explore all aspects of using .NET Windows Forms class libraries and the associated programming tools in Visual Studio .NET, enabling you to build applications for the Windows 9x, Windows 2000 and Windows XP desktop platforms. Step-by-step, you'll learn ways to design applications that either function alone on a PC, or work in combination with your web-based application server to take advantage of the richer interface and higher level of security. The book also explains how your new Windows applications can sidestep problems that used to arise from the use of DLLs (known collectively as "DLL hell"), and how .NET Windows Forms can be used as an alternative to ASP.NET and browser-based approaches for building web application clients. Jesse Liberty definitely knows his stuff when it comes to the .NET platform. As the author of O'Reilly's Programming C# and Learning Visual Basic .NET , he's well-known for his clear and concise style that prompted one reviewer to say, "It's as if he knows exactly what questions I'm going to ask ahead of time." Jesse also co-authored Programming ASP.NET with contract programmer Dan Hurwitz, and now the two have teamed up again to bring you this comprehensive tutorial--without a doubt, the best source available for learning how to program with .NET Windows Forms.
    Note: "Covers .NET 1.1 & Visual studio .NET 2003" -- Cover. - "Rich client applications with C# or FB.NET" -- Cover. - Includes index. - Originally published 2003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 317 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Java programmers know how finicky Java can be to work with. An omitted semi-colon or the slightest typo will cause the Java command-line compiler to spew pages of annoying error messages across your screen. And it doesn't fix them--that's up to you: fix them, compile again, and hope that nothing goes wrong this time.Eclipse, the popular Java integrated development environment (IDE) provides an elegant and powerful remedy for this common, frustrating scenario. It doesn't just catch your errors before you compile, it also suggests solutions. All you need to do is point and click. And it's free--what could be better? Still, if you're like most programmers, mastering a new technology--no matter how productive it will make you in the long run--is going to take a chunk out of your productivity now. You want to get up to speed quickly without sacrificing efficiency.O'Reilly's new guide to the technology, Eclipse , provides exactly what you're looking for: a fast-track approach to mastery of Eclipse. This insightful, hands-on book delivers clear and concise coverage, with no fluff, that gets down to business immediately. The book is tightly focused, covering all aspects of Eclipse: the menus, preferences, views, perspectives, editors, team and debugging techniques, and how they're used every day by thousands of developers. Development of practical skills is emphasized with dozens of examples presented throughout the book.From cover-to-cover, the book is pure Eclipse, covering hundreds of techniques beginning with the most basic Java development through creating your own plug-in editors for the Eclipse environment. Some of the topics you'll learn about include: Using Eclipse to develop Java code Testing and debugging Working in teams using CVS Building Eclipse projects using Ant The Standard Widget Toolkit (SWT) Web development Developing Struts applications with Eclipse From basics to advanced topics, Eclipse takes you through the fundamentals of Eclipse and more. You may be an Eclipse novice when you pick up the book, but you'll be a pro by the time you've finished.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 283 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Electronic books ; local
    Abstract: If you think that getting creative with Excel means the underhanded tweaking of numbers, think again. Excel Hacks shows even the most experienced users how to do things with Excel they might never have thought of doing--and lets them have a little fun while they're at it.Microsoft Excel is not just the dominant spreadsheet in the world; it's also one of the most popular applications ever created. Its success lies not only in its power and flexibility, but also in its streamlined, familiar interface that casually conceals its considerable capabilities. You don't need to know everything that Excel can do in order to use it effectively, but if you're like the millions of Excel power users looking to improve productivity, then Excel Hacks will show you a wide variety of Excel tasks you can put to use, most of which are off the beaten path.With this book, Excel power users can bring a hacker's creative approach to both common and uncommon Excel topics--"hackers" in this sense being those who like to tinker with technology to improve it. The "100 Industrial Strength Tips and Tools" in Excel Hacks include little known "backdoor" adjustments for everything from reducing workbook and worksheet frustration to hacking built-in features such as pivot tables, charts, formulas and functions, and even the macro language.This resourceful roll-up-your-sleeves guide is for intermediate to advanced Excel users eager to explore new ways to make Excel do things--from data analysis to worksheet management to import/export--that you never thought possible. Excel Hacks will help you increase productivity with Excel and give you hours of "hacking" enjoyment along the way.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Your first step into the world of routing No routing experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding routing begins here! Learn routing basics simply and easily Explore how network traffic gets from here to there Understand routing tools and technologies Reinforce your understanding with chapter review questions Welcome to the world of routing! Routing is the technology that enables worldwide Internet communication. Many people involved with networking technologies or companies need to know how routing works. But learning about routing tends to involve a complex web of terms and acronyms-a language that can be difficult and unfamiliar. No routing experience needed! Routing First-Step explains the basics of Internet routing in language all of us can understand. This book takes you on a guided tour of routing, starting with systems you are familiar with: the postal system, the telephone system, and the interstate highway system. From there, you'll learn routing simply and easily. Whether you are looking to take your first step into a career in networking or are interested only in gaining knowledge of the technology, this book is for you!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 820 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Examinations ; Study guides ; Telecommunications engineers ; Certification ; Study guides ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. In addition to acting as a key study aid for the CCSP SECUR 642-501 exam, this book will be an invaluable theory and configuration guide for years to come. CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a Cisco authorized, self-paced learning tool that helps you gain mastery over all security techniques and technologies, including newer topics such as Cisco Easy VPN and Security Device Manager (SDM). Chapter overviews bring you quickly up to speed on technologies you can use to secure your network. Configuration examples are designed to show you how to make Cisco IOS devices secure, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with Cisco IOS security or a study guide for the 642-501 exam, CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is the reference you are looking for. CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is part of a recommended learning path from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products fro...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 828 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. The Cisco Intrusion Detection Sensors and Management options work as a united system to provide detection, notification, and aggressive lockdown to malicious network breaches. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS), Second Edition , offers in-depth configuration and deployment information for the reliable and intensive intrusion detection solutions from Cisco Systems. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over the use of both the host-based and network-based IDS options (as well as the Cisco Threat Response functionality) by presenting a consolidated all-inclusive reference on all of the current Cisco IDS sensor platforms and management platforms. Chapter overviews bring you quickly up to speed and help you get to work right away. Configuration examples are designed to show you how to make the most of your IDS system, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with the CIDS sensor and management platforms or a study guide for the 642-531 exam, CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, supports your effective use of the Cisco IDS. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, an...
