Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (220)
  • Operating systems (Computers)  (167)
  • Computer security  (57)
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xv, 362 p. , ill. ; , 23 cm
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: What better way to learn something than from the inside? Novell Linux Desktop 9 Administrator's Handbook brings you inside the system and inside the only Novell authorized administrator's handbook for the new Novell Linux Desktop (NLD). Learn how NLD interacts with other Novell components and how to integrate security throughout the operating system. You'll also cover: Working with graphical interfaces, devices and file systems How to boot, initialize, shutdown and run levels Linux administration With the help of Novell Linux Desktop 9 Administrator's Handbook , you will master the administration of Novell Linux Desktop 9 systems.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xiii, 435 p. , ill. ; , 23 cm. +
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Novell Linux Desktop 9 User's Handbook is the official handbook to help you take control of you Novell Linux Desktop. Walk through the new Novell Linux interfaces as you learn how to use them, interact with the operating system, create files and more. Cover everything that you need to know to effectively and efficiently use the new desktop and quickly get up to speed on the latest technology from Novell with Novell Linux Desktop 9 User's Handbook .
    Note: Accompanied by Supplemental DVD. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xix, 530 p. , ill. ; , 23 cm
    Edition: [2nd ed.].
    DDC: 005.432
    Keywords: Mac OS ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: As Unix spreads its tentacles across users' desktops, more and more Mac users are starting to pop the hood and learn about the operating system that's at the root of it all. And there's no better way to conquer that fear than by consulting this Visual QuickPro Guide. Matisse Enzer , who wrote the first edition of this book, Unix for Mac OS X: Visual QuickPro Guide has completely updated this guide to reflect all that's new in Tiger's version of Unix. Readers will learn everything they need to know to make sense of the commands and technical jargon surrounding Unix. In the process they'll find out about useful utilities, editing and printing files, security, and more--all through simple, step-by-step instructions that break the learning process into manageable chunks. Throughout, users will find plenty of the tips and visual references that have become the hallmark of Peachpit's popular Visual QuickPro Guides. Unix for Mac OS X 10.4: Visual QuickPro Guide is perfect for any Mac user interested in learning about the Unix operating system.
    Note: Includes index. - Previous ed.: 2003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: "When it comes to software security, the devil is in the details. This book tackles the details." --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies "McGraw's book shows you how to make the 'culture of security' part of your development lifecycle." --Howard A. Schmidt, Former White House Cyber Security Advisor "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the lunchroom wall." --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book's methods without radically changing the way you work. Inside you'll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development lifecycle with the touchpoints described in this book. Let this expert author show you how to build more secure software by building security in.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Upper Saddle River, NJ. ; : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 480 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.4469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Praise for Marcel Gagné's Moving to Linux: Kiss the Blue Screen of Death Goodbye! "This is kind of a funny book for me to be recommending to readers of a Windows newsletter, but a lot of people ask me about this topic, so here goes. Author Marcel Gagné is a columnist for Linux Journal , and in Moving to Linux he's prepared a step-by-step guide to converting a Windows PC to Linux-or just trying it! The book includes a bootable CD with a version of Linux that you can poke around in without touching or changing anything about your Windows installation. If your boss is asking, 'What's with this Linux stuff?', moving to Linux is a great way to show that you know what you're talking about." -Brian Livingston, Editor, WindowsSecrets.com "Pros: Too many to list in the available space. We liked the book from the very first page right through to the end. Gagné has done a solid job of exposing Linux and all its components in a way that is both inviting, useful, and easy to understand . . . We really liked this book-highly recommended." -Howard Carson, Kickstart News, www.kickstartnews.com "Marcel walks the user through each technique in a very chatty and comfortable style. In fact, when I put the book down, I had a momentary impression that I'd just finished watching a good cooking show with an entertaining chef. (Australian readers may understand if I say that it felt like having just watched Ian Parmenter do an episode of 'Consuming Passions.')" -Jenn Vesperman, Linuxchix.org "Gagné's Moving to Linux is a straightforward exposition of just how a non-hacker PC user can get rid of 'The Blue Screen of Death'. If you have a friend, a co-worker, a significant other, or a relative who periodically screams, sighs, bursts into tears, or asks for help, here's the simple solution. It comes with a bootable CD of Knoppix, Klaus Knopper's variant of Debian." -Peter H. Salus, writing in ;login: The Usenix Magazine "This is a book aimed not at you, dear developer/techie/guru, but at your friends, acquaintances, and family who are lowly users of Windows. Yes, such people do exist even in the tightest of families. Fear not, however, because salvation is at hand should any of them decide that this Linux thing might be worth investigating. No longer will you be faced with the unenviable task of walking them through the process of switching OS. Moving to Linux: Kiss the Blue Screen of Death Goodbye! is a big, bold, and friendly guide to help them along. The emphasis i...
    Note: Disc in pocket attached to inside back cover. - Includes index. - Previous ed.: Boston, Mass. : Addison-Wesley, 2004
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 887 p. , ill. ; , 23 cm. +
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: In-depth technical information and tools to help IT professionals deploy Microsoft Windows desktop operating systems and applications-straight from the source. Get definitive guidance, plus must-have tools, templates, and scripts on CD.
    Note: Accompanying CD-ROM includes scripts, worksheets, white papers, and an eBook. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    San Jose, Calif. ; : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xvii, 533 p. , ill. ; , 23 cm
    Edition: 3rd ed. /
    DDC: 005.8
    Keywords: Linux (Computer file) ; Computer security ; Electronic books ; local
    Abstract: An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall optimization along with some advanced concepts including customizing the Linux kernel to enhance security.The third edition, while distribution neutral, has been updated for the current Linux Kernel and provides code examples for Red Hat, SUSE, and Debian implementations. Don't miss out on the third edition of the critically acclaimed Linux Firewalls .
    Note: Previous ed.: published as by Robert L. Ziegler. Indianapolis, Ind.: New Riders, 2001
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxi, 548 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: A smart collection of insider tips and tricks, Windows XP Hacks , Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes extensive coverage of hot-button issues such as: security web browsing controlling the control panel removing uninstallable XP components pop-up ads You'll also find timesaving hacks for file distribution; digital media, such as iTunes; and high-visibility web software, services, and exploits that have emerged since the book's last edition. Each hack in the book can be read easily in just a few minutes, saving countless hours of searching for the right answer.Now completely revised and updated to cover Service Pack 2 (SP2), the second edition of this bestseller carefully breaks down the new features that come with SP2, including IE pop-up blocker, Windows Firewall, and the new wireless client.Written by Preston Gralla, the compact and affordable Windows XP Hacks , Second Edition provides direct, hands-on solutions that can be applied to the challenges facing XP beginners, as well as the more experienced power user. Each year, Windows XP is pre-installed on 90 million PCs worldwide, making it the world's most popular operating system.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xii, 177 p. , ill. ; , 26 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer security ; Computers ; Access control ; Data protection ; Identity theft ; Electronic books ; local
    Abstract: From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances shows you how to regain control of your life. You'll learn how to keep private information private, stop nosy bosses, get off that incredibly annoying mailing list, and more. Unless you know what data is available about you and how to protect it, you're a sitting duck. Computer Privacy Annoyances is your guide to a safer, saner, and more private life. Written by privacy pro Dan Tynan, and based on interviews with privacy experts from all over the globe, Computer Privacy Annoyances serves up real-world advice in bite-sized portions that will help you stop the snoops in their tracks. The book even addresses non-computing threats, from telemarketer-cum-stalkers, thieves at your mailbox, nosy folks in your HR department, cell phone eavesdroppers, and more. The key areas covered include: Privacy at Home Privacy on the Net Privacy at Work Privacy in Public Privacy and Uncle Sam Privacy in the Future Daniel Tynan has written about Internet privacy and security for nearly a decade. His work has appeared in more than 40 national publications. As executive editor at PC World , Tynan edited a special issue on Internet Privacy that won a Grand Neal Award and was a finalist for a National Magazine Award. He has won more than a dozen other honors, including nine Neals, four Maggies, and two Computer Press Association Awards.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 653 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Operating systems (Computers) ; Electronic books ; local
    Abstract: Each year, Windows XP is pre-installed on 30 million PCs sold inthe U.S.--and 90 million worldwide--making it the world's mostpopular operating system, and proving to frustrated userseverywhere that preponderance does not equate to ease of use. Thereare literally thousands of programs, tools, commands, screens,scripts, buttons, tabs, applets, menus, and settings containedwithin Windows XP. And it has only been in the last couple of yearsthat Microsoft's documentation has actually been more of a helpthan a hindrance. But it still isn't enough. Windows XP users and administrators need a quick and easy way tofind answers. Plenty of books go into detail about the theorybehind a particular technology or application, but few go straightto the essentials for getting the job done. Windows XPCookbook does just that, tackling the most common tasks neededto install, manage, and support Windows XP. Featuring a new twist to O'Reilly's proven Cookbook formula,this problem-solving guide offers multiple solutions for each ofits 300-plus recipes. Solve dilemmas with the graphical userinterface, the command line, through the Registry, or by usingscripts. Each step-by-step recipe includes a discussion thatexplains how and why it works. The book is also among the first tocover Microsoft's XP Service Pack 2. With these practical,on-the-job solutions, Windows XP Cookbook will save youhours of time searching for answers. Windows XP Cookbook will be useful to anyone that has touse, deploy, administer, or automate Windows XP. But this isn't atypical end-user book; it covers the spectrum of topics involvedwith running Windows XP in both small and large environments. As aresult, IT professionals and system administrators will find it agreat day-to-day reference. And power users will find Windows XPCookbook a great source for information on tweaking XP andgetting the most out of their systems. The bottom line is that Windows XP Cookbook will make just about anyone who uses XPmore productive.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 445 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: FreeBSD ; OpenBSD ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Abstract: FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure.FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems.Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate.Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 1142 p. , ill. ; , 24 cm
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!" James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker Jamesaccusource.net "Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003." Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com "Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security." Bob Reinsch bob.reinsch@fosstraining.com " Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information." Richard Siddaway, MCSE rsiddaw@hotmail.com "Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security." Michael VonTungeln, MCSE, CTT mvontung@yahoo.com "I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it. Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all." Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net "R...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 747 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company. Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. This shorter version of the original work omits much mathematical formalism, making it more accessible for professionals and students who have a less formal mathematical background, or for readers with a more practical than theoretical interest.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Harlow : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 347 p. , ill. ; , 24 cm. +
    DDC: 005.8
    Keywords: Business enterprises ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Praise for J.C. Cannon's Privacy "A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between." -Peter Wayner, author of Translucent Databases "Cannon provides an invaluable map to guide developers through the dark forest created by the collision of cutting-edge software development and personal privacy." -Eric Fredericksen, Sr. Software Engineer, PhD., Foundstone, Inc. "Cannon's book is the most comprehensive work today on privacy for managers and developers. I cannot name any technical areas not covered. No practitioners should miss it." -Ray Lai, Principal Engineer, Sun Microsystems, Inc., co-author of Core Security Patterns and author of J2EE Platform Web Services "Every developer should care deeply about privacy and this is the best book I've read on the subject. Get it, read it, and live it." -Keith Ballinger, Program Manager, Advanced Web Services, Microsoft "J.C. Cannon's book demonstrates that information and communication technology can contribute in a significant way to restoring individual privacy and raises more awareness of the complexity and importance of this societal problem." -Dr. John J. Borking, Former Commissioner and Vice-President of the Dutch Data Protection Authority "If you are planning, implementing, coding, or managing a Privacy campaign in your company or your personal computing, there is no more relevant reference. J.C. Cannon nails the issues." -Rick Kingslan, CISSP, Microsoft MVP-Windows Server: Directory Services and Right Management, West Corporation "It's often been said that security is a process, not a product. Privacy is no different! Unlike other privacy books, J.C. Cannon's book has something valuable to convey to everyone involved in the privacy process, from executives to designers and developers, many of whom aren't thinking about privacy but should be." -Keith Brown, Co-founder of Pluralsight and author of The .NET Developer's Guide to Windows Security and Programming Windows Security "J.C. Cannon's new book on electronic privacy is an important addition to the available works in this emerging field of study and practice. Through many humorous (and occasionally frightening) examples of privacy gone wrong, J.C. helps you better understand how to protect your privacy and how to build privacy awareness into your organization and its development process. Keenly illustrating both the pros and cons of various privacy-e...
