Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Safari Tech Books Online  (119)
  • Safari, an O'Reilly Media Company
  • Application software ; Development  (68)
  • Computer networks ; Security measures  (51)
Datenlieferant
Materialart
Sprache
Erscheinungszeitraum
  • 1
    Online-Ressource
    Online-Ressource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 504 p. , ill. ; , 23 cm
    DDC: 005.5
    Schlagwort(e): Microsoft Office ; Application software ; Development ; Microsoft .NET ; Electronic books ; local
    Kurzfassung: This book delivers real-world strategies and coding techniques for creating Microsoft Office-based solutions that work seamlessly in the .NET environment-information that's been put to work by Microsoft's own product support and development teams.
    Anmerkung: At head of title: Microsoft. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 234 , ill. ; , 24 cm
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers. Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for ExciteHome.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture. How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
    Anmerkung: "Unmasking Identity Management Architecture (IMA)". - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. ; : O'Reilly Media | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 324 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.
    Anmerkung: "Writing, hacking, and modifying security tools"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Cisco | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 454 p. , ill. ; , 24 cm
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions. Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems. Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detectio...
    Anmerkung: Includes bibliographical references (p. [427]-430) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Anmerkung: Includes bibliographical references (p. [389]-395) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 320 p. , ill. ; , 24 cm +
    Ausgabe: 1st ed.
    DDC: 004.67/8
    Schlagwort(e): WebSphere ; Application software ; Development ; Web servers ; Computer programs ; Web site development ; Electronic books ; local
    Kurzfassung: Make the most of completely revamped administration tools in WebSphere Version 5 IBM WebSphere Version 5 offers a completely rewritten, radically improved infrastructure for administering servers and applications. Now, its creators have written the definitive WebSphere Version 5 administration reference and tutorial: everything you need to manage WebSphere to the highest levels of performance and efficiency. The authors systematically cover all four WebSphere administration toolsets: command-line utilities, the new Administrative Console, scripting tools, and Java management APIs. You'll find a complete library of code examples, plus powerful new insider's tips for maximizing your productivity as a WebSphere administrator. Whether you're managing WebSphere Version 5 or incorporating administrative support into new WebSphere applications, this book provides you with the techniques, examples, and tips you need to do it right. Fundamentals of WebSphere administration: servers, nodes, node agents, cells, clusters, and the deployment manager Revamped package structure of WebSphere Version 5 and its implications Process internals, distributed administration features, administrative security, and XML configuration file structure Command-line tools: a complete reference with practical examples Web-based graphical management with the new Administrative Console Scripting the management features of WebSphere Version 5 with wsadmin Writing custom management programs Extending the native WebSphere administrative system with new managed options Using Java administrative APIs to manage WebSphere applications from other products Sum Includes extensive code examples, real-world scenarios, and best practices
    Anmerkung: "Version 5.1 (Trial version)," from CD-ROM. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 381 p. , ill. ; , 23 cm
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computer security ; United States ; Management ; Data protection ; Data protection ; Management ; Electronic books ; local
    Kurzfassung: Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization's aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board. Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow fin...
    Anmerkung: "Understand the total cost of ownership and return on investment for network security solutions"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxii, 734 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 184 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Serie: A developer's notebook
    Schlagwort(e): Application software ; Development ; Spring (Computer program language) ; Electronic books ; local
    Kurzfassung: Since development first began on Spring in 2003, there's been a constant buzz about it in Java development publications and corporate IT departments. The reason is clear: Spring is a lightweight Java framework in a world of complex heavyweight architectures that take forever to implement. Spring is like a breath of fresh air to overworked developers.In Spring, you can make an object secure, remote, or transactional, with a couple of lines of configuration instead of embedded code. The resulting application is simple and clean. In Spring, you can work less and go home early, because you can strip away a whole lot of the redundant code that you tend to see in most J2EE applications. You won't be nearly as burdened with meaningless detail. In Spring, you can change your mind without the consequences bleeding through your entire application. You'll adapt much more quickly than you ever could before. Spring: A Developer's Notebook offers a quick dive into the new Spring framework, designed to let you get hands-on as quickly as you like. If you don't want to bother with a lot of theory, this book is definitely for you. You'll work through one example after another. Along the way, you'll discover the energy and promise of the Spring framework.This practical guide features ten code-intensive labs that'll rapidly get you up to speed. You'll learn how to do the following, and more: install the Spring Framework set up the development environment use Spring with other open source Java tools such as Tomcat, Struts, and Hibernate master AOP and transactions utilize ORM solutions As with all titles in the Developer's Notebook series, this no-nonsense book skips all the boring prose and cuts right to the chase. It's an approach that forces you to get your hands dirty by working through one instructional example after another-examples that speak to you instead of at you.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxiv, 798 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: "The book you are about to read will arm you with the knowledge you need to defend your network from attackers-both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." -Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security-one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." -Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." -Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." -Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes-resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools-including Sguil, Argus, and Ethereal-to mine network traffic for full content, session, statistical, and ale...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 11
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxi, 702 p. , ill. ; , 25 cm
    Ausgabe: 2nd ed.
    DDC: 005.1
    Schlagwort(e): Linux ; Application software ; Development ; Electronic books ; local
    Kurzfassung: "The first edition of this book has always been kept within arm's reach of my desk due to the wonderful explanations of all areas of the Linux userspace API. This second edition greatly overshadows the first one, and will replace it." --Greg Kroah-Hartman, Linux kernel programmer Develop Software that Leverages the Full Power of Today's Linux Linux Application Development, Second Edition, is the definitive reference for Linux programmers at all levels of experience, including C programmers moving from other operating systems. Building on their widely praised first edition, leading Linux programmers Michael Johnson and Erik Troan systematically present the key APIs and techniques you need to create robust, secure, efficient software or to port existing code to Linux. This book has been fully updated for the Linux 2.6 kernel, GNU C library version 2.3, the latest POSIX standards, and the Single Unix Specification, Issue 6. Its deep coverage of Linux-specific extensions and features helps you take advantage of the full power of contemporary Linux. Along the way, the authors share insights, tips, and tricks for developers working with any recent Linux distribution, and virtually any version of Unix. Topics include Developing in Linux: understanding the operating system, licensing, and documentation The development environment: compilers, linker and loader, and unique debugging tools System programming: process models, file handling, signal processing, directory operations, and job control Terminals, sockets, timers, virtual consoles, and the Linux console Development libraries: string matching, terminal handling, command-line parsing, authentication, and more Hundreds of downloadable code samples New to this edition The GNU C library (glibc), underlying standards, and test macros Writing secure Linux programs, system daemons, and utilities Significantly expanded coverage of memory debugging, including Valgrind and mpr Greatly improved coverage of regular expressions IPv6 networking coverage, including new system library interfaces for using IPv6 and IPv4 interchangeably Coverage of strace, ltrace, real-time signals, poll and epoll system calls, popt library improvements, Pluggable Authentication Modules (PAM), qdbm, and much more Improved index and glossary, plus line-numbered code examples
    Anmerkung: Includes bibliographical references (p. 679-682) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 645 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    Schlagwort(e): UNIX Shells ; Computer networks ; Security measures ; Data encryption (Computer science) ; Electronic books ; local
    Kurzfassung: Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide . This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
    Anmerkung: "Covers SSH-2 protocol"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 13
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 270 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysis But the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.
    Anmerkung: "Solutions and examples for Snort administrators"--Cover. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 14
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 377 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.2/762
    Schlagwort(e): Apache (Computer file : Apache Group) ; Application software ; Development ; Java (Computer program language) ; Open source software ; Electronic books ; local
    Kurzfassung: As a Java developer, you're always looking for tools to help in your web and application development. Maybe you've heard of the Jakarta Commons open source Java tools. The Jakarta Commons is an open source Jakarta subproject where developers create and maintain a collection of twenty-plus independent Java components and utilities that serve useful purposes. Jakarta Commons packages include utilities for web, XML, networking, building and testing applications, and some that help other packages work better together. Jakarta Commons packages are designed to be reusable. Each one is a time saver by itself, and when used in combination the results can be very powerful. But in searching for information on the Jakarta Commons tools, you find it hard to locate documentation relevant to your needs. You don't have lots of time to spend searching for information on a specific Jakarta Commons tool to determine what it does and how to incorporate it in your code. If you are looking for a single source for clear information and samples on how to use the Jakarta Commons tools, then the Jakarta Commons Cookbook is for you. The Jakarta Commons Cookbook summarizes each of the available Jakarta Commons packages and contains practical and efficient recipes for making the most out of the Jakarta Commons open source Java tools. You don't have to be an expert, since the book explains how and why to use a utility, pitfalls to avoid, and where to look for additional information on Jakarta Commons utilities. It introduces design possibilities and explores combining Jakarta Commons utilities in novel assemblies to create complex applications. The book offers detailed code samples and insider tips--making it a valuable resource whether you are an expert Java developer or a novice. If you want to quickly learn how to use Jakarta Commons timing-saving utilities or have an invaluable resource for Jakarta Commons questions and techniques, then the Jakarta Commons Cookbook is for you.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 15
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR ; | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxi, 395 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Schlagwort(e): Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Praise for Rapid J2EE Development "The author provides a good survey of the technologies and approaches for rapid development in the J2EE arena. He touches on all areas that should be of interest to a reader, from design through testing. He illustrates the different phases of rapid development by going into several technologies in depth, and he also lists or otherwise mentions other available technologies. I would recommend this book to anyone looking to get started with developing J2EE applications." -Beth Stearns, Consultant, ComputerEase Publishing "This book has a lot of great material in it. The author really shows his experience in the subject matter. The content is excellent. I haven't seen another book that is as comprehensive or contains as many real-world lessons learned." -Madhu Siddalingaiah, Consultant, SEA Corporation "I think the book does a good job of presenting a set of processes and technologies that enable rapid development. I think this is an extremely useful book, and I would recommend it to others." -Satadip Dutta, Software Engineer, HP "The author skillfully presents a collection of tools, technologies and processes that facilitate rapid development of J2EE applications. I see this book as a valuable addition to any company bookshelf, especially given its broad application across the software lifecycle. It's also quite amazing that a Google search does not reveal any existing publications with this title. This book should neatly fill that hole." -Martin Westacott, Director and Senior Consultant, Solstice Software Limited, U.K. "If you ever needed to put some polish to your J2EE development understanding or would like to move into the role of Senior J2EE Developer, then this is the book for you. The author covers everything you need to take you from design to coding to build process. Along the way he introduces some new valuable 'leading-edge' technologies. All this will leave you with good capabilities to tackle most J2EE projects confidently." -Shane Griggs, J2EE Architect Learn to accelerate J2EE development, from design through testing and beyond. Covers agile development, model-driven architecture, code generation, aspect-oriented programming, test-driven development, and much more. An essential resource for every J2EE developer, project leader, and manager. J2EE is today's premier platform for enterprise-level development, but it's difficult to deliver J2EE solutions as quickly as today's businesses need them. This...
    Anmerkung: Includes bibliographical references (p. 375-377) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 16
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 372 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer crimes ; Prevention ; Computer networks ; Security measures ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the following topics How denial-of-service attacks are waged How to improve your network's resilience to denial-of-service attacks What to do when you are involved in a denial-of-service attack The laws that apply to these attacks and their implications How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplices The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.