    Note: Includes index. - Rev. ed. of: Cisco secure intrusion detection system. c2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 350 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: Internet programming ; PHP (Computer program language) ; Electronic books ; local
    Abstract: PHP has gained a following among non-technical web designers who need to add interactive aspects to their sites. Offering a gentle learning curve, PHP is an accessible yet powerful language for creating dynamic web pages. As its popularity has grown, PHP's basic feature set has become increasingly more sophisticated. Now PHP 5 boasts advanced features--such as new object-oriented capabilities and support for XML and Web Services--that will please even the most experienced web professionals while still remaining user-friendly enough for those with a lower tolerance for technical jargon.If you've wanted to try your hand at PHP but haven't known where to start, then Learning PHP 5 is the book you need. If you've wanted to try your hand at PHP but haven't known where to start, then Learning PHP 5 is the book you need. With attention to both PHP 4 and the new PHP version 5, it provides everything from a explanation of how PHP works with your web server and web browser to the ins and outs of working with databases and HTML forms. Written by the co-author of the popular PHP Cookbook , this book is for intelligent (but not necessarily highly-technical) readers. Learning PHP 5 guides you through every aspect of the language you'll need to master for professional web programming results. This book provides a hands-on learning experience complete with exercises to make sure the lessons stick. Learning PHP 5 covers the following topics, and more: How PHP works with your web browser and web server PHP language basics, including data, variables, logic and looping Working with arrays and functions Making web forms Working with databases like MySQL Remembering users with sessions Parsing and generating XML Debugging Written by David Sklar, coauthor of the PHP Cookbook and an instructor in PHP, this book offers the ideal classroom learning experience whether you're in a classroom or on your own. From learning how to install PHP to designing database-backed web applications, Learning PHP 5 will guide you through every aspect of the language you'll need to master to achieve professional web programming results.
    Note: "A pain-free introduction to building interactive web sites"--Cover. - 1st ed., 2004. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 343 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: You've probably heard the buzz about Eclipse, the powerful open source platform that gives Java developers a new way to approach development projects. It's like a shiny new car--no longer content to just admire Eclipse, you're now itching to get in and drive. Eclipse is to Java developers what Visual Studio is to .NET developers--it's an integrated development environment (IDE) that combines a code editor, compiler, debugger, text editor, graphical user interface (GUI) builder, and other components into a single, user-friendly application. It provides a solid foundation that enables Java developers to construct and run integrated software-development tools for web development, application design, modeling, performance, testing, and much more. As with any extensive programming tool, however, there's a lot to learn. And there s no better guy than well-known Java expert Steve Holzner to teach you. An award-winning and best-selling author who has been writing about Java topics since the language first appeared, Holzner delivers just the kind of targeted, practical, everyday knowledge you need to hone your mastery of Eclipse. Perfect as a companion to an Eclipse programming tutorial (such as Holzner's own Eclipse , O'Reilly, April 2004) or an ideal stand-alone for all those developers who either don't want or don't need the tutorial approach, the Eclipse Cookbook contains task-oriented recipes for more than 800 situations you may encounter while using this new Java platform--from deploying a web application automatically to reverse engineering compiled code, from re-naming all references to a class across multiple packages to initializing the SWT JNI libraries. Each recipe in the ever-popular and utterly practical problem-solution-discussion format for O'Reilly cookbooks contains a clear and thorough description of the problem, a brief but complete discussion of a solution, and in-action examples illustrating that solution. The Eclipse Cookbook will satiate Java programmers at all levels who are ready to go beyond tutorials--far beyond writing plug-ins and extensions--and actually use the powerful and convenient Eclipse day to day.
    Note: "Covers Eclipse 3.0"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 298 , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 723 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/762
    Keywords: JavaServer pages ; Java (Computer program language) ; Servlets ; Web site development ; Electronic books ; local
    Abstract: With literally hundreds of examples and thousands of lines of code, the Java Servlet and JSP Cookbook yields tips and techniques that any Java web developer who uses JavaServer Pages or servlets will use every day, along with full-fledged solutions to significant web application development problems that developers can insert directly into their own applications. Java Servlet and JSP Cookbook presents real-world problems, and provides concise, practical solutions to each. Finding even one tested code "recipe" that solves a gnarly problem in this comprehensive collection of solutions and best practices will save hours of frustration--easily justifying the cost of this invaluable book.But "Java Servlet and JSP Cookbook" is more than just a wealth of cut-and-paste code. It also offers clear explanations of how and why the code works, warns of potential pitfalls, and directs you to sources of additional information, so you can learn to adapt the problem-solving techniques to similar situations.These recipes include vital topics like the use of Ant to setup a build environment, extensive coverage of the WAR file format and web.xml deployment descriptor, file-uploading, error-handling, cookies, logging, dealing with non-HTML content, multimedia, request filtering, web services, I18N, web services, and a host of other topics that frustrate even the most seasoned developers.For Java web developers of all levels who are eager to put into practice the theory presented in other API-focused books, the solutions presented in this practical book will prove invaluable over and over again. This is painless way for less experienced developers who prefer to learn by doing to expand their skills and productivity, while accomplishing practical solutions to the pressing problems they face every day. More experienced developers can use these recipes to solve time-consuming problems quickly, freeing up their time for the more creative aspects of their work.