    Note: Includes bibliographical references (p. 319-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Note: Includes bibliographical references (p. [389]-395) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Language: English
    Pages: xxviii, 683 p. , ill. ; , 25 cm
    DDC: 005.3
    Keywords: FreeBSD ; Free computer software ; Operating systems (Computers) ; Electronic books ; local
    Abstract: As in earlier Addison-Wesley books on the UNIX-based BSD operating system, Kirk McKusick and George Neville-Neil deliver here the most comprehensive, up-to-date, and authoritative technical information on the internal structure of open source FreeBSD. Readers involved in technical and sales support can learn the capabilities and limitations of the system; applications developers can learn effectively and efficiently how to interface to the system; system administrators can learn how to maintain, tune, and configure the system; and systems programmers can learn how to extend, enhance, and interface to the system. The authors provide a concise overview of FreeBSD's design and implementation. Then, while explaining key design decisions, they detail the concepts, data structures, and algorithms used in implementing the systems facilities. As a result, readers can use this book as both a practical reference and an in-depth study of a contemporary, portable, open source operating system. This book: Details the many performance improvements in the virtual memory system Describes the new symmetric multiprocessor support Includes new sections on threads and their scheduling Introduces the new jail facility to ease the hosting of multiple domains Updates information on networking and interprocess communication Already widely used for Internet services and firewalls, high-availability servers, and general timesharing systems, the lean quality of FreeBSD also suits the growing area of embedded systems. Unlike Linux, FreeBSD does not require users to publicize any changes they make to the source code.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 381 p. , ill. ; , 23 cm
    Keywords: Computer networks ; Security measures ; Computer security ; Computer security ; United States ; Management ; Data protection ; Data protection ; Management ; Electronic books ; local
    Abstract: Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization's aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board. Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow fin...
    Note: "Understand the total cost of ownership and return on investment for network security solutions"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xiii, 324 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.
    Note: "Writing, hacking, and modifying security tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 341 p. , ill. ; , 23 cm. +
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: For years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you to perform all the tasks you can do with Windows.Getting to know Linux has never been easier, because now there's a way to test-drive Linux without changing, installing, or configuring a thing on your computer. It's called Test Driving Linux: From Windows to Linux in 60 Seconds .This latest release from O'Reilly comes with a Live CD called Move, that allows Windows users to try all the features of Mandrake Linux, a popular Linux distribution without the hassle of actually installing Linux. Users simply place the Move CD into their CD drive, boot from the disc, then watch an entire Mandrake system run on the fly from the CD-ROM. Test Driving Linux: From Windows to Linux in 60 Seconds is a detailed step-by-step guide to the Linux operating system and several popular open source programs. With this guide you can quickly learn how to use Linux to perform the tasks you do most: surf the web, send and receive email, instant message with friends, write letters, create spreadsheets, and even how to enhance your digital photos. Test Driving Linux: From Windows to Linux in 60 Seconds provides both home and business users with a hassle-free way to investigate this operating system before they purchase and install a complete Linux distribution.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 478 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.
    Note: "A system administrator's guide to hetrogeneous networking"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly. | Boston, MA :Safari,
    Language: English
    Pages: xxii, 534 p. , ill. ; , 24 cm
    DDC: 005.43
    Keywords: Operating systems (Computers) ; Electronic books ; local
    Abstract: Shell scripting skills never go out of style. It's the shell that unlocks the real potential of Unix. Shell scripting is essential for Unix users and system administrators-a way to quickly harness and customize the full power of any Unix system. With shell scripts, you can combine the fundamental Unix text and file processing commands to crunch data and automate repetitive tasks. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards. Classic Shell Scripting is written to help you reliably navigate these tricky waters.Writing shell scripts requires more than just a knowledge of the shell language, it also requires familiarity with the individual Unix programs: why each one is there, how to use them by themselves, and in combination with the other programs. The authors are intimately familiar with the tips and tricks that can be used to create excellent scripts, as well as the traps that can make your best effort a bad shell script. With Classic Shell Scripting you'll avoid hours of wasted effort. You'll learn not only write useful shell scripts, but how to do it properly and portably.The ability to program and customize the shell quickly, reliably, and portably to get the best out of any individual system is an important skill for anyone operating and maintaining Unix or Linux systems. Classic Shell Scripting gives you everything you need to master these essential skills.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xvi, 401 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Keywords: Operating systems (Computers) ; Electronic books ; local
    Abstract: "Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their coding. The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces. It covers the Linux kernel from both angles, theoretical and applied, which should appeal to readers with a variety of interests and needs."--BOOK JACKET.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Sebastopol, Calif. : Pogue Press/O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 847 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.4469
    Keywords: Mac OS ; Macintosh (Computer) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: You can set your watch to it: As soon as Apple comes out with another version of Mac OS X, David Pogue hits the streets with another meticulous Missing Manual to cover it with a wealth of detail. The new Mac OS X 10.4, better known as Tiger, is faster than its predecessors, but nothing's too fast for Pogue and Mac OS X: The Missing Manual . There are many reasons why this is the most popular computer book of all time. With its hallmark objectivity, the Tiger Edition thoroughly explores the latest features to grace the Mac OS. Which ones work well and which do not? What should you look for? This book tackles Spotlight, an enhanced search feature that helps you find anything on your computer; iChat AV for videoconferencing; Automator for automating repetitive, manual or batch tasks; and the hundreds of smaller tweaks and changes, good and bad, that Apple's marketing never bothers to mention. Mac OS X: The Missing Manual, Tiger Edition is the authoritative book that's ideal for every user, including people coming to the Mac for the first time. Our guide offers an ideal introduction that demystifies the Dock, the unfamiliar Mac OS X folder structure, and the entirely new Mail application. There are also mini-manuals on iLife applications such as iMovie, iDVD, and iPhoto, those much-heralded digital media programs, and a tutorial for Safari, Mac's own web browser. And plenty more: learn to configure Mac OS X using the System Preferences application, keep your Mac secure with FileVault, and learn about Tiger's enhanced Firewall capabilities. If you're so inclined, this Missing Manual also offers an easy introduction to the Terminal application for issuing basic Unix commands. There's something new on practically every page, and David Pogue brings his celebrated wit and expertise to every one of them. Mac's brought a new cat to town and we have a great new way to tame it.
    Note: "Covers Mac OS X 10.4"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xiii, 270 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysis But the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.
    Note: "Solutions and examples for Snort administrators"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 822 p. , ill. ; , 24 cm
    DDC: 005.446
    Keywords: Mac OS ; Macintosh (Computer) ; Operating systems (Computers) ; Web servers ; Electronic books ; local
    Abstract: From the command line to Apple's graphical tools, this book uses a thorough, fundamental approach that leads readers to mastery of every aspect of the server. Full of much-needed insight, clear explanations, troubleshooting tips, and security information in every chapter, the book shows system administrators how to utilize the software's capabilities and features for their individual needs. Some of the topics covered in detail include: Installation Deployment Server management Directory services Web application services System interaction Data gathering Stress planning This comprehensive guide also takes the time to carefully highlight and analyze the differences between Mac OS X and the other server platforms.Whether you're a seasoned Unix or Windows administrator or a long-time Mac professional, Essential Mac OS X Panther Server Administration provides you with the depth you're seeking to maximize the potential of your Mac OS X Panther Server.
    Note: "Integrating Mac OS X server into heterogeneous networks"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit ; | Boston, MA :Safari,
    Language: English
    Pages: 703 p. ; , 23 cm
    DDC: 005.446
    Keywords: Mac OS ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: So you're finally ready to find out what all the fuss is about. Whether you're switching from Windows or upgrading from an older Mac OS, this task-based guide represents the surest way to go from 0 to 60 in no time flat with Apple's much anticipated Mac OS X Tiger--more mature, powerfully enhanced, and with more than 200 new features that will knock your socks off. In this thoroughly revised bestseller, Maria Langer walks readers through the process of installing and configuring Tiger, then introduces the Mac OS desktop, including the Dock and the Sidebar, before moving on to more advanced Finder techniques, application basics, printing and faxing, connecting to the Internet, account management, configuring your Mac for multiple users, and more. Weighing in at over 700 pages, this new edition also offers plenty of coverage on what's new in Mac OS X Tiger, including Spotlight, the search tool that helps you find anything on your Mac instantly; multi-way video in iChat AV; the enhanced Mail application; Automator, which lets you automate repetitive manual tasks; Tiger's ultra-useful mini-applications (known as "Dashboard Widgets"); and more. Rounded out with plenty of tips, tricks, and sage advice, this book is equally useful for Macintosh novices as well as early adopters looking for a comprehensive reference on what's new in this much-talked-about Mac OS upgrade.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Electronic books ; local
    Abstract: The Definitive Guide to Protecting Enterprise Data Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecycle Management , leading industry consultant Tom Petrocelli presents a systematic, coherent approach to planning and implementing cost-effective data protection. This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy. Coverage includes A complete, unique framework for considering and planning data protection Understanding storage technology from the standpoint of data protection Architecting more effective backup/restore solutions Using remote copy and replication to keep data synchronized and support immediate failover to hot sites Leveraging core computer security concepts and strategies to protect your most critical data Securing your entire storage infrastructure, not just servers Using policy-driven data protection and Data Lifecycle Management (DLM) to improve security and reduce cost Using ILM to identify your highest-value data and choose the right ways to protect it Data Protection and Information Lifecycle Management is an indispensable resource for IT executives who must plan and implement strategies for data protection; administrators who must protect data on a day-to-day basis; and product managers, consultants, and marketers responsible for crafting superior data-security solutions.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Redmond, WA : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xlvii, 350 p. , col. ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The smart way to learn Windows XP-one step at a time! This fully updated edition makes it easy to teach yourself how to personalize and manage your system, use the new service pack, enjoy digital media technologies, troubleshoot problems, and more.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xiii, 333 p. , col. ill. ; , 19 x 23 cm
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Get the fast facts that make learning Windows XP plain and simple! Fully updated for the latest service packs, technologies, and security updates, this colorful, no-nonsense guide shows the most expedient way to learn a skill or solve a problem.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Language: English
    Edition: 4th ed.
    Keywords: Microsoft Windows (Computer file) ; Microsoft Windows server ; Computer network architectures ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The premier guide to the Windows kernel now covers Windows Server 2003, Windows XP, and Windows 2000, including 64-bit extensions. Get the architectural perspectives and insider insights needed to unlock the power of Windows.
