Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Safari Tech Books Online  (446)
  • Beijing ; : O'Reilly  (198)
  • Sebastopol, CA : O'Reilly  (170)
  • Indianapolis, IN : Cisco Press  (78)
Datenlieferant
Materialart
Sprache
Erscheinungszeitraum
  • 1
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    Ausgabe: 1st ed.
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Your first step into the world of IP telephony No IP telephony experience required Includes clear and easily understood explanations Makes learning easy Your first step to the world of IP telephony begins here! Learn how voice and data communications merge in voice-over-IP technology Use this reader-friendly guide to understand the benefits of this technology Explore real-life applications and theories through case studies in every chapter Welcome to the world of voice over IP We use either a telephone or e-mail for much of our day-to-day communication. Today, these two worlds are merging, and companies can place phone calls over their existing data network infrastructures using a technology called voice over IP (VoIP). No prior experience with VoIP technology is required Voice over IP First-Step is anyone's introduction to the world of VoIP networks. The concepts in this book are presented in plain language, so you don't need in-depth background knowledge to comprehend the technologies covered. If you work with data networks, if you work with telephony networks, if you're a home user interested in how VoIP can reduce your monthly phone bill, or if the concept of VoIP simply intrigues you, this book is for you.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    Ausgabe: 2nd ed.
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Official self-study test preparation guide for the Cisco SNRS exam 642-502 Attack threats Router management and administration Authentication, Authorization, and Accounting (AAA) and Cisco Secure Access Control Server RADIUS and TACACS+ Cisco IOS® Firewall feature set Securing networks with Cisco routers Mitigating Layer 2 attacks IPsec and Easy Virtual Private Network (VPN) Security Device Manager (SDM) CCSP SNRS Exam Certification Guide is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the SNRS exam. Network security engineers Greg Bastien, Sara Nasseh, and Christian Degu share preparation hints and test-taking tips, helping you identify areas of weakness and improve your knowledge of router and switch security. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCSP SNRS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Foundation summary information gives you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful test engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP SNRS Exam Certification Guide is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press®. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains an electronic copy of the book and over 200 practice questions for the SNRS exam, all available in study mode, test mode, and flash card format. Includes a FREE 45-Day Online Edition T...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: An introduction to network attack mitigation with IPS Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the "big picture"? What are the best practices related to IPS? How is IPS deployed, and what should be considered prior to a deployment? Intrusion Prevention Fundamentals offers an introduction and in-depth overview of Intrusion Prevention Systems (IPS) technology. Using real-world scenarios and practical case studies, this book walks you through the lifecycle of an IPS project-from needs definition to deployment considerations. Implementation examples help you learn how IPS works, so you can make decisions about how and when to use the technology and understand what "flavors" of IPS are available. The book will answer questions like: Whether you are evaluating IPS technologies or want to learn how to deploy and manage IPS in your network, this book is an invaluable resource for anyone who needs to know how IPS technology works, what problems it can or cannot solve, how it is deployed, and where it fits in the larger security marketplace. Understand the types, triggers, and actions of IPS signatures Deploy, configure, and monitor IPS activities and secure IPS communications Learn the capabilities, benefits, and limitations of host IPS Examine the inner workings of host IPS agents and management infrastructures Enhance your network security posture by deploying network IPS features Evaluate the various network IPS sensor types and management options Examine real-world host and network IPS deployment scenarios This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques. Includes a FREE 45-Day Online Edition
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 238 p. , ill. ; , 23 cm
    DDC: 004.6/2
    Schlagwort(e): Wireless communication systems ; Electronic books ; local
    Kurzfassung: Your First-Step into the World of Wireless Networks No experience required! Gain an understanding of wireless networking basics with this reader friendly guide The first book anyone should read about wireless networks with step-by-step instruction Learn from an author experienced in and known for writing to a generalist wireless audience with a clear, simple-to-understand style As a basic introduction to wireless networking, Wireless Networks First-Step assumes that readers have no previous wireless experience. The book provides an overview of wireless networking, along with details of applicable standards and technologies. Newcomers to wireless technologies will find practical information along with an abundance of examples. Case studies throughout the chapters provide real-world implementation examples, presented in a non-technical fashion. Implementation details are discussed only to the extent that readers can identify what type of wireless network may be appropriate for their needs. Wireless Networks First-Step , written by Jim Geier, begins with a basic introduction to wireless networks and an explanation of radio wave communications. It then reviews different types of wireless networks including WPANs (wireless personal area networks), WLANs (wireless local area networks), wireless MANs (metropolitan area networks), and WWANs (wireless wide area networks). The final section covers security threats to wireless networks, and solutions to combat these threats. 158720111903232004
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    ISBN: 1587052024
    Sprache: Englisch
    Seiten: p. ; , cm
    Ausgabe: 2nd ed.
    Schlagwort(e): Electronic books ; local
    Kurzfassung: A detailed examination of interior routing protocols -- completely updated in a new edition A complete revision of the best-selling first edition--widely considered a premier text on TCP/IP routing protocols A core textbook for CCIE preparation and a practical reference for network designers, administrators, and engineers Includes configuration and troubleshooting lessons that would cost thousands to learn in a classroom and numerous real-world examples and case studies Praised in its first edition for its approachable style and wealth of information, this new edition provides readers a deep understanding of IP routing protocols, teaches how to implement these protocols using Cisco routers, and brings readers up to date protocol and implementation enhancements. Routing TCP/IP, Volume 1 , Second Edition, includes protocol changes and Cisco features that enhance routing integrity, secure routers from attacks initiated through routing protocols, and provide greater control over the propagation of routing information for all the IP interior routing protocols. Routing TCP/IP, Volume 1 , Second Edition, provides a detailed analysis of each of the IP interior gateway protocols (IGPs). Its structure remains the same as the best-selling first edition, though information within each section is enhanced and modified to include the new developments in routing protocols and Cisco implementations. What's New In This Edition? The first edition covers routing protocols as they existed in 1998. The new book updates all covered routing protocols and discusses new features integrated in the latest version of Cisco IOS Software. IPv6, its use with interior routing protocols, and its interoperability and integration with IPv4 are also integrated into this book. Approximately 200 pages of new information are added to the main text, with some old text removed. Additional exercise and solutions are also included.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. ; , cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Field-proven MPLS designs covering MPLS VPNs, pseudowire, QoS, traffic engineering, IPv6, network recovery, and multicast Understand technology applications in various service provider and enterprise topologies via detailed design studies Benefit from the authors' vast experience in MPLS network deployment and protocol design Visualize real-world solutions through clear, detailed illustrations Design studies cover various operator profiles including an interexchange carrier (IXC), a national telco deploying a multiservice backbone carrying Internet and IP VPN services as well as national telephony traffic, an international service provider with many POPs all around the globe, and a large enterprise relying on Layer-3 VPN services to control communications within and across subsidiaries Design studies are thoroughly explained through detailed text, sample configurations, and network diagrams Definitive MPLS Network Designs provides examples of how to combine key technologies at the heart of IP/MPLS networks. Techniques are presented through a set of comprehensive design studies. Each design study is based on characteristics and objectives common to a given profile of network operators having deployed MPLS and discusses all the corresponding design aspects. The book starts with a technology refresher for each of the technologies involved in the design studies. Next, a series of design studies is presented, each based on a specific hypothetical network representative of service provider and enterprise networks running MPLS. Each design study chapter delivers four elements. They open with a description of the network environment, including the set of supported services, the network topology, the POP structure, the transmission facilities, the basic IP routing design, and possible constraints. Then the chapters present design objectives, such as optimizing bandwidth usage. Following these are details of all aspects of the network design, covering VPN, QoS, TE, network recovery, and-where applicable-multicast, IPv6, and pseudowire. The chapters conclude with a summary of the lessons that can be drawn from the design study so that all types of service providers and large enterprise MPLS architects can adapt aspects of the design solution to their unique network environment and objectives. Although network architects have many resources for seeking information on the concepts and protocols involved with MPLS, there is no single resource that illustrat...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvi, 734 p. , ill. ; , 24 cm
    Schlagwort(e): Computer networks ; Design and construction ; Computer networks ; Management ; Quality control ; Electronic books ; local
    Kurzfassung: Best-practice QoS designs for protecting voice, video, and critical data while mitigating network denial-of-service attacks Understand the service-level requirements of voice, video, and data applications Examine strategic QoS best practices, including Scavenger-class QoS tactics for DoS/worm mitigation Learn about QoS tools and the various interdependencies and caveats of these tools that can impact design considerations Learn how to protect voice, video, and data traffic using various QoS mechanisms Evaluate design recommendations for protecting voice, video, and multiple classes of data while mitigating DoS/worm attacks for the following network infrastructure architectures: campus LAN, private WAN, MPLS VPN, and IPSec VPN Quality of Service (QoS) has already proven itself as the enabling technology for the convergence of voice, video, and data networks. As business needs evolve, so do the demands for QoS. The need to protect critical applications via QoS mechanisms in business networks has escalated over the past few years, primarily due to the increased frequency and sophistication of denial-of-service (DoS) and worm attacks. End-to-End QoS Network Design is a detailed handbook for planning and deploying QoS solutions to address current business needs. This book goes beyond discussing available QoS technologies and considers detailed design examples that illustrate where, when, and how to deploy various QoS features to provide validated and tested solutions for voice, video, and critical data over the LAN, WAN, and VPN. The book starts with a brief background of network infrastructure evolution and the subsequent need for QoS. It then goes on to cover the various QoS features and tools currently available and comments on their evolution and direction. The QoS requirements of voice, interactive and streaming video, and multiple classes of data applications are presented, along with an overview of the nature and effects of various types of DoS and worm attacks. QoS best-practice design principles are introduced to show how QoS mechanisms can be strategically deployed end-to-end to address application requirements while mitigating network attacks. The next section focuses on how these strategic design principles are applied to campus LAN QoS design. Considerations and detailed design recommendations specific to the access, distribution, and core layers of an enterprise campus network are presented. Private WAN QoS design is discussed in the ...
    Anmerkung: Subtitle on cover: Quality of service in LANs, WANs, and VPNs. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 374 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Schlagwort(e): Local area networks (Computer networks) ; Telecommunication ; Switching systems ; Electronic books ; local
    Kurzfassung: The essential guide for understanding Ethernet switched networks Understand various Ethernet technologies from 10BASE-T to Gigabit Ethernet Learn about common switching modes, paths, and architectures Delve into the Cisco Catalyst switch architecture and examine the various Catalyst switch models, including the 6000/6500, 4500, and 3750 Become familiar with VLAN concepts, including types of trunks, VLAN Trunking Protocol (VTP), and private VLANs Understand Multilayer Switching (MLS) and the various hardware components that make MLS work Learn how to configure Cisco Catalyst switches in both native and hybrid mode Implement QoS on Cisco Catalyst switches Deploy multicast features and protocols, including PIM, IGMP snooping, and CGMP Utilize data link layer features such as BPDU Guard, BPDU Filter, Root Guard, Loop Guard, RSTP, and MST Evaluate design and configuration best practices Learn how to manage LANs and troubleshoot common problems Local-area networks (LANs) are becoming increasingly congested and overburdened because of a dramatic increase in traffic, faster CPUs and operating systems, and more network-intensive applications. Many organizations that use network and computing technology use LAN switching to take advantage of high-speed traffic forwarding and improved performance of traditional Ethernet technologies that don't require costly wiring upgrades or time-consuming host reconfiguration. Cisco LAN Switching Fundamentals provides administrators of campus networks with the most up-to-date introduction to LAN switching within a traditional Ethernet environment. Cisco LAN Switching Fundamentals presents an in-depth look at modern campus network requirements. It provides an easy-to-understand introduction to LAN switching best practices using Cisco Catalyst switches. This book provides you with a wealth of details on the architecture, operation, and configuration of the Cisco Catalyst family of switches. You learn about a wide range of topics, including quality of service (QoS), multicast, Rapid Spanning Tree Protocol (RSTP), Multiple Spanning Tree (MST), private virtual LANs (VLANs), and configuration using the native and hybrid software interfaces. Design advice and configuration examples are discussed liberally throughout the book to provide you with the best perspective on effective deployment techniques. Finally, the book wraps up with a discussion of steps necessary to troubleshoot common problems and optimize LAN performance. ...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 208 p. , ill. ; , 24 cm
    Schlagwort(e): Database management ; Relational databases ; Electronic books ; local
    Kurzfassung: This book sheds light on the principles behind the relational model, which is fundamental to all database-backed applications--and, consequently, most of the work that goes on in the computing world today. Database in Depth: The Relational Model for Practitioners goes beyond the hype and gets to the heart of how relational databases actually work.Ideal for experienced database developers and designers, this concise guide gives you a clear view of the technology--a view that's not influenced by any vendor or product. Featuring an extensive set of exercises, it will help you: understand why and how the relational model is still directly relevant to modern database technology (and will remain so for the foreseeable future) see why and how the SQL standard is seriously deficient use the best current theoretical knowledge in the design of their databases and database applications make informed decisions in their daily database professional activities Database in Depth will appeal not only to database developers and designers, but also to a diverse field of professionals and academics, including database administrators (DBAs), information modelers, database consultants, and more. Virtually everyone who deals with relational databases should have at least a passing understanding of the fundamentals of working with relational models.Author C.J. Date has been involved with the relational model from its earliest days. An exceptionally clear-thinking writer, Date lays out principle and theory in a manner that is easily understood. Few others can speak as authoritatively the topic of relational databases as Date can.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 548 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    DDC: 005.4/46
    Schlagwort(e): Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: A smart collection of insider tips and tricks, Windows XP Hacks , Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes extensive coverage of hot-button issues such as: security web browsing controlling the control panel removing uninstallable XP components pop-up ads You'll also find timesaving hacks for file distribution; digital media, such as iTunes; and high-visibility web software, services, and exploits that have emerged since the book's last edition. Each hack in the book can be read easily in just a few minutes, saving countless hours of searching for the right answer.Now completely revised and updated to cover Service Pack 2 (SP2), the second edition of this bestseller carefully breaks down the new features that come with SP2, including IE pop-up blocker, Windows Firewall, and the new wireless client.Written by Preston Gralla, the compact and affordable Windows XP Hacks , Second Edition provides direct, hands-on solutions that can be applied to the challenges facing XP beginners, as well as the more experienced power user. Each year, Windows XP is pre-installed on 90 million PCs worldwide, making it the world's most popular operating system.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 11
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 310 p. , ill. ; , 24 cm
    Schlagwort(e): Intranets (Computer networks) ; Web servers ; Electronic books ; local
    Kurzfassung: Want to work more efficiently and effectively? Want to improve productivity? Microsoft is betting that you do. That's why it created Windows SharePoint Services--a set of collaboration tools that helps organizations increase individual and team productivity by enabling them to create web sites for information sharing and document collaboration.Through these team-oriented web sites, users capture and share ideas, and work together on documents, tasks, contacts, etc.--either among themselves or with partners and customers. And if you have Windows 2003 Server, then you already have SharePoint, since it's built right in. But before you can enjoy the benefits of SharePoint, you need to know how to turn it on, set it up, and get your applications working with it. Essential Sharepoint will help you do just that. It's not only the most complete guide for setting up and using these increasingly popular sites, but it also explains in detail the integration that makes SharePoint exciting. Everything you need to know about SharePoint is covered, including: hosting choices administration customization integration with Microsoft Office developing new SharePoint functionality when to use SharePoint portal server Essential Sharepoint covers all the key topics for getting up and running with this powerful and popular set of collaboration tools. And it's not just for members of the IT staff. This comprehensive guide is for anyone in an organization who wants to explore Microsoft SharePoint in order to foster collaboration with other users.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 234 , ill. ; , 24 cm
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers. Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for ExciteHome.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture. How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
    Anmerkung: "Unmasking Identity Management Architecture (IMA)". - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 13
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 297 p. , ill. ; , 24 cm
    Schlagwort(e): Graphical user interfaces (Computer systems) ; Electronic books ; local
    Kurzfassung: The Eclipse platform continues to gain tremendous popularity as both a Java IDE and a Java platform for application programming. One of the core underpinnings of Eclipse is SWT, the Standard Widget Toolkit. This set of components can be used to develop graphical user interfaces in Java,and offer a native-code alternative to Java's Swing and AWT components. Incorporating the look and feel of whatever platform the code is run on, SWT offers a lightning-fast approach to building GUIs, all of which actually look like they belong on the platform on which they are run. But you already know what you want to do--so wading through the basics of user interface design, graphical components, and what a button does is simply a waste of time. Enter SWT: A Developer's Notebook . In typical Developer's Notebook style, you'll learn how to take SWT out for a spin, make it work for you, and turn it upside down, all without wasted words or space. Each lab in this notebook details a specific task; you can read from the first page to the last, look up just what you need to know, and even squeeze this book into your laptop bag as a quick reference when you forget how to create a multi-tabbed view. This book covers: Downloading and configuring Eclipse and SWT Menus, toolbars, and buttons Building tabbed layouts and folders SWT's unique coolbar control Adding listeners and responding to events Building a complete SWT-based application
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 14
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 233 p. , ill. ; , 24 cm
    DDC: 006.776
    Schlagwort(e): QuickTime ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: QuickTime Java (QJT) is a terrific multimedia toolkit, but it's also terrifying to the uninitiated. Java developers who need to add audio, video, or interactive media creation and playback to their applications find that QTJ is powerful, but not easy to get into. In fact, when it comes to class-count, QuickTime Java is nearly as large as all of Java 1.1. Once you learn the entire scope of Apple's QuickTime software, you really appreciate the problem. At its simplest, QuickTime allows Mac and Windows users to play audio and video on their computers. But QuickTime is many things: a file format, an environment for media authoring, and a suite of applications that includes browser plug-ins for viewing media within a web page, a PictureViewer for working with still pictures, QuickTime Streaming Server for delivering streaming media files on the Internet in real time, and QuickTime Broadcaster for delivering live events on the Internet. Among others. As if that weren't daunting enough, the javadocs on QJT are wildly incomplete, and other books on the topic are long out of date and not well regarded, making progress with QTJ extremely difficult. So what can you do? Our new hands-on guide, QuickTime Java: A Developer's Notebook , not only catches up with this technology, but de-mystifies it. This practical "all lab, no lecture" book is an informal, code-intensive workbook that offers the first real look at this important software. Like other titles in our Developer's Notebook series, QuickTime Java: A Developer's Notebook is for impatient early adopters who want get up to speed on what they can use right now. It's deliberately light on theory, emphasizing example over explanation and practice over concept, so you can focus on learning by doing. QuickTime Java: A Developer's Notebook gives you just the functionality you need from QTJ. Even if you come to realize that 95% of the API is irrelevant to you, this book will help you master the 5% that really counts.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 15
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 1224 p. , ill. ; , 23 cm
    Ausgabe: 5th ed.