    Note: Includes bibliographic references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Hands-on techniques for enabling authentication, authorization, and accounting Understand the security concepts behind the AAA framework Learn message formats, communication, and message encryption using the TACACS+ and RADIUS protocols Configure and troubleshoot AAA on Cisco routers Understand where to position and install the CSACS in your network Explore and customize the CSACS interface Configure CSACS user accounts, user groups, and shared profile components Add AAA clients and manage network connections Configure external databases and perform database replication and backup Explore the various reports and logs available in CSACS Learn how AAA models apply to service provider environments Install and configure Cisco Access Registrar As network infrastructures evolve, it is increasingly important that access to vital corporate resources is vigilantly monitored and controlled. The Cisco identity management solutions, including Cisco Secure Access Control Server (CSACS), address this requirement, enabling security, control, and administration of the growing population of users that connect to corporate networks. CSACS, an essential component of the Cisco Identity Based Networking Services (IBNS) architecture, extends access security by combining authentication, user and administrator access, and policy control from a centralized identity-networking framework. This allows greater flexibility and mobility, increased security, and user productivity gains. Cisco Access Control Security provides you with the skills needed to configure authentication, authorization, and accounting (AAA) services on Cisco devices. Separated into three parts, this book presents hard-to-find configuration details of centralized identity networking solutions. Part I provides an overview of the AAA architecture, complete with discussions of configuring Cisco routers for AAA. Part II addresses enterprise AAA management with CSACS, including installation, configuration, and management details. Part III looks at service provider AAA management with Cisco Access Registrar. Full of detailed overviews, diagrams, and step-by-step instructions for enabling essential access control solutions, Cisco Access Control Security is a practical tool that can help enforce assigned access policies and simplify user management. "This book manages the rare combination of being highly accurate and technically astute, while maintaining an easy readability and flow. It is a great guide for s...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 739 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at security design with three included case studies Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way. Beginning where other security books leave off, Network Security Architectures shows you how the various technologies that make up a security system can be used together to improve your network's security. The technologies and best practices you'll find within are not restricted to a single vendor but broadly apply to virtually any network system. This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy. You'll review detailed desig...
    Note: Includes "Glossary of terms" (p. [673]-677). - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 460 p. , ill. ; , 23 cm
    DDC: 005.72
    Keywords: XML (Document markup language) ; Electronic books ; local
    Abstract: Developers and system administrators alike are uncovering the true power of XML, the Extensible Markup Language that enables data to be sent over the Internet from one computer platform to another or one application to another and retain its original format. Flexible enough to be customized for applications as diverse as web sites, electronic data interchange, voice mail systems, wireless devices, web services, and more, XML is quickly becoming ubiquitous. XML Hacks is a roll-up-your-sleeves guide that distills years of ingenious XML hacking into a complete set of practical tips, tricks, and tools for web developers, system administrators, and programmers who want to go far beyond basic tutorials to leverage the untapped power of XML.With plenty of useful real-world projects that illustrate how to define, read, create, and manipulate XML documents, XML Hacks shows readers how to put XML's power to work on the Internet and within productivity applications. Each Hack in this book can be read easily in a few minutes, saving programmers and administrators countless hours of searching for the right answer. And this is an O'Reilly Hacks book, so it's not just practical, imminently useful, and time-saving. It's also fun.From Anatomy of an XML Document to Exploring SOAP Messages XML Hacks shows you how to save time and accomplish more with fewer resources. If you want much more than the average XML user--to explore and experiment, do things you didn't know you could do with XML, discover clever shortcuts, and show off just a little--this invaluable book is a must-have.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxv, 384 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Local area networks (Computer networks) ; Telecommunication ; Switching systems ; Electronic books ; local
    Abstract: Your first step into the world of LAN switching No LAN switching experience required Includes clear and easily understood explanations Makes learning easy Your first step to LAN switching begins here! Learn local-area network (LAN) key concepts and terminology Identify key issues involved with designing and managing a switched LAN Answer the question: do I need a hub, a bridge, or a switch? Welcome to the world of LAN switching! Network switches work by connecting network paths together and making intelligent decisions about moving traffic in a network. By keeping track of changes in the network, switches reduce congestion and improve speed. No LAN switching experience needed! LAN Switching First-Step explains the basics of LAN switching in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the key concepts behind how bridges and switches work. Whether you are looking to take your first step into a career in networking or are interested in just gaining a conversational knowledge of the technology, this book is for you!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 860 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Firewalls (Computer security) ; Examinations ; Study guides ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-521 foundation learning Gain proficiency with new features of PIX Firewall version 6.3, including OSPF, 802.1Q VLANs, NAT-T, and more Learn the ins and outs of the PIX product family and its complete feature set Use the PIX Device Manager (PDM) 3.0 to configure and manage the PIX Firewall Use advanced techniques to control traffic on your network using ACLs (access control lists), content filtering, and object groups Improve security using PIX Firewall attack guards, intrusion detection, and shunning features Learn about techniques and security considerations for configuring OSPF on PIX Firewall version 6.3 Configure scalable site-to-site and client remote access VPNs using the PIX Firewall version 6.3 Configure high-availability solutions using stateful and LAN-based failover techniques Use logical interfaces and 802.1Q trunks to scale your PIX Firewall implementation Master enterprise management and maintenance techniques using CiscoWorks Management Center for Firewalls 1.2 and Auto Update Server 1.1 Configure the PIX Firewall Services Module (FWSM) The use of firewalls-devices residing at the network perimeter to protect against intrusion-is an essential building block to even the most basic security program. Cisco Systems has continued the support and development of the PIX OS to provide networks top-notch security while maintaining compatibility with the latest standards and protocols. Now offered in many models, the PIX Firewall is perfectly suited to meet the requirements of small offices (501 model), medium to large businesses (506E, 515E, and 525 models), and large enterprise and service provider customers (525 and 535 models and the Firewall Services Module). CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA) , Second Edition, offers in-depth configuration and deployment information for this popular and versatile firewall solution. CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA) , Second Edition, teaches you the skills needed to configure and operate the PIX Firewall product family. Chapter overviews bring you quickly up to speed and help you get to work right away. Lab exercises and scenario-based solutions allow you to adapt configurations to your network for rapid implementation, helping you make the most of your PIX Firewall. Chapter-ending review questions test your knowledge. PIX Device Manager (PDM) configuration procedures are presented to complement extensive...