    Note: Includes index. - Title from caption
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly | Boston, Mass. :Safari Books Online
    ISBN: 0596100094
    Language: English
    Pages: 206 p
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Windows PowerShell, formerly know by its codename "Monad" and available now for Windows Server 2003, Windows XP, and Windows Vista, and soon for Exchange Server 2007 and MOM, is the future of Windows administration. From setting up automated build environments to managing 20,000 Exchange email clients in an organization, any tool that reduces the number of repetitive steps an administrator must perform, is a real win. Even better, PowerShell part of a major Microsoft initiative that aims to replace a host of Windows management tools with a single, unified shell. This is the promise of PowerShell and the reason IT professionals need to start learning how to use it today Reflecting the best of legacy tools such as bash and the Korn shell, PowerShell also breaks new ground in its command language design and its use of the object-oriented .NET Framework. And there is no better way to learn how to put PowerShell to work than to get your hands on Monad , O'Reilly's innovative, hands-on introduction to the tool. This concise 200-page book is an exciting tour of some of the new capabilities thatPowerShell puts into the hands of system administrators and power users, and is the perfect complement to existing PowerShell documentation. With more than 40 hands-on activities, the book covers every angle, from using PowerShell commands and its object-oriented pipelines to querying systems, generating reports and writing scripts that automate existing tasks. Adding to the lure is the fact that the book is written by Microsoft manager, Andy Oakley with a Foreword by PowerShell architect Jeffrey Snover-so you can be certain that it's teeming with inside information. Monad lets you see for yourself how PowerShell can significantly improve your productivity. Because the PowerShell technology has wide appeal, so, too, does this compact guide. Developers, administrators, and power users alike can all benefit from its insight. If you're someone who habitually drifts toward the c-m-d keys, knows all of the switches to most command tools, or spends time authoring batch files to solve new challenges, this book is right up your alley. And if your organization plans to upgrade soon to Exchange 2007 or MOM V3, there's no time to waste. Breaking News: A PowerShell RC1 Update to the book is now available at no charge from the book's catalog page on oreilly.com!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xviii, 260 p. , ill. ; , 24 cm
    Edition: 4th ed.
    Keywords: Mac OS ; UNIX (Computer file) ; Operating systems (Computers) ; TIGER System (Information retrieval system) ; Electronic books ; local
    Abstract: Beneath Mac OS X Tiger's easy-to-use Aqua interface lies a powerful Unix engine. Mac users know that Unix is at their fingertips, if only they knew how to access it. Learning Unix for Mac OS X Tiger provides Mac users with a user-friendly tour of the Unix world concealed beneath Mac OS X's hood and shows how to make the most use of the command-line tools.Thoroughly revised and updated for Mac OS X Tiger, this new edition introduces Mac users to the Terminal application and shows you how to navigate the command interface, explore hundreds of Unix applications that come with the Mac, and, most importantly, how to take advantage of both the Mac and Unix interfaces. Readers will learn how to: Launch and configure the Terminal application Customize the shell environment Manage files and directories Search with Spotlight from the command line Edit and create text files with vi and Pico Perform remote logins Access internet functions, and much more Learning Unix for Mac OS X Tiger is a clear, concise introduction to what you need to know to learn the basics of Unix on Tiger. If you want to master the command-line, this gentle guide to using Unix on Mac OS X Tiger is well worth its cover price.
    Note: "Unlock the power of UNIX"--Cover. - First 2 eds. have title: Learning Unix for Mac OS X; 3rd ed. has title: Learning Unix for Mac OS X Panther. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Language: English
    Pages: xvii, 663 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Series Statement: In a nutshell
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Windows XP in a Nutshell , Second Edition documents everything there is to know about the world's most widely used operating system. Updated to include information on Service Pack 2 (SP2), this compact guide is the ultimate resource for IT professionals and Windows XP power users everywhere. Written in O'Reilly's time-tested in a Nutshell format, Windows XP in a Nutshell , Second Edition cuts through the hype and delivers practical details in a no-nonsense manner. At the heart of the book is an invaluable 200-plus-page section titled Windows XP Application and Tools. In it, readers will find: A list of available commands and utilities, including Start Menu accessories, command prompt tools, and hidden system administration utilities A Task and Setting Index for quick access to hundreds of XP settings A complete reference to XP's command prompt, including advanced commands and scripting features Windows XP in a Nutshell , Second Edition also includes a primer on files, folders, and windows; control panels and built-in applications; how to set up a PC for Internet use; and the standard Windows rituals of troubleshooting, installation, and upgrading. And, of course, this greatly expanded second edition also includes all the need-to-know details about the security technologies featured in SP 2, so you can better defend yourself against viruses, worms, and hackers. Readers even receive guidelines and instructions for installing SP2 on their PC, or across a network of computers. With its wealth of tips, careful instruction, and expert advice, this must-have desktop reference is dedicated to making your time at the computer safer, easier, and more fun.
    Note: "Covers Service Pack 2"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Language: English
    Pages: xviii, 714 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computerinteraction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security & Usability groups 34 essays into six parts: Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems--how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems--methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 238 p. , ill. ; , 24 cm
    Keywords: Linux ; Computer security ; Electronic books ; local
    Abstract: The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: A readable and concrete explanation of SELinux concepts and the SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With SELinux , a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Sebastopol, CA : Pogue Press/O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxi, 359 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Windows XP can be a great tool, but it is all too easy to trip over Windows XP's annoying traits more often than you leverage its productivity. Windows XP power-users troll online resources, documentation, and the expertise (or lucky finds) of friends for valuable tips and tricks--a keyboard shortcut here, an undocumented double-click there--to eliminate annoyances, save time, and take control of their Windows XP. But what if there was an easier way?This new book presents literally hundreds of problems and solutions, amazing power tips, cool tricks, and clever workarounds in one clearly organized, easy to use, and portable resource. Truly insightful and amusing, Windows XP Power Hound gives Windows XP users practical hints for everything from the desktop to Office programs to the registry, and includes documented (but little-known) tips as well as previously undocumented tricks. Windows XP Power Hound moves far beyond mere productivity and explores what's possible with Windows XP--including cool things you probably never thought of doing.An understanding of Windows XP basics will get the job done. But discovering the most useful I didn't know that! tips and shortcuts will make using Windows XP a far richer and less frustrating experience. The practical, concise format of Windows XP Power Hound makes it easy to dip into for a quick tip from time to time; the warm, jargon-free tone makes it easy to read cover to cover.Anyone who wants to smooth out Windows XP's speed bumps and get some serious speed to accelerate through the bottlenecks will find that even a handful of these useful, to-the-point tips will make Windows XP Power Hound worth its weight in chocolate.
    Note: "Covers Windows XP Home & Pro"--Cover. - Includes index. - Subtitle on cover: Teach yourself new tricks
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 350 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.26/8
    Keywords: Linux ; Electronic data processing ; Distributed processing ; High performance computing ; Operating systems (Computers) ; Parallel processing (Electronic computers) ; Electronic books ; local
    Abstract: To the outside world, a "supercomputer" appears to be a single system. In fact, it's a cluster of computers that share a local area network and have the ability to work together on a single problem as a team. Many businesses used to consider supercomputing beyond the reach of their budgets, but new Linux applications have made high-performance clusters more affordable than ever. These days, the promise of low-cost supercomputing is one of the main reasons many businesses choose Linux over other operating systems.This new guide covers everything a newcomer to clustering will need to plan, build, and deploy a high-performance Linux cluster. The book focuses on clustering for high-performance computation, although much of its information also applies to clustering for high-availability (failover and disaster recovery). The book discusses the key tools you'll need to get started, including good practices to use while exploring the tools and growing a system. You'll learn about planning, hardware choices, bulk installation of Linux on multiple systems, and other basic considerations. Then, you'll learn about software options that can save you hours--or even weeks--of deployment time.Since a wide variety of options exist in each area of clustering software, the author discusses the pros and cons of the major free software projects and chooses those that are most likely to be helpful to new cluster administrators and programmers. A few of the projects introduced in the book include: MPI, the most popular programming library for clusters. This book offers simple but realistic introductory examples along with some pointers for advanced use. OSCAR and Rocks, two comprehensive installation and administrative systems openMosix (a convenient tool for distributing jobs), Linux kernel extensions that migrate processes transparently for load balancing PVFS, one of the parallel filesystems that make clustering I/O easier C3, a set of commands for administering multiple systems Ganglia, OpenPBS, and cloning tools (Kickstart, SIS and G4U) are also covered. The book looks at cluster installation packages (OSCAR & Rocks) and then considers the core packages individually for greater depth or for folks wishing to do a custom installation. Guidelines for debugging, profiling, performance tuning, and managing jobs from multiple users round out this immensely useful book.
    Note: "A comprehensive getting started guide"--Cover. - Includes bibliographical references (p. 329-337) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: "It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding." --Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible." --Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight. "Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine. "Understanding the ultimate attacker's tool provides ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 670 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.7585
    Keywords: Microsoft Windows server ; Client/server computing ; Operating systems (Computers) ; Electronic books ; local
    Abstract: This practical reference guide offers hundreds of useful tasks for managing Windows 2000 and Windows Server 2003, Microsoft's latest and greatest server. Through concise, on-the-job solutions to common problems, Windows Server Cookbook for Windows Server 2003 & Windows 2000 is certain to save you hours of time searching for answers.Now, instead of dredging reams of Microsoft documentation or browsing its unstructured knowledge base to figure out a particular issue--such as how to compare registry values between two hosts--you can simply reference the index of Windows Server Cookbook for Windows Server 2003 & Windows 2000 . From there, you'll be directed to the exact trouble-shooting recipe they need.As the newest title in O'Reilly's popular Cookbook series, this book covers a wide range of issues that you are likely to face in your daily management of the Windows Server operating system. This includes how to deal with: files event logs DNS DHCP security the registry backup/restore One of the book's key benefits is the presentation of solutions in three different recipe formats. Depending on preference, you can solve most problems with the graphical user interface, the command line, or by using scripts. Where appropriate, all three solutions are presented for each recipe in this book. Each recipe also includes a detailed discussion that explains how and why it works. Windows Server Cookbook for Windows Server 2003 & Windows 2000 is written for all levels of system administrators on Windows servers. If you're a relatively new user with only a rudimentary understanding of the job, the book can open your eyes to the many possibilities that await. And if you're an advanced user, it can serve as a useful reference and memory-jogger.Download the code examples from this book. The complete set of examples isavailable at: http://www.rallenhome.com/books/​winsckbk/code.html .