    Anmerkung: Includes bibliographical references (p. 335-350) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 17
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 338 p. , ill. ; , 24 cm
    DDC: 005.2762
    Schlagwort(e): Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Easy-to-follow coverage of twelve indispensable Jakarta Commons packages Code examples that show innovative uses of Commons components, including using HttpClient to access Web resources, FileUpload for handling HTTP file uploads, and BeanUtils for easy form generation Detailed instructions for combining the Commons project libraries with the popular Eclipse IDE Save time and money with reusable open source Java™ components Master the Jakarta Commons Library of Open Source JavaTM Components Using the Apache Jakarta Commons reusable Java™ components, you can leverage the work of the global open-source community to solve common programming problems reliably, quickly, and inexpensively. But, to use the Commons libraries effectively, you need far more guidance than the official documentation offers. In Apache Jakarta Commons: Reusable Java™ Components, Will Iverson covers what Java developers need to know to take full advantage of Jakarta Commons-starting right now. Iverson begins with a definitive overview of the Commons project: goals, installation, and getting started with Commons components. Next, he presents example-rich chapters on the twelve most useful Commons packages, covering topics ranging from HTTP FileUpload to database connectivity. Iverson provides detailed code samples for every component he describes. After you've mastered the core Jakarta Commons packages, you'll constantly rely on this book's handy seventy-five page quick-reference. Iverson's coverage includes Downloading Commons project libraries and installing them into Eclipse Programmatically accessing resources via HTTP, FTP, NNTP, and other Internet protocols Using the Jakarta Commons suite of configurable object pools Managing database connectivity in Swing applications-and anywhere containers aren't doing it for you Using BeanUtils to generate forms and gain runtime access to information provided by JavaBeans-style objects Traversing complex object graphs with JXPath Using Jakarta Commons' advanced collections tools to establish richer object relationships Extending java.lang with better methods for manipulating core classes Implementing conversion routines, configurable logging, command-line help, and more Exploring the newest packages, including emerging "sandbox" packages Whether you're building code for front-end Web applications, client-side software, or back-end servers, learning Jakarta Commons will make you far more efficient. Apache Jakarta Commons is the faste...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 18
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 695 p. , ill. ; , 24 cm
    Serie: IBM Press series--information management
    Schlagwort(e): WebSphere ; Application software ; Development ; Java (Computer program language) ; Web servers ; Computer programs ; Web site development ; Electronic books ; local
    Kurzfassung: The expert guide to deploying and managing any WebSphere Application Server V5.x application and environment If you're a WebSphere Application Server administrator or developer, this is your advanced guide for delivering applications rapidly, running them smoothly, and administering them efficiently. Four leading IBM consultants draw on their years of experience to illuminate the key steps involved in taking WebSphere Application Server applications from development to production. They focus on the areas most crucial to success, including application assembly and build, application and infrastructure configuration and administration, and application testing and verification. Along the way, they show how to implement automated deployment processes that can be executed frequently, reliably, and quickly-so you can get your applications to market fast. The focus is on WebSphere Application Server Version 5.1, but much of the information applies to other versions. Coverage includes Installing, testing, and managing WebSphere Application Server environments: clustering, security, messaging, integration, and more Deploying and managing key J2EE technologies: JDBC, Connectors, EJB, container managed and message driven beans, transactions, JMS, JavaMail, and more Deploying highly available, scalable multi-node WebSphere Application Server environments: clustering, distributed session management, and edge components Advanced considerations: working with Java Management Extensions, caching, and much more Performance-tuning tools Troubleshooting Leveraging key WebSphere deployment and administration tools: ANT, wsadmin, Admin Console, and the Application Server Toolkit Advanced discussions of J2EE and architectural concepts you need to deploy successfully-with practical examples © Copyright Pearson Education. All rights reserved.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 19
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 434 p. , ill. ; , 24 cm
    Serie: Robert C. Martin series
    DDC: 005.1
    Schlagwort(e): Application software ; Development ; Electronic books ; local
    Kurzfassung: Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your development efforts. In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases. This book draws on material Michael created for his renowned Object Mentor seminars: techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include Understanding the mechanics of software change: adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platformwith examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structure This book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes. © Copyright Pearson Education. All rights reserved.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 20
    Online-Ressource
    Online-Ressource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxix, 553 p. , ill. ; , 23 cm. +
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques-straight from members of the Microsoft Security Team.
    Anmerkung: Includes bibliographical references (p. 515-526) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 21
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 298 , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 22
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 531 , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 23
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR ; | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 330 p. , ill. ; , 24cm
    DDC: 005.13/3
    Schlagwort(e): WebSphere ; Application software ; Development ; Electronic mail systems ; Java (Computer program language) ; Telecommunication ; Message processing ; Electronic books ; local
    Kurzfassung: The real-world guide to JMS messaging with IBM WebSphere technologies This book offers start-to-finish guidance for building reliable, high-performance JMS-based messaging infrastructure with IBM WebSphere technologies. IBM expert Kareem Yusuf systematically introduces the latest versions of JMS-both 1.1 and 1.02b. Once you've thoroughly mastered JMS development on any platform, Yusuf turns to the exceptional JMS support found in IBM's WebSphere products. Using extensive code examples, he walks you step-by-step through WebSphere JMS development, configuration, deployment, and administration in several real-world scenarios. Coverage includes: Roles and goals of messaging infrastructure in the enterprise Key JMS concepts: messaging domains, messages, and Application Server Facilities Defining/structuring content, choosing message types, and manipulating messages The JMS API, explained through detailed code examples Using JMS with EJB, message-driven beans, servlets, and portlets Working with IBM WebSphere JMS providers, administered objects, and tools Hands-on tutorials: EJB message exchange, integration with non-JMS applications, and SSL security Resource location and physical topologies for maximizing availability and efficiency Whether you're developing enterprise messaging infrastructure, architecting it, or managing it, this book delivers indispensable guidance-straight from the frontlines. On the Web Download an extensive library of code samples for JMS 1.1 and 1.02b, including complete functional prototypes built for JMS 1.02b.
    Anmerkung: Includes bibliographical references (p. 315-318) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 24
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 745 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 25
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Anmerkung: Includes bibliographical references (p. 321-326) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 26
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxvii, 828 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. The Cisco Intrusion Detection Sensors and Management options work as a united system to provide detection, notification, and aggressive lockdown to malicious network breaches. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS), Second Edition , offers in-depth configuration and deployment information for the reliable and intensive intrusion detection solutions from Cisco Systems. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over the use of both the host-based and network-based IDS options (as well as the Cisco Threat Response functionality) by presenting a consolidated all-inclusive reference on all of the current Cisco IDS sensor platforms and management platforms. Chapter overviews bring you quickly up to speed and help you get to work right away. Configuration examples are designed to show you how to make the most of your IDS system, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with the CIDS sensor and management platforms or a study guide for the 642-531 exam, CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, supports your effective use of the Cisco IDS. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, an...
    Anmerkung: Includes index. - Rev. ed. of: Cisco secure intrusion detection system. c2002
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 27
    Sprache: Englisch
    Seiten: xiv, 378 p. , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Web services ; Web sites ; Security measures ; Electronic books ; local
    Kurzfassung: Comprehensive coverage is given in this up-to-date and practical guide to Web services security--the first to cover the final release of new standards SAML 1.1 and WS-Security. Rosenberg and Remy are security experts who co-founded GeoTrust, the #2 Web site certificate authority.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 28
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 269 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Anmerkung: "Intrusion detection with open source tools"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 29
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly Media, Inc. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 262 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.75/85
    Schlagwort(e): Oracle (Computer file) ; Application software ; Development ; Client/server computing ; Computer software ; Development ; Database management ; Computer programs ; Relational databases ; Web servers ; Electronic books ; local
    Kurzfassung: The new Oracle Application Server offers a wide range of functionality, including Java runtime and development tools, portal development tools, business intelligence, single sign-on identify management, and much more. It's so powerful and complex, in fact, that many people who use the product (or are considering using it) are familiar with only a portion of the entire range of its capabilities. The choices can be overwhelming. Few people grasp how the larger issues--such as the interplay between components or the various architectural choices in the product--play out in the Oracle Application Server. This new guide provides the perfect introduction to the Oracle Application Server for users of any level. Regardless of which of the server's capabilities you use, you'll benefit from this tightly focused, all-in-one technical overview. It's written for anyone who is concerned with using and managing web servers, doing Java development and deployment, using Oracle's own tools--like Forms and Reports, using or developing for Oracle Portal, or those who use and administer business intelligence, mobile or integration software. Divided into three concise sections, the book covers server basics, core components, and server functionality. The book leads with the history of Oracle Application Server, its architecture, management, standards, and third-party support for languages and tools such as Java, Perl, and HTTP. The next section covers Oracle's web server, containers for Java web caching, and the server's security features. And finally, the book discusses HTML development, Java development, and Oracle development. Although the book refers mainly to Oracle Application Server 10g, the authors also describe features in earlier product releases where necessary, particularly Oracle9i Application Server. More comprehensible than a large reference and more detailed than a primer, the book provides a foundation for understanding and using Oracle Application Server effectively and efficiently. Readers concentrate on the most important issues and components of the server, focusing primarily on principles rather than syntax. Designed to be the ideal first OracleAS book, Oracle Application Server 10g Essentials offers Oracle application developers and administrators everything they need to know about this powerful server.
    Anmerkung: "Architecture and components"--Cover. - Includes bibliographical references (p. 233-240) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 30
    Online-Ressource
    Online-Ressource
    [United States?] : IBM, International Technical Support Organization | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 150 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    DDC: 005.3
    Schlagwort(e): Application software ; Development ; IBM computers ; Programming ; Electronic books ; local
    Kurzfassung: To solve any mystery, detectives rely on their experience along with proven tools and techniques to unravel the conundrum. This IBM Redbook addresses the often illusive mystery known as software deployment success. The information, practices, and methods presented in this book have enabled many IBM customers to achieve their business and IT goals more quickly and efficiently. IBM has accumulated a wealth of knowledge and experience in software deployment. The technologies we have developed, the best practices we have authored, and the employees we have cultivated are our greatest assets. Like a detective explaining how the mystery was solved, we use this redbook to pass on to you -- our customers -- the experience, knowledge, and wisdom we have accumulated after years of solving software deployment mysteries. The primary audience for this redbook is the person who has ultimate ownership for software deployment performance. We refer to this person as the Enterprise Business Sponsor (EBS). Secondary audiences include anyone who is engaged in software deployment activities. Both audiences benefit from the practices and procedures described.
    Anmerkung: "February 2004.". - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 31
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 006.7/6
    Schlagwort(e): Application software ; Development ; Internet programming ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Praise for XForms: XML Powered Web Forms "XForms is an exciting new technology for designing Web forms in an elegant and accessible way. Raman's book provides strong motivations for flexibility in the design of human-machine interactions, and explains how to use XForms to this end in crystal-clear prose." - Eve Maler XML Standards Architect, Sun Microsystems "Interactive forms technology is the logical evolution of Web user interface design. XForms represents a significant leap forward in that evolution." - Sean McGrath CTO, Propylon "The greatest strength of this book is the skill with which T. V. Raman links the XForms technology with the larger context of the Web. The limitations of HTML forms, the ways in which XForms provides a better foundation for Web and Web service user interfaces, and the opportunities for an XForms-powered Web that is accessible to all users and devices are outlined and brought together in a compelling way." - Michael Champion Advisory Research and Development Specialist, Software AG "Raman's book gives the reader an excellent explanation of the emerging W3C XForms recommendation. It's a well-organized and well-written book that begins with a gentle introduction to the concepts that motivated the development of XForms and then provides a reasonable overview of the relevant XML technology related to XForms. Most of the book covers XForms components: user interface controls, model properties, functions, actions, and events. It concludes with XForms as a Web service, offering multi-modal access and accessibility. In light of the October 2003 deadline for U.S. federal agencies to comply with the mandate of the Government Paperwork Elimination Act (GPEA) to give citizens the opportunity to provide information online, this important technical work comes none too soon. As T. V. masterfully elucidates, XForms provides the 'last mile' in 'connecting users to their data.' Insightfully, he also observes 'the document is the human interface' to data-an understanding without which the challenge to make eGov services 'citizen-centered' simply cannot and will not be met." - Owen Ambur Cofounder and Cochair, XML Working Group, U.S. CIO Council "I found the author's straightforward style quite comfortable and informative. I heartily recommend this book, especially for government XML developers interested in the broader area of E-Forms. Understanding XForms is key to developing robust and flexible E-Forms solutions that separate cont...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 32
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 488 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Schlagwort(e): Application software ; Development ; Business enterprise ; Data processing ; Web services ; Electronic books ; local
    Kurzfassung: "Linthicum provides an insightful overview of the services-integration issues that will enable you to capitalize on current and future integration technologies. He also dives deep into the key Web services technologies for implementing the next generation integration architecture. Highly recommended for those thinking of moving from traditional EAI to Web services." --Dr. Ravi Kalakota, CEO, E-Business Strategies Author of Services Blueprint: Roadmap for Execution For a majority of businesses, application integration is an outright failure. Most companies' computer systems are labyrinthine at best and self-destructive at worst. With the arrival of Web services, the new service-oriented middleware technology standard, and increasingly complex and challenging problem domains, it's time to take application integration to the next level. In Next Generation Application Integration distributed computing and application-integration expert David S. Linthicum describes the effect that this new generation of middleware will have on traditional application-integration efforts. Using key industry examples and case studies, Linthicum reveals the techniques and practices that are necessary to revolutionize data-sharing for any company--from sole-proprietorship to Fortune 500. In this book you'll find a thorough discussion of today's most advanced application-integration concepts, approaches, technologies, and solutions. Written with the technical manager and enterprise architect in mind, this book addresses essential application integration issues such as: Strategies for dealing with complex problem domains Forward-looking approaches to ensure long-term solutions that are right for your company Techniques for implementation of new Web services middleware Introductions to the appropriate technologies for next generation application integration Scenarios for Web services integration Support concepts outlined by case studies and real-world examples Descriptions and analyses of the different types of Web service integration--standards, implementation, and enabling technology Full analysis of Web services and integration, including the relationship between EAI and Web services How to leverage both vertical and horizontal application-integration standards If you're responsible for managing or implementing application-integration middleware, Next Generation Application Integration will prove to be an indispensable resource. 0201844567B07142003
    Anmerkung: Includes bibliographical references (p. 463-470) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 33
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 252 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Biometric identification ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application. In Biometrics for Network Security , biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes: An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
    Anmerkung: Includes bibliographical references (p. 239-241) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 34
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxix, 739 p. , ill. ; , 24 cm
    Serie: Networking technology series
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at security design with three included case studies Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way. Beginning where other security books leave off, Network Security Architectures shows you how the various technologies that make up a security system can be used together to improve your network's security. The technologies and best practices you'll find within are not restricted to a single vendor but broadly apply to virtually any network system. This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy. You'll review detailed desig...