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Object-oriented programming (Computer science) ; Web servers ; Electronic books ; local
    Kurzfassung: With more than 700,000 copies sold to date, Java in a Nutshell from O'Reilly is clearly the favorite resource amongst the legion of developers and programmers using Java technology. And now, with the release of the 5.0 version of Java, O'Reilly has given the book that defined the "in a Nutshell" category another impressive tune-up. In this latest revision, readers will find Java in a Nutshell , 5th Edition, does more than just cover the extensive changes implicit in 5.0, the newest version of Java. It's undergone a complete makeover--in scope, size, and type of coverage--in order to more closely meet the needs of the modern Java programmer. To wit, Java in a Nutshell , 5th Edition now places less emphasis on coming to Java from C and C++, and adds more discussion on tools and frameworks. It also offers new code examples to illustrate the working of APIs, and, of course, extensive coverage of Java 5.0. But faithful readers take comfort: it still hasn't lost any of its core elements that made it such a classic to begin with. This handy reference gets right to the heart of the program with an accelerated introduction to the Javaprogramming language and its key APIs--ideal for developers wishing to start writing code right away. And, as was the case in previous editions, Java in a Nutshell , 5th Edition is once again chock-full of poignant tips, techniques, examples, and practical advice. For as longas Java has existed, Java in a Nutshell has helped developers maximize the capabilities of the program's newest versions. And this latest edition is no different.
    Anmerkung: "Covers Java 5.0"--Cover p. [1]. - Contains an accelerated introduction to Java for C and C++ programmers who want to learn the language fast. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 16
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 478 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Schlagwort(e): Linux ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.
    Anmerkung: "A system administrator's guide to hetrogeneous networking"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 17
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 243 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.133
    Schlagwort(e): Microsoft Visual BASIC ; Handbooks, manuals, etc ; BASIC (Computer program language) ; Handbooks, manuals, etc ; Microsoft .NET Framework ; Handbooks, manuals, etc ; Electronic books ; local
    Kurzfassung: When Microsoft introduced the Visual Basic .NET programming language, as part of its move to the .NET Framework two years ago, many developers willingly made the switch. Millions of others, however, continued to stick with Visual Basic 6. They weren't ready for such a radical change, which included an object-oriented environment similar to Java. They liked the old Visual Basic just fine.In an effort to win over those diehard VB6 developers, the company has included a new version of VB.NET in its upcoming next generation release of the Visual Studio .NET development platform. Visual Basic 2005 comes with innovative language constructs, new compiler features, dramatically enhanced productivity and an improved debugging experience. The language's new version is now available in beta release, and Microsoft is encouraging developers to give it a test drive. Visual Basic 2005: A Developer's Notebook provides the ideal test track. With nearly 50 hands-on projects, this practical introduction to VB 2005 will bring you up to speed on all the new features of this language by allowing you to work with them directly. The book summarizes the changes that VB 2005 brings, and tells you how to acquire, install and configure the beta version of VB 2005 SDK. Each project or experiment explores a different feature, with emphasis on changes that can increase productivity, simplify programming tasks, and help you add new functionality to your applications.This one-of-a-kind book also offers suggestions for further experimentation, links to on-line documentation and other sources of information, and practical notes and warnings from the author.The new Developer's Notebooks series from O'Reilly offers an in-depth first look at important new tools for software developers. Emphasizing example over explanation and practice over theory, they focus on learning by doing you'll get the goods straight from the masters, in an informal and code-intensive style. For those who want to get up speed with VB 2005 right away, this is the perfect all lab, no lecture guide.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 18
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 653 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: Each year, Windows XP is pre-installed on 30 million PCs sold inthe U.S.--and 90 million worldwide--making it the world's mostpopular operating system, and proving to frustrated userseverywhere that preponderance does not equate to ease of use. Thereare literally thousands of programs, tools, commands, screens,scripts, buttons, tabs, applets, menus, and settings containedwithin Windows XP. And it has only been in the last couple of yearsthat Microsoft's documentation has actually been more of a helpthan a hindrance. But it still isn't enough. Windows XP users and administrators need a quick and easy way tofind answers. Plenty of books go into detail about the theorybehind a particular technology or application, but few go straightto the essentials for getting the job done. Windows XPCookbook does just that, tackling the most common tasks neededto install, manage, and support Windows XP. Featuring a new twist to O'Reilly's proven Cookbook formula,this problem-solving guide offers multiple solutions for each ofits 300-plus recipes. Solve dilemmas with the graphical userinterface, the command line, through the Registry, or by usingscripts. Each step-by-step recipe includes a discussion thatexplains how and why it works. The book is also among the first tocover Microsoft's XP Service Pack 2. With these practical,on-the-job solutions, Windows XP Cookbook will save youhours of time searching for answers. Windows XP Cookbook will be useful to anyone that has touse, deploy, administer, or automate Windows XP. But this isn't atypical end-user book; it covers the spectrum of topics involvedwith running Windows XP in both small and large environments. As aresult, IT professionals and system administrators will find it agreat day-to-day reference. And power users will find Windows XPCookbook a great source for information on tweaking XP andgetting the most out of their systems. The bottom line is that Windows XP Cookbook will make just about anyone who uses XPmore productive.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 19
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 381 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 621.389/3
    Schlagwort(e): Home entertainment systems ; Home video systems ; Stereophonic sound systems ; Electronic books ; local
    Kurzfassung: It might be the long lines at the theater, the $4.00 for a small bag of popcorn, or the cutting-edge technology that's now so readily available to the home market. Whatever the reason, the home theater market today is booming like the soundtrack to Star Wars! Want proof? A Google search for home theater reveals over three million results. Yikes! It's simply undeniable: More and more people prefer watching their favorite movies, television shows, and videos from the comfort of their own sofas and couches. What's also undeniable is the inexperience of most people who choose to install or upgrade their home theaters. Until now, the knowledge, technique, and experiences of those who've encountered similar conditions to yours could only be accessed through laborious web searches, stacks of magazines, and water cooler conversations. Home Theater Hacks from O'Reilly is the perfect remedy for this group. A smart collection of insider tips and tricks, Home Theater Hacks covers home theater installation from start to finish, purchase to experience. Just imagine: no frustrating trial-and-error process and better yet, no expensive appointments with installation experts. Home Theater Hacks prevents both by imparting down-and-dirty technique not found anywhere else. The book begins with a quick glossary of terms so you can speak the lingo when you go shopping, and then dives right into hush-hush, insider tricks. It's all covered where to find the right audio and video components, how to deal with speakers and wiring, understanding cable connectivity, mastering remote controls, how to fully grasp TiVo, and so much more. And to top it off, each of these insider tips is presented in a concise yet delightfully entertaining style. Bringing the Jurassic Park dinosaurs into your living room has never been so easy! A seasoned veteran with numerous O'Reilly titles under his belt, author Brett McLaughlin leaves no stone unturned in helping you customize your home theater experience to your own personal environment.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 20
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 439 p. , ill. ; , 24 cm
    Schlagwort(e): eBay (Firm) ; Internet auctions ; Electronic books ; local
    Kurzfassung: It's the undisputed king of Internet auction sites. It's a global bazaar offering a range of goods from Antiques to Zulu Daisies. Cars, clothing, collectibles: you name it, and it's likely that you can find on eBay. But along with the vast selection of goods available, buyers and sellers also encounter all the other elements that markets are known for: tricks and swindlers, overpriced goods, deceptive labeling, small print, recycled items marked as new, and the occasional rare priceless find or undiscovered treasure.Seasoned eBay traders know that to successfully buy and sell within this mega-shopping platform, you need to understand the system. Unfortunately, the secrets of the site are often tightly held by other buyers and sellers seeking a competitive edge. But what if you're a newcomer? Or an experienced trader who wants to make the jump to power buyer or seller? eBay: The Missing Manual gives you the inside information you'll need to become an eBay expert.Buyers will find the most effective ways to find you want and pay prices that are sure to bring a smile to your face. And you'll get authoritative advice on strategic bidding: how to watch for elusive items, time your bids to take the competition by surprise, and--above all--avoid paying more than you ought to.Sellers will get sure-fire tips from eBay veterans who have discovered ways to ramp up their own auctions and sell at the highest possible prices. From the smallest details, such as how to take and post the most effective photos of your goods, to pricing strategies, inventory management, and shipping methods, this user-friendly manual will help you make more money on eBay. Whether you're selling a single item or running fulltime business on the site, you'll find tips to help you do it more effectively.As in any community, problems and disputes arise, and you'll learn how other eBayers resolve such troubles or work around them. eBay: The Missing Manual has gems of wisdom for everyone from total novices to more experienced traders. If you're looking to improve your eBay auction experience, you'll savor the tips and trick revealed in this guided exploration.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 21
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 280 p. ; , 24 cm
    Ausgabe: 3rd ed.
    DDC: 005.13
    Schlagwort(e): GNU Emacs ; Make (Computer file) ; Utilities (Computer programs) ; Electronic books ; local
    Kurzfassung: The utility simply known as make is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, make still turns up to this day as the central engine in most programming projects; it even builds the Linux kernel. In the third edition of the classic Managing Projects with GNU make , readers will learn why this utility continues to hold its top position in project build software, despite many younger competitors. The premise behind make is simple: after you change source files and want to rebuild your program or other output files, make checks timestamps to see what has changed and rebuilds just what you need, without wasting time rebuilding other files. But on top of this simple principle, make layers a rich collection of options that lets you manipulate multiple directories, build different versions of programs for different platforms, and customize your builds in other ways. This edition focuses on the GNU version of make , which has deservedly become the industry standard. GNU make contains powerful extensions that are explored in this book. It is also popular because it is free software and provides a version for almost every platform, including a version for Microsoft Windows as part of the free Cygwin project. Managing Projects with GNU make , 3rd Edition provides guidelines on meeting the needs of large, modern projects. Also added are a number of interesting advanced topics such as portability, parallelism, and use with Java. Robert Mecklenburg, author of the third edition, has used make for decades with a variety of platforms and languages. In this book he zealously lays forth how to get your builds to be as efficient as possible, reduce maintenance, avoid errors, and thoroughly understand what make is doing. Chapters on C++ and Java provide makefile entries optimized for projects in those languages. The author even includes a discussion of the makefile used to build the book.
    Anmerkung: Includes index. - Rev. ed. of: Managing projects with Make / Andrew Oram and Steve Talbott
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 22
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 517 , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Perl (Computer program language) ; Electronic books ; local
    Kurzfassung: Many programmers code by instinct, relying on convenient habits ora "style" they picked up early on. They aren't conscious of all thechoices they make, like how they format their source, the namesthey use for variables, or the kinds of loops they use. They'refocused entirely on problems they're solving, solutions they'recreating, and algorithms they're implementing. So they write codein the way that seems natural, that happens intuitively, and thatfeels good. But if you're serious about your profession, intuition isn'tenough. Perl Best Practices author Damian Conway explainsthat rules, conventions, standards, and practices not only helpprogrammers communicate and coordinate with one another, they alsoprovide a reliable framework for thinking about problems, and acommon language for expressing solutions. This is especiallycritical in Perl, because the language is designed to offer manyways to accomplish the same task, and consequently it supports manyincompatible dialects. With a good dose of Aussie humor, Dr. Conway (familiar to manyin the Perl community) offers 256 guidelines on the art of codingto help you write better Perl code--in fact, the best Perl code youpossibly can. The guidelines cover code layout, naming conventions,choice of data and control structures, program decomposition,interface design and implementation, modularity, objectorientation, error handling, testing, and debugging. They're designed to work together to produce code that is clear,robust, efficient, maintainable, and concise, but Dr. Conwaydoesn't pretend that this is the one true universal and unequivocalset of best practices. Instead, Perl Best Practices offerscoherent and widely applicable suggestions based on real-worldexperience of how code is actually written, rather than onsomeone's ivory-tower theories on how software ought to becreated. Most of all, Perl Best Practices offers guidelines thatactually work, and that many developers around the world arealready using. Much like Perl itself, these guidelines are abouthelping you to get your job done, without getting in the way. Praise for Perl Best Practices from Perl communitymembers: "As a manager of a large Perl project, I'd ensure that everymember of my team has a copy of Perl Best Practices on theirdesk, and use it as the basis for an in-house style guide." --Randal Schwartz "There are no more excuses for writing bad Perl programs. Alllevels of Perl programmer will be more productive after readingthis book." ...
    Anmerkung: Includes bibliographical references (p. 493-494) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 23
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 401 p. , ill. ; , 23 cm
    Schlagwort(e): TCP/IP (Computer network protocol) ; Electronic books ; local
    Kurzfassung: Your first step into the world of TCP/IP No TCP/IP experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding TCP/IP begins here! Learn TCP/IP basics Discover the power of TCP/IP components and subcomponents Use hands-on activities to understand TCP/IP Benefit from examples that illustrate the power of TCP/IP Welcome to the world of TCP/IP! TCP/IP is the world's de facto communications protocol. It is the official protocol of the Internet and, consequently, has become the predominant communications protocol suite in many private networks and internetworks. No TCP/IP experience needed! TCP/IP First-Step explores TCP/IP concepts in a reader-friendly manner that assumes no previous experience. Learn about packetized data transfer, open networking, reference models, and standards bodies. Understand the architecture of the TCP/IP protocol suite and learn about its components, functions, and respective uses. TCP/IP First-Step helps you understand TCP/IP's role in the network. Learn more about the First-Step Series at www.ciscopress.com/firststep.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 24
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    Ausgabe: 1st ed.
    Schlagwort(e): Electronic books ; local
    Kurzfassung: The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network. Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization's network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks. Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks. Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources. "This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade." -...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 25
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. ; , cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize a data center site Learn how to lay out key infrastructure objects within the data center for greatest efficiency, from buffer zones to server rows Apply proven installation methods by studying sample illustrations of both overhead and under-floor systems Extract the best practices and design strategies for both in-room and standby electrical infrastructure Avoid accidental downtime, improve productivity, and ensure user safety Safeguard and streamline your network infrastructure with a well-organized physical hierarchy Understand the special challenges of retrofitting overburdened server environments Implement solutions from a wide array of sample illustrations and examples of essential data center signage Safeguard servers with operations standards for people working in or visiting the data center Download templates used by Cisco to design its data centers, customizable to square footage and geography Avoid excess construction costs by designing a data center that meets your needs today and for many years to come All data centers are unique, but they all share the same mission: to protect your company's valuable information. Build the Best Data Center Facility for Your Business answers your individual questions in one flexible step-by-step reference guide. Benefit from the author's concise and practical approach to data center design and management. The author distills this complex topic by sharing his first-hand and worldwide experience and expertise. Regardless of your experience level, you can fill your knowledge gaps on how to safeguard your company's valuable equipment and intellectual property. This easy-to-navigate book is divided into two parts: Part I covers data center design and physical infrastructure details, and Part II covers data center management and operations. You can also access supplementary online materials for installation instructions, which include customizable data center design templates, written cabling specifications, and sample drawings. If you need a starting point for designing your first data center, regardless of size; if you need to prepare yourself with comprehensive strategies to retrofit or improve an existing one; or if you need proven methods to manage a d...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 26
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xii, 185 p. , ill. ; , 23 cm
    Schlagwort(e): Computer programming ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Bruce Tate, author of the Jolt Award-winning Better, Faster, Lighter Java has an intriguing notion about the future of Java, and it's causing some agitation among Java developers. Bruce believes Java is abandoning its base, and conditions are ripe for an alternative to emerge. In Beyond Java , Bruce chronicles the rise of the most successful language of all time, and then lays out, in painstaking detail, the compromises the founders had to make to establish success. Then, he describes the characteristics of likely successors to Java. He builds to a rapid and heady climax, presenting alternative languages and frameworks with productivity and innovation unmatched in Java. He closes with an evaluation of the most popular and important programming languages, and their future role in a world beyond Java. If you are agree with the book's premise--that Java's reign is coming to an end--then this book will help you start to build your skills accordingly. You can download some of the frameworks discussed and learn a few new languages. This book will teach you what a new language needs to succeed, so when things do change, you'll be more prepared. And even if you think Java is here to stay, you can use the best techniques from frameworks introduced in this book to improve what you're doing in Java today.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 27
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: ix, 117 p. , ill. ; , 18 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Eclipse is the world's most popular IDE for Java development. And although there are plenty of large tomes that cover all the nooks and crannies of Eclipse, what you really need is a quick, handy guide to the features that are used over and over again in Java programming. You need answers to basic questions such as: Where was that menu? What does that command do again? And how can I set my classpath on a per-project basis? This practical pocket guide gets you up to speed quickly with Eclipse. It covers basic concepts, including Views and editors, as well as features that are not commonly understood, such as Perspectives and Launch Configurations. You'll learn how to write and debug your Java code--and how to integrate that code with tools such as Ant and JUnit. You'll also get a toolbox full of tips and tricks to handle common--and sometimes unexpected--tasks that you'll run across in your Java development cycle. Additionally, the Eclipse IDE Pocket Guide has a thorough appendix detailing all of Eclipse's important views, menus, and commands. The Eclipse IDE Pocket Guide is just the resource you need for using Eclipse, whether it's on a daily, weekly, or monthly basis. Put it in your back pocket, or just throw it in your backpack. With this guide in hand, you're ready to tackle the Eclipse programming environment.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 28
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 213 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Computer networks ; Design and construction ; Internet programming ; Open source software ; Python (Computer program language) ; Electronic books ; local
    Kurzfassung: Twisted Network Programming Essentials from O'Reilly is a task-oriented look at this new open source, Python-based technology. The book begins with recommendations for various plug-ins and add-ons to enhance the basic package as installed. It then details Twisted's collection simple network protocols, and helper utilities. The book also includes projects that let you try out the Twisted framework for yourself. For example, you'll find examples of using Twisted to build web services applications using the REST architecture, using XML-RPC, and using SOAP. Written for developers who want to start building applications using Twisted, this comprehensive guide presents examples of the most common tasks you'll face when building network applications. It also helps you understand the key concepts and design patterns used in Twisted applications. Here are just some of the topics discussed in Twisted Network Programming Essentials : Installing Twisted How to make TCP connections How to use Twisted to work with the Web Twisted's authentication framework Usenet and SSH clients and servers Along the way, each lesson is supported by thorough notes and explanations to make absolutely certain you're up to speed with this leading-edge Python technology.