    Note: "Step-by-step procedures and scripts for every occasion"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 713 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." -Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code-and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Upper Saddle River, NJ. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations of UNIX and UNIX-like environments. And yet, it does all this while retaining the style and taste of the original classic." --Mukesh Kacker, cofounder and former CTO of Pronto Networks, Inc. "One of the essential classics of UNIX programming." --Eric S. Raymond, author of The Art of UNIX Programming "This is the definitive reference book for any serious or professional UNIX systems programmer. Rago has updated and extended the classic Stevens text while keeping true to the original. The APIs are illuminated by clear examples of their use. He also mentions many of the pitfalls to look out for when programming across different UNIX system implementations and points out how to avoid these pitfalls using relevant standards such as POSIX 1003.1, 2004 edition and the Single UNIX Specification, Version 3." --Andrew Josey, Director, Certification, The Open Group, and Chair of the POSIX 1003.1 Working Group " Advanced Programming in the UNIX® Environment, Second Edition, is an essential reference for anyone writing programs for a UNIX system. It's the first book I turn to when I want to understand or re-learn any of the various system interfaces. Stephen Rago has successfully revised this book to incorporate newer operating systems such as GNU/Linux and Apple's OS X while keeping true to the first edition in terms of both readability and usefulness. It will always have a place right next to my computer." --Dr. Benjamin Kuperman, Swarthmore College Praise for the First Edition " Advanced Programming in the UNIX® Environment is a must-have for any serious C programmer who works under UNIX. Its depth, thoroughness, and clarity of explana-tion are unmatched." -- UniForum Monthly "Numerous readers recommended Advanced Programming in the UNIX® Environment by W. Richard Stevens (Addison-Wesley), and I'm glad they did; I hadn't even heard of this book, and it's been out since 1992. I just got my hands on a copy, and the first few chapters have been fascinating." -- Open Systems Today "A much more readable and detailed treatment of UNIX internals can be found in Advanced Programming in the UNIX® Environment by W. Richard Steven...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 352 p. , ill. ; , 23 cm. +
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Enter your Linux Desktop Garage Don't just survive with Linux: thrive Find tools & info to do practically everything , such as: Ripping your CDs (&DVDs) De-Spam-ifying your email Capturing, editing, organizing your digital photos Chatting with your Linux-deficient IM pals Tracking your contacts, appointments, life Transforming Firefox into easy blogware Finding great substitutes for your Windows apps Diving into a veritable plethora of games Where you get the truth (unvarnished) Where you get productive (quick) Where Linux is fun (honest) Your guide: Susan Matteson , real user, real expert She reveals the fun stuff (from MP3s to desktop wallpaper) Demystifies the essentials (from file management to passwords) Simplifies the tasks they said were easy, but weren't (until now) Where there's even more (plenty) Step-by-step instructions for both Mandrake & Fedora Linux Zero-hassle tips for managing & personalizing your PC Gnoppix Linux on CD-ROM (run Linux without touching Windows) © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 651 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Where has this book been all my professional life? It is about time someone wrote this book. The author covers many basic, practical issues that other authors omit in a format that makes for a great troubleshooting reference and for casual perusing. There are a lot of books available that give a broad overview of system and network administration, and there are a lot of detailed books on each specific topic covered in this book, but I don't know of any other place where I can get so much useful, practical information on such a wide range of topics in such a concise and readable form. I will highly recommend it to my friends and colleagues who are trying to manage their own systems. I am anxious to show it to our instructors who teach data communications and networks as a possible text or lab manual." -Ron McCarty, instructor and program chair, Computer Science, Penn State Erie "This book takes a very unique approach and is very flexible. It offers a great deal to the home user, students, small businesses-all the way to any Linux sys admin that needs a handy reference. I found it very refreshing in terms of style, stated goals, presentation, ease of use, direction, and the "present and future" value of the content. In other words the author is very current and knowledgeable. I would recommend this book to every level from programmer to manager." -Joe Brazeal, Information Technician III, Southwest Power Pool "This book is an excellent resource for new Linux administrators. I was impressed with the comprehensive set of 35 topic chapters, making this book a very useful reference. I know of no other work like this." -George Vish II, Linux curriculum program manager and senior education consultant, Hewlett-Packard Education "I would recommend this book to novice Linux users and administrators. It covers a lot of topics, and makes it easy for readers to follow along." -Bret Strong, education consultant, Hewlett-Packard Company "Linux Quick Fix Notebook is a well-written guide to designing, installing, and maintaining Linux servers. Many Linux reference texts are just simple rewrites of Linux ¨man¨ and ¨info¨ pages, but this book addresses the real issues that systems administrators encounter when working with Linux. The author provides a pedagogical guide to learning Linux server administration. In addition, the book includes step-by-step information so that users can quickly take advantage of the best that open source software has to offer today. I...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 643 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: HP-UX ; Operating systems (Computers) ; Electronic books ; local
    Abstract: This is the definitive guide to installing and administering HP-UX 11i Version 2 in any environment, on both HP 9000 and HP Integrity server families. Drawing on 18 years of on-site HP-UX consulting experience, Marty Poniatowski offers unparalleled practical insight into running HP-UX 11i efficiently and reliably, illuminating features even experienced HP-UX sysadmins find confusing. Poniatowski organizes this book around your day-to-day needs and your system's lifecycle. He begins with in-depth coverage of installation and bootup, then walks through everything from LVM and kernel configuration through networking. He especially focuses on the capabilities and tools that make HP-UX unique-and how you can use them to save time and money. Coverage includes Partitioning from start to finish-including vPars and nPartitions installation, creation, and modification Booting HP Integrity systems with EFI, and HP 9000 systems with PDC, ISL, or hpux Mastering the Management Processor (MP): console, virtual front panel, and command menu Using HP-UX's new kernel-building commands: kcconfig, kcusage, kctune, kcmodule, and more Working with HP-UX's new web-based tools: pd (devices), parmgr (partitions), and kcweb (kernel) Mapping LBA to slot numbers: clear explanations of a non-intuitive technique Using Ignite-UX to boot and recover systems across the network Managing disks, devices, backup, users/groups, and much more © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: 360 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The fastest route to true Linux mastery! You know your way around Windows (or maybe a Mac, or even UNIX). Now, you're ready for Linux. And you don't have a minute to waste. Welcome. This book's for you . Janet Valade has spent thirteen years helping new users master Linux and related technologies. She knows the "magic words" that'll help you get the job done, fast. (And she knows exactly how to keep you out of trouble, too!) You'll learn Linux through dozens of focused, bite-size examples, each one carefully designed to build on what you've learned before. Need specific solutions? This book's carefully crafted, high-efficiency format delivers them... instantly . Working on Fedora? Mandrake? SuSE? No matter. This book is for you. No other introduction to Linux covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with Linux- without the hassles! Choose the best Linux distribution for your personal or business needs Get Linux installed quickly and running reliably Handle your day-to-day tasks and efficiently manage your files Master KDE, GNOME, and the Linux command line Write documents and build spreadsheets with OpenOffice.org Set up Web access, email, and instant messaging Work with powerful Linux multimedia and graphics software Find, install, and run new Linux software Set up your printer to work with Linux Supercharge Linux with shell scripts and customized configuration files Includes concise Linux command reference and quick guide to building powerful Regular Expressions Spring Into ... is a new series of fast-paced tutorials from Addison-Wesley Professional Publishers. Each book in the series is designed to bring you up-to-speed quickly. Complex technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working... now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR ; | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 353 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The first comprehensive, expert guide for end-to-end Linux application optimization Learn to choose the right tools-and use them together to solve real problems in real production environments Superior application performance is more crucial than ever-and in today's complex production environments, it's tougher to ensure, too. If you use Linux, you have extraordinary advantages: complete source code access, plus an exceptional array of optimization tools. But the tools are scattered across the Internet. Many are poorly documented. And few experts know how to use them together to solve real problems. Now, one of those experts has written the definitive Linux tuning primer for every professional: Optimizing Linux® Performance. Renowned Linux benchmarking specialist Phillip Ezolt introduces each of today's most important Linux optimization tools, showing how they fit into a proven methodology for perfecting overall application performance. Using realistic examples, Ezolt shows developers how to pinpoint exact lines of source code that are impacting performance. He teaches sysadmins and application developers how to rapidly drill down to specific bottlenecks, so they can implement solutions more quickly. You'll discover how to: Identify bottlenecks even if you're not familiar with the underlying system Find and choose the right performance tools for any problem Recognize the meaning of the events you're measuring Optimize system CPU, user CPU, memory, network I/O, and disk I/O-and understand their interrelationships Fix CPU-bound, latency-sensitive, and I/O-bound applications, through case studies you can easily adapt to your own environment Install and use oprofile, the advanced systemwide profiler for Linux systems If you're new to tuning, Ezolt gives you a clear and practical introduction to all the principles and strategies you'll need. If you're migrating to Linux, you'll quickly master Linux equivalents to the tools and techniques you already know. Whatever your background or environment, this book can help you improve the performance of all your Linux applications-increasingbusiness value and user satisfaction at the same time. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive book on Security Patterns, which are critical for secure programming. --Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your development efforts. --Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. --Judy Lin, Executive Vice President, VeriSign, Inc. Core Security Patterns provides a comprehensive patterns-driven approach and methodology for effectively incorporating security into your applications. I recommend that every application developer keep a copy of this indispensable security reference by their side. --Bill Hamilton, author of ADO.NET Cookbook , ADO.NET in a Nutshell , and NUnit Pocket Reference As a trusted advisor, this book will serve as a Java developers security handbook, providing applied patterns and design strategies for securing Java applications. --Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase Like Core J2EE Patterns , this book delivers a proactive and patterns-driven approach for designing end-to-end security in your applications. Leveraging the authors strong security experience, they created a must-have book for any designer/developer looking to create secure applications. --John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE Patterns Core Security Patterns is the hands-on practitioners guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisionin...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Learn Linux kernel programming, hands-on : a uniquely effective top-down approach The Linux ® Kernel Primer is the definitive guide to Linux kernel programming. The authors' unique top-down approach makes kernel programming easier to understand by systematically tracing functionality from user space into the kernel and carefully associating kernel internals with user-level programming fundamentals. Their approach helps you build on what you already know about Linux, gaining a deep understanding of how the kernel works and how its elements fit together. One step at a time, the authors introduce all the tools and assembly language programming techniques required to understand kernel code and control its behavior. They compare x86 and PowerPC implementations side-by-side, illuminating cryptic functionality through carefully-annotated source code examples and realistic projects. The Linux ® Kernel Primer is the first book to offer in-depth coverage of the rapidly growing PowerPC Linux development platform, and the only book to thoroughly discuss kernel configuration with the Linux build system. Coverage includes Data structures x86 and PPC assembly language Viewing kernel internals Linux process model User and kernel space Interrupts and exceptions Memory allocation and tracking Tracing subsystem behavior I/O interactions Filesystems and file operations Scheduling and synchronization Kernel boot process Kernel build system Configuration options Device drivers And more... If you know C, this book teaches you all the skills and techniques you need to succeed with Linux kernel programming. Whether you're a systems programmer, software engineer, systems analyst, test professional, open source project contributor, or simply a Linux enthusiast, you'll find it indispensable. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Mac OS ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The Most Useful UNIX Guide for Mac OS X Users Ever, with Hundreds of High-Quality Examples! Beneath Mac OS ® X's stunning graphical user interface (GUI) is the most powerful operating system ever created: UNIX ® . With unmatched clarity and insight, this book explains UNIX for the Mac OS X user-giving you total control over your system, so you can get more done, faster. Building on Mark Sobell's highly praised A Practical Guide to the UNIX System, it delivers comprehensive guidance on the UNIX command line tools every user, administrator, and developer needs to master-together with the world's best day-to-day UNIX reference. This book is packed with hundreds of high-quality examples. From networking and system utilities to shells and programming, this is UNIX from the ground up-both the "whys" and the "hows"-for every Mac user. You'll understand the relationships between GUI tools and their command line counterparts. Need instant answers? Don't bother with confusing online "manual pages": rely on this book's example-rich, quick-access, 236-page command reference! Don't settle for just any UNIX guidebook. Get one focused on your specific needs as a Mac user! A Practical Guide to UNIX ® for Mac OS ® X Users is the most useful, comprehensive UNIX tutorial and reference for Mac OS X and is the only book that delivers Better, more realistic examples covering tasks you'll actually need to perform Deeper insight, based on the authors' immense knowledge of every UNIX and OS X nook and cranny Practical guidance for experienced UNIX users moving to Mac OS X Exclusive discussions of Mac-only utilities, including plutil , ditto , nidump , otool , launchctl , diskutil , GetFileInfo , and SetFile Techniques for implementing secure communications with ssh and scp -plus dozens of tips for making your OS X system more secure Expert guidance on basic and advanced shell programming with bash and tcsh Tips and tricks for using the shell interactively from the command line Thorough guides to vi and emacs designed to help you get productive fast, and maximize your editing efficiency In-depth coverage of the Mac OS X filesystem and access permissions, including extended attributes and Access Control Lists (ACLs) A comprehensive UNIX glossary Dozens of exercises to help you practice and gain confidence And much more, including a superior introduction to UNIX programming tools such as awk , sed , otool , make , gcc , gdb , and CVS