    Anmerkung: Includes "Glossary of terms" (p. [673]-677). - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 35
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 479 p. , ill. ; , 24 cm. +
    Ausgabe: 3rd ed.
    DDC: 005.3
    Schlagwort(e): Application software ; Development ; UML (Computer science) ; Electronic books ; local
    Kurzfassung: Learn UML, the Unified Modeling Language, to create diagrams describing the various aspects and uses of your application before you start coding, to ensure that you have everything covered. Millions of programmers in all languages have found UML to be an invaluable asset to their craft. More than 50,000 previous readers have learned UML with Sams Teach Yourself UML in 24 Hours . Expert author Joe Schmuller takes you through 24 step-by-step lessons designed to ensure your understanding of UML diagrams and syntax. This updated edition includes the new features of UML 2.0 designed to make UML an even better modeling tool for modern object-oriented and component-based programming. The CD-ROM includes an electronic version of the book, and Poseidon for UML, Community Edition 2.2, a popular UML modeling tool you can use with the lessons in this book to create UML diagrams immediately.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 36
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 450 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.3
    Schlagwort(e): Apache (Computer file : Apache Group) ; JavaServer pages ; Application software ; Development ; Internet programming ; Struts framework ; Web site development ; Electronic books ; local
    Kurzfassung: While the look and feel of an enterprise web application is certainly important, developers usually find themselves spending far too much time on the front-end presentation before they can get to coding the good stuff--the business logic at the heart of the program. Jakarta Struts addresses this issue by combining Java Servlets, Java ServerPages (JSP), custom tags, and messaging resources (like Java Message Service) into a unified, re-usable framework. The result is a cooperative, synergistic platform that's efficient and suitable for independent developers, large development teams, and everyone in between. The Struts Framework has become a highly popular open source project, but there's still woefully little documentation on the technology. What does exist is far too basic and lacks critical information for developers like you writing today's complex web applications. The revised and expanded Programming Jakarta Struts , 2nd Edition covers everything the successful earlier edition did--including an overview of the concepts involved in writing web applications; installation and configuration instructions for getting Struts up and running; a thorough discussion of how Struts implements the Model-View-Controller (MVC) design paradigm (known as the Model 2 approach) and how to interface with that pattern in your own applications; Logging, Validation, and Exception Handling with Struts; using Tiles; writing internationalization and localization code using Struts; and practical, real-world best practices for web applications--as well as plenty more: now fully up to date with Struts 1.1, this edition covers the latest material on tag libraries and the new JavaServerFaces (JSF) APIs and even includes all-new chapters on JSF, JSTL/EL, and security. With each enterprise system he s developed, author Chuck Cavaness has spent many grueling hours learning invaluable lessons about Struts and figuring out the dos and the don'ts of building web applications. He saves you time and headaches by sharing that invaluable real-world experience here, with his realistic, practical, here's how to do it approach to using the Struts Framework to its fullest potential.
    Anmerkung: "Building Web applications with servlets and JSPs"--cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 37
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 828 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 006.7
    Schlagwort(e): BEA WebLogic server ; Application software ; Development ; Client/server computing ; Java (Computer program language) ; Web servers ; Electronic books ; local
    Kurzfassung: BEA's WebLogic Server implements the full range of J2EE technologies, and includes many additional features such as advanced management, clustering, and web services. Widely adopted, it forms the core of the WebLogic platform, providing a stable framework for building scalable, highly available, and secure applications. In fact, in the long list of WebLogic's strengths and features, only one shortcoming stands out: the documentation that comes with the WebLogic server often leaves users clamoring for more information. WebLogic: The Definitive Guide presents a 360-degree view of the world of WebLogic. Providing in-depth coverage of the WebLogic server, the book takes the concept of "definitive" to a whole new level. Exhaustive treatment of the WebLogic server and management console answers any question that developers or administrators might think to ask. Developers will find a useful guide through the world of WebLogic to help them apply their J2EE expertise to build and manage applications. Administrators will discover all they need to manage a WebLogic-based setup. And system architects will appreciate the detailed analysis of the different system architectures supported by WebLogic, the overall organization of a WebLogic domain and supporting network infrastructure, and more. WebLogic: The Definitive Guide is divided into three sections that explore WebLogic and J2EE, Managing the WebLogic Environment, and WebLogic Enterprise APIs. Some of the topics covered in this comprehensive volume include: Building web applications on the WebLogic Server Building and optimizing RMI applications Using EJBs with WebLogic, including CMP entity beans Packaging and deploying applications Understanding WebLogic's support for clustering Performance tuning and related configuration settings Configuring WebLogic's SSL support Maximizing WebLogic's security features Building web services with XML Using WebLogic's JMX services and MBeans Anyone who has struggled with mastering the WebLogic server will appreciate the thorough, clearly written explanations and examples in this book. WebLogic: The Definitive Guide is the definitive documentation for this popular J2EE application server.
    Anmerkung: "Covers versions 7 & 8.1"--Cover. - "Development, deployment & maintenance"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 38
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 1228 p. , ill. ; , 23 cm
    DDC: 005.2/768
    Schlagwort(e): Microsoft Visual studio ; Microsoft Windows (Computer file) ; Application software ; Development ; C# (Computer program language) ; Microsoft .NET Framework ; User interfaces (Computer systems) ; Electronic books ; local
    Kurzfassung: For those of you who develop standalone Windows applications for PCs and other devices, Microsoft's .NET Windows Forms provide a much better way to get it done. This new technology gives you more power and flexibility for a fraction of the effort compared to classic Win32 development, with a streamlined programming model that deals automatically with many tedious details that once plagued developers. As with most things .NET, the only hitch is the learning curve. But that's where acclaimed author Jesse Liberty makes the difference with Programming .NET Windows Applications . With this tutorial, you will explore all aspects of using .NET Windows Forms class libraries and the associated programming tools in Visual Studio .NET, enabling you to build applications for the Windows 9x, Windows 2000 and Windows XP desktop platforms. Step-by-step, you'll learn ways to design applications that either function alone on a PC, or work in combination with your web-based application server to take advantage of the richer interface and higher level of security. The book also explains how your new Windows applications can sidestep problems that used to arise from the use of DLLs (known collectively as "DLL hell"), and how .NET Windows Forms can be used as an alternative to ASP.NET and browser-based approaches for building web application clients. Jesse Liberty definitely knows his stuff when it comes to the .NET platform. As the author of O'Reilly's Programming C# and Learning Visual Basic .NET , he's well-known for his clear and concise style that prompted one reviewer to say, "It's as if he knows exactly what questions I'm going to ask ahead of time." Jesse also co-authored Programming ASP.NET with contract programmer Dan Hurwitz, and now the two have teamed up again to bring you this comprehensive tutorial--without a doubt, the best source available for learning how to program with .NET Windows Forms.
    Anmerkung: "Covers .NET 1.1 & Visual studio .NET 2003" -- Cover. - "Rich client applications with C# or FB.NET" -- Cover. - Includes index. - Originally published 2003
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 39
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvii, 784 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Schlagwort(e): PowerBuilder ; Application software ; Development ; Internet ; Computer programs ; Electronic books ; local
    Kurzfassung: Version 9 of PowerBuilder introduces many features designed specifically to blend the traditional strength of PowerBuilder as a rapid Client/Server application development tool with the new and emerging models for distributed application development. PowerBuilder developers need PowerBuilder-specific information on interacting with Java application servers, such as WebSphere, WebLogic, and Sybase's Enterprise Application Server (EAServer) and Web Service development. This book presents the new capabilities of PowerBuilder 9 along with the architecture and patterns required to create distributed systems in PowerBuilder.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 40
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 647 p. , ill. ; , 23 cm
    Serie: Prentice Hall series in computer networking and distributed systems
    DDC: 005.8
    Schlagwort(e): Computer crimes ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to come "This is a truly outstanding book-enormous technical wealth and beautifully written." -Warwick Ford "Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!" -Harlan Carvey, CISSP "This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." -Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it! This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes: Solutions and examples that cover both UNIX® and Windows® Practical, time-tested, real-world actions you can take to secure your systems Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly! Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home compu...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 41
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 418 p. , ill. ; , 23 cm. +
    DDC: 005.13/3
    Schlagwort(e): Application software ; Development ; Internet programming ; Java (Computer program language) ; Web servers ; Web site development ; Java (Langage de programmation) ; Logiciels d'application ; Développement ; Programmation sur Internet ; Serveurs Web ; Sites Web ; Développement ; Electronic books ; local
    Kurzfassung: Written by Sun Microsystems' Java™ BluePrints team, Designing Web Services with the J2EE™ 1.4 Platform is the authoritative guide to the best practices for designing and integrating enterprise-level Web services using the Java 2 Platform, Enterprise Edition (J2EE) 1.4. This book provides the guidelines, patterns, and real-world examples architects and developers need in order to shorten the learning curve and start building robust, scalable, and portable solutions. The authors use the Java Adventure Builder application to bring the design process to life and help illustrate the use of Java APIs for XML Processing (JAXP), Java APIs for XML-Based RPC (JAX-RPC), and other Web service and Java-XML technologies. Key topic coverage includes: Web service requirements and design issues Support for Web services provided by the J2EE 1.4 platform Designing and implementing Web service end points Writing efficient Web service client applications Designing and developing XML-based applications Integrating applications and data using Web services The J2EE platform security model as it applies to Web services A coherent programming model for designing and developing Web service endpoints and clients Designing Web Services with the J2EE™ 1.4 Platform provides the insight, advice, and detail that make it easier to create effective Web service applications using the J2EE 1.4 platform.
    Anmerkung: Includes bibliographical references (p. xx-xxii) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 42
    Online-Ressource
    Online-Ressource
    Boston : Prentice Hall Professional Technical Reference, c2005 : [Verlag nicht ermittelbar] | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxi, 567 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): Linux ; Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Linux is the fastest-growing Java development platform because it saves money and time by serving as a platform for both development and deployment. But developers face significant platform-specific challenges when managing and deploying Java applications in a controlled production environment. Written for Java and Linux developers alike, Java™ Application Development on Linux® is the hands-on guide to the full Java application development lifecycle on Linux. Determined to spare other developers hours of trial and error, Albing and Schwarz demonstrate the platform, tools, and application development by showing realistic, easy-to-follow examples. After a simple command-line application introduces basic tools, this program leads readers through business-logic object analysis, database design, Java servlet UIs, Java Server Pages (JSP) UIs, Swing GUIs, and Standard Widget Toolkit (SWT) GUIs. Scaling up to the enterprise level provides the opportunity to use both the JBoss Application Server and the Apache Geronimo Application Servers, and Enterprise JavaBeans (EJB). Readers learn how to Use development tools available on Linux, such as the GNU Compiler for Java (gcj), Ant, the NetBeans IDE, IBM's Eclipse Java IDE, JUnit, and SunONE Studio Develop business logic layers using Java DataBase Connectivity (JDBC) Add a Web interface using servlets and JSPs Add a GUI using Sun's Abstract Window Toolkit (AWT) and IBM's SWT Deploy EJBs in Linux The authors conclude by demonstrating how a hierarchy of budgets can be created, tracked, and shared with Concurrent Versions System (CVS). A companion Website includes all source code and a link to each tool described. Java™ Application Development on Linux® can propel you from a standing start to the full-speed development and deployment of Java applications on Linux.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 43
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall/PTR ; | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 578 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Schlagwort(e): Application software ; Development ; Business enterprise ; Data processing ; Java (Computer program language) ; Web services ; Electronic books ; local
    Kurzfassung: Build robust, scalable, end-to-end business solutions with J2EE™ Web Services. This is the definitive practitioner's guide to building enterprise-class J2EE Web Services that integrate with any B2B application and interoperate with any legacy system. Sun senior architect Ray Lai introduces 25 vendor-independent architectural patterns and best practices for designing Web Services that deliver outstanding performance, scalability, and reliability. Lai takes you to the frontiers of emerging Web Services technologies, showing how to make the most of today's leading-edge tools, from Java Web Services Developer Pack to Apache Axis. Coverage includes: Web Services: making the business case, and overcoming the technical and business challenges Real-life examples and scenarios, and a start-to-finish application case study Expert guidance on reducing risk and avoiding implementation pitfalls Building complete business solutions with rich messaging and workflow collaboration Mainframe interoperability and B2B integration within and beyond the enterprise Framework and methodology to develop your Web Services patterns and best practices Up-to-the-minute coverage of Web Services security New applications: service consolidation, wireless, and more An extensive library of links to Web resources, reference material, and vendors Whether you're an architect, designer, project leader, or developer, these are the best practices, patterns, and techniques you need to succeed with Web services in your enterprise environment. Enterprises seeking to leverage Web Services to revolutionize the ways they deliver services to customers, partners, and employees will find the answers they need in this book. "Ray Lai's J2EETM Platform Web Services is a comprehensive look at J2EE platform architecture and should be a must read for any serious Web Services developer." -Larry Tabb, Senior Strategic Advisor, Tower Group "This is a book for true practitioners. It's for those interested in designing and implementing Web Services now-and preparing for new opportunities on the horizon." -Jonathan Schwartz, Executive Vice President, Sun Microsystems
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 44
    Online-Ressource
    Online-Ressource
    [United States?] : IBM | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 378 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Serie: Redbooks
    DDC: 004.3/6
    Schlagwort(e): Globus (Electronic resource) ; Application software ; Development ; Computational grids (Computer systems) ; IBM software ; Electronic books ; local
    Kurzfassung: This IBM Redbook, a follow-on to Introduction to Grid Computing with Globus, SG24-6895, discusses the issues and considerations for enabling an application to run in a grid environment. Programming examples are provided based on the Globus Toolkit V2.2. The first part of this publication addresses various considerations related to grid-enabling an application, from the perspective of the infrastructure, the application, and the data requirements. The second part of this publication provides many programming examples in C/C++ and Java to help solidify the concepts of grid computing and the types of programming tasks that must be handled when developing an application intended to run in a grid environment.