    Note: Includes bibliographical references (p. [837]-841) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 745 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 281 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: IEEE 802.11 (Standard) ; Wireless LANs ; Electronic books ; local
    Abstract: Master the basics in designing, building, and managing a Cisco Aironet WLAN. Master the basics of Wireless LANs with this concise design and deployment guide Understand implementation issues for a variety of environments including vertical, SOHO, and enterprise networks Learn design and troubleshooting advice from real-world case studies 802.11 Wireless LAN Fundamentals gives networking engineers and IT professionals the knowledge they need to design, deploy, manage, and troubleshoot their own wireless local-area networks (WLANs). Starting with an overview of the technology and architecture of WLANs, the book goes on to explain services and advanced features that such applications can provide. Most importantly, it provides practical design guidance and deployment recommendations. Wireless LANs connect computer networks via radio transmissions instead of traditional phone lines or cables. Benefits to these systems go well beyond getting rid of all the cables and wires. Campus networks can grow geographically larger while still retaining all their efficiency and speed. Additionally, cost savings can be realized when third-party phone lines are no longer necessary, saving the cost of line rental and equipment upkeep. Finally, flexibility in campus network design increases significantly for the networking professional, while the network accessibility and usefulness increases for the individual users. 802.11 Wireless LAN Fundamentals helps networking professionals realize these benefits by helping them understand how to design, build, and maintain these networks, as well as how to justify their value within organizations.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 409 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.7/1376
    Keywords: Internet Relay Chat ; Electronic books ; local
    Abstract: IRC (Internet Relay Chat) may very well turn out to be the world's most successful hack. In 1988, Jarkko Oikarinen wrote the original IRC program at the University of Oulu, Finland. As he says in his foreword, "IRC started as one summer trainee's programming exercise. A hack grew into a software development project that hundreds of people participated in, and then became a worldwide environment where tens of thousands of people now spend time with each other. I have found many of my friends through IRC and learnt a significant part of my present software engineering knowledge while using and working with IRC. That would not have been possible without learning from code examples and hacks from others".IRC has continued to grow in popularity since its inception. Millions of people from all over the world now use IRC to chat with friends, discuss projects and collaborate on research. With a simple, clearly defined protocol, IRC has become one of the most accessible chat environments, with clients written for a multitude of operating systems. And IRC is more than just a simple chat system it is a network of intercommunicating servers, allowing thousands of clients to connect from anywhere in the world using the IRC protocol.While IRC is easy to get into and many people are happy to use it without being aware of what's happening under the hood, there are those who hunger for more knowledge, and this book is for them. IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net).Like all of our Hacks books, there are many different ways to use IRC Hacks . You can read the book from cover to cover, but you might be better served by picking an interesting item from the table of contents and just diving in.If you're relatively new to IRC, you should considering starting with a few hacks from each progressive chapter. Chapter 1 starts you off by showing you how to connect to IRC, while Chapter 2 acquaints you with the everyday concepts you'll need to use IRC effectively. Chapter 3 is all about users and channels, and introduces the first pieces of code. Chapter 4 shows you how to make useful enhancements to IRC clients.Chapter 5 is where you will learn the basics about creating IRC bots, with Chapters 6-...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 243 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Java (Computer program language) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Sometimes the simplest answer is the best. Many Enterprise Java developers, accustomed to dealing with Java's spiraling complexity, have fallen into the habit of choosing overly complicated solutions to problems when simpler options are available. Building server applications with "heavyweight" Java-based architectures, such as WebLogic, JBoss, and WebSphere, can be costly and cumbersome. When you've reached the point where you spend more time writing code to support your chosen framework than to solve your actual problems, it's time to think in terms of simplicity.In Better, Faster, Lighter Java , authors Bruce Tate and Justin Gehtland argue that the old heavyweight architectures are unwieldy, complicated, and contribute to slow and buggy application code. As an alternative means for building better applications, the authors present two "lightweight" open source architectures: Hibernate--a persistence framework that does its job with a minimal API and gets out of the way, and Spring--a container that's not invasive, heavy or complicated.Hibernate and Spring are designed to be fairly simple to learn and use, and place reasonable demands on system resources. Better, Faster, Lighter Java shows you how they can help you create enterprise applications that are easier to maintain, write, and debug, and are ultimately much faster.Written for intermediate to advanced Java developers, Better, Faster, Lighter Java , offers fresh ideas--often unorthodox--to help you rethink the way you work, and techniques and principles you'll use to build simpler applications. You'll learn to spend more time on what's important. When you're finished with this book, you'll find that your Java is better, faster, and lighter than ever before.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: The only home networking book you'll ever need Setting up a home network doesn't need to be difficult. You can use this easy-to-understand reference to set up your home network, secure it, and turn it into an entertainment network. Don't be fooled by other guides-it can be this simple: It's Easy-Set up your home network with this visual step-by-step guide. Quit Wasting Time and Money-Buy the network gadgets and equipment you need. Make It Secure-Use simple tips to make your network secure. Wow the Neighbors-Turn your home network into an entertainment network. What Went Wrong-Fix common problems you might encounter while setting up your network.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 427 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.4/32
    Keywords: Berkeley BSD (Computer file) ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun."Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks , the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools--and even fun--for administrators and power users of BSD systems. BSD Hacks takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command.The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas: Customizing the User Environment Dealing with Files and Filesystems The Boot and Login Environments Backing Up Networking Hacks Securing the System Going Beyond the Basics Keeping Up-to-Date Grokking BSD If you want more than your average BSD user--you want to explore and experiment, unearth shortcuts, create useful tools, and come up with fun things to try on your own-- BSD Hacks is a must-have. This book will turn regular users into power users and system administrators into super system administrators.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xx, 309 p. , ill. (chiefly col.) ; , 23 cm
    Edition: 1st ed.