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Praise for Mark Sobell's Books "I keep searching for books that collect everything you want to know about a subject in one place, and keep getting disappointed. Usually the books leave out some important topic, while others go too deep in some areas and must skim lightly over the others. A Practical Guide to Red Hat® Linux® is one of those rare books that actually pulls it off. Mark G. Sobell has created a single reference for Red Hat Linux that cannot be beat! This marvelous text (with a 4-CD set of Linux Fedora Core 2 included) is well worth the price. This is as close to an 'everything you ever needed to know' book that I've seen. It's just that good and rates 5 out of 5." -Ray Lodato, Slashdot contributor "Mark Sobell has written a book as approachable as it is authoritative." -Jeffrey Bianchine, Advocate, Author, Journalist "Excellent reference book, well suited for the sysadmin of a linux cluster, or the owner of a PC contemplating installing a recent stable linux. Don't be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs." -Wes Boudville, Inventor " A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you Mark Sobell." -C. Pozrikidis, University of California at San Diego "This book presents the best overview of the Linux operating system that I have found. . . . It should be very helpful and understandable no matter what the reader's background is: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready." -Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group FRUUG, Boulder, Colorado "Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There's no other book that discusses so many different topics and in such depth." -Eugenia Loli-Queru, Editor in Chief, OSNews.com The Most Useful Linux Tutorial and Reference Ever, with Hundreds of High-Quality Examples Covering Every Linux Distribution! To be truly productive with Linux, you need to thoroughly mast...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 1090 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.26/8
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The best just became BETTER! Completely revised to meet all your Red Hat Linux needs! Fedora Core and Red Hat Enterprise Linux are advanced operating systems. You need a book that's just as advanced. This book explains Linux clearly and effectively--with a focus on the features you care about, including system security, Internet server setup, and sharing files and printers with Windows systems. Best-selling Linux author Mark Sobell starts at the beginning and walks you through everything that matters, from installing Fedora Core using the included CDs to GNOME, KDE, Samba 3, sendmail, Apache, DNS, NIS, and iptables. Along the way, you learn the "hows" and the "whys." Whether you are a user, an administrator, or a programmer, this book gives you all you need and more. Mark Sobell knows every Linux nook and cranny, has taught hundreds of thousands of readers, and never forgets what it's like to be new to Linux. Don't settle for yesterday's Linux book...get the ONLY book that meets today's challenges and tomorrow's! Compared with the other Linux books out there, A Practical Guide to Red Hat® Linux®, Second Edition, delivers... The full Fedora Core operating system on 4 CDs (not the truncated "Publisher's Edition") AND complete coverage of Fedora Core and the 2.6 Linux kernel, PLUS coverage of Red Hat Enterprise Linux Deeper coverage of GNOME and KDE, including customization More practical coverage of file sharing with Samba, NFS, and FTP Easier-to-follow coverage of Internet server configuration including Apache, sendmail, NFS, and DNS More up-to-date coverage of security, including SELinux (Security Enhanced Linux), OpenSSH, and firewall setup using iptables Better coverage of "meat-and-potatoes" system/network administration tasks A more practical introduction to writing bash shell scripts More complete coverage of configuring local and network printers using CUPS And much more...including a 500+ word glossary and a comprehensive index to help you find what you need fast! Includes 4 CDs! Get the full version of Red Hat's Fedora Core 2 release!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 1664 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: HP-UX ; Hewlett-Packard computers ; Programming ; Examinations ; Study guides ; Operating systems (Computers) ; Electronic books ; local
    Abstract: HP-UX CSE: Official Study Guide and Desk Reference The definitive HP-UX CSE exam preparation guide and reference HP-approved coverage of all three CSE exams: CSE HP-UX Advanced System Administration, CSE High Availability Using HP-UX Serviceguard, and CSE HP-UX Networking and Security Comprehensive study resources: exam objectives, sample questions, and summaries for last-minute review More than a great study guide: an outstanding reference for working system engineers This book delivers comprehensive preparation for all three HP-UX CSE exams, the core exam: CSE HP-UX Advanced System Administration, and specialty exams, CSE High Availability Using HP-UX Serviceguard and CSE HP-UX Networking and Security . Coverage includes: Implementing HP-UX in technology-rich enterprise environments Maximizing the performance and availability of HP-UX systems and applications Partitioning: node and virtual partitions Disks, volumes, file systems: RAID, LVM, VxVM, HFS, VxFS, VFS layer, swap/dump space, and more Monitoring system resources, activities, events, and kernels Processes, threads, and bottlenecks: priorities, run queues, multi-processor environments, memory requirements, bottlenecks, and more Installation, patching, and recovery, including Software Distributor and Ignite-UX Emergency recovery with HP-UX installation media Broad networking coverage: IPv6, ndd, DHCP, DNS, NTP, CIFS/9000, LDAP, sendmail, Automatic Port Aggregation, VPNs, VLANs, and more Planning, implementing, and managing high availability clustering with Serviceguard Other HP-UX cluster solutions: Extended Serviceguard Cluster, Metrocluster, Continentalclusters, and more Infrastructure for remote access to HA clusters: SANs, DWDM, dark fiber HP-UX security administration: Trusted systems, SSH, HIDS, IPSec, IPFilter, and Bastille Operating Systems/HP-UX Sample questions, last-minute review tips, and other study resources This isn't just an outstanding prep guide, it's the definitive day-to-day reference for working professionals in high availability environments. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Boston : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 665 p. , ill. ; , 24 cm. +
    Keywords: Linux ; Business ; Data processing ; Computer networks ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Switch your business to Linux: proven techniques for working IT Professionals This is the complete technical resource for migrating your business desktops to Linux, administering them efficiently, and using them to drive cost savings throughout your organization. Respected Linux Journal columnist Marcel Gagné walks you step-by-step through planning and managing the transition, getting users up and running, and keeping them happy. Gagné covers hardware, productivity applications, messaging, coexistence with Windows environments, support, and much more. This is also the first book with in-depth coverage of using Linux Terminal Server Project (LTSP) thin clients to dramatically reduce the cost and complexity of computing. Deploy Linux with your existing PCs, printers, and IT/network infrastructure Centrally manage users and security through Webmin's convenient Web interface Deliver reliable email services with Postfix, or integrate Linux mail clients with Microsoft Exchange servers Configure Windows file sharing with Samba, and Linux file sharing with NFS Secure network communications with Linux firewalls and OpenSSH Plan and deploy LTSP thin clients and diskless workstations and the server support for them Provide LDAP directory services to all your clients Support users by "remote control"-without leaving your desk From network security to spam reduction, automated backup/restore to collaboration groupware, Gagné offers specific solutions and proven techniques for leveraging the full power of Linux in your business. Say goodbye to the expense, hassle, and insecurity of Windows desktops! Say hello to business computing the way it's supposed to be-with Linux! About the Author Marcel Gagné is best known as the author of the Linux Journal's "Cooking with Linux" series, winner of the Readers' Choice award for favorite column for three straight years. He has written two highly acclaimed Addison-Wesley books: Moving to Linux and Linux System Administration: A User's Guide. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xi, 705 p. , ill. ; , 23 cm. +
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Join an estimated 85% of the U.S. Linux market in using Red Hat's Linux distributions by learning it from a Fedora authority. Sams Teach Yourself Red Hat Fedora 4 All in One is a starter kit that will help you install, configure, and use Red Hat's Fedora 4 distribution and desktop applications. The easy-to-understand, step-by-step instructions will also show you how to: Use the OpenOffice.org productivity suite and other leading applications. Troubleshoot hardware issues and install new components. Set up a small Linux-based network to share files and resources. Also included is a DVD, which will provide you with the complete Fedora Core Linux distribution, OpenOffice.org desktop suite, and the leading applications for e-mail, Web browsing, and graphics. Find out how you can safely and reliably use Linux and Linux-based applications to accomplish your day-to-day work in the office and at home with Sams Teach Yourself Red Hat Fedora 4 All in One .
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 269 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Note: "Intrusion detection with open source tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 386 p. , ill. ; , 24 cm
    DDC: 005.4/3
    Keywords: HP-UX ; Operating systems (Computers) ; Electronic books ; local
    Abstract: HP-UX 11i Internals Chris CooperChris Moore Invaluable information for optimizing HP-UX performance, reliability, and efficiency Find out how to approach system administration, tuning, and troubleshooting from a more informed perspective For every HP-UX sysadmin, programmer, and performance specialist HP Professional Books HP-UX 11i Internals HP-UX under the hood: practical insight for optimization and troubleshooting To maximize the performance, efficiency, and reliability of your HP-UX sysem, you need to know what's going on under the hood. HP-UX 11i Internals goes beyond generic UNIX internals, showing exactly how HP-UX works in PA-RISC environments. HP experts Cooper and Moore systematically illuminate HP-UX kernel data structures and algorithms for memory management, process and thread scheduling, I/O control, files and file systems, resource management, and more. They focus on HP-UX 11i, while also offering valuable insight for those using earlier versions. PA-RISC architecture: register set, virtual memory, key instructions, and procedure calling conventions HP-UX kernel organization: hardware-dependent and independent data structures Process and thread management: proc tables, memory management, scheduling, and the complete process/thread lifecycle System-wide memory resources: allocation and mapping to physical memory HP-UX paging and swapping Files and filesystems: traditional UNIX filesystems, HFS, VFS, and dynamic buffer cache I/O and device management: addressing, DMA, interrupts, device files, I/O configuration, device driver assignments, and I/O request pathways Logical Volume Management (LVM): abstracting physical disks from the disk I/O system HP-UX multiprocessing: challenges, data structures, and interfaces Kernel communication services: semaphores, message queues, shared memory, signals, and the kernel "callout" system Signaling in complex threaded environments System initialization, from vmunix to init: running HP-UX on diverse platforms Whether you administer HP-UX, tune it, troubleshoot it, or write kernel modules for it, you'll find HP-UX 11i Internals indispensable. U.S. $59.99 Canada $90.99 PRENTICE HALL Upper Saddle River, NJ 07458 www.phptr.com Hewlett-Packard(R) Professional Books A Prentice Hall Title www.hp.com/hpbooks ISBN: 0-13-032861-8
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 357 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Microsoft Windows server ; Operating systems (Computers) ; Electronic books ; local
    Abstract: One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, consistent set of tools, and wizards that walk you through complex tasks allow you to install, configure and maintain Windows servers without any knowledge of programming or scripting languages or learning complicated command-line syntax. It's possible, in fact, to accomplish about 90% of all Windows administration without ever opening a command prompt or running a script! But what about the other ten percent of the time? While it's true that most common, day-to-day tasks of Windows administration can be performed from the GUI, it's not always the best way, especially with complex or repetitive tasks Scripts and command-line tools often provide a faster, more flexible approach. Windows Server Hacks reveals techniques that go well beyond basic management tasks found in most handbooks to help busy system administrators master the more powerful features of Windows Server. Windows Server Hacks focuses on scripts and other tools that will make your life as an administrator much easier. These tools, or hacks--quick and dirty solutions to problems, or clever ways of doing things--were created by other professionals who've also had to struggle to find solutions to administering Windows environments. You'll save valuable time using their scripts, tools, tips, and advice. Plus, you can easily learn to customize the scripts to create even more powerful tools for your own, specific needs. The book includes secrets of the masters in such areas as Active Directory, User Management, Group Policy, DNS and DHCP, File and Print, IIS, performance and security. The hundred, industrial strength hacks in the book range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, and backup and recovery. No matter which Windows server you use--NT, IIS, 2000, or 2003--this book will put the knowledge and expertise of veteran system administrators and hackers to work for you. Windows Server Hacks will make your life easier while expanding your understanding of the capabilities of Windows Server.