    Anmerkung: "Foreword by Glyph Lefkowitz, creator of Twisted"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 29
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 357 p. , ill. ; , 25 cm
    DDC: 621.3893
    Schlagwort(e): Computer sound processing ; Multimedia systems ; Music ; Computer network resources ; Music ; Computer programs ; Sound ; Recording and reproducing ; Digital techniques ; Electronic books ; local
    Kurzfassung: Join the digital audio revolution! Tens of millions of users are embracing digital music, and with Digital Audio Essentials , you can, too. Nearly every personal computer built in the last few years contains a CD-burning drive; MP3 and other portable player sales dominate the consumer electronics industry; and new networkable stereo equipment lets you use your digital music collection to power your home entertainment system. Whether it's downloading music, ripping CDs, organizing, finding, and creating higher quality music files, buying music players and accessories, or constructing a home stereo system, Digital Audio Essentials helps you do get it done. An indispensable reference for music enthusiasts, digital archivists, amateur musicians, and anyone who likes a good groove, Digital Audio Essentials helps you avoid time-consuming, costly trial and error in downloading audio files, burning CDs, converting analog music to digital form, publishing music to and streaming from the Web, setting up home stereo configurations, and creating your own MP3 and other audio files. The book--for both Mac and PC users--includes reliable hardware and software recommendations, tutorials, resources, and file sharing, and it even explains the basics of the DMCA and intellectual property law. You may (or may not) already know the basics of ripping CDs or downloading music, but Fries will show you so much more--including advice on the multitude of MP3 players on the market, stereo options, file formats, quality determinations, and the legalities of it all. Both a timely, entertaining guide and an enduring reference, this is the digital audio handbook you need to make the most of your expanding digital music collection.
    Anmerkung: "A comprehensive guide to creating, recording, editing, and sharing music and other audio"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 30
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 221 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): C-Sharp (Computer program language) ; Computer programming ; Electronic books ; local
    Kurzfassung: In the three years since Microsoft made C# available, there have been lots of tweaks to the language. That's because C# is not only essential for making .NET work, it's a big way for Microsoft to attract millions of Java, C and C++ developers to the platform. And C# has definitely made some inroads. Because of its popularity among developers, the language received standardization from ECMA International, making it possible to port C# applications to other platforms. To bolster its appeal, C# 2.0 has undergone some key changes as part of Visual Studio 2005 that will make development with .NET quicker and easier.That's precisely what Visual C# 2005: A Developer's Notebook allows you to do. There are some great new features in C# and this unique "all lab, no lecture" guide covers them all with 50 hands-on projects. Each project explores a new feature, with emphasis on changes that increase productivity, simplify programming tasks, and add functionality to applications.C#'s component-based design combines the productivity of Microsoft's popular Visual Basic with the raw power of C++ for web-based applications. Many reviewers note a similarity between C# and Java--in fact, a new feature that took the Java development team five years to incorporate into Java is now available in C# 2.0. Called "generics", this feature enables developers to reuse and customize their existing code, so they can dramatically cut down the time it takes to develop new applications. Visual C# 2005: A Developer's Notebook is full of no-nonsense code without the usual page-filling commentary. You'll find suggestions for further experimentation, links to on-line documentation, plus practical notes and warnings. The book also tells developers how to acquire, install and configure Visual Studio 2005. Are you a coder to the core? Learn what C# 2.0 can do for you now.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 31
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xii, 488 p. , ill. ; , 22 cm
    Schlagwort(e): Leadership ; Project management ; Electronic books ; local
    Kurzfassung: The Art of Project Management covers it all--from practical methods for making sure work gets done right and on time, to the mindset that can make you a great leader motivating your team to do their best. Reading this was like reading the blueprint for how the best projects are managed at Microsoft... I wish we always put these lessons into action!" --Joe Belfiore, General Manager, E-home Division, Microsoft Corporation "Berkun has written a fast paced, jargon-free and witty guide to what he wisely refers to as the 'art' of project management. It's a great introduction to the discipline. Seasoned and new managers will benefit from Berkun's perspectives." --Joe Mirza, Director, CNET Networks (Cnet.com) "Most books with the words 'project management' in the title are dry tomes. If that's what you are expecting to hear from Berkun's book, you will be pleasantly surprised. Sure, it's about project management. But it's also about creativity, situational problem-solving, and leadership. If you're a team member, project manager, or even a non-technical stakeholder, Scott offers dozens of practical tools and techniques you can use, and questions you can ask, to ensure your projects succeed." --Bill Bliss, Senior VP of product and customer experience, expedia.com In The Art of Project Management , you'll learn from a veteran manager of software and web development how to plan, manage, and lead projects. This personal account of hard lessons learned over a decade of work in the industry distills complex concepts and challenges into practical nuggets of useful advice. Inspiring, funny, honest, and compelling, this is the book you and your team need to have within arms reach. It will serve you well with your current work, and on future projects to come. Topics include: How to make things happen Making good decisions Specifications and requirements Ideas and what to do with them How not to annoy people Leadership and trust The truth about making dates What to do when things go wrong
    Anmerkung: Includes bibliographical references (p. 449-466) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 32
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxv, 191 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Maven (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Maven is a new project management and comprehension tool which provides an elegant way to share build logic across projects. In terms of capabilities, Maven is an improvement to Apache Ant-thanks to numerous plug-ins and built-in integration with unit testing frameworks such as JUnit. Tired of writing the same build logic for every project? Using Maven, you can leverage the experience of the community to avoid the tedious process of creating yet another build script for each new project. Maven: A Developer's Notebook begins by introducing you to the concept of project object model (POM), and then offers further details on the essential features of Maven. Like all titles in O'Reilly's Developer's Notebook series, this no-nonsense book skips the boring prose and cuts right to the chase. It's an approach that forces you to get your hands dirty by working through a series of poignant labs-exercises that speak to you instead of at you.Plus, Maven: A Developer's Notebook is the first book on the subject to hit the market, so you know the information is fresh and timely. If you're a Java programmer, you'll be armed with all the critical information you need to get up to speed on this powerful new build tool. You'll discover how Maven can help you: manage a project's build, reporting, and documentation, all from a central piece of information break a complex project into a series of smaller subprojects report on code quality, unit tests, code duplication, and project activity create a custom remote repository build simple and complex plug-ins In the end, you'll find yourself spending less time working on your project's build system and more time working on your project's code.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 33
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 376 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Home automation ; Household electronics ; Electronic books ; local
    Kurzfassung: So much of what is commonplace today was once considered impossible, or at least wishful thinking. Laser beams in the operating room, cars with built-in guidance systems, cell phones with email access. There's just no getting around the fact that technology always has, and always will be, very cool.But technology isn't only cool; it's also very smart. That's why one of the hottest technological trends nowadays is the creation of smart homes.At an increasing rate, people are turning their homes into state-of-the-art machines, complete with more switches, sensors, and actuators than you can shake a stick at. Whether you want to equip your home with motion detectors for added security, install computer-controlled lights for optimum convenience, or even mount an in-home web cam or two purely for entertainment, the world is now your oyster. Ah, but like anything highly technical, creating a smart home is typically easier said than done.Thankfully, Smart Home Hacks takes the guesswork out of the process. Through a seemingly unending array of valuable tips, tools, and techniques, Smart Home Hacks explains in clear detail how to use Mac, Windows, or Linux to achieve the automated home of your dreams. In no time, you'll learn how to turn a loose collection of sensors and switches into a well-automated and well-functioning home no matter what your technical level may be. Smart Home Hacks covers a litany of stand-alone and integrated smart home solutions designed to enhance safety, comfort, and convenience in new and existing homes. Kitchens, bedrooms, home offices, living rooms, and even bathrooms are all candidates for smart automation and therefore are all addressed in Smart Home Hacks .Intelligently written by engineering guru and George Jetson wannabe, Gordon Meyer, Smart Home Hacks leaves no stone unturned. From what to purchase to how to use your remote control, it's the ultimate guide to understanding and implementing complete or partial home automation.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 34
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 238 p. , ill. ; , 24 cm
    Schlagwort(e): Linux ; Computer security ; Electronic books ; local
    Kurzfassung: The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: A readable and concrete explanation of SELinux concepts and the SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With SELinux , a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 35
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 644 p. , ill. ; , 24 cm
    Ausgabe: 4th ed.
    Schlagwort(e): C# (Computer program language) ; Computer programming ; Electronic books ; local
    Kurzfassung: The programming language C# was built with the future of application development in mind. Pursuing that vision, C#'s designers succeeded in creating a safe, simple, component-based, high-performance language that works effectively with Microsoft's .NET Framework. Now the favored language among those programming for the Microsoft platform, C# continues to grow in popularity as more developers discover its strength and flexibility. And, from the start, C# developers have relied on Programming C# both as an introduction to the language and a means of further building their skills. The fourth edition of Programming C# --the top-selling C# book on the market--has been updated to the C# ISO standard as well as changes to Microsoft's implementation of the language. It also provides notes and warnings on C# 1.1 and C# 2.0. Aimed at experienced programmers and web developers, Programming C# , 4th Edition, doesn't waste too much time on the basics. Rather, it focuses on the features and programming patterns unique to the C# language. New C# 2005 features covered in-depth include: Visual Studio 2005 Generics Collection interfaces and iterators Anonymous methods New ADO.NET data controls Fundamentals of Object-Oriented Programming Author Jesse Liberty, an acclaimed web programming expert and entrepreneur, teaches C# in a way that experienced programmers will appreciate by grounding its applications firmly in the context of Microsoft's .NET platform and the development of desktop and Internet applications. Liberty also incorporates reader suggestions from previous editions to help create the most consumer-friendly guide possible.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 36
    Sprache: Englisch
    Seiten: xiii, 200 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Information technology ; Management ; Electronic books ; local
    Kurzfassung: In a typical organization, there's always plenty that to do such as: pay vendors, invoice customers, answer customer inquiries, and fix bugs in hardware or software. You need to know who wants what and keep track of what is left to do. This is where a ticketing system comes in. A ticketing system allows you to check the status of various tasks: when they were requested, who requested them and why, when they were completed, and more. RT is a high-level, open source ticketing system efficiently enabling a group of people to manage tasks, issues, and requests submitted by a community of users. RT Essentials , co-written by one of the RT's original core developers, Jesse Vincent, starts off with a quick background lesson about ticketing systems and then shows you how to install and configure RT. This comprehensive guide explains how to perform day-to-day tasks to turn your RT server into a highly useful tracking tool. One way it does this is by examining how a company could use RT to manage its internal processes. Advanced chapters focus on developing add-on tools and utilities using Perl and Mason. There's also chapter filled with suggested uses for RT inside your organization. No matter what kind of data your organization tracks--from sales inquiries to security incidents or anything in between-- RT Essentials helps you use RT to provide order when you need it most.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 37
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 770 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Computer programs ; Electronic books ; local
    Kurzfassung: Whether you are an Excel neophyte, a sophisticate who knows the program inside out, or an intermediate-level plodder eager to hone your skills, Excel: The Missing Manual is sure to become your go-to resource for all things Excel. Covering all the features of Excel 2002 and 2003, the most recent versions for Windows, Excel: The Missing Manual is an easy-to-read, thorough and downright enjoyable guide to one of the world's most popular, (and annoyingly complicated!) computer programs.Never a candidate for "the most user-friendly of Microsoft programs," Excel demands study, practice and dedication to gain even a working knowledge of the basics. Excel 2003 is probably even tougher to use than any previous version of Excel. However, despite its fairly steep learning curve, this marvelously rich program enables users of every stripe to turn data into information using tools to analyze, communicate, and share knowledge. Excel can help you to collaborate effectively, and protect and control access to your work. Power users can take advantage of industry-standard Extensible Markup Language (XML) data to connect to business processes.To unleash the power of the program and mine the full potential of their database talents, users need an authorative and friendly resource. None is more authoritative or friendlier than Excel: The Missing Manual . Not only does the book provide exhaustive coverage of the basics, it provides numerous tips and tricks, as well as advanced data analysis, programming and Web interface knowledge that pros can adopt for their latest project. Neophytes will find everything they need to create professional spreadsheets and become confident users. Excel: The Missing Manual covers: worksheet basics, formulas and functions, organizing worksheets, charts and graphics, advanced data analysis, sharing data with the rest of the world, and programming.If you buy just one book about using Excel, this has GOT to be it. This book has all you need to help you excel at Excel.
    Anmerkung: "Covers versions 2002 and 2003"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 38
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 445 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): FreeBSD ; OpenBSD ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure.FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems.Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate.Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 39
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. ; , cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention System Secure your endpoint systems with host IPS Build and manipulate policies for the systems you wish to protect Learn how to use groups and hosts in the Cisco Security Agent architecture and how the components are related Install local agent components on various operating systems Explore the event database on the management system to view and filter information Examine Cisco Security Agent reporting mechanisms for monitoring system activity Apply Application Deployment Investigation to report on installed applications, hotfixes, and service packs Collect detailed information on processes and see how they use and are used by system resources Create and tune policies to control your environment without impacting usability Learn how to maintain the Cisco Security Agent architecture, including administrative access roles and backups Cisco Security Agent presents a detailed explanation of Cisco Security Agent, illustrating the use of host Intrusion Prevention Systems (IPS) in modern self-defending network protection schemes. At the endpoint, the deployment of a host IPS provides protection against both worms and viruses. Rather than focusing exclusively on reconnaissance phases of network attacks a host IPS approaches the problem from the other direction, preventing malicious activity on the host by focusing on behavior. By changing the focus to behavior, damaging activity can be detected and blocked-regardless of the attack. Cisco Security Agent is an innovative product in that it secures the portion of corporate networks that are in the greatest need of protection-the end systems. It also has the ability to prevent a day-zero attack, which is a worm that spreads from system to system, taking advantage of vulnerabilities in networks where either the latest patches have not been installed or for which patches are not yet available. Cisco Security Agent utilizes a unique architecture that correlates behavior occurring on the end systems by monitoring clues such as file and memory access, process behavior, COM object access, and access to shared libraries as well as other important indicators. Cisco Security Agent is the first book to explore the features and benefits of this powerful host IPS product. Divided into seven parts, the book provides a detailed overview of Cisco Security Agent features and deployment scenarios. Part...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 40
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 180 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Perl (Computer program language) ; Electronic books ; local
    Kurzfassung: Is there any sexier topic in software development than software testing? That is, besides game programming, 3D graphics, audio, high-performance clustering, cool websites, et cetera? Okay, so software testing is low on the list. And that's unfortunate, because good software testing can increase your productivity, improve your designs, raise your quality, ease your maintenance burdens, and help to satisfy your customers, coworkers, and managers. Perl has a strong history of automated tests. A very early release of Perl 1.0 included a comprehensive test suite, and it's only improved from there. Learning how Perl's test tools work and how to put them together to solve all sorts of previously intractable problems can make you a better programmer in general. Besides, it's easy to use the Perl tools described to handle all sorts of testing problems that you may encounter, even in other languages. Like all titles in O'Reilly's Developer's Notebook series, this "all lab, no lecture" book skips the boring prose and focuses instead on a series of exercises that speak to you instead of at you. Perl Testing: A Developer's Notebook will help you dive right in and: Write basic Perl tests with ease and interpret the results Apply special techniques and modules to improve your tests Bundle test suites along with projects Test databases and their data Test websites and web projects Use the "Test Anything Protocol" which tests projects written in languages other than Perl With today's increased workloads and short development cycles, unit tests are more vital to building robust, high-quality software than ever before. Once mastered, these lessons will help you ensure low-level code correctness, reduce software development cycle time, and ease maintenance burdens. You don't have to be a die-hard free and open source software developer who lives, breathes, and dreams Perl to use this book. You just have to want to do your job a little bit better.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 41
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 334 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Database management ; Electronic books ; local
    Kurzfassung: As part of the Microsoft Office suite, Access has become the industry's leading desktop database management program for organizing, accessing, and sharing information. But taking advantage of this product to build increasingly complex Access applications requires something more than your typical how-to book. What it calls for is Access Hacks from O'Reilly.This valuable guide provides direct, hands-on solutions that can help relieve the frustrations felt by users struggling to master the program's various complexities. For experienced users, Access Hacks offers a unique collection of proven techniques and tools that enable them to take their database skills and productivity to the next level. For Access beginners, it helps them acquire a firm grasp of the program's most productive features.A smart collection of insider tips and tricks, Access Hacks covers all of the program's finer points. Among the multitude of topics addressed, it shows users how to: work with Access in multi-user environments utilize SQL queries work with external data and programs integrate Access with third-party products Just imagine: a learning process without the angst. Well, Access Hacks delivers it with ease, thanks to these down-and-dirty techniques not collected together anywhere else.Part of O'Reilly's best-selling Hacks series, Access Hacks is based on author Ken Bluttman's two decades of real-world experience in database programming and business application building. It's because of his vast experiences that the book is able to offer such a deep understanding of the program's expanding possibilities.