    DDC: 775
    Keywords: Photography ; Digital techniques ; Electronic books ; local
    Abstract: Your digital camera is more than new incarnation of your old film camera. Yes, it still produces photos, but it also offers new outlets for creativity, including instant gratification of seeing your photos now, the ability to experiment without worrying about expense, the technology to fine-tune your photos with advanced professional techniques, and the means to share your work instantaneously with anyone, anyplace in the world. It's no wonder that digital cameras are outselling traditional cameras for the first time ever. But the question most digital camera users ask is this, "How do I get from taking 'decent' photos to doing the things I'd really like to do? How do I tap into that potential?" Digital Photography Hacks is your passport to taking the kind of digital photos you've always aspired to. Written by Derrick Story, photographer and author of Digital Photography Pocket Guide and other books, it goes beyond the standard fare of most digital photography books--such as camera basics, understanding memory cards, and when to use a flash--to the things that professional photographers have learned through thousands of shots' worth of experience, years of experimentation, and fiddling and hacking. The book includes a foreword by photographer Rick Smolan, author of America 24/7. With exquisite, full-color photos throughout, the book presents a collection of tips, tricks, and techniques for photographers ready to move beyond the basics. And if you don't have the latest in digital camera photography, this book will show you how to extend the life and functionality of your existing camera. All the hacks in the book are platform-agnostic, designed for use on both Mac on Windows-based computers. You'll find 100 proven techniques in the areas of: Daytime and nighttime photo secrets Flash magic Digital camera attachments The computer connection Photoshop magic Fun photo projects Camera phone tricks This book is for the photographer you are now, and the one you want to be. Digital Photography Hacks is for the creative adventurer who resides in each of us.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 269 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Note: "Intrusion detection with open source tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A guide to successful deployment of the Cisco IP Telephony solution Real-world case studies from the Cisco design consulting engineers who developed the PDIOO process provide practical advice on all stages of successful IPT deployment Concise understanding of the PDIOO phases enables architects and engineers to successfully deploy the Cisco IPT solution Division of the process into PDIOO phases provides a logical and defined guide for network engineers and architects as they proceed through each of the phases in deploying the Cisco IPT solution Includes detailed questionnaires for each phase of deployment in the PDIOO cycle-a great aid in understanding customer networks and requirements Network infrastructure design, call processing infrastructure design and applications, and voice-mail system design are covered in depth Cisco® IP Telephony (IPT) solutions are being deployed at an accelerated rate, and network architects and engineers need to understand the various phases involved in successful deployment: planning, design, implementation, operation, and optimization (PDIOO). On the road to that understanding, those involved need to collect information for each phase of deployment, and then follow through with the best architecture, deployment model, and implementation based on the data collected. Cisco IP Telephony: Planning, Design, Implementation, Operation, and Optimization is a guide for network architects and engineers as they deploy the Cisco IPT solution. With this book, you will master the PDIOO phases of the IPT solution, beginning with the requirements necessary for effective planning of a large-scale IPT network. From there, you'll follow a step-by-step approach to choose the right architecture and deployment model. Real-world examples and explanations with technical details, design tips, network illustrations, and sample configurations illustrate each step in the process of planning, designing, implementing, operating, and optimizing a chosen architecture based on information you have collected. In-depth instruction on each PDIOO phase provides specific details about the tasks involved and best practices for successful implementation of the IPT solution. This book also contains predesigned questionnaires and PDIOO assistance tools that help you determine the requirements of each phase of the PDIOO cycle. Authors Ramesh Kaza and Salman Asadullah have been involved with Cisco IPT solutions from the beginning and have planned, design...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco QOS 642-642 exam. The official study guide helps you master all the topics on the QOS exam, including QoS concepts, tools, and architectures Modular QoS CLI (MQC), QoS Policy Manager (QPM), and AutoQoS Classification and marking Congestion management Traffic shaping and policing Congestion avoidance through drop policies Compression tools and link fragmentation and interleaving (LFI) tools for link efficiency LAN QoS QoS best practices The CCVP certification validates a robust set of skills in implementing, operating, configuring, and troubleshooting a converged IP network. A solid understanding of quality-of-service (QoS) features and implementation is essential for CCVP certification and is also a core component of the CCIP® certification. Cisco QOS Exam Certification Guide , Second Edition, is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the QOS 642-642 exam. Senior instructor and best-selling author Wendell Odom and senior AVVID consultant Michael Cavanaugh share preparation hints and test-taking tips, helping you identify areas of weakness and improve your QoS knowledge. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. Cisco QOS Exam Certification Guide , Second Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary tables, figures, and snapshot information make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. Cisco QOS Exam Certification Guide , Second Edition, is part of a recommended learning path from Cisco Syst...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 498 p. , ill. ; , 24 cm
    Keywords: Fiber optics ; Handbooks, manuals, etc ; Fiber optics ; Metropolitan area networks (Computer networks) ; Optical communications ; Handbooks, manuals, etc ; Optical communications ; Electronic books ; local
    Abstract: Plan, design, and configure high-speed fiber-optic networks Coverage includes: Configuring ONS 15454 and ONS 15327 platforms Architecture for building Metropolitan Ethernet Transparent LAN Services (TLS) Packet over SONET (PoS) network design, configuration, and verification Inner workings of dense wavelength division multiplexing (DWDM), including operability with the ONS 15216 product family Principles of Dynamic Packet Transport (DPT) SONET background, including structures, components, and network design Bonus case studies, which challenge you to select equipment and design a metro optical network Fiber-optic networking has several significant advantages over traditional wired and wireless networks: optical signals can travel much farther than electrical signals, are more secure, are resistant to electromagnetic interference, and have the potential to provide bandwidth in the terabits per second range (1000 Gbps). Service providers must satisfy the always-increasing networking demands of customers while keeping costs to a minimum. Optical networks must meet the challenge of supporting multiple types of transmissions including voice, video, and data traffic. Although time-division multiplexing (TDM) has provided a growth path for services, it is more constrained than IP + Optical strategies like the Cisco Dynamic Packet Transport (Resilient Packet Ring). The Cisco Systems® end-to-end IP + Optical networking strategy provides an intelligent converged network in which optical infrastructures can be used to their fullest potential. While most reference books focus on the theory involved in SONET and optical infrastructures, Cisco Self-Study: Building Cisco Metro Optical Networks (METRO) focuses on the practical application of planning and configuring optical networks that involve SONET, DWDM, Metropolitan Ethernet, Packet over SONET, and Dynamic Packet Transport (Resilient Packet Ring). Cisco Self-Study: Building Cisco Metro Optical Networks (METRO) is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. This volume is in the Certification Self-Study Series offered by Cisco Press. Books in this series provide officially deve...