    Note: "100 industrial-strength tips & tools"--Cover. - "Covers Windows 2000 & 2003"--Spine. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Language: English
    Pages: xix, 251 p. , ill. ; , 24 cm
    Keywords: Solaris (Computer file) ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Increase efficiency with new technologies and processes Improve the performance and availability of your IT solutions Reduce IT total cost of ownership This book presents an established methodology for transitioning the people, processes, and technologies in IT environments to the Solaris(TM) Operating System. It steps you through the various phases of the migration process, using detailed case studies to illustrate the benefits, costs, and requirements associated with a migration project. While this book focuses on UNIX server migrations, the methodology and best practices presented apply for most migrations to the Solaris environment. They can be used for projects ranging from the smallest data conversion to the largest legacy migration.
    Note: "A Prentice Hall title.". - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and respond to such attacks and breaches. The Effective Incident Response Team is the first complete guide to forming and managing a Computer Incident Response Team (CIRT). In this book, system and network administrators and managers will find comprehensive information on establishing a CIRT's focus and scope, complete with organizational and workflow strategies for maximizing available technical resources. The text is also a valuable resource for working teams, thanks to its many examples of day-to-day team operations, communications, forms, and legal references. IT administrators and managers must be prepared for attacks on any platform, exploiting any vulnerability, at any time. The Effective Incident Response Team will guide readers through the critical decisions involved in forming a CIRT and serve as a valuable resource as the team evolves to meet the demands of ever-changing vulnerabilities. Inside, readers will find information on: Formulating reactive or preventative operational strategy Forming, training, and marketing the CIRT Selecting penetration-testing, intrusion-detection, network-monitoring, and forensics tools Recognizing and responding to computer incidents and attacks, including unauthorized access, denial-of-service attacks, port scans, and viruses Tracking, storing, and counting incident reports and assessing the cost of an incident Working with law enforcement and the legal community Benefiting from shared resources Scrutinizing closed incidents to further prevention Offering services such as user-awareness training, vulnerability and risk assessments, penetration testing, and architectural reviews Communicating the CIRT's return on investment through management reporting 0201761750B10062003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Take your Windows XP knowledge to the next level! Designed for advanced home and office users, this thoroughly updated second edition delivers in-depth information on core and advanced Windows XP topics, including all-new coverage of Windows XP Service Pack 2, Microsoft Windows Server 2003, Microsoft Windows XP Media Center Edition, Windows Media Series 9, and Windows Movie Maker 2. The award-winning Inside Out format makes it easy to find the timesaving solutions, troubleshooting tips, and workarounds you needand it features new Reality Check sidebars, which offer the straight scoop on popular wisdom about Windows XP.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 637 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: In an ideal world, an operating system would do its job in the background, while you did yours in the foreground. In reality, though, operating systems often get in the way, fouling up the process at the most inopportune times. And Windows XP is no exception.O'Reilly's popular series for customizing and troubleshooting Windows once again comes to the rescue with Windows XP Annoyances for Geeks . Offering dozens of on-target tips, workarounds, and warnings, Windows XP Annoyances for Geeks allows users to improve their overall experience with the Windows XP operating system in every way possible.You'll learn how to use the Registry Editor; how to customize the interface beyond Microsoft's own intentions; and how to master Windows' built-in networking capabilities, including advanced technologies such as Internet Connection sharing, Remote Desktop sharing, and virtual private networking. And now, with this updated edition, you can also expect detailed coverage of the newly released Service Pack 2 (SP2) technology.SP2 is designed to make your work with the Windows XP operating system even easier and safer by providing superior protection against viruses, hackers, and worms. Among the core SP2 components covered in Windows XP Annoyances for Geeks are Windows Firewall, Pop-up Blocker for Internet Explorer, and the new Windows Security Center.David Karp, veteran author of several titles in the Windows Annoyances series, is behind the wheel of this comprehensive guide, as well. Karp points out numerous SP2-related quirks and unaccountable behaviors that are guaranteed to increase your level of perplexity and frustration. By recognizing these shortcomings, Windows XP Annoyances for Geeks arms you with the knowledge to overcome them.Karp leaves no stone unturned in providing the ultimate resource for the ever-expanding Windows XP market. As a result, you'll be able to seize complete control of the Windows XP operating system--instead of the other way around.
    Note: "Covers service pack 2"--Cover. - "Tips, secrets and solutions"--Cover. - First ed. entitled: Windows XP annoyances. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 390 p. , ill. ; , 24 cm. +
    Edition: 1st ed.
    DDC: 005.446
    Keywords: Linux ; Java (Computer program language) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The Java Desktop System (TM), from Sun Microsystems, is a modern system for all kinds of users, novice through expert. As an unusually robust, well-integrated desktop system, it may become the first to fulfill the promise of mass adoption for open source. JDS brings Linux and other open source software up to a level of usability that makes them suitable for the enormous base of Personal Computer users including office workers, students, mobile and home users. It behaves pretty much the way a Windows or Mac user would expect, but with many more powerful features. JDS has seen widespread adoption in the United States, Britain, China, and elsewhere. This book is the ideal guide to JDS: it is clear and direct, but loaded with insights from authors who have spent time working with, supporting, and enhancing the system. Tom Adelstein is an award winning polymath system designer; Sam Hiser is a respected business consultant with an itch that led him to become the marketing project lead for OpenOffice.org. Both are advocates for open source and founders of the Open Government Interoperability Project, members of the Open Source Software Institute and contributors to the JDShelp.org project. This book carefully covers such housekeeping chores as setting up networking, updates, and backups. Then it enters into great depth concerning the key productivity tools every user needs: email, web browsing, instant messaging, word processing, spreadsheets, and slide presentations. A number of chapters and appendices concerning useful tools, including things you can add to your system, rounds out this remarkably useful book. It has plenty to offer the new user as well as the seasoned Linux professional.
    Note: "Linux for prime time with the Java Desktop System"--Cover. - CD-ROM contains Sun Microsystem's Java Desktop System. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 427 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.4/32
    Keywords: Berkeley BSD (Computer file) ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun."Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks , the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools--and even fun--for administrators and power users of BSD systems. BSD Hacks takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command.The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas: Customizing the User Environment Dealing with Files and Filesystems The Boot and Login Environments Backing Up Networking Hacks Securing the System Going Beyond the Basics Keeping Up-to-Date Grokking BSD If you want more than your average BSD user--you want to explore and experiment, unearth shortcuts, create useful tools, and come up with fun things to try on your own-- BSD Hacks is a must-have. This book will turn regular users into power users and system administrators into super system administrators.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Note: Includes bibliographical references (p. 321-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 298 , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Beijing ; : O'Reilly Media, Inc. | Boston, MA :Safari,
    Language: English
    Pages: xii, 297 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.26/8
    Keywords: Linux ; Operating systems (Computers) ; Wireless communication systems ; Electronic books ; local
    Abstract: In Linux Unwired , you'll learn the basics of wirelesscomputing, from the reasons why you'd want to go wireless in thefirst place, to setting up your wireless network or accessingwireless data services on the road. The book provides a completeintroduction to all the wireless technologies supported by Linux.You'll learn how to install and configure a variety of wirelesstechnologies to fit different scenarios, including an office orhome network and for use on the road. You'll also learn how to getWi-Fi running on a laptop, how to use Linux to create your ownaccess point, and how to deal with cellular networks, Bluetooth,and Infrared. Other topics covered in the book include: Connecting to wireless hotspots Cellular data plans you can use with Linux Wireless security, including WPA and 802.1x Finding and mapping Wi-Fi networks with kismet and gpsd Connecting Linux to your Palm or Pocket PC Sending text messages and faxes from Linux through yourcellular phone Linux Unwired is a one-stop wireless information source foron-the-go Linux users. Whether you're considering Wi-Fi as asupplement or alternative to cable and DSL, using Bluetooth tonetwork devices in your home or office,or want to use cellular dataplans for access to data nearly everywhere, this book will show youthe full-spectrum view of wireless capabilities of Linux, and howto take advantage of them.
    Note: "A complete guide to wireless configuration"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Reading this book has filled a gap in my education. I feel a sense of completion, understand that UNIX is really a style of community. Now I get it, at least I get it one level deeper than I ever did before. This book came at a perfect moment for me, a moment when I shifted from visualizing programs as things to programs as the shadows cast by communities. From this perspective, Eric makes UNIX make perfect sense." --Kent Beck, author of Extreme Programming Explained, Test Driven Development , and Contributing to Eclipse "A delightful, fascinating read, and the lessons in problem-solvng are essential to every programmer, on any OS." --Bruce Eckel, author of Thinking in Java and Thinking in C++ Writing better software: 30 years of UNIX development wisdom In this book, five years in the making, the author encapsulates three decades of unwritten, hard-won software engineering wisdom. Raymond brings together for the first time the philosophy, design patterns, tools, culture, and traditions that make UNIX home to the world's best and most innovative software, and shows how these are carried forward in Linux and today's open-source movement. Using examples from leading open-source projects, he shows UNIX and Linux programmers how to apply this wisdom in building software that's more elegant, more portable, more reusable, and longer-lived. Raymond incorporates commentary from thirteen UNIX pioneers: Ken Thompson , the inventor of UNIX. Ken Arnold , part of the group that created the 4BSD UNIX releases and co-author of The Java Programming Language . Steven M. Bellovin , co-creator of Usenet and co-author of Firewalls and Internet Security . Stuart Feldman , a member of the Bell Labs UNIX development group and the author of make and f77 . Jim Gettys and Keith Packard , principal architects of the X windowing system. Steve Johnson , author of yacc and of the Portable C Compiler. Brian Kernighan , co-author of The C Programming Language, The UNIX Programming Environment, The Practice of Programming, and of the awk programming language. David Korn , creator of the korn shell and author of The New Korn Shell Command and Programming Language . Mike Lesk , a member of the Bell Labs development group and author of the ms macro package, the tbl and refer tools, lex and UUCP . Doug McIlroy , Director of the Bell Labs research group where UNIX was born and inventor of the UNIX pipe. Marshall Kirk McKusick , developer of the 4.2BSD fast filesystem and a leader ...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xvi, 792 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: I am more than satisfied (actually impressed) with how much system administration is possible from Webmin. Comprehensive and convenient, just about any administration I've done is covered here, along with several areas that I've hesitated to explore. --Karel Baloun, Sr. Software Engineer, Looksmart, Ltd. Easy, browser-based Linux/UNIX administration with Webmin--step by step Webmin gives you an easy, browser-based solution for virtually any day-to-day Linux/UNIX administration task. Now, there's a definitive Webmin guide for every beginning-to-intermediate sysadmin. Written by Webmin's primary developer, Managing Linux Systems with Webmin delivers authoritative, step-by-step coverage of the latest version of Webmin, from basic installation to centrally managing multiple servers. Coverage includes: How Webmin works--and how to install and secure it Using Webmin to configure basic system services, including filesystems, users/groups, and printing Configuring Apache, Sendmail, Squid, Samba, MySQL, PostgreSQL, FTP services, and more Cluster modules: configuring multiple systems from one master server Webmin modules: configuring Webmin itself Full API documentation and instructions for writing your own Webmin modules and themes Jamie Cameron walks you through more than 50 essential Webmin tasks--offering all the background you need, step-by-step instructions, extensive screen captures, and listings of the underlying configuration files that are being modified. Whether you're new to Linux/UNIX system administration or you simply want an alternative to the command line, Managing Linux Systems with Webmin will be an indispensable resource.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 745 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Indianapolis, IN : Que | Boston, MA :Safari,
    Language: English
    Pages: xix, 539 p. , ill. ; , 24 cm
    DDC: 005.4/465
    Keywords: Mac OS ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Show Me Mac OS X offers readers a fast, visual way to learn and solve their Mac OS problems. All the most important tasks are covered, using clear, step-by-step instructions with accompanying visuals. The book covers system-level functions, as well as the many accessories and free applications that come with Mac OS X, such as the popular iTunes, iMovie, and iCal programs. This easy-to-use book includes Show Me Live! Software that shows you how to perform everyday tasks and helps you gain real-world experience. Other features include a Troubleshooting Guide to help you solve common problems.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Use this book-and-DVD set to explore the amazing things you can do with Microsoft Windows XP. Discover the possibilities with digital photography, music, and video; Windows Movie Maker 2; Windows Power Toys; instant messaging; and more!