    Anmerkung: "Tips & tools for wrangling your data" -- Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 42
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 184 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Serie: A developer's notebook
    Schlagwort(e): Application software ; Development ; Spring (Computer program language) ; Electronic books ; local
    Kurzfassung: Since development first began on Spring in 2003, there's been a constant buzz about it in Java development publications and corporate IT departments. The reason is clear: Spring is a lightweight Java framework in a world of complex heavyweight architectures that take forever to implement. Spring is like a breath of fresh air to overworked developers.In Spring, you can make an object secure, remote, or transactional, with a couple of lines of configuration instead of embedded code. The resulting application is simple and clean. In Spring, you can work less and go home early, because you can strip away a whole lot of the redundant code that you tend to see in most J2EE applications. You won't be nearly as burdened with meaningless detail. In Spring, you can change your mind without the consequences bleeding through your entire application. You'll adapt much more quickly than you ever could before. Spring: A Developer's Notebook offers a quick dive into the new Spring framework, designed to let you get hands-on as quickly as you like. If you don't want to bother with a lot of theory, this book is definitely for you. You'll work through one example after another. Along the way, you'll discover the energy and promise of the Spring framework.This practical guide features ten code-intensive labs that'll rapidly get you up to speed. You'll learn how to do the following, and more: install the Spring Framework set up the development environment use Spring with other open source Java tools such as Tomcat, Struts, and Hibernate master AOP and transactions utilize ORM solutions As with all titles in the Developer's Notebook series, this no-nonsense book skips all the boring prose and cuts right to the chase. It's an approach that forces you to get your hands dirty by working through one instructional example after another-examples that speak to you instead of at you.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 43
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 519 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Swing (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Swing Hacks helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. If you're a Java developer looking to build enterprise applications with a first-class look and feel, Swing is definitely one skill you need to master. This latest title from O'Reilly is a reference to the cool stuff in Swing. It's about the interesting things you learn over the years--creative, original, even weird hacks--the things that make you say, "I didn't know you could even do that with Swing!" Swing Hacks will show you how to extend Swing's rich component set in advanced and sometimes non-obvious ways. The book touches upon the entire Swing gamut-tables, trees, sliders, spinners, progress bars, internal frames, and text components. Detail is also provided on JTable/JTree, threaded component models, and translucent windows. You'll learn how to filter lists, power-up trees and tables, and add drag-and-drop support. Swing Hacks will show you how to do fun things that will directly enhance your own applications. Some are visual enhancements to make your software look better. Some are functional improvements to make your software do something it couldn't do before. Some are even just plain silly, in print only to prove it could be done. The book will also give you give you a small glimpse of the applications coming in the future. New technology is streaming into the Java community at a blistering rate, and it gives application developers a whole new set of blocks to play with. With its profusion of tips and tricks, Swing Hacks isn't just for the developer who wants to build a better user interface. It's also ideally suited for client-side Java developers who want to deliver polished applications, enthusiasts who want to push Java client application boundaries, and coders who want to bring powerful techniques to their own applications. Whatever your programming needs, Swing Hacks is packed with programming lessons that increase your competency with interface-building tools.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 44
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 663 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    Serie: In a nutshell
    Schlagwort(e): Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: Windows XP in a Nutshell , Second Edition documents everything there is to know about the world's most widely used operating system. Updated to include information on Service Pack 2 (SP2), this compact guide is the ultimate resource for IT professionals and Windows XP power users everywhere. Written in O'Reilly's time-tested in a Nutshell format, Windows XP in a Nutshell , Second Edition cuts through the hype and delivers practical details in a no-nonsense manner. At the heart of the book is an invaluable 200-plus-page section titled Windows XP Application and Tools. In it, readers will find: A list of available commands and utilities, including Start Menu accessories, command prompt tools, and hidden system administration utilities A Task and Setting Index for quick access to hundreds of XP settings A complete reference to XP's command prompt, including advanced commands and scripting features Windows XP in a Nutshell , Second Edition also includes a primer on files, folders, and windows; control panels and built-in applications; how to set up a PC for Internet use; and the standard Windows rituals of troubleshooting, installation, and upgrading. And, of course, this greatly expanded second edition also includes all the need-to-know details about the security technologies featured in SP 2, so you can better defend yourself against viruses, worms, and hackers. Readers even receive guidelines and instructions for installing SP2 on their PC, or across a network of computers. With its wealth of tips, careful instruction, and expert advice, this must-have desktop reference is dedicated to making your time at the computer safer, easier, and more fun.
    Anmerkung: "Covers Service Pack 2"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 45
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 372 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Microsoft Visual BASIC ; C# (Computer program language) ; Microsoft .NET Framework ; Electronic books ; local
    Kurzfassung: Like most complex tasks, .NET programming is fraught with potential costly, and time-consuming hazards. The millions of Microsoft developers worldwide who create applications for the .NET platform can attest to that. Thankfully there's now a book that shows you how to avoid such costly and time-consuming mistakes. It's called .NET Gotchas .The ultimate guide for efficient, pain-free coding, .NET Gotchas from O'Reilly contains 75 common .NET programming pitfalls--and advice on how to work around them. It will help you steer away from those mistakes that cause application performance problems, or so taint code that it just doesn't work right.The book is organized into nine chapters, each focusing on those features and constructs of the .NET platform that consistently baffle developers. Within each chapter are several "gotchas," with detailed examples, discussions, and guidelines for avoiding them. No doubt about it, when applied, these concise presentations of best practices will help you lead a more productive, stress-free existence.What's more, because code examples are written in both VB.NET and C#, .NET Gotchas is of interest to more than 75 percent of the growing numbers of .NET programmers. So if you're a .NET developer who's mired in the trenches and yearning for a better way, this book is most definitely for you.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 46
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 253 p. , ill. ; , 24 cm
    Schlagwort(e): Internet programming ; Web site development ; Electronic books ; local
    Kurzfassung: Perhaps the most explosive technological trend over the past two years has been blogging. As a matter of fact, it's been reported that the number of blogs during that time has grown from 100,000 to 4.8 million-with no end to this growth in sight.What's the technology that makes blogging tick? The answer is RSS--a format that allows bloggers to offer XML-based feeds of their content. It's also the same technology that's incorporated into the websites of media outlets so they can offer material (headlines, links, articles, etc.) syndicated by other sites.As the main technology behind this rapidly growing field of content syndication, RSS is constantly evolving to keep pace with worldwide demand. That's where Developing Feeds with RSS and Atom steps in. It provides bloggers, web developers, and programmers with a thorough explanation of syndication in general and the most popular technologies used to develop feeds.This book not only highlights all the new features of RSS 2.0-the most recent RSS specification-but also offers complete coverage of its close second in the XML-feed arena, Atom. The book has been exhaustively revised to explain: metadata interpretation the different forms of content syndication the increasing use of web services how to use popular RSS news aggregators on the market After an introduction that examines Internet content syndication in general (its purpose, limitations, and traditions), this step-by-step guide tackles various RSS and Atom vocabularies, as well as techniques for applying syndication to problems beyond news feeds. Most importantly, it gives you a firm handle on how to create your own feeds, and consume or combine other feeds.If you're interested in producing your own content feed, Developing Feeds with RSS and Atom is the one book you'll want in hand.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 47
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 954 p. , ill. ; , 24 cm. +
    Ausgabe: 3rd ed.
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Version 5.0 of the Java 2 Standard Edition SDK is the most important upgrade since Java first appeared a decade ago. With Java 5.0, you'll not only find substantial changes in the platform, but to the language itself-something that developers of Java took five years to complete. The main goal of Java 5.0 is to make it easier for you to develop safe, powerful code, but none of these improvements makes Java any easier to learn, even if you've programmed with Java for years. And that means our bestselling hands-on tutorial takes on even greater significance. Learning Java is the most widely sought introduction to the programming language that's changed the way we think about computing. Our updated third edition takes an objective, no-nonsense approach to the new features in Java 5.0, some of which are drastically different from the way things were done in any previous versions. The most essential change is the addition of "generics", a feature that allows developers to write, test, and deploy code once, and then reuse the code again and again for different data types. The beauty of generics is that more problems will be caught during development, and Learning Java will show you exactly how it's done. Java 5.0 also adds more than 1,000 new classes to the Java library. That means 1,000 new things you can do without having to program it in yourself. That's a huge change. With our book's practical examples, you'll come up to speed quickly on this and other new features such as loops and threads. The new edition also includes an introduction to Eclipse, the open source IDE that is growing in popularity. Learning Java , 3rd Edition addresses all of the important uses of Java, such as web applications, servlets, and XML that are increasingly driving enterprise applications.
    Anmerkung: Accompanying disc contains Java 5 Stand Edition (also known as JDK 1.5), NetBeans 4.1, Eclipse 3.1, Ant 1.4.1, Tomcat 4.0.3, BeanShell 2.0, and full source code for all examples in the book. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 48
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 507 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): Application software ; Internet programming ; Java (Computer program language) ; Struts framework ; Web site development ; Electronic books ; local
    Kurzfassung: The Jakarta Struts Framework is a popular open source platform for building web applications from top to bottom with Java. While this popularity has led to a wealth of online and in-print documentation, developers still find themselves faced with a number of common tasks that are not clearly and succinctly explained.In these situations, programmers can now turn to the Jakarta Struts Cookbook an amazing collection of code solutions to common--and uncommon--problems encountered when working with the Struts Framework. Among many other recipes, this book explains how to: display data in complex HTML tables use JSP, the JSTL, and JavaScript in your user interface define static and dynamic action forms validate data and respond to errors use Logging, Validation, and Exception Handling integrate Struts with persistence frameworks like Hibernate and iBATIS This look-up reference is just what today's time-pressed developers need. With solutions to real-world problems just a few page flips away, information is instantly available. And while the book's solutions focus on getting to the point, each recipe's discussion section imparts valuable concept and insight from a Struts veteran.The Jakarta Struts Cookbook is perfect for independent developers, large development teams, and everyone in between who wishes to use the Struts Framework to its fullest potential. Plus, it s completely up-to-date with the latest versions of Framework, so readers can be sure the information is viable.
    Anmerkung: "Covers Struts 1.2 "--Cover. - "Mastering Jakarta Struts, Solution by Solution"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 49
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 377 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    Schlagwort(e): Embedded computer systems ; Electronic books ; local
    Kurzfassung: Embedded computer systems literally surround us: they're in our cell phones, PDAs, cars, TVs, refrigerators, heating systems, and more. In fact, embedded systems are one of the most rapidly growing segments of the computer industry today.Along with the growing list of devices for which embedded computer systems are appropriate, interest is growing among programmers, hobbyists, and engineers of all types in how to design and build devices of their own. Furthermore, the knowledge offered by this book into the fundamentals of these computer systems can benefit anyone who has to evaluate and apply the systems.The second edition of Designing Embedded Hardware has been updated to include information on the latest generation of processors and microcontrollers, including the new MAXQ processor. If you're new to this and don't know what a MAXQ is, don't worry--the book spells out the basics of embedded design for beginners while providing material useful for advanced systems designers. Designing Embedded Hardware steers a course between those books dedicated to writing code for particular microprocessors, and those that stress the philosophy of embedded system design without providing any practical information. Having designed 40 embedded computer systems of his own, author John Catsoulis brings a wealth of real-world experience to show readers how to design and create entirely new embedded devices and computerized gadgets, as well as how to customize and extend off-the-shelf systems.Loaded with real examples, this book also provides a roadmap to the pitfalls and traps to avoid. Designing Embedded Hardware includes: The theory and practice of embedded systems Understanding schematics and data sheets Powering an embedded system Producing and debugging an embedded system Processors such as the PIC, Atmel AVR, and Motorola 68000-series Digital Signal Processing (DSP) architectures Protocols (SPI and I2C) used to add peripherals RS-232C, RS-422, infrared communication, and USB CAN and Ethernet networking Pulse Width Monitoring and motor control If you want to build your own embedded system, or tweak an existing one, this invaluable book gives you the understanding and practical skills you need.
    Anmerkung: "Create new computers and devices"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 50
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvi, 554 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.75/65
    Schlagwort(e): Oracle (Computer file) ; Database management ; Electronic books ; local
    Kurzfassung: Despite its wide availability and usage, few developers and DBAs have mastered the true power of Oracle SQL Plus. This bestselling book--now updated for Oracle 10g--is the only in-depth guide to this interactive query tool for writing SQL scripts. It's an essential resource for any Oracle user.The new second edition of Oracle SQL Plus: The Definitive Guide clearly describes how to perform, step-by-step, all of the tasks that Oracle developers and DBAs want to perform with SQL Plus--and maybe some you didn't realize you could perform.With Oracle SQL Plus: The Definitive Guide, you'll expertly: write and execute script files generate ad hoc reports extract data from the database query the data dictionary tables customize an SQL Plus environment and much more It also includes a handy quick reference to all of its syntax options and an often-requested chapter on SQL itself, along with a clear, concise, and complete introduction.This book is truly the definitive guide to SQLPlus. It's an indispensable resource for those who are new to SQL*Plus, a task-oriented learning tool for those who are already using it, and an immediately useful quick reference for every user. If you want to leverage the full power and flexibility of this popular Oracle tool, you'll need this book.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 51
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 291 p. , ill. (some col.) ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 004.165
    Schlagwort(e): Apple Computer, Inc. ; Macintosh Division ; History ; Computer industry ; United States ; History ; Macintosh (Computer) ; Electronic books ; local
    Kurzfassung: There was a time, not too long ago, when the typewriter and notebook ruled, and the computer as an everyday tool was simply a vision. Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the groundbreaking Macintosh computer was born. The book traces the development of the Macintosh, from its inception as an underground skunkworks project in 1979 to its triumphant introduction in 1984 and beyond. The stories in Revolution in the Valley come on extremely good authority. That's because author Andy Hertzfeld was a core member of the team that built the Macintosh system software, and a key creator of the Mac's radically new user interface software. One of the chosen few who worked with the mercurial Steve Jobs, you might call him the ultimate insider. When Revolution in the Valley begins, Hertzfeld is working on Apple's first attempt at a low-cost, consumer-oriented computer: the Apple II. He sees that Steve Jobs is luring some of the company's most brilliant innovators to work on a tiny research effort the Macintosh. Hertzfeld manages to make his way onto the Macintosh research team, and the rest is history. Through lavish illustrations, period photos (many never before published), and Hertzfeld's vivid first-hand accounts, Revolution in the Valley reveals what it was like to be there at the birth of the personal computer revolution. The story comes to life through the book's portrait of the talented and often eccentric characters who made up the Macintosh team. Now, over 20 years later, millions of people are benefiting from the technical achievements of this determined and brilliant group of people.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 52
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xii, 198 p. , ill. ; , 24 cm. +
    Ausgabe: 1st ed.
    Schlagwort(e): Computer programming ; Computer software ; Development ; Computer software ; Testing ; Electronic books ; local
    Kurzfassung: Unit test frameworks are a key element of popular development methodologies such as eXtreme Programming (XP) and Agile Development. But unit testing has moved far beyond eXtreme Programming; it is now common in many different types of application development. Unit tests help ensure low-level code correctness, reduce software development cycle time, improve developer productivity, and produce more robust software.Until now, there was little documentation available on unit testing, and most sources addressed specific frameworks and specific languages, rather than explaining the use of unit testing as a language-independent, standalone development methodology. This invaluable new book covers the theory and background of unit test frameworks, offers step-by-step instruction in basic unit test development, provides useful code examples in both Java and C++, and includes details on some of the most commonly used frameworks today from the XUnit family, including JUnit for Java, CppUnit for C++, and NUnit for .NET. Unit Test Frameworks includes clear, concise, and detailed descriptions of: The theory and design of unit test frameworks Examples of unit tests and frameworks Different types of unit tests Popular unit test frameworks And more It also includes the complete source code for CppUnit for C++, and NUnit for .NET.
    Anmerkung: "A language-independent overview"--Cover. - CD-ROM contents include: README files, build directions, and Makefile comments. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 53
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 316 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    Schlagwort(e): Ant (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Soon after its launch, Ant succeeded in taking the Java world by storm, becoming the most widely used tool for building applications in Java environments. Like most popular technologies, Ant quickly went through a series of early revision cycles. With each new version, more functionality was added, and more complexity was introduced. Ant evolved from a simple-to-learn build tool into a full-fledged testing and deployment environment. Ant: The Definitive Guide has been reworked, revised and expanded upon to reflect this evolution. It documents the new ways that Ant is being applied, as well as the array of optional tasks that Ant supports. In fact, this new second edition covers everything about this extraordinary build management tool from downloading and installing, to using Ant to test code. Here are just of a few of the features you'll find detailed in this comprehensive, must-have guide: Developing conditional builds, and handling error conditions Automatically retrieving source code from version control systems Using Ant with XML files Using Ant with JavaServer Pages to build Web applications Using Ant with Enterprise JavaBeans to build enterprise applications Far exceeding its predecessor in terms of information and detail, Ant: The Definitive Guide , 2nd Edition is a must-have for Java developers unfamiliar with the latest advancements in Ant technology. With this book at your side, you'll soon be up to speed on the premiere tool for cross-platform development.Author Steve Holzner is an award-winning author who s been writing about Java topics since the language first appeared; his books have sold more than 1.5 million copies worldwide.