    Note: "Plan, design, and configure high-speed fiber-optic networks"--Cover. - Includes bibliographical references (p. 483) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Maximize the performance and availability of network applications and the network infrastructure with application performance management Understand how to identify applications critical to your business model Identify basic application characteristics and how they can be optimized for transmission Understand the principle of proactive planning in order to maintain the delivery criteria necessary for your business critical applications Improve service delivery and outsourcing decisions by utilizing meaningful SLAs Identify and solve network application performance problems, saving valuable time and money Includes real-world case studies that cover design and performance issues The astounding growth of computer networking in recent years has been characterized by the struggle of network managers to keep pace with the demand for network resources. As more and more users, running more and more applications, demand increased network bandwidth and performance, network managers find themselves adding expensive capacity in an effort to satisfy the needs of their customers. Yet networks remain congested, and applications continue to run slowly. Moreover, new aggressive applications, an ever expanding set of business stakeholders, and demands for greater reliability and security compound this struggle. Optimizing Applications on Cisco Networks takes a practical look at how application performance management can assist in the end-to-end application delivery model by proactively identifying hot spots within an organization. This book covers network dependent application delivery, with an emphasis on optimizing the underlying infrastructure, procedures, and methodologies to aid and measure delivery. The book also covers applications, delivery techniques, and QoS protocols. Use Optimizing Applications on Cisco Networks to identify and profile business critical applications, define and establish service-level criteria, and ensure that these system configurations are continually assessed to maintain the desired level of service. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, traffic filtering, user authentication, content filtering, application inspection, and traffic shunning Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Control access and manage activity on the Cisco IOS firewall Configure a Cisco firewall to act as an IDS sensor Every organization has data, facilities, and workflow processes that are critical to their success. As more organizations make greater use of the Internet, defending against network attacks becomes crucial for businesses. Productivity gains and returns on company investments are at risk if the network is not properly defended. Firewalls have emerged as the essential foundation component in any network security architecture. Cisco ASA and PIX Firewall Handbook is a guide for the most commonly implemented features of the popular Cisco Systems® firewall security solutions. This is the first book to cover the revolutionary Cisco ASA and PIX® version 7 security appliances. This book will help you quickly and easily configure, integrate, and manage the entire suite of Cisco® firewall products, including Cisco ASA, PIX version 7 and 6.3, the Cisco IOS router firewall, and the Catalyst Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Shaded thumbtabs mark each section for quick reference and each section provides information in a concise format, with background, configuration, and example...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM. Design and implement effective network solutions by mastering the design process that is used by successful networking professionals Understand the diversity of solutions for the SMB environment, avoiding the pitfalls of the one-size-fits-all approach Create effective and customizable security solutions across the spectrum of SMB types and sizes Exploit the trend of universal communications convergence by expanding into the VoIP market with the Cisco IP Telephony and unified communication solutions Break into the fast-growing CRM marketplace with the Cisco CRM integration solutions Implement wireless LAN solutions that facilitate productivity and workforce optimization In today's business world, investing in technology solutions that improve productivity and save money is critical, but the road to a modern, technology-driven business is full of pitfalls. Cisco Network Design Solutions for Small-Medium Businesses zeros in on critical solutions for networking professionals who are deploying computer networks within a small-medium business (SMB). You'll learn about core networking issues and associated solutions, including security, IP telephony, unified communications, customer relations management (CRM), wireless LANs, and more within this complete design guide. Cisco Network Design Solutions for Small-Medium Businesses is separated into two parts. Part I helps you explore the network design process, survey the SMB landscape, and identify your network requirements from the edge to the core for an effective solution implementation. Part II delves into security, CRM, IP telephony, unified messaging, IP/TV, and wireless LAN solutions, which can save businesses critical time and money. For networking professionals, Cisco Network Design Solutions for Small-Medium Businesses is a one-stop reference and design guide for the effective implementation of SMB networking solutions that enhance the bottom-line. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications Evaluate market drivers for Layer 2 VPNs Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3 Grasp the essentials of Layer 2 LAN and WAN technologies Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching Understand the operation and application of Virtual Private LAN Services (VPLS) Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. As part of its new Unified VPN Suite, Cisco Systems® now offers next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco® Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs. Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HD...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 222 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Ethernet (Local area network system) ; Metropolitan area networks (Computer networks) ; Electronic books ; local
    Abstract: The definitive guide to Enterprise and Carrier Metro Ethernet applications Discover the latest developments in metro networking, Ethernet, and MPLS services and what they can do for your organization Learn from the easy-to-read format that enables networking professionals of all levels to understand the concepts Gain from the experience of industry innovator and best-selling Cisco Press author, Sam Halabi, author of Internet Routing Architectures Metro networks will emerge as the next area of growth for the networking industry and will represent a major shift in how data services are offered to businesses and residential customers. The metro has always been a challenging environment for delivering data services because it has been built to handle the stringent reliability and availability needs for voice. Carriers will have to go through fundamental shifts to equip the metro for next-generation data services demanded by enterprise customers and consumers. This is not only a technology shift, but also a shift in the operational and business model that will allow the incumbent carriers to transform the metro to offer enhanced data services. Metro Ethernet from Cisco Press looks at the deployment of metro data services from a holistic view. It describes the current metro, which is based on TDM technology, and discusses the drivers and challenges carriers will face in transforming the metro to address data services. Metro Ethernet discusses the adoption of metro Ethernet services and how that has led carriers to the delivery of metro data services. With a changing mix of transport technologies, the book then examines current and emerging trends, and delves into the role of virtual private networks (VPN), virtual private local area networks (VLAN), virtual private LAN services (VPLS), traffic engineering, and MPLS and Generalized MPLS (GMPLS).
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Language: English
    Pages: xxiii, 897 p. , ill. ; , 23 cm. +
    Edition: 2nd ed.
    Series Statement: In a nutshell
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Electronic books ; local
    Abstract: C# in a Nutshell provides C# programmers with a concise and thorough reference to the language in one straightforward and accessible volume. Designed as a handbook for daily use, this book is an essential guide to the C# language and the base class APIs of the .NET Framework. Programmers will want to keep this book next to their keyboards for years to come. The heart of the book is a succinct but detailed reference to the C# language and the .NET types most essential to C# programmers. Each chapter in the API reference begins with an overview of a .NET namespace and a diagram of its types, including a quick-reference entry for each type, with name, assembly, category, description, member availability, class hierarchy, and other relevant information, such as whether the type is part o the ECMA CLI specification. Newly updated for .NET Framework version 1.1, the second edition also adds a CD that allows you to integrate the book's API Quick Reference directly into the help files of Visual Studio .NET 2002 & 2003, giving you direct access to this valuable information via your computer. In addition to the API reference section, this book includes: An accelerated introduction to the C# language and the .NET Common Language Runtime A tutorial section on using C# with the core classes of the .NET Framework Class Library to perform common tasks such as manipulating strings, I/O, and interacting with legacy components Comprehensive language and tool reference chapters, including a C# syntax summary, a list of XML documentation tags, and a guide to command-line tools that ship with Visual Studio .NET and the .NET Framework Appendixes with reference tables for regular expression syntax, format specifiers, a C# keyword glossary, namespace/assembly cross-reference, and a type and member index for determining in which type a method or field is defined. Every once in a while, a book becomes the de-facto standard for a technology, operating system, or programming language--which is exactly what C# in a Nutshell has done in a single straightforward and easy to use volume. There is no more complete, up-to-date reference to the C# Language available.