    Anmerkung: "June 2003.". - "SG24-6936-00.". - Includes bibliographical references (p. 365-372) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 45
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 322 p. , ill. ; , 25 cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Business enterprises ; Computer networks ; Security measures ; Computer networks ; Security measures ; Public key infrastructure (Computer security) ; Electronic books ; local
    Kurzfassung: PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition , provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery.
    Anmerkung: Revised ed. of: Understanding public-key infrastructure. 1999. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 46
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 253 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Access control ; Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need.Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting.In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations.If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
    Anmerkung: "Covers Unix and Windows"--Cover. - "Cross-platform authentication & single-sign-on"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 47
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 215 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.7/2
    Schlagwort(e): Application software ; Development ; HTML (Document markup language) ; Internet programming ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: The use of forms on the web is so commonplace that most user interactions involve some type of form. XForms--a combination of XML and forms--offers a powerful alternative to HTML-based forms. By providing excellent XML integration, including XML Schema, XForms allows developers to create flexible, web-based user-input forms for a wide variety of platforms, including desktop computers, handhelds, information appliances, and more. XForms Essentials is an introduction and practical guide to the new XForms specification. Written by Micah Dubinko, a member of the W3C XForms working group and an editor of the specification, the book explains the how and why of XForms, showing readers how to take advantage of them without having to write their own code. You'll learn how to integrate XForms with both HTML and XML vocabularies, and how XForms can simplify the connection between client-based user input and server-based processing. XForms Essentials begins with a general introduction to web forms, including information on history and basic construction of forms. The second part of the book serves as a reference manual to the XForms specification. The third section offers additional hints, guidelines, and techniques for working with XForms. Topics covered in the book include: creating XForms files in a text or XML editor converting existing forms (electronic or paper) to XForms collecting XML data from users in a user-friendly way reducing the amount of JavaScript needed within browser interfaces increasing the security and reliability of your current forms system by combining client-side and server-side checks into a common code base creating interactive websites using the latest standard technology XForms Essentials focuses on the practical application of XForms technology. If you work with forms, HTML, or XML information, XForms Essentials will provide you with a much simpler route to more sophisticated interactions with users.
    Anmerkung: "Gathering and managing XML information"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 48
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 468 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.7/2
    Schlagwort(e): Application software ; Development ; UML (Computer science) ; Web site development ; Electronic books ; local
    Kurzfassung: This is a new edition of the widely acclaimed Building Web Applications with UML . Based on the author's extensive experience as a Web developer, it incorporates helpful reader feedback, identifies and addresses modeling problems unique to page-based Web applications, and offers practical advice and straightforward solutions. This thoroughly revised Second Edition reflects the latest techniques and issues surrounding the development of software and systems for the Web. You will find: Updated, expanded examples and diagrams Enhanced coverage of the latest Web application security concerns Detailed coverage of proven object technology concepts as applied to the development of Web applications Robust, scalable, and feature-rich Web applications are attainable. Using the industry-standard Unified Modeling Language (UML) to create designs allows Web application developers to easily integrate them with other systems modeled in UML. Written for project managers, architects, analysts, designers, and implementers, Building Web Applications with UML, Second Edition , demystifies the challenging aspects of modeling with the Web Application Extension (WAE) for the Unified Modeling Language. Because UML has been widely accepted as the standard language for modeling software systems, it is without question the best option for modeling Web application designs. The WAE extends the UML notation with semantics and constructs that empower you to model Web-specific architectural elements using the Rational Unified Process or an alternative methodology. Furthermore, using UML allows the modeling of Web applications as a part of the complete system and the integration of the business logic that must be reflected in each application. With this book as your guide, you will be able to gain a clear understanding of how to address the unique problems of modeling the design of page-based Web applications, and more important, how to take your model directly into working code. 0201730383B08282002
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 49
    Online-Ressource
    Online-Ressource
    Upper Saddle, N.J. : Prentice Hall | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 574 p. , ill. ; , 24 cm. +
    DDC: 005.2/762
    Schlagwort(e): Application software ; Development ; Java (Computer program language) ; Web site development ; Electronic books ; local
    Kurzfassung: Learn J2EE and the JAX APIs for Web services and applications-all in one volume. The first book to offer integrated coverage of J2EE and JAX in one volume Java Web application and services programming taught by example Rich with code examples and explanations of supporting technologies CD-ROM includes free, fully functional copy of HP Application Server (HP-AS) Using a simple, stand-alone program as a point of departure, Java expert Michael Yawn brings you through all the steps and decisions needed to transform it into a rich, Web-enabled application. Along the way you'll gain a working knowledge of Java 2 Enterprise Edition (J2EE) and the Java APIs for XML (JAX)-emerging technologies for writing Web applications and working with XML documents and procedures. Yawn's technique of reworking the example application gives you hands-on experience at adapting software for different purposes and environments, as well as a deep understanding of how to build flexibility into your projects from the outset. Web applications and services-and underlying technologies-by example Layering applications to simplify reworking; using design patterns Integrating JavaServer Pages, JavaBeans, Servlets, and custom tag libraries XML on the Web and with wireless devices Java Message Service, MOM, and XML messaging with SOAP and JAXM JAX RPC services and their clients Enterprise JavaBeans-Session, Message-Driven, and Entity beans CD-ROM contains a full copy of HP Application Server (HP-AS)-a free alternative to IBM's WebSphere and BEA's WebLogic-and code samples from the book In his engaging style, Yawn doesn't simply describe Web applications and services-you'll come away understanding how it all fits together. With the whys well in hand, you'll be a much more effective coder. This book requires only a basic knowledge of Java programming, and its content is applicable to all servers.
    Anmerkung: Includes bibliographical references (p. 565) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 50
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 391 p. , ill. ; , 25 cm
    Serie: Prentice Hall PTR series in computer networking and distributed systems
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Enterprise security for real netadmins in the real worldThis book shows how to secure an enterprise network in the real world--when you're on the front lines, constantly under attack, and you don't always get the support you need. Symantec security engineer and former UUNet network architect Allan Liska addresses every facet of network security, from risk profiling through access control, Web/email security through day-to-day monitoring. He systematically identifies today's most widespread security mistakes and vulnerabilities--and offers realistic solutions you can begin implementing right away.Coverage Includes: Quantifying security risks and "selling" security throughout the organization Defining security models that reflect your company's philosophy Translating your security model into effective, enforceable policies Making your routers and switches your first lines of network defense Controlling access via authentication, authorization, and accounting Configuring secure VPNs and remote access Securing wireless LANs and WANs Establishing a DMZ between your network and the public Internet Securing Web/application servers, DNS servers, email servers, and file/print servers Implementing effective day-to-day network security administration, monitoring, and logging Responding to attacks: detect, isolate, halt, report, and prosecute Liska integrates these techniques in an end-to-end case study, showing you how to redesign an insecure enterprise network for maximum security--one step at a time.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 51
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 340 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rules and known exploits. The lack of usable information made using Snort a frustrating experience. The average Snort user needs to learn how to actually get their systems up-and-running. Snort Intrusion Detection provides readers with practical guidance on how to put Snort to work. Opening with a primer to intrusion detection and Snort, the book takes the reader through planning an installation to building the server and sensor, tuning the system, implementing the system and analyzing traffic, writing rules, upgrading the system, and extending Snort.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 52
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 945 p. , ill. ; , 23 cm. +
    Ausgabe: 4th ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.
    Anmerkung: Includes bibliographical references (p. [731]-759) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 53
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 286 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 004.68
    Schlagwort(e): Computer networks ; Security measures ; Wireless communication systems ; Security measures ; Wireless communication systems ; Standards ; Electronic books ; local
    Kurzfassung: It's an increasingly wired world, but many people are finding that the best way to get connected is to do away with wires entirely. From cable replacement to universal Internet connectivity, wireless technology is changing the way we connect to our machines and to each other. As with any new technology, buying your gear is only the first step. Understanding how to make the best use of it is another story. Wireless Hacks offers 100 industrial-strength tips about wireless networking, contributed by experts who apply what they know in the real world every day. Each Hack can be read in just a few minutes, but can save you hours of research. Inside, you will find a wealth of useful techniques for making the most out of wireless technology, including: Making sense of the alphabet soup of the 802.11 standards, and understanding which technology makes sense for your solving particular problem Using Bluetooth, mobile radios, mobile data networks, and other exotic methods to keep you connected, no matter where you are Practical methods for detecting, analyzing, and monitoring wireless networks Extending the range of your network, and making the best possible use of the available radio spectrum Designing and building your own antennas Engineering long distance network links that span several miles Understanding the security issues of wireless networking, and protecting yourself and your users from unauthorized access and eavesdropping Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done.
    Anmerkung: "100 industrial-strength tips & tools"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 54
    Online-Ressource
    Online-Ressource
    Beijing : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 693 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Microsoft .NET ; Electronic books ; local
    Kurzfassung: With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.The book works as both a comprehensive tutorial and reference to security issues for .NET application development, and contains numerous practical examples in both the C# and VB.NET languages. With Programming .NET Security , you will learn to apply sound security principles to your application designs, and to understand the concepts of identity, authentication and authorization and how they apply to .NET security. This guide also teaches you to: use the .NET run-time security features and .NET security namespaces and types to implement best-practices in your applications, including evidence, permissions, code identity and security policy, and role based and Code Access Security (CAS) use the .NET cryptographic APIs , from hashing and common encryption algorithms to digital signatures and cryptographic keys, to protect your data. use COM+ component services in a secure manner If you program with ASP.NET will also learn how to apply security to your applications. And the book also shows you how to use the Windows Event Log Service to audit Windows security violations that may be a threat to your solution.Authors Adam Freeman and Allen Jones, early .NET adopters and long-time proponents of an "end-to-end" security model, based this book on their years of experience in applying security policies and developing products for NASDAQ, Sun Microsystems, Netscape, Microsoft, and others. With the .NET platform placing security at center stage, the better informed you are, the more secure your project will be.
    Anmerkung: "Writing secure applications using C# or Visual Basic .NET"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 55
    Online-Ressource
    Online-Ressource
    Beijing : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 879 p. , ill. ; , 23 cm. +
    Ausgabe: 1st ed.