    Anmerkung: Includes index. - Prev. ed. by Jesse Tilly and Eric M. Burke, pub. May 2002
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 54
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 350 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.26/8
    Schlagwort(e): Linux ; Electronic data processing ; Distributed processing ; High performance computing ; Operating systems (Computers) ; Parallel processing (Electronic computers) ; Electronic books ; local
    Kurzfassung: To the outside world, a "supercomputer" appears to be a single system. In fact, it's a cluster of computers that share a local area network and have the ability to work together on a single problem as a team. Many businesses used to consider supercomputing beyond the reach of their budgets, but new Linux applications have made high-performance clusters more affordable than ever. These days, the promise of low-cost supercomputing is one of the main reasons many businesses choose Linux over other operating systems.This new guide covers everything a newcomer to clustering will need to plan, build, and deploy a high-performance Linux cluster. The book focuses on clustering for high-performance computation, although much of its information also applies to clustering for high-availability (failover and disaster recovery). The book discusses the key tools you'll need to get started, including good practices to use while exploring the tools and growing a system. You'll learn about planning, hardware choices, bulk installation of Linux on multiple systems, and other basic considerations. Then, you'll learn about software options that can save you hours--or even weeks--of deployment time.Since a wide variety of options exist in each area of clustering software, the author discusses the pros and cons of the major free software projects and chooses those that are most likely to be helpful to new cluster administrators and programmers. A few of the projects introduced in the book include: MPI, the most popular programming library for clusters. This book offers simple but realistic introductory examples along with some pointers for advanced use. OSCAR and Rocks, two comprehensive installation and administrative systems openMosix (a convenient tool for distributing jobs), Linux kernel extensions that migrate processes transparently for load balancing PVFS, one of the parallel filesystems that make clustering I/O easier C3, a set of commands for administering multiple systems Ganglia, OpenPBS, and cloning tools (Kickstart, SIS and G4U) are also covered. The book looks at cluster installation packages (OSCAR & Rocks) and then considers the core packages individually for greater depth or for folks wishing to do a custom installation. Guidelines for debugging, profiling, performance tuning, and managing jobs from multiple users round out this immensely useful book.
    Anmerkung: "A comprehensive getting started guide"--Cover. - Includes bibliographical references (p. 329-337) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 55
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 382 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Cellular telephones ; Mobile communication systems ; Electronic books ; local
    Kurzfassung: Nokia's smartphones pack a powerful computer into a very small space. Unlike your desktop or laptop, your smallest computer can be connected to the Internet all the time, and can interact with the world around it through its camera, voice recognition, and its traditional phone keypad. Nokia smartphones combine these features with impressive storage options and a host of networking protocols that make this smallest computer the only thing a road warrior truly needs. If you're still cracking open your laptop or pining for your desktop while you're on the road, you haven't begun to unlock your Nokia's full potential. Nokia Smartphone Hacks is dedicated to tricking out your smartphone and finding all the capabilities lurking under the surface. Learn how to: Unlock your phone so that you can use it with any carrier Avoid and recover from malicious mobile software Watch DVD movies on the phone Use the phone as a remote control Use the phone as a data modem for your notebook Check your email and browse the web Post to your weblog from your phone Record phone conversations Choose mobile service plans Transfer files between the phone and your computer Whether you want to use your smartphone as your lifeline while you're on the road, or you're just looking for a way to make the most of the time you spend waiting in lines, you'll find all the user-friendly tips, tools, and tricks you need to become massively productive with your Nokia smartphone. With Nokia Smartphone Hacks , you'll unleash the full power of that computer that's sitting in your pocket, purse, or backpack.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 56
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 645 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    Schlagwort(e): UNIX Shells ; Computer networks ; Security measures ; Data encryption (Computer science) ; Electronic books ; local
    Kurzfassung: Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide . This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
    Anmerkung: "Covers SSH-2 protocol"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 57
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 209 p. , ill. ; , 25 cm
    Ausgabe: 1st ed.
    DDC: 004.6/8
    Schlagwort(e): Home automation ; Home computer networks ; Electronic books ; local
    Kurzfassung: The beauty of a home network is that it can make life so easy--what could be better than sharing an Internet connection so that everyone can be online at the same time? With home networking you can move files from one computer to another, share resources, print to a single printer or multiple printers from any computer in the house, and IM the kids when they're holed up in their rooms. And the downside? Anyone who's ever had to troubleshoot a network glitch doesn't need to ask that question. The simple words, "Why can't I print? Why can't I get to the Internet? Why does my computer say 'Access Denied' today, when it worked fine yesterday?" are enough to send the home network administrator running for cover. And the concept of "network security" can keep the soundest sleeper tossing and turning all night.Currently, more than 8 million homes in the US have installed a network of some kind, and within five years, that number is expected to jump to 37 million. This speaks to the availability of easy-to-install home networking products. Unfortunately, there's also a glut of potential headaches that can occur after installation (and during, sometimes) with no warning label on the box saying, "This product sure to cause annoyances."But help is here. Home Networking Annoyances will ease the headaches and annoyances of anyone who runs a home network. This book tackles all the common annoyances associated with running your network--whether it's wired or wireless, or a combination thereof. Its friendly, off-the-cuff approach will put you in a position of power over those home networking glitches, including file sharing, printing, cabling, security, and much more. You'll find dozens of on-target tips, workarounds, and fixes that will help you improve your home networking experience in every way possible.Whether you're a mainstream business user or a home user with newly installed network hardware, you've probably had your patience tested by frustrating network maintenance issues. Take a stand against annoyances now: just as the bestselling PC Annoyances brought peace and happiness to PC users everywhere, Home Networking Annoyances is your ticket to serenity.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 58
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 341 p. , ill. ; , 23 cm. +
    Schlagwort(e): Linux ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: For years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you to perform all the tasks you can do with Windows.Getting to know Linux has never been easier, because now there's a way to test-drive Linux without changing, installing, or configuring a thing on your computer. It's called Test Driving Linux: From Windows to Linux in 60 Seconds .This latest release from O'Reilly comes with a Live CD called Move, that allows Windows users to try all the features of Mandrake Linux, a popular Linux distribution without the hassle of actually installing Linux. Users simply place the Move CD into their CD drive, boot from the disc, then watch an entire Mandrake system run on the fly from the CD-ROM. Test Driving Linux: From Windows to Linux in 60 Seconds is a detailed step-by-step guide to the Linux operating system and several popular open source programs. With this guide you can quickly learn how to use Linux to perform the tasks you do most: surf the web, send and receive email, instant message with friends, write letters, create spreadsheets, and even how to enhance your digital photos. Test Driving Linux: From Windows to Linux in 60 Seconds provides both home and business users with a hassle-free way to investigate this operating system before they purchase and install a complete Linux distribution.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 59
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 735 p. , ill. ; , 24 cm
    Ausgabe: 3rd ed.
    DDC: 005.2762
    Schlagwort(e): Computer networks ; Programming ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: The new third edition of this highly regarded introduction to Java networking programming has been thoroughly revised to cover all of the 100+ significant updates to Java Developers Kit (JDK) 1.5. It is a clear, complete introduction to developing network programs (both applets and applications) using Java, covering everything from networking fundamentals to remote method invocation (RMI). Java Network Programming , 3rd Edition includes chapters on TCP and UDP sockets, multicasting protocol and content handlers, servlets, multithreaded network programming, I/O, HTML parsing and display, the Java Mail API, and the Java Secure Sockets Extension. There's also significant information on the New I/O API that was developed in large part because of the needs of network programmers.This invaluable book is a complete, single source guide to writing sophisticated network applications. Packed with useful examples, it is the essential resource for any serious Java developer.
    Anmerkung: Includes index. - Previous ed.: Beijing; Sebastopol, Calif.: O'Reilly, 2000
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 60
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 436 p. , ill. ; , 23 cm
    DDC: 794.8 C278g
    Schlagwort(e): Computer games ; Programming ; Video games ; Electronic books ; local
    Kurzfassung: It doesn't take long for an avid--or just wickedly clever--gamer to be chafed by the limitations of videogame software or hardware. If you want to go far beyond the obvious--whether you want to modify your console controller to work on other consoles, create your own text adventure, or modify your Game Boy--there's an awful lot of fun you can have for cheap or free, using the creative exploits of the gaming gurus. Gaming Hacks is the indispensable guide to cool things gamers can do to create, modify, and hack videogame hardware and software. Everything from social exploits and tips to be used in MMORPGs (Massive Multiplayer Online Role Playing Games) to soldering-iron heavy hardware hacks is covered in this extreme-cool hack guide written by gamers for gamers. Gaming Hacks offers a stunning variety of hacks, exploits, and other creative acts on both modern and archaic console hardware and today's PC hardware--one hundred detailed, ingenious hacks are included. Gaming Hacks also includes detailed software-based looks at MMO (massively multiplayer) titles, FPS (first-person shooter) games, machinima (real-time movies created using game engines), emulation, save-game hacking, and many other miscellaneous subgenres and topics. Gaming Hacks shows hardcore gamers how to configure the best FPS peripherals, hack the Nuon DVD Player/Gaming System, modify their Game Boy, watch movies and listen to music and their Sega Dreamcast, and much, much more. Gaming Hacks shows you how to do things you didn't know could be done. If you want more than your average gamer--you want to explore and experiment, unearth shortcuts, make your games do what you want them to do Gaming Hacks will show you how. You don't need to be gaming guru to pick up Gaming Hacks ; you'll be one when you put it down.
    Anmerkung: "100 industrial-strength tips & tools"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 61
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 377 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.2/762
    Schlagwort(e): Apache (Computer file : Apache Group) ; Application software ; Development ; Java (Computer program language) ; Open source software ; Electronic books ; local
    Kurzfassung: As a Java developer, you're always looking for tools to help in your web and application development. Maybe you've heard of the Jakarta Commons open source Java tools. The Jakarta Commons is an open source Jakarta subproject where developers create and maintain a collection of twenty-plus independent Java components and utilities that serve useful purposes. Jakarta Commons packages include utilities for web, XML, networking, building and testing applications, and some that help other packages work better together. Jakarta Commons packages are designed to be reusable. Each one is a time saver by itself, and when used in combination the results can be very powerful. But in searching for information on the Jakarta Commons tools, you find it hard to locate documentation relevant to your needs. You don't have lots of time to spend searching for information on a specific Jakarta Commons tool to determine what it does and how to incorporate it in your code. If you are looking for a single source for clear information and samples on how to use the Jakarta Commons tools, then the Jakarta Commons Cookbook is for you. The Jakarta Commons Cookbook summarizes each of the available Jakarta Commons packages and contains practical and efficient recipes for making the most out of the Jakarta Commons open source Java tools. You don't have to be an expert, since the book explains how and why to use a utility, pitfalls to avoid, and where to look for additional information on Jakarta Commons utilities. It introduces design possibilities and explores combining Jakarta Commons utilities in novel assemblies to create complex applications. The book offers detailed code samples and insider tips--making it a valuable resource whether you are an expert Java developer or a novice. If you want to quickly learn how to use Jakarta Commons timing-saving utilities or have an invaluable resource for Jakarta Commons questions and techniques, then the Jakarta Commons Cookbook is for you.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 62
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: x, 329 p. , ill. ; , 25 cm. +
    Schlagwort(e): Digital video ; Editing ; Electronic books ; local
    Kurzfassung: Apple's DVD Studio Pro, released in 2001, provided a low-cost, professional solution for home and small business DVD authoring. Today, the highly sophisticated yet easy-to-use DVD Studio Pro 3 allows independent filmmakers, video producers, trainers, event videographers, and enthusiasts to create professional-grade DVDs on the Macintosh platform. Pair the program with DVD Studio Pro 3: In the Studio , and you've got everything you need to embrace the digital video revolution.This indispensable book gives you the tools and know-how to master DVD Studio Pro 3. Oversized and in full color, the highly visual DVD Studio Pro 3: In the Studio is ideal for Macintosh ProApps developers--those who use Final Cut Pro 4 and Shake 3--as well as for prosumer and professional filmmakers who wish to transfer their projects to DVDs. The book goes well beyond the program's features list to demystify the entire process of DVD design and authoring.Author Marc Loy, who has been using DVD Studio Pro since its inception, goes beyond a simple discussion about the DVD Studio Pro 3 interface and entices readers to experience the program's powerful capabilities as they create eye-catching, innovative DVD designs. He covers the actual protocols involved with the DVD files and filesystems, pixel aspect ratio issues, and common "gotchas" using both still and motion media. He also delivers plenty of tips and tricks for using dynamic buttons. DVD Studio Pro 3: In the Studio explores most everything you need and want to know, including importing from Photoshop and Final Cut Pro, making motion video menus available, effective looping of video and audio, adding multilingual menus and subtitles, encoding rules for DVDs, scripting, and mass duplication hunts. DVD Studio Pro 3: In the Studio is a professional-level book for anyone who's serious about creating high-impact, professional-level DVDs to make your unique vision a digital video reality.
    Anmerkung: One DVD inside back cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 63
    Sprache: Englisch
    Seiten: xviii, 615 p. , ill. ; , 24 cm
    Ausgabe: 3rd ed.
    DDC: 004.5/6
    Schlagwort(e): Linux device drivers (Computer programs) ; Electronic books ; local
    Kurzfassung: Device drivers literally drive everything you're interested in--disks, monitors, keyboards, modems--everything outside the computer chip and memory. And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic Linux Device Drivers from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.Over the years the book has helped countless programmers learn: how to support computer peripherals under the Linux operating system how to develop and write software for new hardware under Linux the basics of Linux operation even if they are not expecting to write a driver The new edition of Linux Device Drivers is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.
    Anmerkung: On t.p. of previous ed. Alessandro Rubini's name appeared first. - Includes bibliographical references (p. 575-577) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 64
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. ; , cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: A comprehensive guide to analyzing the business rationale for WLANs Evaluate the business rationale behind the deployment of WLANs, including return on investment (ROI), net present value, payback period, and total cost of ownership Develop a robust execution plan to deploy and operate the WLAN Understand the high-level technical issues of deploying and managing your WLAN from a business decision-maker's perspective Maximize the positive impact of supplementary and complementary services such as voice, video, and guest WLAN access Identify potential security threats and develop strategies to mitigate attacks Learn methodological and technical best practices from WLAN deployment case studies featuring real-world, enterprise-class businesses and institutions Gather information easily by referring to quick reference sheets and appendixes covering an antenna overview, a high-level sample project plan, checklists, and flowcharts Businesses today are increasingly adopting wireless LANs (WLANs) as a primary data transport mechanism. To determine when and how to effectively deploy WLANs, business managers, project managers, and IT executives need a clear, holistic evaluation of the business benefits and risks behind this complex technology solution. The Business Case for Enterprise-Class Wireless LANs helps you make the right decisions by explaining the business value and cost of investing in a WLAN-from security and architecture to deployment and application. Using a lifecycle perspective, this guide covers the value proposition, cost justification, and alignment of security, design, and operational components within the business. Written in an approachable style, The Business Case for Enterprise-Class Wireless LANs provides a baseline analysis of WLAN technologies for a large-scale deployment and includes concise real-world case studies with checklists and flowcharts that you can adapt for your needs. By recognizing the obstacles and advantages of implementing a WLAN from a strategic and justified business perspective, you can apply the economic benefits to your organization and ensure a timely and efficient deployment of your organization's WLAN. This volume is in the Network Business Series offered by Cisco Press®. Books in this series provide IT executives, decision makers, and networking professionals with pertinent information about today's most important technologies and business strategies.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 65
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Identify, mitigate, and respond to network attacks Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI) Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM) Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network. This new family of adaptive security appliances also controls network activity and application traffic and delivers flexible VPN connectivity. The result is a powerful multifunction network security device that provides the security breadth and depth for protecting your entire network, while reducing the high deployment and operations costs and complexities associated with managing multiple point products. Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a practitioner's guide to planning, deploying, and troubleshooting a comprehensive security plan with Cisco ASA. The book provides valuable insight and deployment examples and demonstrates how adaptive identification and mitigation services on Cisco ASA provide a sophisticated security solution for both large and small network environments. The book contains many useful sample configurations, proven design scenarios, and discussions of debugs that help you understand how to get the most out of Cisco ASA in your own network. "I have found this book really highlights the practical aspects needed for building real-world security. It offers the insider's guidance needed to plan, implement, configure, and troubleshoot the Cisco ASA in customer environments and demonstrates the potential and power of Self-Defending Networks." -Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems® This security book is part of th...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 66
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. ; , cm
    Ausgabe: 2nd ed.