    Note: Includes indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 221 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Parallel Title: Erscheint auch als
    DDC: 005.4/476
    Keywords: Linux ; Client/server computing ; Electronic books ; local
    Abstract: A competent system administrator knows that a Linux server is a high performance system for routing large amounts of information through a network connection. Setting up and maintaining a Linux server requires understanding not only the hardware, but the ins and outs of the Linux operating system along with its supporting cast of utilities as well as layers of applications software. There's basic documentation online but there's a lot beyond the basics you have to know, and this only comes from people with hands-on, real-world experience. This kind of "know how" is what we sought to capture in Linux Server Hacks . Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files. You'll learn alternative ways to do backups, how to use system monitoring tools to track system performance and a variety of secure networking solutions. Linux Server Hacks also helps you manage large-scale Web installations running Apache, MySQL, and other open source tools that are typically part of a Linux system.O'Reilly's new Hacks Series proudly reclaims the term "hacking" for the good guys. Hackers use their ingenuity to solve interesting problems. Rob Flickenger is an experienced system administrator, having managed the systems for O'Reilly Network for several years. (He's also into community wireless networking and he's written a book on that subject for O'Reilly.) Rob has also collected the best ideas and tools from a number of other highly skilled contributors.Written for users who already understand the basics, Linux Server Hacks is built upon the expertise of people who really know what they're doing.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 275 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; eXtreme programming ; Electronic books ; local
    Abstract: Extreme Programming does not mean programming naked while rollerblading down the side of the Grand Canyon. It does mean a new approach to software development that is both radical and common-sense. Unlike many software development methodologies, XP has been accepted quickly because its core practices--particularly code sharing, test-first development, and continuous integration--resonated immediately with software developers everywhere. Instead of impressing developers with a body of theory, XP got programmers to say, "Yeah, that's how I'd like to work." Oddly enough, although most developers turn to Extreme Programming methods in order to code real, hands-on, and extensible projects quickly ("Code comes first"), most books on Extreme Programming insist on focusing on the theory and not the practice. Not the Java Extreme Programming Cookbook . Brimming with over 100 "recipes" for getting down to business and actually doing XP, the Java Extreme Programming Cookbook doesn't try to "sell" you on XP; it succinctly documents the most important features of popular open source tools for XP in Java--including Ant, Junit, HttpUnit, Cactus, Tomcat, XDoclet--and then digs right in, providing recipes for implementing the tools in real-world environments. Each recipe offers solutions that help you put an extreme programming environment together: then provides code for automating the build process and testing. Although the time saved using any one of these solutions will more than pay for the book, Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each recipe also includes explanations of how and why the approach works, so you can adapt the techniques to similar situations. One of the biggest challenges facing developers today is sorting through the wide variety of tools available form various source and figuring out how to them effectively. The recipes in Java Extreme Programming Cookbook showcase how to use the most important features of these XP tools. Many of these tools are geared towards unit testing, while others are invaluable for continuous integration; with these practical examples, you'll be able to choose the most effective tools to accomplish your goals, then implement them in a cohesive development environment quickly. If you want to set up a test-driven development environment that allows you to focus on writing testable code--now--this book will prove invaluable.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 574 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Perl (Computer program language) ; Web site development ; Electronic books ; local
    Abstract: Among the many different approaches to "templating" with Perl--such as Embperl, Mason, HTML::Template, and hundreds of other lesser known systems--the Template Toolkit is widely recognized as one of the most versatile. Like other templating systems, the Template Toolkit allows programmers to embed Perl code and custom macros into HTML documents in order to create customized documents on the fly. But unlike the others, the Template Toolkit is as facile at producing HTML as it is at producing XML, PDF, or any other output format. And because it has its own simple templating language, templates can be written and edited by people who don't know Perl. In short, the Template Toolkit combines the best features of its competitors, with ease-of-use and flexibility, resulting in a technology that's fast, powerful and extensible, and ideally suited to the production and maintenance of web content and other dynamic document systems.In Perl Template Toolkit you'll find detailed coverage of this increasingly popular technology. Written by core members of the technology's development team, the book guides you through the entire process of installing, configuring, using, and extending the Template Toolkit. It begins with a fast-paced but thorough tutorial on building web content with the Template Toolkit, and then walks you through generating and using data files, particularly with XML. It also provides detailed information on the Template Toolkit's modules, libraries, and tools in addition to a complete reference manual.Topics in the book include: Getting started with the template toolkit The Template language Template directives Filters Plugins Extending the Template Toolkit Accessing databases XML Advanced static web page techniques Dynamic web content and web applications The only book to cover this important tool, Perl Template Toolkit is essential reading for any Perl programmer who wants to create dynamic web content that is remarkably easy to maintain. This book is your surefire guide to implementing this fast, flexible, and powerful templating system.
    Note: "Scalable templating for the Web"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 541 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Programming Visual Basic .NET , Second Edition is the complete guide to application development using Visual Basic .NET. Entirely rewritten by .NET expert Jesse Liberty, the new edition of this tutorial will be essential reading for the millions of Visual Basic programmers looking to make the change to Microsoft's .NET programming environment. Thorough, entertaining, and easy to follow, this book provides a comprehensive and detailed overview of the language, object-oriented programming, and the .NET Framework, and goes even further--you'll learn how to create Windows and Web applications, as well as Web services. A comprehensive introduction to the Visual Basic .NET language, this new edition covers topics of greatest concern to VB6 programmers who wish to make the transition from traditional Visual Basic 6 programming to the new object-oriented, component-based world of .NET. Loaded with practical examples for intermediate and advanced programmers, Programming Visual Basic .NET focuses on turning you into a proficient .NET developer. Some of the topics in the book include: Visual Basic .NET and the .NET Framework Object-Oriented Programming Building Windows Applications Accessing Data with ADO.NET ASP.NET Web Services and much more Jesse Liberty's books have successfully guided thousands of new and experienced programmers alike into the world of .NET programming and Programming Visual Basic .NET , Second Edition will be no exception. This book is sure to become a key component of developers' .NET libraries.