    DDC: 005.268
    Schlagwort(e): Microsoft Windows (Computer file) ; Application software ; Development ; Microsoft .NET ; Electronic books ; local
    Kurzfassung: .NET Windows Forms are a powerful technology for building a large class of applications for the Windows .NET platform. They offer nearly the same power and flexibility of classic Win32 development, but for a fraction of the effort. The programming model is lean and streamlined, and many of the tedious details that developers used to have to spend time on are now dealt with automatically by the platform. .NET Windows Forms in a Nutshell offers an accelerated introduction to this next-generation of rich user interface development. The book provides an all-inclusive guide for experienced programmers using the .NET Windows Forms platform to develop Windows applications, along with a compact but remarkably complete reference to the .NET Framework Class Library (FCL) Windows Forms namespaces and types. The authors present solid coverage of the fundamental building blocks, such as Controls, Forms, Menus, and GDI+, and enough detail to help you build your own fully featured reusable visual components so you can write visual component libraries as well as standalone applications. .NET Windows Forms in a Nutshell aims to provide not just the practical information and advice required to get programs working, but also to communicate the rationale behind the various parts of Windows Forms' design. The authors show how the thinking behind the framework enhances your productivity substantially. The new framework allows you to guess correctly what "the Right Way" to do things is a majority of the time, even if you've never tried what you're doing before. No more digging around in documentation for days to try to find the bit of information you need to use one particular feature. Anyone who is involved in user interface development will appreciate the ease of creation and expanded capabilities provided by .NET Windows Forms, as well as the in-depth focus and straight-forward approach this book brings. Included on CD is an add-in that will integrate the book's reference directly into the help files of Visual Studio .NET.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 56
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.268
    Schlagwort(e): Microsoft foundation class library ; Application software ; Development ; Microsoft .NET Framework ; Electronic books ; local
    Kurzfassung: "To anyone looking to augment their existing MFC code base and knowledge with the powerful .NET classes-which provide such capabilities as disconnected data, in-memory database (IMDB), regular expressions, and data encryption-Tom Archer's book has it all." - Erik Westermann, Lead Architect, Eidenai Innovations Extending MFC Applications with the .NET Framework is the first book to show MFC developers how to boost productivity by incorporating .NET functionality into existing MFC applications. Tom Archer clearly illustrates how using the .NET Base Class Library (BCL)-to complement or replace MFC classes when there is a clear advantage-enables MFC developers to create elegant and robust Windows applications in the most efficient way possible. Each chapter begins with an introduction that explains the technology, outlines its benefits, lists its pragmatic business uses, and summarizes the required syntax. As is an Archer trademark, this information is solidified with hands-on, practical demo applications. This book answers the questions MFC developers have about .NET, including: What are the key issues when combining MFC and Managed Extensions? Page 15 How can Regular Expressions be used to parse a document for multiple complex pattern types, such as email addresses? Page 84 How can hash codes be used to validate users without storing passwords? Page 161 How can MFC applications maintain data stored in XML format? Page 274 Once an ADO.NET DataSet is filled, how can the data be searched, sorted, and filtered? Page 336 What technique is used for reading image data from a database using ADO.NET classes? Page 363 What are the options for handling disconnected data concurrency issues? Page 396 How can Remoting be used to pass MFC objects between applications? Page 460 The CD-ROM supplies the complete downloadable source code, working samples, and test code from the book, as well as several productivity-enhancing utilities such as a Visual Studio .NET Custom AppWizard. 032117352XB11142003
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 57
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 745 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Schlagwort(e): Oracle (Computer file) ; Application software ; Development ; Internet programming ; PL/SQL (Computer program language) ; Electronic books ; local
    Kurzfassung: The hands-on, rapid-mastery guide to Oracle PL/SQL Web development. Start building Oracle 9i PL/SQL Web applications-hands on Covers the entire development lifecycle, from design to deployment Provides instruction for PL/SQL Server Pages, the PL/SQL Web Toolkit, and the Oracle 9i Application Server Introduces Web basics-HTML, JavaScript, basic UNIX and FTP, and image handling Reviews PL/SQL and SQL concepts Includes practical tips and troubleshooting help Leverage your SQL and PL/SQL experience to build powerful data-driven Web and e-business applications-starting right now! In this book, a team of Columbia University PL/SQL instructors cover the core pieces of what you need to know, from preliminary configuration to deployment of dynamic, data-driven applications. You'll find practical examples, hands-on exercises, and dozens of practical tips and solutions designed to save you time, effort, and frustration. One step at a time, discover how to: Configure Oracle's Internet Application Server Control Web applications and servers remotely Build Oracle Web applications with PL/SQL Create dynamic, data-driven pages Test, debug, troubleshoot, and deploy your applications Maintain and optimize running Web applications Whether you've been writing simple queries or complex PL/SQL code, this book takes your database development skills onto the Web-and into the future!
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 58
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxv, 830 p. , ill. ; , 24 cm
    DDC: 005.26/8
    Schlagwort(e): Microsoft Visual BASIC ; Application software ; Development ; BASIC (Computer program language) ; Microsoft .NET Framework ; Electronic books ; local
    Kurzfassung: Build industrial-strength .NET applications with Visual Basic. Experienced programmers: Quickly come up to speed on the new, powerful Visual Basic .NET Practical, hands-on coverage of the .NET Framework, CLR, ADO.NET, ASP.NET, Web services, security, interoperability, and more Running case study: see how concepts work together when you build .NET applications This book gives experienced developers the practical insight they need to build enterprise applications using Visual Basic .NET. Using extensive code examples and a running case study, the authors illuminate the .NET concepts and technologies that offer developers the greatest power and value. They cover the entire process of constructing a .NET application: developing a simple .NET console application; adding a Windows Forms interface; isolating functionality within components; providing database access via ADO.NET; securing your code; and using ASP.NET to create Web applications and services. .NET Framework and Common Language Runtime fundamentals for experienced programmers Key .NET features: interfaces, attributes, collections, I/O, threading, remoting, and more In-depth coverage of ADO.NET, ASP.NET Web Forms, and Web services Advanced user interface programming with Windows Forms and GDI+ Assemblies, component deployment, and versioning Ensuring interoperability with diverse and legacy systems Includes a self-contained Visual Basic .NET overview for those new to the language Part of The Integrated .NET Series from Object Innovations and Prentice Hall PTR.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 59
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Cisco | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvii, 774 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Examinations ; Study guides ; Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. Lack of customer, partner, and employee access to e-commerce and data servers can impact both revenue and productivity. Even so, most networks do not have the proper degree of security. Network Security Principles and Practices provides an in-depth understanding of the policies, products, and expertise that brings organization to this extremely complex topic and boosts your confidence in the performance and integrity of your network systems and services. Written by a CCIE engineer who participated in the development of the CCIE Security exams, Network Security Principles and Practices is the first book that provides a comprehensive review of topics important to achieving CCIE Security certification. Network Security Principles and Practices is a comprehensive guide to network security threats and the policies and tools developed specifically to combat those threats. Taking a practical, applied approach to building security into networks, the book shows you how to build secure network architectures from the ground up. Security aspects of routing protocols, Layer 2 threats, and switch security features are all analyzed. A comprehe...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 60
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 265 p. , ill. ; , 23 cm
    DDC: 005.4/4769
    Schlagwort(e): Linux ; Application software ; Development ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: Linux Clustering: Building and Maintaining Linux Clusters provides Linux users with information about building their own Linux cluster from the ground up. It gives best practices, helpful hints, and guidelines about building one server or hundreds of servers at a level that administrators at any experience level can understand. From installation of the air conditioning and power in the data center, to alternative file systems to the final production run, this book provides you with everything that you need to know. Linux Clustering: Building and Maintaining Linux Clusters walks you through the initial design and selection of the best possible types of clusters, as well as covering monitoring tools and providing for disaster recovery. Not only does this book provide information on parallel and Beowulf type clusters, Charles Bookman goes into depth on high availability clusters, load balancing, and provides advice for writing your own distributing applications as well. Incorporating best practices and cutting-edge approaches, Bookman provides step-by-step and tried-and-true methods of bringing up a Linux cluster to production level.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 61
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 385 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Mac OS ; Computer networks ; Security measures ; Computer security ; Macintosh (Computer) ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.
    Anmerkung: Includes bibliographical references (p. 361-369) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 62
    Online-Ressource
    Online-Ressource
    Beijing ; Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 311 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Linux ; Computer networks ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are: Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more Monitoring your network with tcpdump, dsniff, netstat, and other tools Protecting network connections with Secure Shell (SSH) and stunnel Safeguarding email sessions with Secure Sockets Layer (SSL) Encrypting files and email messages with GnuPG Probing your own security with password crackers, nmap, and handy scripts This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.
    Anmerkung: "Security tools & techniques"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 63
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 176 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; IEEE 802.11 (Standard) ; Wireless communication systems ; Security measures ; Electronic books ; local
    Kurzfassung: Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your own secure wireless network. 802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent Privacy component of 802.11. You'll learn how to configure a wireless client and to set up a WAP using either Linux or Free BSD. You'll also find thorough information on controlling network access and encrypting client traffic. Beginning with an introduction to 802.11b in general, the book gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. Next, the book details the technical setup instructions needed for both the Linux and FreeBSD operating systems. Some of the topics covered include: Station Security for Linux, FreeBSD, Open BSD, Mac OS X and Windows Setting Up Access Point Security Gateway Security, including building Gateways, firewall Rules, Auditing, etc. Authentication and Encryption FreeBSD IPsec client and gateway configuration Linux IPsec client and gateway configuration 802.1x authentication 802.11 Security is a book whose time has come. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b-based systems, you'll want this book beside you every step of the way.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 64
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 236 p. , ill. ; , 24 cm
    DDC: 005.1
    Schlagwort(e): Application software ; Development ; Software patterns ; Use cases (Systems engineering) ; Electronic books ; local
    Kurzfassung: Use cases have become an integral part of modeling software requirements, but many software developers are discovering that writing effective use cases is more difficult than they had anticipated. An understanding of the basic principles of use cases is not enough. Software developers need a source of objective criteria by which to judge quality and effectiveness. Patterns for Effective Use Cases provides this set of objective criteria. Written by experienced use case practitioners, this book fills a critical information gap by presenting a pattern language that contains over thirty patterns, providing simple, elegant, and proven solutions to the most common problems in use case development. These patterns distill and define the properties and characteristics of quality use cases. As such, they facilitate the development of original use cases and provide a diagnostic tool for evaluating existing ones. The book opens with a review of use cases and pattern fundamentals, along with a discussion of the requirements-gathering team. These patterns address the use case development process, the internal structure of use cases, and the relationships among use cases within the system as a whole. Examples of patterns include: BreadthBeforeDepth VisibleBoundary EverUnfoldingStory IntentionRevealingName PreciseAndReadable LeveledSteps InterruptsAsExtensions RedistributeTheWealth Each pattern discussion includes at least one example demonstrating its real-world application, highlighting both the benefits of using the pattern and the consequences of not doing so. In addition, the book presents guidelines for the effective use of UML with relevant patterns. Anyone involved in use case writing or requirements gathering will find Patterns for Effective Use Cases an indispensable handbook and reference. 0201721848B07302002
    Anmerkung: Includes bibliographical references (p. 217-218) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 65
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvi, 322 p. , ill. ; , 25 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Standards ; Electronic information resources ; Access control ; Electronic books ; local
    Kurzfassung: TCPA: Building computing platforms upon a solid foundation of trust. As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms , leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future. What trusted computing platforms are, how they work, and what problems they will solve Transforming standard platforms into trusted platforms cost-effectively Scenarios for managers: TCPA applications in the security-focused business Protected storage: how TCPA can ensure the confidentiality of stored data Software integrity: ensuring that a system's software environment hasn't been tampered with Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead Trusted platforms in practice: TCPA for developers and technical professionals How trusted platforms can be used to protect user privacy The TCPA initiative: its history, status, and next steps forward Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology-and with this book, you will.
    Anmerkung: Includes bibliographical references (p. 305-308) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 66
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 198 p. , ill. ; , 24 cm
    DDC: 005.4/465
    Schlagwort(e): Solaris (Computer file) ; UNIX Shells ; Computer networks ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: The best practices guide to building, scaling and deploying Open SSH for legacy Solaris (2.6, 7, and 8) and Solaris 9 OE systems. Covers the new Solaris Secure Shell for all versions of Solaris. Shows how to secure remote logins, integrate Secure Shell into existing scripts and avoid common problems. Written by Jason Reid, a member of the Solaris System Test group at Sun Microsystems, Inc.
    Anmerkung: "Sun Microsystems Press, A Prentice Hall Title". - Includes bibliographical references (p. 185-190) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 67
    Online-Ressource
    Online-Ressource
    [United States?] : IBM, International Technical Support Organization | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 726 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.3
    Schlagwort(e): JavaBeans ; WebSphere ; Application software ; Development ; Electronic books ; local
    Kurzfassung: This IBM Redbook provides detailed information on how to effectively use WebSphere Studio Application Developer for the development of applications based on the Enterprise JavaBeans (EJB) architecture, and deployment of such applications to a WebSphere Application Server. Throughout the book, we provide examples based on a simple banking application with an underlying relational database. In Part 1, we introduce EJBs as a part of Java 2 Enterprise Edition (J2EE) and cover the basic concepts and the architecture. In particular we point out the new functions introduced with the EJB 2.0 specification that provide, for example, enhanced functionality for container-managed persistence entity beans and message-driven beans. We also provide best practice guidelines for successful implementations of EJBs. In Part 2, we introduce the sample banking application and then implement entity beans, session beans, and message-driven beans using WebSphere Studio Application Developer. We also implement finder methods, different mapping strategies, and simple clients that use the EJBs. At the end, we describe how to deploy EJB applications to a WebSphere Application Server.