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Exposes the inner workings of Cisco CallManager to help you maximize your Cisco IP Communications solution Read new content on QSIG, SIP trunks, video support, hunt lists and line groups, time-of-day routing, and new features added in CallManager releases 3.2, 3.3, 3.4, 4.0, and 4.1 Review content from the first edition that has been fully revised and updated to CallManager release 4.1 Learn how to deploy and manage a CallManager solution Understand the components that make up CallManager call routing through the use of basic to advanced examples that solve enterprise call routing problems Gain a full understanding of how CallManager manages media resources and processes information for conferencing, transcoding, annunciation, and more Learn detailed information about North American and international dial plans, trunk and station devices, media resources, and much more Cisco CallManager Fundamentals , Second Edition, provides examples and reference information about Cisco® CallManager, the call-processing component of the Cisco IP Communications solution. Cisco CallManager Fundamentals uses examples and architectural descriptions to explain how CallManager processes calls. This book details the inner workings of CallManager so that those responsible for designing and maintaining a Voice over IP (VoIP) solution from Cisco Systems® can understand the role each component plays and how they interrelate. This book is the perfect resource to supplement your understanding of CallManager. You'll learn detailed information about dial plan management and call routing, hardware and software components, media processing, call detail records, system management and monitoring, and the history of CallManager. The authors, all members of the original team that developed and implemented the CallManager software and documentation from its early stages, also provide a list of features and Cisco solutions that integrate with CallManager. This second edition of Cisco CallManager Fundamentals covers software releases through release 4.1. With this book, you will gain a deeper understanding of the system and find answers to questions not available in any other source. This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 67
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 624 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    Schlagwort(e): Internet programming ; Microsoft .NET ; Electronic books ; local
    Kurzfassung: Brilliantly compiled by author Juval Lowy, Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover .NET 2.0. It remains one of the few practical books available on this topic. This invaluable resource is targeted at anyone who develops complex or enterprise-level applications with the .NET platform--an ever-widening market. In fact, nearly two million Microsoft developers worldwide now work on such systems. Programming .NET Components , Second Edition begins with a look at the fundamentals of component-oriented programming and then progresses from there. It takes the time to carefully examine how components can simplify and add flexibility to complex applications by allowing users to extend their capabilities. Next, the book introduces a variety of .NET essentials, as well as .NET development techniques. Within this discussion on component development, a separate chapter is devoted to each critical development feature, including asynchronous calls, serialization, remoting, security, and more. All the while, hazardous programming pitfalls are pointed out, saving the reader from experiencing them the hard way.A .NET expert and noted authority on component-oriented programming, Lowy uses his unique access to Microsoft technical teams to the best possible advantage, conveying detailed, insider information in easy-to-grasp, activity-filled language. This hands-on approach is designed to allow individuals to learn by doing rather than just reading. Indeed, after digesting Programming .NET Components , Second Edition, readers should be able to start developing .NET components immediately. Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover...
    Anmerkung: "Covers .NET 2.0 & Visual Studio 2005"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 68
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    Ausgabe: 1st ed.
    Schlagwort(e): Electronic books ; local
    Kurzfassung: The all-in-one guide to modern routed and switched campus network design Understand the network design process and network design models Learn how switches are used in network design Design an IP addressing plan and select appropriate IP routing protocols Apply network security design principles to boost network security Enable WLANs to improve workforce mobility Examine QoS design requirements and tools Unleash the power of voice transport over data networks, including VoIP and IP telephony Use content networking to provide content to users quickly and efficiently Learn how to integrate network management protocols and tools into network designs Understand how to effectively integrate IP multicast, high availability, storage networking, and IPv6 into your network designs Over the past decade, campus network design has evolved many times as new technologies have emerged and business needs have changed. For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and content networking, their core infrastructures must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step. Campus Network Design Fundamentals is an all-in-one guide to key technologies that can be integrated into network design. The book provides insight into why each technology is important and how to apply this knowledge to create a campus network that includes as many or as few of today's productivity-enhancing applications as are needed in your environment. Topics covered throughout the book include network design process and models, switching, IP routing, quality of service (QoS), security, wireless LANs (WLANs), voice transport, content networking, network management, IPv6, IP multicast, increasing network availability, and storage networking. Sample network designs are included through-out, and the book concludes with a comprehensive case study that illustrates the design process and solutions for headquarters, branch offices, and home office/remote users. Whether you need an overview of modern campus technologies or seek advice on how to design switched and routed networks that securely support these technologies, this book is your comprehensive resource to the foundations upon which all modern-day campus networks are based. This book is part of the Cisco Press® Fundament...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 69
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network. Securing Your Business with Cis...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 70
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. ; , cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: A new edition of this title is available, ISBN-10: 1587055740 ISBN-13: 9781587055744 Cisco authorized self-study book for CCDP® 642-871 architectures foundation learning Prepare for the CCDP ARCH exam 642-871 with the Cisco authorized self-study guide. This book teaches you how to: Understand the composition and deployment of the Cisco AVVID framework in network design Understand the composition and role of the Enterprise Composite Network Model in enterprise network design Design enterprise campus networks and their edge network connectivity to the Internet Understand and implement network management solutions in the network Integrate new technologies designed to enhance network performance and availability in the enterprise, such as high availability, QoS, multicasting, and storage and content networking Design and implement appropriate security solutions for enterprise networks Deploy wireless technologies within the enterprise Implement and design IP telephony solutions for the enterprise network CCDP Self-Study: Designing Cisco Network Architectures (ARCH) is a Cisco® authorized self-paced learning tool. By presenting a structured format for the conceptual and intermediate design of AVVID network infrastructures, this book teaches you how to design solutions that scale from small to large enterprise networks and take advantage of the latest technologies. Whether you are preparing for the CCDP® certification or simply want to gain a better understanding of how to architect network solutions over intelligent network services to achieve effective performance, scalability, and availability, you will benefit from the foundation information presented in this book. This comprehensive book provides detailed information and easy-to-grasp tutorials on a broad range of topics related to architecture and design, including security, fine-tuning routing protocols, switching structures, and IP multicasting. To keep pace with the Cisco technological developments and new product offerings, this study guide includes coverage of wireless networking, the SAFE Blueprint, content networking, storage networking, quality of service (QoS), IP telephony, network management, and high availability networks. Design examples and sample verification output demonstrate implementation techniques. Configuration exercises, which appear in every chapter, provide a practical review of key concepts to discuss critical issues surrounding network operation. Chapter-ending revie...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 71
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    Ausgabe: 1st ed.
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Your complete guide to building your information technology career in any economy The IT Career Builder's Toolkit features market-focused skills and proven methods you can use to jump-start and advance your career. While other books cover just the mechanics of preparing your résumé, writing a cover letter, and interviewing, this book provides all that plus additional insight from IT career development expert, Matt Moran, to help you plan and create a rewarding IT career over the long term. The toolkit approach allows you to use this book to suit your unique needs: Are you new to the IT field? Benefit by reading the book cover to cover. Just need to fine-tune your IT career? Choose a topic and dive in. Understand and prepare for the various and changing factors that affect your career in both positive and negative ways. Learn how to Present the value of your technical skills in the job market Position yourself as the primary commodity of your career Remove the guesswork out of job searches Highlight on-the-job skills and gain meaningful professional exposure The companion CD-ROM includes career management tools such as résumé and cover letter templates, forms to track important contacts, and self-assessment tools. Start or further your consulting career with sample proposals, opportunity tracking forms, and a time-tracking and billing database. Financial tools, including budget and cash-flow summary worksheets, help you gain financial well-being. Use the Value-Added Technologist presentation to gain a clear understanding of the career-building process and how to use the toolkit to build a dynamic career. Most of all, have fun! Every year, people advance along the path to career stardom. Let Matt help you to be one of them through his career philosophy "Do not accept mediocrity as a career objective-demand more of yourself." "I want you to see the [toolkit] techniques as one more set of skills to adopt in your overall career development program. They are skills, just like your technical skills, that you will use daily during your career. Just as you adopt new technical skills, use the toolkit to define those soft skills that you must learn and put to use. The result will be a more well-rounded and complete professional skill-set." ~ Matthew Moran, from the Introduction Companion CD-ROM The CD-ROM contains valuable tools, forms, spreadsheets, and documents that work with the Toolkit to help you master key areas of your career development.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 72
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: The all-in-one practical guide to supporting your Cisco network Provides detailed tips for using freeware and open-source tools readily available from the Internet, including the reasons behind choosing a particular tool Refer to a single source for common Cisco network administration issues Dedicated section for network security aids administrators in effectively dealing with security issues Deploy fully functional RADIUS and TACACS+ for servers for controlling access to Cisco devices Deploy Linux- and Windows-based syslog servers to centrally collect syslog information generated by Cisco devices Deploy Linux- and Windows-based network monitoring systems to monitor interface traffic through Cisco devices including routers, switches, VPN concentrators, and Cisco PIX® firewalls Use the trending feature of network monitoring systems for long-term network analysis and capacity planning Automatically detect and report configuration changes on Cisco IOS® Software-based devices and Cisco PIX firewalls Deploy Cisco-based VPNs in mixed environments using Linux- and Windows-based VPN servers Network Administrators Survival Guide solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco® networks using freeware tools. It is a single reference source that explains particular issues, their significance for administrators, and the installation and configuration process for the tools. The solutions are Cisco centric and provide detail not available in generic online information. Network Administrators Survival Guide emphasizes solutions for network managers and administrators of small to medium-sized businesses and enterprises. Each chapter is broadly based on a network administration function, starting with an overview of the topic, followed by the methodology involved to accomplish that function. This includes the tools available, why they are the right choice, and their installation, configuration, and usage methods. For any given function, Network Administrators Survival Guide covers both Windows- and Linux-based tools as appropriate. Most of the Windows-based tools offer the advantage of GUI for ease of use, whereas the Linux-based tools are command-line based and can be used in automated scripts. Both are significant for network administrators. Based on author Anand Deveriya's extensive field experience, this practical guide to maintaining Cisco networks will save you signifi...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 73
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. ; , cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Identify, analyze, and resolve current and potential network security problems Learn diagnostic commands, common problems and resolutions, best practices, and case studies covering a wide array of Cisco network security troubleshooting scenarios and products Refer to common problems and resolutions in each chapter to identify and solve chronic issues or expedite escalation of problems to the Cisco TAC/HTTS Flip directly to the techniques you need by following the modular chapter organization Isolate the components of a complex network problem in sequence Master the troubleshooting techniques used by TAC/HTTS security support engineers to isolate problems and resolve them on all four security domains: IDS/IPS, AAA, VPNs, and firewalls With the myriad Cisco® security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. Cisco Network Security Troubleshooting Handbook can single-handedly help you analyze current and potential network security problems and identify viable solutions, detailing each step until you reach the best resolution. Through its modular design, the book allows you to move between chapters and sections to find just the information you need. Chapters open with an in-depth architectural look at numerous popular Cisco security products and their packet flows, while also discussing potential third-party compatibility issues. By following the presentation of troubleshooting techniques and tips, you can observe and analyze problems through the eyes of an experienced Cisco TAC or High-Touch Technical Support (HTTS) engineer or determine how to escalate your case to a TAC/HTTS engineer. Part I starts with a solid overview of troubleshooting tools and methodologies. In Part II, the author explains the features of Cisco ASA and Cisco PIX® version 7.0 security platforms, Firewall Services Module (FWSM), and Cisco IOS® firewalls. Part III covers troubleshooting IPsec Virtual Private Networks (IPsec VPN) on Cisco IOS routers, Cisco PIX firewalls with embedded VPN functionalities, and the Cisco 3000 Concentrator. Troubleshooting tools and techniques on the Authentication, Authorization, and Accounting (AAA) framework are discussed thoroughly on routers, Cisco PIX firewalls, and Cisco VPN 3000 concentrators in Part IV. Part IV also covers troubleshooting Cisco Secure ACS on Windows, the server-side component of the AAA framework. IDS/IPS troubleshooting...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 74
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    Ausgabe: 3rd ed.
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Official self-study test preparation guide for the Cisco IPS exam 642-532 The official study guide helps you master all the topics on the IPS exam, including: IPS concepts Command-line interface (CLI) and IPS Device Manager (IDM) configuration modes Basic sensor and IPS signature configuration IPS signature engines Sensor tuning IPS event monitoring Sensor maintenance Verifying system configuration Using the Cisco IDS Module (IDSM) and Cisco IDS Network Module Capturing network traffic CCSP IPS Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the IPS exam. Cisco Security Test Engineer Earl Carter shares preparation hints and test-taking tips, helping you identify areas of weakness and improve your Intrusion Prevention System (IPS) knowledge. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCSP IPS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary materials make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP IPS Exam Certification Guide is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains an electronic copy of the book and more than 200 practice questions for the IPS ex...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 75
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: The practical guide to building resilient and highly available IP networks Learn from an all-in-one introduction to new features and developments in building a resilient IP network Enable your organization to meet internal service-level agreements (SLAs) for mission-critical resources Understand how a resilient IP network can help in delivering mission-critical information such as video and voice services Work with configuration examples that are based on real-world issues and customer requirements Get tips and best practices from field personnel who have worked on some of the largest networks with stringent uptime requirements and SLAs More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is of utmost importance to companies and their service providers. The challenges for the professionals responsible for these networks include ensuring that the network remains up all the time, keeping abreast of the latest technologies that help maintain uptime, and reacting to ever-increasing denial-of-service (DoS) attacks. Building Resilient IP Networks helps you meet those challenges. This practical guide to building highly available IP networks captures the essence of technologies that contribute to the uptime of networks. You gain a clear understanding of how to achieve network availability through the use of tools, design strategy, and Cisco IOS® Software. With Building Resilient IP Networks , you examine misconceptions about five-nines availability and learn to focus your attention on the real issues: appreciating the limitations of the protocols, understanding what has been done to improve them, and keeping abreast of those changes. Building Resilient IP Networks highlights the importance of having a modular approach to building an IP network and, most important, illustrates how a modular design contributes to a resilient network. You learn how an IP network can be broken down to various modules and how these modules interconnect with one another. Then you explore new network resiliency features that have been developed recently, categorized with respect to the design modules. Building Resilient IP Networks is relevant to both enterprise and service provider customers of all sizes. Regardless of whether the network connects to the Internet, fortifying IP networks for maximum uptime and prevention of attacks is mandatory for anyone's b...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 76
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. ; , cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution A complete resource for understanding VPN components and VPN design issues Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients Discover troubleshooting tips and techniques from real-world scenarios based on the author's vast field experience Filled with relevant configurations you can use immediately in your own network With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs. Part I, "VPNs," introduces the topic of VPNs and discusses today's main technologies, including IPsec. It also spends an entire chapter on SSL VPNs, the newest VPN technology and one that Cisco has placed particular emphasis on since 2003. Part II, "Concentrators," provides detail on today's concentrator products and covers site-to-site and remote-access connection types with attention on IPsec and WebVPN. Part III covers the Cisco VPN Client versions 3.x and 4.x along with the Cisco3002 Hardware Client. Cisco IOS® routers are the topic of Part IV, covering scalable VPNs with Dynamic Multipoint VPN, router certificate authorities, and router remote access solutions. Part V explains Cisco PIX and Cisco ASA security appliances and their roles in VPN connectivity, including remote access and site-to-site connections. In Part VI, a case study shows how a VPN solution is best implemented in the real world using a variety of Cisco VPN products in a sample network. This security book is part of the Cisco Press® Networking Technology Serie...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 77
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. ; , cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: A complete configuration manual for MPLS, MPLS VPNs, MPLS TE, QoS, Any Transport over MPLS (AToM), and VPLS Understand the crucial Cisco commands for various MPLS scenarios Understand fundamentals of MPLS operation and learn to configure basic MPLS in Frame Relay and ATM-based environments Master fundamentals of MPLS VPN operation including Multiprotocol BGP (MBGP) operation, VPNv4 route exchange, and basic MPLS VPN configuration in the provider network Understand and configure various PE-CE routing protocols in MPLS VPN networks Understand MPLS VPN provisioning in an Inter-provider VPN (Inter-AS) and Carrier Supporting Carrier (CSC) environment Learn MPLS TE and its advanced features Examine AToM with configuration examples for like-to-like and any-to-any L2 VPN implementations and VPLS components and operation, VPLS configuration and verification, and VPLS topologies Learn about MPLS QoS, including configuration and implementation of uniform and short pipe modes MPLS Configuration on Cisco IOS Software is a complete and detailed resource to the configuration of Multiprotocol Label Switching (MPLS) networks and associated features. Through its practical, hands-on approach, you'll become familiar with MPLS technologies and their configurations using Cisco IOS® Software. MPLS Configuration on Cisco IOS Software covers basic-to-advanced MPLS concepts and configuration. Beyond its emphasis on MPLS, you'll learn about applications and deployments associated with MPLS, such as traffic engineering (TE), Layer 2 virtual private networks (VPN), and Virtual Private LAN Service (VPLS). You'll receive practical guidance and deployment scenarios that can be enhanced by re-creation of the setups and configurations demonstrated within this book. You'll move quickly from a brief overview of MPLS technology and basic MPLS configuration on Cisco® routers to more advanced topics. Several chapters provide instruction on VPN connectivity options, including implementing Border Gateway Protocol (BGP) in MPLS VPNs. You'll receive configuration guidelines for advanced MPLS implementations such as MPLS TE, quality of service (QoS), and extranet VPNs. You'll learn about implementation of Layer 2 VPNs versus Layer 3 VPNs with Cisco Any Transport over MPLS (AToM). And you'll see demonstrations of implementing VPLS on Cisco routers complete with the configurations and platform support. "I highly recommend MPLS Configuration on Cisco IOS Software as required reading for th...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 78
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    ISBN: 9780596517168 , 0596517165 , 0596005040
    Sprache: Englisch
    Seiten: xxxv, 816 p. , ill. ; , 24 cm
    Paralleltitel: Erscheint auch als
    DDC: 384.5/35
    Schlagwort(e): Flash (Computer file) ; Mobile communication systems ; Multimedia communications ; Electronic books ; local ; Flash (Computer file) ; Mobile communication systems ; Multimedia communications ; Réseaux multimédias ; TECHNOLOGY & ENGINEERING ; Mobile & Wireless Communications ; Flash (Logiciel) ; Radiocommunications mobiles
    Kurzfassung: With the advent of Flash Communication Server MX (FCS), Macromedia believes that it's on the edge of a breakthrough in how people think about the Internet. FCS has been designed to provide web developers with the means to add polished interactive audio and video features to their sites, the sort of features that users have come to expect. Naturally, the process of efficiently integrating rich media into applications, web sites, and web content is a complex one, to say the least. That's where Programming Flash Communication Server factors in. As the foremost reference on FCS, it helps readers understand how FCS can facilitate: Video on demand Live webcasts Video chat and messaging Shared desktop conferences Live auctions Interactive whiteboard presentations Workflow collaboration Multi-user games Programming Flash Communication Server not only explains how to use the pre-built FCS components to construct a simple application, it also explains the architecture so that developers can program custom components to make even more advanced applications. In addition, the book explains how to truly optimize performance, and talks about considerations for networked applications as well as the media issues pertaining to FCS. Programming Flash Communication Server gives developers a sorely needed leg up on this potentially intimidating technology. It lets users develop cool web applications ranging from direct dating experiences with real-time video, to pre-recorded corporate presentations, to news services with video and audio, and much more. At last, the ability to build web sites with rich interactive features--minus the complex downloads and installation hassles--is a reality. And now, with Programming Flash Communication Server from O'Reilly by your side, you can do more quickly and easily than you ever dreamed possible.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 79
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 299 p. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 302.23/0973
    Schlagwort(e): Facts and Comparisons electronic resources ; Digital media ; United States ; Internet ; Political aspects ; United States ; Internet ; Social aspects ; United States ; Mass media and technology ; United States ; Online journalism ; United States ; Web publishing ; United States ; Electronic books ; local
    Kurzfassung: " We the Media , has become something of a bible for those who believe the online medium will change journalism for the better." -Financial Times Big Media has lost its monopoly on the news, thanks to the Internet. Now that it's possible to publish in real time to a worldwide audience, a new breed of grassroots journalists are taking the news into their own hands. Armed with laptops, cell phones, and digital cameras, these readers-turned-reporters are transforming the news from a lecture into a conversation. In We the Media , nationally acclaimed newspaper columnist and blogger Dan Gillmor tells the story of this emerging phenomenon and sheds light on this deep shift in how we make--and consume--the news. Gillmor shows how anyone can produce the news, using personal blogs, Internet chat groups, email, and a host of other tools. He sends a wake-up call tonewsmakers-politicians, business executives, celebrities-and the marketers and PR flacks who promote them. He explains how to successfully play by the rules of this new era and shift from "control" to "engagement." And he makes a strong case to his fell journalists that, in the face of a plethora of Internet-fueled news vehicles, they must change or become irrelevant. Journalism in the 21st century will be fundamentally different from the Big Media oligarchy that prevails today. We the Media casts light on the future of journalism, and invites us all to be part of it. Dan Gillmor is founder of Grassroots Media Inc., a project aimed at enabling grassroots journalism and expanding its reach. The company's first launch is Bayosphere.com, a site "of, by, and for the San Francisco Bay Area." Dan Gillmor is the founder of the Center for Citizen Media, a project to enable and expand reach of grassroots media. From 1994-2004, Gillmor was a columnist at the San Jose Mercury News , Silicon Valley's daily newspaper, and wrote a weblog for SiliconValley.com. He joined the Mercury News after six years with the Detroit Free Press . Before that, he was with the Kansas City Times and several newspapers in Vermont. He has won or shared in several regional and national journalism awards. Before becoming a journalist he played music professionally for seven years.