    Note: Includes index. - Rev. ed. of: Programming Visual Basic .NET / Dave Grundgeiger. 1st ed., 2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: ix, 118 p. ; , 18 cm
    Keywords: C# (Computer program language) ; Electronic books ; local
    Abstract: C# programmers all have one thing in common -- they're learning a new language. That fact alone brings challenges, frustrations, and constant demands on your patience. And, no matter how good your reference books are, you can't always stop to thumb through hundreds of pages to find the piece of information you need. Your answer is the C# Language Pocket Reference . Concise and easy to use, this handy pocket guide to C# comes from the authors of C# in a Nutshell , and is a must-have quick reference for anyone implementing this new object-oriented language.The C# Language Pocket Reference offers the convenience of a quick reference in a format that will actually fit in your pocket. The book includes a guide to C# language elements, a brief overview of the Framework Class library, a cross-reference for namespaces and assemblies, a list of compiler syntax and switches, a regular expressions reference guide, and more. You'll be surprised at how much information can fit into this slim volume.O'Reilly's Pocket References have become a favorite among programmers everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point in your work and need to get to a solution quickly, the new C# Language Pocket Reference is the book you'll want to have.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 400 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 006.74
    Keywords: XML (Document markup language) ; Electronic books ; local
    Abstract: This second edition of the bestselling Learning XML provides web developers with a concise but grounded understanding of XML (the Extensible Markup Language) and its potential-- not just a whirlwind tour of XML.The author explains the important and relevant XML technologies and their capabilities clearly and succinctly with plenty of real-life projects and useful examples. He outlines the elements of markup--demystifying concepts such as attributes, entities, and namespaces--and provides enough depth and examples to get started. Learning XML is a reliable source for anyone who needs to know XML, but doesn't want to waste time wading through hundreds of web sites or 800 pages of bloated text.For writers producing XML documents, this book clarifies files and the process of creating them with the appropriate structure and format. Designers will learn what parts of XML are most helpful to their team and will get started on creating Document Type Definitions. For programmers, the book makes syntax and structures clear. Learning XML also discusses the stylesheets needed for viewing documents in the next generation of browsers, databases, and other devices. Learning XML illustrates the core XML concepts and language syntax, in addition to important related tools such as the CSS and XSL styling languages and the XLink and XPointer specifications for creating rich link structures. It includes information about three schema languages for validation: W3C Schema, Schematron, and RELAX-NG, which are gaining widespread support from people who need to validate documents but aren't satisfied with DTDs. Also new in this edition is a chapter on XSL-FO, a powerful formatting language for XML. If you need to wade through the acronym soup of XML and start to really use this powerful tool, Learning XML , will give you the roadmap you need.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 331 p. , ill. ; , 24 cm
    DDC: 006.7/4
    Keywords: Cataloging of computer network resources ; Metadata ; RDF (Document markup language) ; Semantic Web ; Electronic books ; local
    Abstract: The Resource Description Framework (RDF) is a structure for describing and interchanging metadata on the Web--anything from library catalogs and worldwide directories to bioinformatics, Mozilla internal data structures, and knowledge bases for artificial intelligence projects. RDF provides a consistent framework and syntax for describing and querying data, making it possible to share website descriptions more easily. RDF's capabilities, however, have long been shrouded by its reputation for complexity and a difficult family of specifications. Practical RDF breaks through this reputation with immediate and solvable problems to help you understand, master, and implement RDF solutions. Practical RDF explains RDF from the ground up, providing real-world examples and descriptions of how the technology is being used in applications like Mozilla, FOAF, and Chandler, as well as infrastructure you can use to build your own applications. This book cuts to the heart of the W3C's often obscure specifications, giving you tools to apply RDF successfully in your own projects.The first part of the book focuses on the RDF specifications. After an introduction to RDF, the book covers the RDF specification documents themselves, including RDF Semantics and Concepts and Abstract Model specifications, RDF constructs, and the RDF Schema. The second section focuses on programming language support, and the tools and utilities that allow developers to review, edit, parse, store, and manipulate RDF/XML. Subsequent sections focus on RDF's data roots, programming and framework support, and practical implementation and use of RDF and RDF/XML.If you want to know how to apply RDF to information processing, Practical RDF is for you. Whether your interests lie in large-scale information aggregation and analysis or in smaller-scale projects like weblog syndication, this book will provide you with a solid foundation for working with RDF.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 765 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: To thoroughly understand what makes Linux tick and why it's so efficient, you need to delve deep into the heart of the operating system--into the Linux kernel itself. The kernel is Linux--in the case of the Linux operating system, it's the only bit of software to which the term "Linux" applies. The kernel handles all the requests or completed I/O operations and determines which programs will share its processing time, and in what order. Responsible for the sophisticated memory management of the whole system, the Linux kernel is the force behind the legendary Linux efficiency. The new edition of Understanding the Linux Kernel takes you on a guided tour through the most significant data structures, many algorithms, and programming tricks used in the kernel. Probing beyond the superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Relevant segments of code are dissected and discussed line by line. The book covers more than just the functioning of the code, it explains the theoretical underpinnings for why Linux does things the way it does. The new edition of the book has been updated to cover version 2.4 of the kernel, which is quite different from version 2.2: the virtual memory system is entirely new, support for multiprocessor systems is improved, and whole new classes of hardware devices have been added. The authors explore each new feature in detail. Other topics in the book include: Memory management including file buffering, process swapping, and Direct memory Access (DMA) The Virtual Filesystem and the Second Extended Filesystem Process creation and scheduling Signals, interrupts, and the essential interfaces to device drivers Timing Synchronization in the kernel Interprocess Communication (IPC) Program execution Understanding the Linux Kernel , Second Edition will acquaint you with all the inner workings of Linux, but is more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. If knowledge is power, then this book will help you make the most of your Linux system.
    Note: "Linux 2.4"--p. ix. - Includes bibliographical references (p. 707-709) and indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...