    Anmerkung: "April 2003.". - "SG24-6819-00.". - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 68
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvii, 422 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 006.7/6
    Schlagwort(e): ColdFusion ; Fusebox ; Application software ; Development ; Internet programming ; Electronic books ; local
    Kurzfassung: Developers face a constant struggle to launch projects on time and under budget, especially without pulling all-nighters. Fusebox helps ensure successful projects by providing a framework that serves as a base for applications. It's a standard process that makes projects more manageable and simplifies maintenance and requests for change during development. With this book, you'll learn to make ColdFusion applications reliably successful by following a standardized system. In addition, relying on the Fusebox framework to help plan and organize your ColdFusion code will allow you to write increasingly complex and specialized applications. Jeff Peters and Nat Papovich , both members of the Fusebox Council, share their extensive experience in this book. They'll teach you to use Fusebox with your ColdFusion applications and develop a set of best practices for managing web projects. Read this book if you want to eliminate frustrations and roadblocks in your projects, such as unmanageable complexity, wasteful redundancy of effort, time-consuming code maintenance, and slow development speed.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 69
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 578 p. , ill. ; , 23 cm
    DDC: 005.2/768
    Schlagwort(e): Application software ; Development ; Microsoft .NET Framework ; Mobile computing ; Pocket computers ; Electronic books ; local
    Kurzfassung: The primary goal of .NET Compact Framework is to bring the familiar experience of developing .NET applications for the desktop to the device world. Of the approximately six million Microsoft desktop developers in the world, it is estimated that perhaps two hundred thousand will turn their attention to the device world using the enabling technology of the .NET Compact Framework.To facilitate the goal of showing readers how to develop applications for the .NET Compact Framework, the book contains in-depth treatment in the following topic areas: Windows Forms and Threading, Network Programming, ADO.NET Dataset, XML Serialization, SQL CE, Web Services, and performance management. Each concept is accompanied with a sample application that illustrates its implementation on the .NET Compact Framework. For the convenience of the reader, each sample application will be offered in both C# and Visual BASIC. Developers can use this source code as a springboard for creating their own device side database applications.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 70
    Online-Ressource
    Online-Ressource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 004.67/8/068
    Schlagwort(e): Application software ; Development ; Business ; Data processing ; Web services ; Electronic books ; local
    Kurzfassung: "This book performs a valuable service for managers seeking to harness the business potential of Web services technology. Bringing a real practitioner's experience to the task, Anne carefully walks managers through the fundamentals of Web services technology. She does a superb job of helping managers understand this technology so that they can move with sure footing and avoid potentially harmful stumbles along the way." --From the Foreword by John Hagel III and John Seely Brown Written for business and technology managers, Web Services: A Manager's Guide illuminates the potential of Web services for application integration. It describes the essentials of supporting technologies and shows how they can be built into a Web services infrastructure that is high-performance, robust, and cost-effective. Realistic in approach, this book offers a readable definition of Web services and non-technical explanations of key technologies and standards. The author explores the scenarios and applications that would benefit most from Web services and offers guidelines for making an informed decision about which Web services products are right for your company's needs. You will find detailed coverage of the following topics: The advantages of Web services over other middleware technologies Various Web services business models, including those used by Google, Kinko's, Amazon, UPS, and T-Mobile The basics of XML, XSLT, SOA, WSDL, UDDI, and SOAP How W3C, OASIS, and WS-I are standardizing technologies and defining guidelines for interoperability Web services standards for security, transactions, and portlets Powerful features of Web services, including dynamic discovery and dynamic binding Using Web services for heterogeneous integration, managing legacy assets, and B2B electronic procurement Web services core products and platforms Evaluating Web services offerings based on such requirements as scalability, extensibility, and security With this book in hand, you will have a clear understanding of Web services, what the technology can do for your organization, and the direction in which you should be heading. Margin content summaries enable time-constrained managers to locate and absorb needed information quickly. Case studies illustrate the benefits of adopting Web services and also reveal pitfalls to avoid. 0321185773B06042003
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 71
    Online-Ressource
    Online-Ressource
    Boston, MA : Addison Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.1
    Schlagwort(e): Application software ; Development ; Component software ; Management information systems ; UML (Computer science) ; Electronic books ; local
    Kurzfassung: This book presents the approaches and practices for the construction of software systems using Select Perspective. It details the key workflows for a contemporary approach to supplying, managing, and consuming software assets to deliver business IT systems. This book provides a comprehensive development lifecycle (Select Perspective) for component and web service based IT solutions, that supports parallel development activities, to reduce time-to-market. It introduces the Select Perspective as a Supply, Manage, Consume software development process. It provides a real world project experience and examples. Technology: Unlike other development processes, Select Perspective is focused on a small number of key deliverables within an organizational framework of suppliers and consumers, of solution driven components. Audience: For CIOs, IT Directors, Project Managers, and solution developers. Level Intermediate. Hedley Apperly is Vice President, Product Marketing and Development with Aonix Hedley has graduate and post-graduate qualifications in production engineering, business computing and strategic marketing. His 19 years experience in IT, have focused on the design and development of relational, object-oriented and component-bases systems. He is also a committee member of the British Computer Societies (BCS), Object-Oriented Programming and Systems (OOPS) specialist group. As well as his involvement Component Based Development for Enterprise Systems , published by Cambridge University Press, Hedley co-authored Component Based Software Engineering; Putting the Pieces Together , published by Addison Wesley. Ralph Hofman works in Manager Services (Benelux) at Aonix. Ralph studied computer science at the University of Twente in the Netherlands. He started as a freelance consultant for different companies and specialized in methods and tools for system development. Ralph initiated component-based development as a way of working within a major international Bank. He joined Aonix in 2000, where he is responsible for the consultancy and services in the Benelux. Steve Latchem is Director of International Services with Aonix. Steve has been within the IT industry for over 18 years, holding positions in large consultancy groups and IT Departments ranging from business analyst to object oriented consultant, architect and project manager. Steve now directs the global professional services group at Aonix. Steve collaborated on AntiPatterns: Refactoring...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 72
    Online-Ressource
    Online-Ressource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Sprache: Englisch
    Schlagwort(e): Application software ; Development ; COM (Computer architecture) ; Microsoft .NET ; Electronic books ; local
    Kurzfassung: Providing both theoretical and practical approaches, this in-depth programming guide explains how to interoperate between COM/COM+ and Microsoft® .NET. Coverage includes writing COM and COM+ code, disconnected applications, and new technologies in .NET.
    Anmerkung: Includes index. - Includes link to companion website. - Title from title screen
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 73
    Online-Ressource
    Online-Ressource
    [Austin] : IBM International Technical Support Organization | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 516 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    Serie: Redbooks
    DDC: 005.1
    Schlagwort(e): AIX (Computer file) ; Application software porting ; Application software ; Development ; C (Computer program language) ; C++ (Computer program language) ; Electronic books ; local
    Kurzfassung: This IBM Redbook will help experienced UNIX application developers who are new to the AIX operating system. The book explains the many concepts in detail, including the following: - Enhancements and new features provided by the latest C and C++ compilers for AIX - Compiling and linking tasks required to effectively use and manage shared libraries and run-time linking - Use of process heap and shared memory in the 32- and 64-bit user process models - A new programming paradigm in a partitioned environment where resources can be dynamically changed - Parallel programming using POSIX threads and OpenMP The following chapters are also useful for system administrators who are responsible for the software problem determination and application software release level management on AIX systems: Chapter 3, "Understanding user process models" Chapter 7, "Debugging your applications" Chapter 12, "Packaging your applications"
    Anmerkung: "June 2003.". - "SG24-5674-01.". - Includes bibliographical references (p. 497-500) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 74
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 599 p. , ill. ; , 23 cm. +
    DDC: 005.1/17
    Schlagwort(e): ActiveX ; Application software ; Development ; Internet programming ; Microsoft .NET ; Object-oriented programming (Computer science) ; Electronic books ; local
    Kurzfassung: Written by experts on the Microsoft® .NET programming platform, ADO.NET in a Nutshell delivers everything .NET programmers will need to get a jump-start on ADO.NET technology or to sharpen their skills even further. In the tradition of O'Reilly's In a Nutshell Series, ADO.NET in a Nutshell is the most complete and concise source of ADO.NET information available.ADO.NET is the suite of data access technologies in the .NET Framework that developers use to build applications services accessing relational data and XML. Connecting to databases is a fundamental part of most applications, whether they are web, Windows®, distributed, client/server, XML Web Services, or something entirely different. But ADO.NET is substantially different from Microsoft's previous data access technologies--including the previous version of ADO--so even experienced developers need to understand the basics of the new disconnected model before they start programming with it.Current with the .NET Framework 1.1, ADO.NET in a Nutshell offers one place to look when you need help with anything related to this essential technology, including a reference to the ADO.NET namespaces and object model. In addition to being a valuable reference, this book provides a concise foundation for programming with ADO.NET and covers a variety of issues that programmers face when developing web applications or Web Services that rely on database access. Using C#, this book presents real world, practical examples that will help you put ADO.NET to work immediately.Topics covered in the book include: An Introduction to ADO.NET Connections, Commands and DataReaders Disconnected Data Advanced DataSets Transactions DataViews and Data Binding XML and the DataSet Included with the book is a Visual Studio .NET add-in that integrates the entire reference directly into your help files. When combining ADO.NET in a Nutshell with other books from O'Reilly's .NET In a Nutshell series, you'll have a comprehensive, detailed and independent reference collection that will help you become more productive.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 75
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxi, 492 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Web sites ; Security measures ; Electronic books ; local
    Kurzfassung: "Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems and shopping carts, and critical vulnerabilities associated with URLs. This book is a virtual battle plan that will help you identify and eliminate threats that could take your Web site off line..." --From the Foreword by William C. Boni, Chief Information Security Officer, Motorola "Just because you have a firewall and IDS sensor does not mean you aresecure; this book shows you why." --Lance Spitzner, Founder, The Honeynet Project Whether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. Organizations using Web-based business applications are increasingly at risk. Web Hacking: Attacks and Defense is a powerful guide to the latest information on Web attacks and defense. Security experts Stuart McClure (lead author of Hacking Exposed ), Saumil Shah, and Shreeraj Shah present a broad range of Web attacks and defense. Features include: Overview of the Web and what hackers go after Complete Web application security methodologies Detailed analysis of hack techniques Countermeasures What to do at development time to eliminate vulnerabilities New case studies and eye-opening attack scenarios Advanced Web hacking concepts, methodologies, and tools "How Do They Do It?" sections show how and why different attacks succeed, including: Cyber graffiti and Web site defacements e-Shoplifting Database access and Web applications Java™ application servers; how to harden your Java™ Web Server Impersonation and session hijacking Buffer overflows, the most wicked of attacks Automated attack tools and worms Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. Web Hacking informs from the trenches. Experts show you how to connect the dots--how to put the stages of a Web hack together so you can best defend against them. Written for maximum brain absorption with unparalleled technical content and battle-tested analysis, Web Hacking will help you combat potentially costly security threats and attacks. 0201761769B07192002
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 76
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxii, 692 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Schlagwort(e): ColdFusion ; Application software ; Development ; Internet programming ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: The first Java guide specifically for experienced ColdFusion developers and Web professionals! Leverage your Web and ColdFusion skills to develop powerful Java applications Master JSP, servlets, custom tags, JavaBeans, JDBC, and other key Java Web technologies Install and run Apache Tomcat 4 and JRun 4 application servers Build several complete applications, including an e-commerce site Includes handy Java glossary and JSP/servlet references Up-to-the-minute coverage of Java 1.4, JSP 1.2, servlet 2.3, and ColdFusion MX With ColdFusion MX and this book, any Web professional can leverage the power of Java to build robust, high-performance Web applications. Leading Web developer and columnist Eben Hewitt begins with a rapid-fire introduction to Java that builds on what you already know about ColdFusion to teach you exactly what you need to know about Java programming. Hewitt's focused examples, real-world insights, and code will take you from the basics of object-oriented programming to sophisticated JSP/servlet development, XML-based applications, and beyond! Master object-oriented application design and programming Build powerful servlets, JavaServer Pages, applets, and desktop applications Leverage XML & XSLT, exception handling, I/O, JDBC databases, and more Understand the similarities and key differences between CFML and Java development Integrate ColdFusion MX with J2EE and servlet technology Create JSP custom tags and use the brand-new JSP Standard Tag Library Includes complete references to JSP tags and the Servlet API, plus a handy Java glossary The bookÕs extensive code examples (downloadable from www.corecoldfusion.com) include a start-to-finish Java e-commerce application.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 77