    Anmerkung: "Web site directory": p. 251-257. - Includes bibliographical references (p. 261-279) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 80
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvii, 958 p. , ill. ; , 24 cm
    DDC: 004.6
    Schlagwort(e): Electronic data processing personnel ; Certification ; Telecommunication ; Switching systems ; Examinations ; Study guides ; Telecommunications engineers ; Certification ; Study guides ; Electronic books ; local
    Kurzfassung: Gain necessary hands-on experience implementing CCNP BCMSN concepts with this practical lab guide Lab configurations include explanations of equipment set-up and execution Valuable reference tool for Catalyst switches, including shortcuts, caveats, and application of the most advanced features Real-world scenarios represent the whole range of CCNP BCMSN 642-811 exam topics CCNP Practical Studies: Switching (CCNP Self-Study) provides CCNP candidates with an in-depth, hands-on experience in configuring Cisco Catalyst switches. This practical guide shows intermediate level networkers how to apply the theoretical knowledge they have gained through CCNP coursework and exam preparation. Configuration labs performed within this book will cover all technologies tested on the BCMSN 642-811 exam, as well as a number of real world scenarios that will test users' overall understanding of multilayer switching. The labs come complete with full explanations, highlighting why the chosen commands and techniques are recommended. In addition to applicable labs, this book also provides general information on various switching technologies, as well as tips, tricks, shortcuts, and caveats for deploying Cisco switching gear in production environments. This book also includes exercises (similar to traditional mathematics exercises) that will help readers internalize, practice, and memorize certain concepts and thought processes necessary to successfully deploy a switched network. Part of the Practical Studies series from the Cisco Press, CCNP Practical Studies: Switching provides self-study based hands-on experience. As such, it can be used in conjunction with other Cisco Press titles and is an excellent companion to instructor-led training from a Cisco Learning Partner.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 81
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 455 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 004.67/8
    Schlagwort(e): Electronic data processing personnel ; Certification ; Extranets (Computer networks) ; Electronic books ; local
    Kurzfassung: Cisco authorized self-study book for CCSP 642-511 foundation learning Understand the underlying principles of VPNs Learn about and identify proper implementation of remote access and site-to-site VPNs Identify the features, functions, and benefits of the Cisco VPN 3000 Concentrator Series Configure and test a remote access VPN using preshared keys on the Cisco VPN 3000 Concentrator Work with the RIP and OSPF dynamic routing protocols Gain proficiency with the VPN Client Firewall Apply digital certificates on the Cisco VPN 3000 Concentrator Use the Cisco 3002 Hardware Client to configure and test a remote access VPN Implement advanced VPN client features such as load balancing, reverse route injection, and the appropriate use of backup servers Configure LAN-to-LAN VPNs on the Cisco 3000 Concentrator Offer granular user-level security with user and unit authentication Learn how to use VPN through NAT and resolve real-world implementation challenges Provide a sound level of support and administration skills for day-to-day management of a VPN 3000 Concentrator-based VPN by utilizing the tools resident in the Concentrator CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN) , Second Edition, is a complete reference for professionals who intend to work with virtual private networks (VPNs) using IPSec. It includes detailed coverage of the VPN 3000 Concentrator, a scalable remote access platform that offers encryption, high availability, and superior performance. In addition to acting as a valuable study aid for the CCSP CSVPN 642-511 exam, this book is an invaluable theory and configuration guide for the VPN 3000 series of products, with its thorough coverage of concentrators, hardware clients, and software clients. CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over all techniques and technologies related to Cisco Systems VPN products. Chapter overviews bring you quickly up to speed and prepare you to get to work on securing your network. Detailed configuration examples allow you to take advantage of Cisco VPN products in no time. Unique chapter-ending review questions reinforce key concepts and test your knowledge. Whether you are seeking a reference guide to plan, administer, and maintain a VPN based upon the Cisco VPN 3000 Concentrator or are looking for a study guide for the 642-511 exam, CCSP Self-Study: Cisco Secure Virtual P...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 82
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. ; , cm
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Hands-on techniques for enabling authentication, authorization, and accounting Understand the security concepts behind the AAA framework Learn message formats, communication, and message encryption using the TACACS+ and RADIUS protocols Configure and troubleshoot AAA on Cisco routers Understand where to position and install the CSACS in your network Explore and customize the CSACS interface Configure CSACS user accounts, user groups, and shared profile components Add AAA clients and manage network connections Configure external databases and perform database replication and backup Explore the various reports and logs available in CSACS Learn how AAA models apply to service provider environments Install and configure Cisco Access Registrar As network infrastructures evolve, it is increasingly important that access to vital corporate resources is vigilantly monitored and controlled. The Cisco identity management solutions, including Cisco Secure Access Control Server (CSACS), address this requirement, enabling security, control, and administration of the growing population of users that connect to corporate networks. CSACS, an essential component of the Cisco Identity Based Networking Services (IBNS) architecture, extends access security by combining authentication, user and administrator access, and policy control from a centralized identity-networking framework. This allows greater flexibility and mobility, increased security, and user productivity gains. Cisco Access Control Security provides you with the skills needed to configure authentication, authorization, and accounting (AAA) services on Cisco devices. Separated into three parts, this book presents hard-to-find configuration details of centralized identity networking solutions. Part I provides an overview of the AAA architecture, complete with discussions of configuring Cisco routers for AAA. Part II addresses enterprise AAA management with CSACS, including installation, configuration, and management details. Part III looks at service provider AAA management with Cisco Access Registrar. Full of detailed overviews, diagrams, and step-by-step instructions for enabling essential access control solutions, Cisco Access Control Security is a practical tool that can help enforce assigned access policies and simplify user management. "This book manages the rare combination of being highly accurate and technically astute, while maintaining an easy readability and flow. It is a great guide for s...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 83
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 637 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    Schlagwort(e): Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: In an ideal world, an operating system would do its job in the background, while you did yours in the foreground. In reality, though, operating systems often get in the way, fouling up the process at the most inopportune times. And Windows XP is no exception.O'Reilly's popular series for customizing and troubleshooting Windows once again comes to the rescue with Windows XP Annoyances for Geeks . Offering dozens of on-target tips, workarounds, and warnings, Windows XP Annoyances for Geeks allows users to improve their overall experience with the Windows XP operating system in every way possible.You'll learn how to use the Registry Editor; how to customize the interface beyond Microsoft's own intentions; and how to master Windows' built-in networking capabilities, including advanced technologies such as Internet Connection sharing, Remote Desktop sharing, and virtual private networking. And now, with this updated edition, you can also expect detailed coverage of the newly released Service Pack 2 (SP2) technology.SP2 is designed to make your work with the Windows XP operating system even easier and safer by providing superior protection against viruses, hackers, and worms. Among the core SP2 components covered in Windows XP Annoyances for Geeks are Windows Firewall, Pop-up Blocker for Internet Explorer, and the new Windows Security Center.David Karp, veteran author of several titles in the Windows Annoyances series, is behind the wheel of this comprehensive guide, as well. Karp points out numerous SP2-related quirks and unaccountable behaviors that are guaranteed to increase your level of perplexity and frustration. By recognizing these shortcomings, Windows XP Annoyances for Geeks arms you with the knowledge to overcome them.Karp leaves no stone unturned in providing the ultimate resource for the ever-expanding Windows XP market. As a result, you'll be able to seize complete control of the Windows XP operating system--instead of the other way around.
    Anmerkung: "Covers service pack 2"--Cover. - "Tips, secrets and solutions"--Cover. - First ed. entitled: Windows XP annoyances. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 84
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 278 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): C# (Computer program language) ; Compilers (Computer programs) ; Microsoft .NET Framework ; Open source software ; Electronic books ; local
    Kurzfassung: The Mono Project is the much talked-about open source initiative to create a Unix implementation of Microsoft's .NET Development Framework. Its purpose is to allow Unix developers to build and deploy cross-platform .NET applications. The project has also sparked interest in developing components, libraries and frameworks with C#, the programming language of .NET. The controversy? Some say Mono will become the preferred platform for Linux development, empowering Linux/Unix developers. Others say it will allow Microsoft to embrace, extend, and extinguish Linux. The controversy rages on, but--like many developers--maybe you've had enough talk and want to see what Mono is really all about. There's one way to find out: roll up your sleeves, get to work, and see what you Mono can do. How do you start? You can research Mono at length. You can play around with it, hoping to figure things out for yourself. Or, you can get straight to work with Mono: A Developer's Notebook --a hands-on guide and your trusty lab partner as you explore Mono 1.0. Light on theory and long on practical application, Mono: A Developer's Notebook bypasses the talk and theory, and jumps right into Mono 1.0. Diving quickly into a rapid tour of Mono, you'll work through nearly fifty mini-projects that will introduce you to the most important and compelling aspects of the 1.0 release. Using the task-oriented format of this new series, you'll learn how to acquire, install, and run Mono on Linux, Windows, or Mac OS X. You'll work with the various Mono components: Gtk#, the Common Language Runtime, the class libraries (both .NET and Mono-provided class libraries), IKVM and the Mono C# compiler. No other resource will take you so deeply into Mono so quickly or show you as effectively what Mono is capable of. The new Developer's Notebooks series from O'Reilly covers important new tools for software developers. Emphasizing example over explanation and practice over theory, they focus on learning by doing--you'll get the goods straight from the masters, in an informal and code-intensive style that suits developers. If you've been curious about Mono, but haven't known where to start, this no-fluff, lab-style guide is the solution.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 85
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 343 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 332.178
    Schlagwort(e): PayPal (Firm) ; Electronic commerce ; Electronic funds transfers ; Electronic books ; local
    Kurzfassung: If you've bought or sold items through eBay, or through hundreds of other online sites, then you're familiar with PayPal, the online payment service. With PayPal, a valid email address, and a credit card or bank account, you can easily send and receive payments online. Not a bank or financial institution itself, PayPal describes its service as one that builds on the financial infrastructure of bank accounts and credit cards, and using advanced propriety fraud prevention systems, creates a safe, global, real-time payment solution. Put simply, PayPal provides the means for people to conduct financial transactions online, instantly and securely.But there's more to PayPal than meets the eye. PayPal Hacks shows you how to make the most of PayPal to get the most out of your online business or transactions. Authors Shannon Sofield of Payloadz.com and PayPal evangelist David Nielsen guide you through the rigors of using and developing with PayPal. Whether you're building an ecommerce site using PayPal as a transaction provider, or simply trying to pay for an eBay auction without getting burned, PayPal Hacks will give you the skinny on this leading global online payment service.The collection of tips and tricks in PayPal Hacks shows you how to find or even build the right tools for using PayPal to buy and sell on eBay or as a transaction provider for ecommerce on your own site. Written for all PayPal users, from those just starting out to those developing sophisticated ecommerce sites, this book begins with the basics such as setting up your account, then moves quickly into specific tips and tools for buyers, sellers, and developers.With PayPal Hacks, you can: Learn extra steps to help protect yourself while buying or selling on eBay Save time and money with advanced tips and undocumented features Learn dozens of easy-to-follow procedures to help you request and receive payments and fill orders Use PayPal to handle subscriptions, affiliate systems, and donations Create and customize your customers' checkout process Effortlessly integrate PayPal's shopping cart system into your own website Implement digital fulfillment with Instant Payment Notification (IPN) and Payment Data Transfer (PDT) Develop and distribute ecommerce applications with the PayPal API Each hack consists of a task to be accomplished or a creative solution to a problem, presented in a clear, logical, and task-oriented format. PayPal Hacks provides the tools and details necessary to ma...
    Anmerkung: "100 industrial-strength tips & tools"--Cover. - Includes bibliographical references (p. xx-xxi) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 86
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 460 p. , ill. ; , 23 cm
    DDC: 005.72
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Developers and system administrators alike are uncovering the true power of XML, the Extensible Markup Language that enables data to be sent over the Internet from one computer platform to another or one application to another and retain its original format. Flexible enough to be customized for applications as diverse as web sites, electronic data interchange, voice mail systems, wireless devices, web services, and more, XML is quickly becoming ubiquitous. XML Hacks is a roll-up-your-sleeves guide that distills years of ingenious XML hacking into a complete set of practical tips, tricks, and tools for web developers, system administrators, and programmers who want to go far beyond basic tutorials to leverage the untapped power of XML.With plenty of useful real-world projects that illustrate how to define, read, create, and manipulate XML documents, XML Hacks shows readers how to put XML's power to work on the Internet and within productivity applications. Each Hack in this book can be read easily in a few minutes, saving programmers and administrators countless hours of searching for the right answer. And this is an O'Reilly Hacks book, so it's not just practical, imminently useful, and time-saving. It's also fun.From Anatomy of an XML Document to Exploring SOAP Messages XML Hacks shows you how to save time and accomplish more with fewer resources. If you want much more than the average XML user--to explore and experiment, do things you didn't know you could do with XML, discover clever shortcuts, and show off just a little--this invaluable book is a must-have.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 87
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 207 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): SpamAssassin (Computer file) ; Internet ; Security measures ; Open source software ; Unsolicited electronic mail messages ; Electronic books ; local
    Kurzfassung: The annoyance factor for individual users whose email is crammedwith pitches for pornography, absurd moneymaking schemes, anddubious health products is fierce. But for organizations, the costof spam in lost productivity and burned bandwidth is astronomical.While society is grappling with a solution to the burgeoning crisisof spam proliferation, the pressure is on system administrators tofind a solution to this massive problem in-house. And fast. Sysadmins can field scores of complaints and spend months testingsoftware suites that turn out to be too aggressive, too passive, ortoo complicated to setup only to discover that SpamAssassin (SA),the leading open source spam-fighting tool, is free, flexible,powerful, highly-regarded, and remarkably effective. The drawback?SpamAssassin's lack of published documentation. SpamAssassin by Alan Schwartz, is the only published resource devoted toSpamAssassin and how to integrate it effectively into yournetworks. This clear, concise guide clarifies the installation,configuration, and use of the SpamAssassin spam-checking system(versions 2.63 and 3.0) for Unix system administrators using thePostfix, Sendmail, Exim, or qmail mail servers, helpingadministrators make the right integration decision for theirparticular environments. It covers concrete advice on how to: Customize SpamAssassin's rules, and even create new ones TrainSpamAssassin's Bayesian classifier, a statistical engine fordetecting spam, to optimize it for the sort of email that youtypically receive Block specific addresses, hosts, and domains using third-partyblacklists like the one maintained by Spamcop.net. Whitelist known good sources of email, so that messages fromclients, coworkers, and friends aren't inadvertently lost. Configure SpamAssassin to work with newer spam-filteringmethods such as Hashcash (www.hashcash.org) and Sender PolicyFramework (SPF). Sys admins, network administrators, and ISPs pay for spam withhours of experimentation and tedious junk email management, frayeduser tempers, and their sanity. SpamAssassin, together with thisessential book, give you the tools you need to take back yourorganization's inboxes. "Detailed, accurate andinformative--recommended for spam-filtering beginners and expertsalike." --Justin Mason, SpamAssassin development team
    Anmerkung: "Covers SpamAssassin version 3.0"--Cover. - "The open source solution to SPAM"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 88
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 327 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.13/3
    Schlagwort(e): MySQL (Electronic resource) ; Object-oriented programming (Computer science) ; PHP (Computer program language) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: If you're using PHP 4, then chances are good that an upgrade to PHP 5 is in your future. The more you've heard about the exciting new features in PHP 5, the sooner that upgrade is probably going to be. Although an in-depth, soup-to-nuts reference guide to the language is good to have on hand, it's not the book an experienced PHP programmer needs to get started with the latest release. What you need is a lean and focused guide that answers your most pressing questions: what's new with the technology, what's different, and how do I make the best use of it? In other words, you need a copy of Upgrading to PHP 5 . This book is targeted toward PHP developers who are already familiar with PHP 4. Rather than serve as a definitive guide to the entire language, the book zeroes in on PHP 5's new features, and covers these features definitively. You'll find a concise appraisal of the differences between PHP 4 and PHP 5, a detailed look at what's new in this latest version, and you'll see how PHP 5 improves on PHP 4 code. See PHP 4 and PHP 5 code side-by-side, to learn how the new features make it easier to solve common PHP problems. Each new feature is shown in code, helping you understand why it's there, when to use it, and how it's better than PHP 4. Short, sample programs are included throughout the book. Topics covered in Upgrading to PHP 5 include: The new set of robust object-oriented programming features An improved MySQL extension, supporting MySQL 4.1, prepared statements, and bound parameters Completely rewritten support for XML: DOM, XSLT, SAX, and SimpleXML Easy web services with SOAP SQLite, an embedded database library bundled with PHP 5 Cleaner error handling with exceptions Other new language features, such as iterators, streams, and more. Upgrading to PHP 5 won't make you wade through information you've covered before. Written by Adam Trachtenberg, coauthor of the popular PHP Cookbook , this book will take you straight into the heart of all that's new in PHP 5. By the time you've finished, you'll know PHP 5 in practice as well as in theory.