    Note: "Body Part No. X10-12255.". - Includes index. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xv, 392 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Abstract: "As usual, Keith masterfully explains complex security issues in down-to-earth and easy-to-understand language. I bet you'll reach for this book often when building your next software application." --Michael Howard, coauthor, Writing Secure Code "When it comes to teaching Windows security, Keith Brown is 'The Man.' In The .NET Developer's Guide to Windows Security, Keith has written a book that explains the key security concepts of Windows NT, Windows 2000, Windows XP, and Windows Server 2003, and teaches you both how to apply them and how to implement them in C# code. By organizing his material into short, clear snippets, Brown has made a complicated subject highly accessible." --Martin Heller, senior contributing editor at Byte.com and owner of Martin Heller & Co. "Keith Brown has a unique ability to describe complex technical topics, such as security, in a way that can be understood by mere mortals (such as myself). Keith's book is a must read for anyone attempting to keep up with Microsoft's enhancements to its security features and the next major version of .NET." --Peter Partch, principal software engineer, PM Consulting "Keith's book is a collection of practical, concise, and carefully thought out nuggets of security insight. Every .NET developer would be wise to keep a copy of this book close at hand and to consult it first when questions of security arise during application development." --Fritz Onion, author of Essential ASP.NET with Examples in C# The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Windows Server 2003, Windows XP, and Windows 2000. Author Keith Brown crystallizes his application security expertise into 75 short, specific guidelines. Each item is clearly explained, cross-referenced, and illustrated with detailed examples. The items build on one another until they produce a comprehensive picture of what tools are available and how developers should use them. The book highlights new features in Windows Server 2003 and previews features of the upcoming version 2.0 of the .NET Framework. A companion Web site includes the source code and examples used throughout the book. Topics covered include: Kerberos authentication Access control Impersonation Network security Constrained delegation Protocol transition Securing enterprise servi...
    Note: Includes bibliographical references (p. 379-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Language: English
    Pages: p. cm
    DDC: 005.7/13769
    Keywords: Microsoft Windows server ; Computer storage devices ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Dilip Naik's Inside Windows Storage is an invaluable reference for developers and customers alike and is a must-read for anyone wishing to implement Windows-based storage networking." -Tom Clark, Director, Technical Marketing, Nishan Systems The Windows and enterprise storage markets are converging. Migrating upwards from low-end servers, Windows is becoming a genuine platform for running mission-critical applications. The enterprise storage market is moving from high-end servers to also include medium range servers. Thanks to a slew of enterprise storage related features, Microsoft Windows storage technologies are rapidly gaining widespread acceptance. System administrators, programmers, and technical managers need to learn to appreciate and to tap the full potential of Windows enterprise storage. Inside Windows Storage is the first book to provide a comprehensive look at new and emerging Microsoft storage technologies. The text begins with an overview of the enterprise storage industry and Windows Server architecture, including the Windows NT I/O subsystem. With that foundation in place, readers explore the ins and outs of current Windows offerings, upcoming Windows server releases, and third-party products. Key topic coverage includes: Direct Attached Storage, including the new Windows Storport driver model Fibre Channel Storage Area Networks (SANs) Network Attached Storage (NAS), including the Windows NT network stack and an overview of CIFS Backup and restore technologies, including Windows XP and Windows Server 2003 Volume Shadow Copy Service File systems and disk virtualization, including a detailed overview of NTFS as well as a study of Windows cluster file systems Storage management, including the new Windows Virtual Disk Service IP Storage and Infiniband High availability, including RAID mirroring as well as multi path I/O solutions This extensive guide concludes by tracing Windows NT storage features as they appear in Windows NT 4.0, Windows 2000, and Windows Server 2003, and by offering a preview of what to expect from future Windows server releases. In short, Inside Windows Storage will help IT professionals gear up for the major role that Windows servers will surely play in the future of enterprise storage. 032112698XB06302003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 1437 p. , ill. ; , 24 cm. +
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Microsoft .NET ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Designed for system administrators, this definitive, supremely organized reference delivers in-depth solutions, tips, and tools for deploying, managing, and troubleshooting Windows Server 2003-all in a concise, fast-answers format.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Indianapolis, IN : SAMS | Boston, MA :Safari,
    Language: English
    Pages: ix, 317 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Why should new versions of mission-critical technologies mean starting from scratch? If you already know how to use Microsoft Windows Server 2000 or NT, leverage those skills to quickly become an expert on Microsoft Windows Server 2003. Microsoft Windows Server 2003 Delta Guide skips the basics and moves straight to what's new and what has changed. The result? You save time and money while preparing yourself for the next generation of Microsoft Server! Skip the basic concepts and move straight to what's new and different. Focus on learning advanced new technologies, techniques, and concepts. Use topic-focused chapters to quickly upgrade the skills you use the most. See important security changes that can affect server upgrades. Master new techniques for installing, administering, and securing servers. Build headless servers using Emergency Management Services. Take advantage of powerful new Group Policy capabilities.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Sebastopol, CA : Pogue Press/O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 689 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.446
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: With the release of Windows XP Service Pack 2 (SP2), Microsoft latest and most reliable corporate desktop operating system now provides better protection against viruses, worms, and malicious hackers. SP2 includes Windows Firewall, Pop-up Blocker for Internet Explorer, and the new Windows Security Center. But it still comes without a single page of printed instructions. This superbly written guide fills the gap. Coauthored by David Pogue, New York Times technology columnist and Missing Manuals creator, Windows XP Pro: The Missing Manual uses wit, technical insight, and scrupulous objectivity to light the way for first-time and intermediate network and standalone PC users. In fact, this jargon-free book explains XP's features so clearly revealing which work well and which don't that it should have been in the box in the first place. The book reveals which features work well and which don't, such as the Remote Desktop software that enables people to connect to the office from home, the encryption file system that protects sensitive information, and the Windows Messenger that enables real-time text, voice and video communication. Contents include: Getting started . The book's early chapters cover using menus, finding lost files, reducing window clutter, and taming the new, multi-column Start menu. Mastering the network . Special chapters help you navigate the corporate network, dial in from the road, and even set up your own small-office (peer-to-peer) network, step by step. Understanding security . User accounts, file encryption, and the NTFS file system keep your private files private, while still offering network access to coworkers you specify. Flying the Net . This book demystifies Outlook Express 6 for email, Internet Explorer 6 for Web browsing, and the new Windows Messenger for voice, chat, and video conferencing. Windows XP Pro: The Missing Manual isn't for system administrators or OS theory geeks; it's for the novice or budding power user who wants to master the machine and get down to work. Yet, anyone who uses XP Pro (including hardcore techies) will find this new system much easier-- and more fun--to digest with this new Missing Manual.
    Note: "Covers service pack 2"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxv, 1025 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.4/465
    Keywords: Mac OS ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Complete overview of Mac OS Jaguar (Mac OS X 10.2) including basic system and network administration features, hundreds of tips and tricks, with an overview of Mac OS X's Unix text editors and CVS.