    Online-Ressource
    Online-Ressource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 859 p. , ill. ; , 24 cm
    DDC: 005.2/768
    Schlagwort(e): Application software ; Development ; Microsoft .NET Framework ; Mobile computing ; Pocket computers ; Electronic books ; local
    Kurzfassung: The Microsoft® Windows® .NET Compact Framework brings the power of the .NET Framework to handheld devices such as Pocket PCs and smart phones. Learn exactly how to build killer applications-and how to solve typical problems-in developing for resource-constrained devices with this book. You'll find specifics on how to develop GUI elements with Windows Forms, access and store data with Microsoft ADO.NET and integrate it across the enterprise with XML Web services, work with Microsoft SQL Server™ CE, develop applications that connect and disconnect across wireless networks, and more-all with working code samples. You even get a quick reference to the differences between the .NET Compact Framework and the full .NET Framework.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 78
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 533 p. , ill. ; , 24 cm
    DDC: 005.1
    Schlagwort(e): Application software ; Development ; Business ; Data processing ; Computer architecture ; System design ; Electronic books ; local
    Kurzfassung: The practice of enterprise application development has benefited from the emergence of many new enabling technologies. Multi-tiered object-oriented platforms, such as Java and .NET, have become commonplace. These new tools and technologies are capable of building powerful applications, but they are not easily implemented. Common failures in enterprise applications often occur because their developers do not understand the architectural lessons that experienced object developers have learned. Patterns of Enterprise Application Architecture is written in direct response to the stiff challenges that face enterprise application developers. The author, noted object-oriented designer Martin Fowler, noticed that despite changes in technology--from Smalltalk to CORBA to Java to .NET--the same basic design ideas can be adapted and applied to solve common problems. With the help of an expert group of contributors, Martin distills over forty recurring solutions into patterns. The result is an indispensable handbook of solutions that are applicable to any enterprise application platform. This book is actually two books in one. The first section is a short tutorial on developing enterprise applications, which you can read from start to finish to understand the scope of the book's lessons. The next section, the bulk of the book, is a detailed reference to the patterns themselves. Each pattern provides usage and implementation information, as well as detailed code examples in Java or C#. The entire book is also richly illustrated with UML diagrams to further explain the concepts. Armed with this book, you will have the knowledge necessary to make important architectural decisions about building an enterprise application and the proven patterns for use when building them. The topics covered include · Dividing an enterprise application into layers · The major approaches to organizing business logic · An in-depth treatment of mapping between objects and relational databases · Using Model-View-Controller to organize a Web presentation · Handling concurrency for data that spans multiple transactions · Designing distributed object interfaces
    Anmerkung: Includes bibliographical references (p. 511-516) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 79
    Online-Ressource
    Online-Ressource
    [Cambridge, Mass.] : IBM International Technical Support Organization | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 826 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Serie: Redbooks
    Schlagwort(e): Lotus Domino ; Lotus Notes ; Application software ; Development ; Electronic commerce ; Computer programs ; Web site development ; Electronic books ; local
    Kurzfassung: In this IBM Redbook, we describe how to develop applications with IBM Lotus Domino Designer 6. With Domino Designer, you are able to create applications hosted by a Domino server. These applications can be used by different clients, such as Notes clients, Web browsers or mobile devices. We introduce, and show in detail, how you can use all the design elements of Domino Designer, such as forms, pages, views, agents, outlines, resources and framesets. Readers who are familiar with developing applications using Release 5 of Lotus Domino may want to start at Chapter 12, which introduces the new features in Domino 6.0, and continue from there. In the chapters toward the end of the book, we discuss the different programming languages, functions, LotusScript, JavaScript, and Java, that can be used in Domino. We detail how to manipulate rich text objects by programming, as well as XML, in Domino. This redbook was written for technical specialists, developers and programmers, customers, IBM Business Partners, and the IBM and Lotus community who need technical understanding of how to develop applications using IBM Lotus Domino Designer 6.0.
    Anmerkung: "December 2002.". - "Lotud.software"--Cover. - "SG24-6854-00.". - Includes bibliographical references (p. 799-800) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 80
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 512 p. , ill. ; , 24 cm. +
    Schlagwort(e): JBoss ; Application software ; Development ; Client/server computing ; Java (Computer program language) ; Open source software ; Web servers ; Management ; Electronic books ; local
    Kurzfassung: The Official JBoss Development and Administration Guide offers a single source for information about deploying, administering, and extending JBoss. The book provides up-close and in-depth information both about the intricacies of JBoss and the best practices of J2EE development. The reader will be able, though this book, to install JBoss and develop J2EE applications as well as extending and enhancing JBoss itself--a primary benefit of the open-source nature of the JBoss product.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 81
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 480 p. , ill. ; , 23 cm
    Schlagwort(e): Application software ; Development ; Java (Computer program language) ; Portable computers ; Programming ; Electronic books ; local
    Kurzfassung: The key to Java 2 Micro Edition (J2ME) Application Development is the clear, concise explanations of the J2ME technology in relation to the existing Java platform. This book assumes proficiency with Java and presents strategies for understanding and deploying J2ME applications. The book presents numerous real-world examples, including health care and financial sector examples from the authors' professional experience.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 82
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: x, 277 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.13/3
    Schlagwort(e): Application software ; Development ; Java (Computer program language) ; Object-oriented programming (Computer science) ; Web servers ; Electronic books ; local
    Kurzfassung: Java developers typically go through four "stages" in mastering Java. In the first stage, they learn the language itself. In the second stage, they study the APIs. In the third stage, they become proficient in the environment. It is in the fourth stage --"the expert stage"-- where things really get interesting, and Java Enterprise Best Practices is the tangible compendium of experience that developers need to breeze through this fourth and final stage of Enterprise Java mastery.Crammed with tips and tricks, Java Enterprise Best Practices distills years of solid experience from eleven experts in the J2EE environment into a practical, to-the-point guide to J2EE. Java Enterprise Best Practices gives developers the unvarnished, expert-tested advice that the man pages don't provide--what areas of the APIs should be used frequently (and which are better avoided); elegant solutions to problems you face that other developers have already discovered; what things you should always do, what things you should consider doing, and what things you should never do--even if the documentation says it's ok.Until Java Enterprise Best Practices , Java developers in the fourth stage of mastery relied on the advice of a loose-knit community of fellow developers, time-consuming online searches for examples or suggestions for the immediate problem they faced, and tedious trial-and-error. But Java has grown to include a huge number of APIs, classes, and methods. Now it is simply too large for even the most intrepid developer to know it all. The need for a written compendium of J2EE Best Practices has never been greater. Java Enterprise Best Practices focuses on the Java 2 Enterprise Edition (J2EE) APIs. The J2EE APIs include such alphabet soup acronyms as EJB, JDBC, RMI, XML, and JMX.
    Anmerkung: "Expert tips & tricks for Java Enterprise programmers"--Cover. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 83
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Que | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 699 p. , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical information. The book offers clear discussion of privacy issues as they affect everyday users of digital devices, covering all current and near-future devices and technologies that pose privacy risks to users.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 84
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 729 p. , ill. ; , 24 cm
    Schlagwort(e): Application software ; Development ; Java (Computer program language) ; Web site development ; Electronic books ; local
    Kurzfassung: "Java Web Services Unleashed" explores everything Java developers need for Web service development. Starting with the business considerations and roles of service-related technologies within the Java architecture, the authors then demonstrate applications using the "pillars" of Web service creation: SOAP, UDDI, and WSDL. Next, the book introduces the JAX* pack - a set of Java APIs for XML programming that ease and enhance service development - using real-world examples explaining the importance of each JAX* API. Later chapters include a series of larger case studies of service development using many Java technologies including JSP and EJB.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 85
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 441 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.3
    Schlagwort(e): Apache (Computer file : Apache Group) ; JavaServer pages ; Application software ; Development ; Internet programming ; Struts framework ; Web site development ; Electronic books ; local
    Kurzfassung: Web tier frameworks have really taken off in the past year or so. Developers who used to spend hours and hours writing low-level features have realized the enormous benefits of using well-written frameworks to build the presentation tier so they can get to coding the "good stuff", the business logic at the core of the program. The Struts Framework, originally created by Craig R. McClanahan and donated to the Apache Software Foundation's Jakarta project in 2000, has become one of the most popular presentation frameworks for building web applications with Java Servlet and JavaServer Pages (JSP) technology. It encourages application architecture based on the Model-View-Controller (MVC) design paradigm, colloquially known as the Model 2 approach. As popular as Struts is becoming, the online documentation is inadequate, focusing on the most basic functionality and leaving out information crucial to developers writing today's complex web applications. O'Reilly's Programming Jakarta Struts was written by Chuck Cavaness after his internet company decided to adopt the framework, then spent months really figuring out how to use it to its fullest potential. He calls the books, "the culmination of lessons learned (the hard way) during the building of our application." Readers will benefit from the real-world, "this is how to do it" approach Cavaness takes to developing complex enterprise applications using Struts, and his focus on the 1.1 version of the Framework makes this the most up-to-date book available. Programming Jakarta Struts covers: An overview of the concepts involved in writing web applications Detailed installation and configuration instructions to get Struts up and running quickly A thorough discussion of how Struts implements the Model-View-Controller pattern, and how to interface with that pattern in your own applications JSP and Jakarta Tag Libraries for authoring complex web pages Logging, Validation, and Exception Handling with Struts Using the new Struts template framework, Tiles . Writing internationalization and localization code using Struts Practical, real-world best practices for web applications Craig McClanahan, originator of Struts, says of the book, "One thing a lot of open source packages lack is a comprehensive guide to all of the features -- something that goes far enough past "hello, world" to get you into solving real application design problems, and it looks like you've hit just the right level for a lot of people."
    Anmerkung: "Building Web applications with servlets and JSPs"--cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 86
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 367 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): OpenSSL ; Computer network protocols ; Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols. Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included.OpenSSL may well answer your need to protect sensitive data. If that?s the case, Network Security with OpenSSL is the only guide available on the subject.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 87
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 173 p. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Routers (Computer networks) ; Electronic books ; local
    Kurzfassung: As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics: The importance of router security and where routers fit into an overall security plan Different router configurations for various versions of Cisco?s IOS Standard ways to access a Cisco router and the security implications of each Password and privilege levels in Cisco routers Authentication, Authorization, and Accounting (AAA) control Router warning banner use (as recommended by the FBI) Unnecessary protocols and services commonly run on Cisco routers SNMP security Anti-spoofing Protocol security for RIP, OSPF, EIGRP, NTP, and BGP Logging violations Incident response Physical security Written by Thomas Akin, an experienced Certified Information Systems Security Professional (CISSP) and Certified Cisco Academic Instructor (CCAI), the book is well organized, emphasizing practicality and a hands-on approach. At the end of each chapter, Akin includes a Checklist that summarizes the hardening techniques discussed in the chapter. The Checklists help you double-check the configurations you have been instructed to make, and serve as quick references for future security procedures.Concise and to the point, Hardening Cisco Routers supplies you with all the tools necessary to turn a potential vulnerability into a strength. In an area that is otherwise poorly documented, this is the one book that will help you make your Cisco routers rock solid.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 88
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 545 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Schlagwort(e): Application software ; Development ; Electronic data processing ; Distributed processing ; Java (Computer program language) ; RMI (Computer architecture) ; Electronic books ; local
    Kurzfassung: Java RMI contains a wealth of experience in designing and implementing Java's Remote Method Invocation. If you're a novice reader, you will quickly be brought up to speed on why RMI is such a powerful yet easy to use tool for distributed programming, while experts can gain valuable experience for constructing their own enterprise and distributed systems.With Java RMI , you'll learn tips and tricks for making your RMI code excel. The book also provides strategies for working with serialization, threading, the RMI registry, sockets and socket factories, activation, dynamic class downloading, HTTP tunneling, distributed garbage collection, JNDI, and CORBA. In short, a treasure trove of valuable RMI knowledge packed into one book.