    Anmerkung: "All that's new in PHP 5, covers MySQL 4.1"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 89
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 763 p. , ill. ; , 24 cm
    Ausgabe: 4th ed.
    DDC: 005.13/3
    Schlagwort(e): JavaBeans ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: The new 2.1 version of the Enterprise JavaBeans (EJB) spec extends its support for web services and the Java Web Services APIs, expands its asynchronous messaging support, adds XML Schema for deployment descriptors, and introduces a new Timer service, which allows for scheduling EJB jobs. The essential--and award winning--book on EJBs, Enterprise JavaBeans , has been completely revised and updated in this new fourth edition, to provide the real-world, nitty-gritty detail developers need to master EJB 2.1. Previous editions of this clear and engaging introduction to EJBs were voted the "Best Java Book" by the editors and readers of Java Developer's Journal , the "Best Java Book for Experts," by JavaPro editors, and one of the Top Computer Books by Amazon.com. The fourth edition lives up to--and surpasses--the excellent reputation earned by its predecessors. This authoritative and thorough guide includes everything that made previous editions the single must-have book for EJB developers: the authors solid grasp on the complexities of EJBs coupled with his succinct, easy-to-follow style; hundreds of clear, practical examples; adept coverage the key concepts EJBs ; and diagrams to illustrate the concepts presented. It also includes everything you need to get up to speed quickly on the changes wrought by EJB version 2.1, an architecture overview, information on resource management and primary services, design strategies, and XML deployment descriptors. In this edition, we're adding an EJB workbook for JBoss 4.0. The workbook shows how to deploy all of the examples on the JBoss 4.0 application server. It addresses an important problem with EJB: deploying the software on a server can be extremely difficult. JBoss is an open source project that has become the most widely used J2EE application server. Good technical authors may lay the facts before you, but great ones offer the distilled essence of their own experience and insight. Richard Monson-Haefel has provided just what Java developers need to know to harness the complexity of EJBs. What makes Monson-Haefel a master of technical authoring can be seen in his well-thought-out and logical progression of ideas, and in his examples practical, precise, usable examples, large enough to test key concepts but still small enough to be comprehensible taken apart and explained in the detail you need to deploy those principles in other situations. If you work with EJBs--or want to--this book will earn a favor...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 90
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: 371 s. ; , 24 cm
    DDC: 006.3'0247948
    Schlagwort(e): Artificial intelligence ; Artificial intelligence ; Computer games ; Design ; Computer games ; Programming ; Computer programming ; Electronic books ; local
    Kurzfassung: Advances in 3D visualization and physics-based simulation technology make it possible for game developers to create compelling, visually immersive gaming environments that were only dreamed of years ago. But today's game players have grown in sophistication along with the games they play. It's no longer enough to wow your players with dazzling graphics; the next step in creating even more immersive games is improved artificial intelligence, or AI.Fortunately, advanced AI game techniques are within the grasp of every game developer--not just those who dedicate their careers to AI. If you're new to game programming or if you're an experienced game programmer who needs to get up to speed quickly on AI techniques, you'll find AI for Game Developers to be the perfect starting point for understanding and applying AI techniques to your games.Written for the novice AI programmer, AI for Game Developers introduces you to techniques such as finite state machines, fuzzy logic, neural networks, and many others, in straightforward, easy-to-understand language, supported with code samples throughout the entire book (written in C/C++). From basic techniques such as chasing and evading, pattern movement, and flocking to genetic algorithms, the book presents a mix of deterministic (traditional) and non-deterministic (newer) AI techniques aimed squarely at beginners AI developers. Other topics covered in the book include: Potential function based movements: a technique that handles chasing, evading swarming, and collision avoidance simultaneously Basic pathfinding and waypoints, including an entire chapter devoted to the A* pathfinding algorithm AI scripting Rule-based AI: learn about variants other than fuzzy logic and finite state machines Basic probability Bayesian techniques Unlike other books on the subject, AI for Game Developers doesn't attempt to cover every aspect of game AI, but to provide you with usable, advanced techniques you can apply to your games right now. If you've wanted to use AI to extend the play-life of your games, make them more challenging, and most importantly, make them more fun, then this book is for you.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 91
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 374 p. , ill. ; , 24 cm
    Ausgabe: 3rd ed.
    DDC: 005.75/85
    Schlagwort(e): Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Kurzfassung: An enormous system comprising myriad technologies, options, and releases, Oracle's complexities have spawned numerous areas of specialization. For each area of specialization there are equally specialized how-to books and manuals. O'Reilly's Oracle Essentials claims a unique place among these books. Rather than focusing on one area, the book explains the foundational concepts of the Oracle technology and the core technical and business aspects of using it.The new edition of this classic book, Oracle Essentials, 3rd Edition: Oracle Database 10 g, distills a vast amount of knowledge into an easy-to-read volume covering every aspect of the Oracle database. Readers of all levels will learn about Oracle's features and technologies, including the product line, architecture, data structures, networking, concurrency, tuning, and much more.Featuring focused text, abundant illustrations, and helpful hints, the new edition offers a valuable overview of Oracle's Database 10 g --the industry's first database to support grid computing. Recent releases such as Oracle 9 i and 8 i are also covered. The book contains chapters on: Oracle products, options, and overall architecture for Oracle 10 g and prior recent releases Installing and running Oracle: how to configure, start up, and shut down the database, and various networking issues Oracle data structures, datatypes, and ways of extending datatypes, with an introduction to Oracle objects (e.g., tables, views, indexes) Managing Oracle: security, the Oracle Enterprise Manager, fragmentation and reorganization, and backup and recovery Oracle performance: characteristics of disk, memory, and CPU tuning Multi-user concurrency, online transaction processing (OLTP), and high availability Hardware architectures (e.g., SMP, MPP, NUMA) and their impact on Oracle Data warehousing and distributed databases Network deployment: using Oracle as an Internet computing platform and for grid computing What's new in Oracle 10 g : a summary of the database changes described in the book Oracle Essentials, 3rd Edition: Oracle Database 10 g was written for anyone whose job involves managing or building systems using Oracle DBMS technology or working with staff that uses Oracle technology. This book is the perfect all-in-one source for understanding the complexities and capabilities of Oracle.
    Anmerkung: "What you need to know about oracle database architecture and features"--Cover. - Includes bibliographical references (p. 347-355) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 92
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 810 p. , ill. ; , 24 cm. +
    Ausgabe: 2nd ed.
    DDC: 005.75/65
    Schlagwort(e): Microsoft Access ; Database management ; Electronic books ; local
    Kurzfassung: Not a reference book, and not a tutorial either, the new second edition of the highly regarded Access Cookbook is an uncommonly useful collection of solutions to problems that Access users and developers are likely to face as they attempt to build increasingly complex applications.Although using any single "recipe" in the book will more than pay back the cost of the book in terms of both hours saved and frustration thwarted, Access Cookbook , Second Edition is much more than a handy assortment of cut-and-paste code.Each of the "recipes" examine a particular problem--problems that commonly occur when you push the upper limits of Access, or ones that are likely to trip up a developer attempting to design a more elegant Access application--even some things you never knew Access could do. The authors then, in a clear, accessible, step-by-step style, present the problems' solution. Following each "recipe" are insights on how Access works, potential pitfalls, interesting programming techniques that are used in the solution, and how and why the solution works, so you can adapt the problem-solving techniques to other similar situations.Fully updated for Access 2003, Access Cookbook , Second Edition is also one of the first books to thoroughly explore new support for .NET managed code and XML. All of the practical, real-world examples have been tested for compatibility with Access 2003, Windows XP, and Windows Server 2003. This updated new edition also covers Access and SharePoint, Access and SmartTags, Access and .NET; and Access and XML.Access power users and programmers at all levels, from the relatively inexperienced to the most sophisticated, will rely on the Access Cookbook for quick solutions to gnarly problems. With a dog-eared copy of Access Cookbook at your side, you can spend your time and energy where it matters most: working on the interesting facets of your Access application, not just the time-consuming ones.
    Anmerkung: "Solutions to practical user interface and programming problems."--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 93
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvi, 357 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.75/85
    Schlagwort(e): Microsoft Windows server ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, consistent set of tools, and wizards that walk you through complex tasks allow you to install, configure and maintain Windows servers without any knowledge of programming or scripting languages or learning complicated command-line syntax. It's possible, in fact, to accomplish about 90% of all Windows administration without ever opening a command prompt or running a script! But what about the other ten percent of the time? While it's true that most common, day-to-day tasks of Windows administration can be performed from the GUI, it's not always the best way, especially with complex or repetitive tasks Scripts and command-line tools often provide a faster, more flexible approach. Windows Server Hacks reveals techniques that go well beyond basic management tasks found in most handbooks to help busy system administrators master the more powerful features of Windows Server. Windows Server Hacks focuses on scripts and other tools that will make your life as an administrator much easier. These tools, or hacks--quick and dirty solutions to problems, or clever ways of doing things--were created by other professionals who've also had to struggle to find solutions to administering Windows environments. You'll save valuable time using their scripts, tools, tips, and advice. Plus, you can easily learn to customize the scripts to create even more powerful tools for your own, specific needs. The book includes secrets of the masters in such areas as Active Directory, User Management, Group Policy, DNS and DHCP, File and Print, IIS, performance and security. The hundred, industrial strength hacks in the book range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, and backup and recovery. No matter which Windows server you use--NT, IIS, 2000, or 2003--this book will put the knowledge and expertise of veteran system administrators and hackers to work for you. Windows Server Hacks will make your life easier while expanding your understanding of the capabilities of Windows Server.
    Anmerkung: "100 industrial-strength tips & tools"--Cover. - "Covers Windows 2000 & 2003"--Spine. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 94
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 283 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.54
    Schlagwort(e): Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Electronic books ; local
    Kurzfassung: If you think that getting creative with Excel means the underhanded tweaking of numbers, think again. Excel Hacks shows even the most experienced users how to do things with Excel they might never have thought of doing--and lets them have a little fun while they're at it.Microsoft Excel is not just the dominant spreadsheet in the world; it's also one of the most popular applications ever created. Its success lies not only in its power and flexibility, but also in its streamlined, familiar interface that casually conceals its considerable capabilities. You don't need to know everything that Excel can do in order to use it effectively, but if you're like the millions of Excel power users looking to improve productivity, then Excel Hacks will show you a wide variety of Excel tasks you can put to use, most of which are off the beaten path.With this book, Excel power users can bring a hacker's creative approach to both common and uncommon Excel topics--"hackers" in this sense being those who like to tinker with technology to improve it. The "100 Industrial Strength Tips and Tools" in Excel Hacks include little known "backdoor" adjustments for everything from reducing workbook and worksheet frustration to hacking built-in features such as pivot tables, charts, formulas and functions, and even the macro language.This resourceful roll-up-your-sleeves guide is for intermediate to advanced Excel users eager to explore new ways to make Excel do things--from data analysis to worksheet management to import/export--that you never thought possible. Excel Hacks will help you increase productivity with Excel and give you hours of "hacking" enjoyment along the way.
    Anmerkung: "100 industrial-strength tips & tools"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 95
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 298 , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 96
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 324 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Focuses on the little-touched but critical parts of the Java programming language that the expert programmers use. Learn about extremely powerful and useful programming techniques such as reflection, advanced data modeling, advanced GUI design, and advanced aspects of JDO, EJB, and XML-based web clients. This unique book reveals the true wizardry behind the complex and often mysterious Java environment--O'Reilly web site.
    Anmerkung: "Secrets of the Java masters"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 97
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 589 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Schlagwort(e): JavaServer pages ; Web site development ; Web sites ; Design ; Electronic books ; local
    Kurzfassung: JavaServer Faces, or JSF, brings a component-based model to web application development that's similar to the model that's been used in standalone GUI applications for years. The technology builds on the experience gained from Java Servlets, JavaServer Pages, and numerous commercial and open source web application frameworks that simplify the development process.In JavaServer Faces , developers learn how to use this new framework to build real-world web applications. The book contains everything you'll need: how to construct the HTML on the front end; how to create the user interface components that connect the front end to your business objects; how to write a back-end that's JSF-friendly; and how to create the deployment descriptors that tie everything together. JavaServer Faces pays particular attention to simple tasks that are easily ignored, but crucial to any real application: working with tablular data, for example, or enabling and disabling buttons. And this book doesn't hide from the trickier issues, like creating custom components or creating renderers for different presentation layers. Whether you're experienced with JSF or a just starting out, you'll find everything you need to know about this technology in this book.Topics covered include: The JSF environment Creating and rendering components Validating input Handling user-generated events Controlling page navigation Working with tabular data Internationalization Integration between JSF and Struts Developing custom renderers and custom components JavaServer Faces is a complete guide to the crucial new JSF technology. If you develop web applications, JSF belongs in your toolkit, and this book belongs in your library.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 98
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 531 , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 99
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvi, 591 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.13/3
    Schlagwort(e): Python (Computer program language) ; Electronic books ; local
    Kurzfassung: Portable, powerful, and a breeze to use, Python is the popular open source object-oriented programming language used for both standalone programs and scripting applications. Python is considered easy to learn, but there's no quicker way to mastery of the language than learning from an expert teacher. This edition of Learning Python puts you in the hands of two expert teachers, Mark Lutz and David Ascher, whose friendly, well-structured prose has guided many a programmer to proficiency with the language. Learning Python , Second Edition, offers programmers a comprehensive learning tool for Python and object-oriented programming. Thoroughly updated for the numerous language and class presentation changes that have taken place since the release of the first edition in 1999, this guide introduces the basic elements of the latest release of Python 2.3 and covers new features, such as list comprehensions, nested scopes, and iterators/generators. Beyond language features, this edition of Learning Python also includes new context for less-experienced programmers, including fresh overviews of object-oriented programming and dynamic typing, new discussions of program launch and configuration options, new coverage of documentation sources, and more. There are also new use cases throughout to make the application of language features more concrete. The first part of Learning Python gives programmers all the information they'll need to understand and construct programs in the Python language, including types, operators, statements, classes, functions, modules and exceptions. The authors then present more advanced material, showing how Python performs common tasks by offering real applications and the libraries available for those applications. Each chapter ends with a series of exercises that will test your Python skills and measure your understanding. Learning Python , Second Edition is a self-paced book that allows readers to focus on the core Python language in depth. As you work through the book, you'll gain a deep and complete understanding of the Python language that will help you to understand the larger application-level examples that you'll encounter on your own. If you're interested in learning Python--and want to do so quickly and efficiently--then Learning Python , Second Edition is your best choice.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 100
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 723 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.2/762
    Schlagwort(e): JavaServer pages ; Java (Computer program language) ; Servlets ; Web site development ; Electronic books ; local
    Kurzfassung: With literally hundreds of examples and thousands of lines of code, the Java Servlet and JSP Cookbook yields tips and techniques that any Java web developer who uses JavaServer Pages or servlets will use every day, along with full-fledged solutions to significant web application development problems that developers can insert directly into their own applications. Java Servlet and JSP Cookbook presents real-world problems, and provides concise, practical solutions to each. Finding even one tested code "recipe" that solves a gnarly problem in this comprehensive collection of solutions and best practices will save hours of frustration--easily justifying the cost of this invaluable book.But "Java Servlet and JSP Cookbook" is more than just a wealth of cut-and-paste code. It also offers clear explanations of how and why the code works, warns of potential pitfalls, and directs you to sources of additional information, so you can learn to adapt the problem-solving techniques to similar situations.These recipes include vital topics like the use of Ant to setup a build environment, extensive coverage of the WAR file format and web.xml deployment descriptor, file-uploading, error-handling, cookies, logging, dealing with non-HTML content, multimedia, request filtering, web services, I18N, web services, and a host of other topics that frustrate even the most seasoned developers.For Java web developers of all levels who are eager to put into practice the theory presented in other API-focused books, the solutions presented in this practical book will prove invaluable over and over again. This is painless way for less experienced developers who prefer to learn by doing to expand their skills and productivity, while accomplishing practical solutions to the pressing problems they face every day. More experienced developers can use these recipes to solve time-consuming problems quickly, freeing up their time for the more creative aspects of their work.
    Anmerkung: Includes bibliographic references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...