    Anmerkung: "Designing & building distributed applications"--Cover. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 89
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 490 p. , ill. ; , 23 cm
    Ausgabe: 3rd ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 90
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 997 p. , ill. ; , 23 cm
    Schlagwort(e): Application software ; Development ; Microsoft .NET ; Programming languages (Electronic computers) ; Electronic books ; local
    Kurzfassung: The .NET Framework provides a runtime environment called the Common Language Runtime, which manages the execution of code and provides services that make the development of robust software easier. The Common Language Runtime (CLR) provides a solid foundation for developers to build various types of applications. Whether a developer is writing an ASP.NET application, a Windows Forms application, a Web Service, a mobile code application, a distributed application, or an application that combines several of these application models, the CLR provides huge benefits such as simplified development and the ability to integrate code written in various languages. This book is a high-end comprehensive reference to the capability of the CLR. The samples in the book have been written so that they not only illustrate a principle but give the reader a springboard to quickly translate the sample to practical, real-world applications. After reading this book, readers will be able to significantly increase their productivity by comfortably using the power and expressiveness of the Common Language Runtime in their applications. This book will take the reader beyond the syntax of C# to using and understanding the CLR to build secure, maintainable, and high performance applications.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 91
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: ix, 228 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.7/2
    Schlagwort(e): Application software ; Development ; User interfaces (Computer systems) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: This concise book gives you the information you need to effectively use the Simple API for XML (SAX2), the dominant API for efficient XML processing with Java. With the SAX2 API, developers have access to the information in XML documents as they are read, without imposing major memory constraints or a large code footprint. SAX2 is often used by other APIs "under the covers", and provides a foundation for processing and creating both XML and non-XML information. While generally considered the most efficient approach to handling XML document parsing, SAX2 also carries a significant learning curve. In SAX2 , author David Brownell explores the many details of managing XML parsers, filtering the information those parsers return, generating your own SAX2 events to convert non-XML information to an XML form, and developing strategies for using event-based parsing in a variety of application scenarios. Created in a public process by the XML-Dev mailing list, the SAX2 API is compact and highly functional. SAX2 uses callbacks to report the information in an XML document as the document is read, allowing you to create your own program structures around the content of documents. No intermediary model of an entire XML document is necessary, and the mapping from XML structures to Java structures and back is straightforward. Both developers learning about SAX2 for the first time and developers returning for reference and advanced material about SAX2 will find useful information in this book. Chapters provide detailed explanations and examples of many different aspects of SAX2 development, while appendices provide a reference to the API and an explanation of the relationships between the SAX2 API and the XML Information Set. While the core of the API is quite approachable, many of its more advanced features are both obscure and powerful. You can use SAX2 to filter, modify, and restructure information in layers of processing which make it easy to reuse generic tools. SAX2 also has some significant limitations that applications need to address in their own ways. This new book gives you the detail and examples required to use SAX2 to its full potential, taking advantage of its power while avoiding its limitations.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 92
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 430 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Linux ; Client/server computing ; Computer networks ; Security measures ; Web servers ; Electronic books ; local
    Kurzfassung: Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured--some of which rival expensive commercial equivalents--making Linux a particularly appropriate platform for providing secure Internet services. Building Secure Servers with Linux will help you master the principles of reliable system and network security by combining practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the larger Internet--and shows readers how to harden their hosts against attacks. Author Mick Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. The book does not cover firewalls, but covers the more common situation where an organization protects its hub using other systems as firewalls, often proprietary firewalls. The book includes: Precise directions for securing common services, including the Web, mail, DNS, and file transfer. Ancillary tasks, such as hardening Linux, using SSH and certificates for tunneling, and using iptables for firewalling. Basic installation of intrusion detection tools. Writing for Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Building Secure Servers with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages. An all-inclusive resource for Linux users who wish to harden their systems, the book covers general security as well as k...
    Anmerkung: "Tools & best practices for bastion hosts"--Cover. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 93
    Online-Ressource
    Online-Ressource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 532 p. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Data encryption (Computer science) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Extensible Markup Language (XML) is the environment of choice for creating many of today's technologically sophisticated and security-sensitive Web applications. With Secure XML, developers now have the hands-on guide they need to combine a strong foundation in XML with proven, practical techniques for enabling the secure transmission of data across the Web. Broad-based and comprehensive, Secure XML fully documents every feature and issue involved with XML security. Opening with a complete introduction to XML, the book then provides detailed coverage of authentication, canonicalization, keying, encryption, algorithms, and more. Notes, background information, guidelines, and "soapbox," or heretical comments, expand on the book's practical focus throughout. In all, this book features the most comprehensive roadmap to digital security and XML encryption available. Topics covered in-depth include: XML basics-documents, namespaces, structures, DTDs and schemas, and stylesheets XPath, XPointer, and SOAP Digital cryptography basics--secret and public key ciphers, asymmetric keys, digital signatures, and certificates XML canonicalization, signatures, and authentication XML encryption Key management and combining encryption with signatures Cryptographic algorithms and noncryptographic algorithms Detailed and practical, this book provides reliable solutions for securing XML and for safeguarding information flow across today's sophisticated Web. 0201756056B06262002
    Anmerkung: Includes bibliographical references (p.495-506) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 94
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 384 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Compuer crimes ; Investigation ; Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: This book teaches readers what they need to know to not only set up an incident response effort, but also how to improve existing incident response efforts. The book provides a comprehensive approach to incident response, covering everything necessary to deal with all phases of incident response effectively ¿ spanning from pre-incident conditions and considerations to the end of an incident. Although technical considerations, (e.g. the particular binaries in Unix and Linux and dynamically linked libraries in Windows NT and Windows 2000) that need to be inspected in case they are corrupted, the types of logging data available in major operating systems and how to interpret it to obtain information about incidents, how network attacks can be detected on the basis of information contained in packets, and so on ¿ the major focus of this book is on managerial and procedural matters. Incident Response advances the notion that without effective management, incident response cannot succeed.
    Anmerkung: Includes bibliographical references (p. 342-353) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 95
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: vii, 394 p. , ill. ; , 24 cm
    DDC: 005.2/768
    Schlagwort(e): Microsoft Visual BASIC ; Application software ; Development ; BASIC (Computer program language) ; Web site development ; Electronic books ; local
    Kurzfassung: Get on the fast track of what is becoming a required skill for software developers--the ability to create Web Services and clients that consume them. Web Services leverage standards such as XML, XSD, SOAP, and WSDL to enable interoperability across programming languages and platforms. They work well to integrate applications on an intranet and on the Internet. Visual Basic .NET, coupled with the .NET Framework, is an attractive environment for Web Services architecture because it provides for rapid development and easy maintenance. This book explains each of the standard protocols needed for Web Service interaction on the client or server. These protocols include SOAP, Web Services Description Language (WSDL), and Universal Description Discovery and Integration (UDDI). Creating and Consuming Web Services in Visual Basic ® also includes Information on how to shape SOAP messages and the data they contain Explanations of how to create applications that consume Web Services Detailed case studies that explore how to use Web Services to help solve real-world B2B and B2C problems Thorough coverage of development concerns such as security and availability Instructions for how to create and consume Web services in earlier versions of VB and convert legacy applications to a Web Services platform 0672321564B06072002
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 96
    Online-Ressource
    Online-Ressource
    Boston ; : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 224 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Schlagwort(e): Application software ; Development ; SQL (Computer program language) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: "Dan's book provides something that the formal standards and development manuals sorely lack: a context that helps developers understand how to use XML in their own projects." --Tim Kientzle, Independent Software Consultant XML and SQL: Developing Web Applications is a guide for Web developers and database programmers interested in building robust XML applications backed by SQL databases. It makes it easier than ever for Web developers to create and manage scalable database applications optimized for the Internet. The author offers an understanding of the many advantages of both XML and SQL and provides practical information and techniques for utilizing the best of both systems. The book explores the stages of application development step by step, featuring a real-world perspective and many examples of when and how each technology is most effective. Specific topics covered include: Project definition for a data-oriented application Creating a bullet-proof data model DTDs (document type definitions) and the design of XML documents When to use XML, and what parts of your data should remain purely relational Related standards, such as XSLT and XML Schema How to use the XML support incorporated into Microsoft's SQL Server™ 2000 The XML-specific features of J2EE™ (Java™ 2 Enterprise Edition) Throughout this book, numerous concrete examples illustrate how to use each of these powerful technologies to circumvent the other's limitations. If you want to use the best part of XML and SQL to create robust, data-centric systems then there is no better resource than this book. 0201657961B10152001
    Anmerkung: Includes bibliographical references (p. 209-210) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 97
    Online-Ressource
    Online-Ressource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxv, 530 p. , ill. ; , 23 cm. +
    DDC: 005.265
    Schlagwort(e): Application software ; Development ; Pen-based computers ; Electronic books ; local
    Kurzfassung: The authoritative guide to creating applications for the Tablet PC-direct from the Microsoft Tablet PC software development team! The introduction of faster chips and hardware has recently enabled the first workable, tablet-sized, pen-based PCs. Building Tablet PC Applications distills the best usability research on pen-based computing to present an authoritative discussion of how to design pen-based applications and user interfaces. It also gives you an in-depth description of the Tablet PC Platform SDK, complete with tips and tricks on how to produce "ink-aware" applications for the Microsoft® Windows® XP Table PC Edition operating system. By the time you finish this book, you'll understand how to create natural, pen-based applications for this exciting new platform, where portability, digital ink, and pen-driven input are the new PC paradigm.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 98
    Online-Ressource
    Online-Ressource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.2/762
    Schlagwort(e): Application software ; Development ; Java (Computer program language) ; Python (Computer program language) ; Electronic books ; local
    Kurzfassung: Characterized by ease of use, richness of expression, and concise syntax, Python has remained a premier programming language for more than a decade, and is used by novices and professionals alike. In particular, its close relationship to Java™ makes the two languages, when used in combination, ideal for Web and distributed enterprise application development. This tutorial begins with coverage of some of the basics of Python programming. Using plenty of skill-building exercises and interactive programming sessions, this book will help those new to programming develop an understanding of concepts and practical techniques. For experienced programmers, the book demonstrates Python's breadth of capabilities and shows the ways that Python interfaces with Java APIs for professional application development. Python Programming with the Java™ Class Libraries: A Tutorial for Building Web and Enterprise Applications with Jython covers important topics such as: Fundamental programming concepts, including statements, expressions, interpreters, and compilers Python basics, including operators, string formatting, namespaces, classes, errors, and exceptions Object-oriented programming concepts File input/output Python's intrinsic functions Formatting, parsing, and manipulating strings Interfacing with the Java APIs and working with Java Streams Using Python and Java Swing to create GUIs Working with SQL and JDBC™ Python and Java applets In addition, the book contains instructions for downloading and installing the Python language and the Java Development Kit (JDK). Terminology, definitions, explanations, and numerous code samples make this book a useful learning experience. Whether you are a sophisticated computer user new to programming or a serious application developer, Python Programming with the Java™ Class Libraries will give you insight into the power of Python and the know-how to put it to work. 0201616165B07022002
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 99
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 480 p. , ill. ; , 23 cm. +
    Ausgabe: 1st ed.
    Schlagwort(e): Cocoon (Electronic resource) ; Application software ; Development ; Internet programming ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Cocoon: Building XML Applications is the guide to the Apache Cocoon project. The book contains the much needed documentation on the Cocoon project, but it does not limit itself to just being a developer¿s handbook. The book motivates the use of XML and XML software (in particular open source software). It contains everything a beginner needs to get going with Cocoon as well as the detailed information a developer needs to develop new and exciting components to extend the XML publishing framework. Although each chapter builds upon the previous ones, the book is designed so that the chapters can also be read as individual guides to the topics they discuss. Varied "hands-on" examples are used to make the underlying concepts and technologies absolutely clear to anyone starting out with Cocoon. Chapters that detail the author¿s experience in building Internet applications are used to embed Cocoon into the "real world" and complete the picture. mdMatthew Langham and Carsten Ziegeler
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 100
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 575 p. , ill. ; , 23 cm
    DDC: 005.7/2
    Schlagwort(e): JavaServer pages ; Application software ; Development ; Web sites ; Design ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: The first Internet revolution was all about delivering information to people. We are now in the second revolution, which focuses on delivering information to systems. XML is the tool that makes this new revolution a reality, and Web services are the methods by which businesses will drive system-to-system communication. JSP(TM) and XML takes you beyond the basics, giving you practical advice and in-depth coverage. In the book, you'll learn the technologies and techniques needed to create your own Web services for use in JSP applications. Written by programmers for programmers, the book will help you successfully utilize these exciting technologies with minimal hassle and maximum speed. In JSP™ and XML you will: Learn how to use XML, XSLT, and XPath in your JSP site Program SAX to speed up your XML document processing Understand DOM to learn the W3C standard method of working with XML Coordinate cross-browser client-side XML utilization Understand the Web services alphabet Learn how to leverage Web services to simplify access to your data Learn how SOAP, WSDL, and UDDI integrate into Web Services Use JDOM and dom4J to easily work with XML files Design a balanced JSP site using XML Expand your knowledge of JSP to add new functionality to your Web pages Learn how to practically apply Servlet filters and listeners to a Web site Build dynamic JSP pages that can self- modify, making sites easier to maintain Understand how the new JSP XML syntax works Review the basics of database access within JSP Learn JSP tag library design and how tag libraries simplify using XML and Web Services
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...