    Note: Previous ed. gives McIntosh as first-named author. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    ISBN: 0131433490
    Language: English
    Pages: xxvi, 530 p. , ill. ; , 24 cm
    DDC: 005.4/3
    Keywords: HP-UX ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Maximize the performance and value of any HP-UX 11i system HP-UX 11i Tuning and Performance takes the guesswork out of maximizing HP-UX 11i performance-so you can quickly maximize the value of any HP-UX system in any environment. Leading HP experts introduce a comprehensive, systematic performance management methodology that addresses every stage in the lifecycle of an HP-UX system. You'll find specific metrics, symptoms and solutions for every key element of an HP-UX 11i system, including hardware, the OS platform, and application development. From start to finish, the emphasis is on practical results-and on understanding the real-world cost/benefit tradeoffs that are central to every tuning project. Coverage includes: A comprehensive optimization methodology, direct from HP's performance labs New optimization opportunities and techniques made possible by HP-UX 11i All-new chapters on network performance and Java performance Rules of thumb for more cost-effective performance management Instrumenting HP-UX 11i systems to accurately reflect reality Choosing the right performance metrics, and using them correctly Key performance tradeoffs in both uniprocessor and SMP environments Practical techniques for resolving CPU, memory, and disk bottlenecks How to make the most of HP-UX specific and generic UNIX performance tools Performance enhancements available through compiler optimization and application profiling Extensive examples from actual HP performance consulting assignments Whether you're an HP-UX 11i sysadmin, netadmin, developer, capacity planner, or performance specialist, this is your complete guide to getting all the performance you paid for!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xix, 1402 p. , ill. ; , 24 cm. +
    Edition: Platinum ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Platinum Edition Using Microsoft Windows XP is the ultimate Windows XP reference for the hardcore Windows user! It offers high-geared content that will teach you how to set up complicated networks, manage multiple users, keep everything secure, hack the registry, and write time-saving scripts. Authors Robert Cowart and Brian Knittel tell it like it is, tackling real-world criticism, complaints, and workarounds. They also tell you - plainly and simply - when a Microsoft solution is the way to go, or whether you're better off with a third-party solution. The CD contains one hour of unique video from Brainsville.com that brings Bob and Brian right to your desktop! This personal seminar digs deep into the guts of Windows XP and is a valuable addition to any power user's bag of tricks. Platinum Edition Using Microsoft Windows XP is the one Windows XP book that you'll go to again and again!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxx, 638 p. , ill. ; , 23 cm
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Rather than being a traditional planning, design, and implementation guide, this book is a serious resource for Windows experts to find tips, tricks, and best practices for implementing and supporting key Windows Server 2003 technologies. The authors started working with Windows Server 2003 (then codename Whistler) just days after the code for Windows 2000 was locked, when most organizations were getting a first chance to see the Windows 2000 server product. With more than three years of experience working with Whistler in early beta and production implementations, the authors of this book have provided a resource to help you make Windows 2003 technologies work properly. When given a choice of different ways of implementing the technologies, you can turn to this book for the best practices of successful field implementations. This book is organized into eight parts focusing around a core technological solution area, with several chapters making up each part. Sections include security, management, design, migration, business continuity, performance, and business productivity.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 685 p. , ill. ; , 24 cm
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Samba (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "The breadth of technical information provided in this book ensures that even the most demanding of administrators will find something they need." --Andrew Tridgell, President of the Samba Team and the original author of Samba The practical, authoritative, step-by-step guide to cutting IT costs with Samba-3! This is the definitive guide to using Samba-3 in production environments. It begins with the immense amount of HOWTO information published by the Samba Team and volunteers around the world . . . but that's just the beginning. The book's Samba Team editors have organized and edited this material around the practical needs of working Windows(R) administrators. UNIX(R)/Linux administrators will find all the answers they need as well. Whether you're deploying Samba for the first time, integrating Samba into a Windows 200x Active Directory environment, migrating from NT 4 or Samba 2.x, or using Samba in a UNIX/Linux environment, you'll find step-by-step solutions, carefully edited for accuracy, practicality, and clarity. You'll learn all you need to make intelligent deployment decisions, get running fast, and use Samba-3's powerful new features to maximize performance and minimize cost. Step-by-step installation techniques and proven configurations that work "right out of the box." Essential Samba-3 information that leverages your Windows networking knowledge Detailed coverage of Samba-3's powerful new user/machine account management, network browsing, and mapping capabilities Authoritative explanations of advanced features such as interdomain trusts and loadable VFS file system drivers Clear information on how Samba-3 handles Windows desktop/user policies and profiles Practical techniques for optimizing network printing Specific guidance for migration from Windows NT 4 or Samba 2.x Troubleshooting techniques that draw on the knowledge of the entire Samba community
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 426 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: JavaBeans ; Computer security ; Java (Computer program language) ; Servlets ; Web services ; Electronic books ; local
    Abstract: J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place, at the right time, and in the right way. Kumar covers every significant J2SE and J2EE security mechanism, presenting practical implementation techniques for the entire J2EE project lifecycle: analysis, design, development, deployment and operations. The book's example-rich coverage includes: Implementing cryptography with the JCA (Java Cryptography Architecture) and JCE (Java Cryptography Extension) security APIs Building PKI systems with Java: implementing X.509 certificates, Certification Authorities, Certificate Revocation Lists, and repositories Java security managers, policy files, and JAAS: implementing access control based on code origin, code signer and user credentials Securing the wire: Using SSL and the JSSE API to secure data exchange over unprotected networks Ensuring XML message integrity, authentication, and confidentiality with the standards: XML Signature & XML Encryption using the VeriSign TSIK, and Infomosaic SecureXML libraries Addressing security issues in RMI-based distributed applications Developing and deploying servlets and EJBs for authenticated and secure access Securing Web services with transport- and message-based security: SSL for transport-based and WS Security for message-based security Covering security aspects of best-of-breed products: Apache Tomcat, Apache Axis, and BEA WebLogic Server.
    Note: Includes bibliographical references (p. 413-414) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 252 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Biometric identification ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application. In Biometrics for Network Security , biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes: An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
    Note: Includes bibliographical references (p. 239-241) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 450 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.26/8
    Keywords: Mac OS ; Cocoa (Application development environment) ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0321503619 ISBN-13: 9780321503619 The highly acclaimed introduction to Cocoa-recommended most by experienced Mac OS X developers now updated and expanded. Here's what critics said about the first edition: "Reading this book is the absolute best way to learn how to harness the power of this amazing technology." - Andrew Stone, President, Stone Design, www.stone.com "Make sure this is the first one you pick up. It's the best book for a beginning Cocoa programmer." -From the review on HyperJeff.net & "I love this book. The descriptions are clear, the examples logical. Everything a programmer needs to get up to speed on Cocoa." - Dave Mark, Editor, MacTech Magazine To help programmers develop applications for Mac OS X, Apple is now giving away XCode, Interface Builder, and the Cocoa frameworks-the tools used to create Safari, GarageBand, Mail, and the iApps. Cocoa® Programming for Mac® OS X, Second Edition, will give you a complete understanding of how to use these tremendously powerful tools and frameworks to write full-featured applications for the Mac. Guiding programmers through the key features of Cocoa, this book emphasizes design patterns that enable you to predict the behavior of classes you have never used before. Written in a tutorial format, it takes you step-by-step through the creation of six applications and an Interface Builder palette. Each project introduces several new ideas, and as each concept or technique is discussed, the author, drawing on his own extensive experience, shows you the right way to use it. Updated for Xcode and Mac OS X 10.3, new chapters in this second edition include coverage of OpenGL, AppleScriptability, the undo manager, creating frameworks, and a brief introduction to using GNUstep on Linux.
    Note: Includes bibliographical references (p. 427-428) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 687 p. , ill. ; , 24 cm
    DDC: 005.4/4682
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "This is an excellent introduction to Linux programming. The topics are well chosen and lucidly presented. I learned things myself, especially about internationalization, and I've been at this for quite a while." -Chet Ramey, Coauthor and Maintainer of the Bash shell "This is a good introduction to Linux programming. Arnold's technique of showing how experienced programmers use the Linux programming interfaces is a nice touch, much more useful than the canned programming examples found in most books." -Ulrich Drepper, Project Lead, GNU C library "A gentle yet thorough introduction to the art of UNIX system programming, Linux Programming by Example uses code from a wide range of familiar programs to illustrate each concept it teaches. Readers will enjoy an interesting mix of in-depth API descriptions and portability guidelines, and will come away well prepared to begin reading and writing systems applications. Heartily recommended." -Jim Meyering, Coauthor and Maintainer of the GNU Core Utility Programs Learn Linux® programming, hands-on... from real source code This book teaches Linux programming in the most effective way possible: by showing and explaining well-written programs. Drawing from both V7 Unix® and current GNU source code, Arnold Robbins focuses on the fundamental system call APIs at the core of any significant program, presenting examples from programs that Linux/Unix users already use every day. Gradually, one step at a time, Robbins teaches both high-level principles and "under the hood" techniques. Along the way, he carefully addresses real-world issues like performance, portability, and robustness. Coverage includes: Memory management File I/O File metadata Processes Users and groups Sorting and searching Argument parsing Extended interfaces Signals Internationalization Debugging And more... Just learning to program? Switching from Windows®? Already developing with Linux but interested in exploring the system call interface further? No matter which, quickly and directly, this book will help you master the fundamentals needed to build serious Linux software. Companion Web Sites, authors.phptr.com/robbins and www.linux-by-example.com , include all code examples.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Inside Java™ 2 Platform Security , the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java experts at Sun Microsystems, provides a detailed look into the central workings of the Java security architecture and describes tools and techniques for successful implementation on even the most demanding network computing environment. While Java has always provided a stronger security model than other platforms, this book reviews all the methods and practices required to improve security without sacrificing functionality. With tips on how to customize, extend, and refine the Java security architecture, users will have everything they need to protect their information assets from both external and internal threats. This book's in-depth coverage encompasses security architecture, deployment, customization, new developments, and much more. Security fundamentals Secure class loading Specifying fine-grained security policy Enforcing security policy with AccessController, SecurityManager, and more Digital certificates, certification paths, signed code, JAAS, and other authentication measures Java-based cryptography with code examples JSSE, Java GSS-API, and RMI for network security Previews of other platforms for security, including Java Card, J2ME and Jini Designed for both the system administrator and software practitioner, this book delivers vital knowledge for building and maintaining a secure system using the Java 2 platform. With detailed code and usage examples throughout, Inside Java™ 2 Platform Security, Second Edition , is an indispensable resource for all platform security needs. The Java™ Series is supported, endorsed, and authored by the creators of the Java technology at Sun Microsystems, Inc. It is the official place to go for complete, expert, and definitive information on Java technology. The books in this Series provide the inside information you need to build effective, robust, and portable applications and applets. The Series is an indispensable resource for anyone targeting the Java™ 2 platform.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 363 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.4/465
    Keywords: Mac OS ; UNIX (Computer file) ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: With its rep for being the sort of machine that won't intimidate even the most inexperienced users, what's the appeal of the Mac® for hard-core geeks? The Mac has always been an efficient tool, pleasant to use and customize, and eminently hackable. But now with Mac OS® X's BSD core, many a Unix® developer has found it irresistible. The latest version of Mac OS X, called Panther, makes it even easier for users to delve into the underlying Unix operating system. In fact, you can port Linux® and Unix applications and run them side-by-side with your native Aqua® apps right on the Mac desktop. Still, even experienced Unix users may find themselves in surprisingly unfamiliar territory as they set out to explore Mac OS X. Even if you know Macs through and through, Mac OS X Panther is unlike earlier Macs, and it's radically different from the Unix you've used before. Enter Mac OS X Panther for Unix Geeks by Brian Jepson and Ernest E. Rothman, two Unix geeks who found themselves in the same place you are. The new edition of this book is your guide to figuring out the BSD Unix system and Panther-specific components that you may find challenging. This concise book will ease you into the Unix innards of Mac OS X Panther, covering such topics as: A quick overview of the Terminal application, including Terminal alternatives like iTerm and GLterm Understanding Open Directory (LDAP) and NetInfo Issues related to using the GNU C Compiler (GCC) Library linking and porting Unix software An overview of Mac OS X Panther's filesystem and startup processes Creating and installing packages using Fink and Darwin Ports Building the Darwin kernel Using the Apple® X11 distribution for running X Windows® applications on top of Mac OS X The book wraps up with a quick manpage-style reference to the "Missing Manual Pages" --commands that come with Mac OS X Panther, although there are no manpages. If you find yourself disoriented by the new Mac environment, Mac OS X Panther for Unix Geeks will get you acclimated quickly to the foreign new areas of a familiar Unix landscape.
    Note: Includes index. - Rev. ed.: Mac OS X for Unix geeks. 2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 581 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Enterprise Java™ Security: Building Secure J2EE™ Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java™ 2 Platform, Enterprise Edition (J2EE), and Java™ 2 Platform, Standard Edition (J2SE™), security architectures and offers practical solutions and usage patterns to address the challenges of Java security. To aid developers who need to build secure J2EE applications, Enterprise Java™ Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP™), and Enterprise JavaBeans™ (EJB™)-technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security. Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology. The relationship between Java and cryptographic technologies is covered in great detail, including: Java Cryptography Architecture (JCA) Java Cryptography Extension (JCE) Public-Key Cryptography Standards (PKCS) Secure/Multipurpose Internet Mail Extensions (S/MIME) Java Secure Socket Extension (JSSE)
    Note: Includes bibliographical references (p. 563) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 647 p. , ill. ; , 23 cm
    Series Statement: Prentice Hall series in computer networking and distributed systems
    DDC: 005.8
    Keywords: Computer crimes ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to come "This is a truly outstanding book-enormous technical wealth and beautifully written." -Warwick Ford "Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!" -Harlan Carvey, CISSP "This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." -Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it! This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes: Solutions and examples that cover both UNIX® and Windows® Practical, time-tested, real-world actions you can take to secure your systems Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly! Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home compu...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: ix, 639 p. , ill. ; , 24 cm
    DDC: 005.4/4769
    Keywords: Solaris (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Special Edition Using Solaris 9 is intended to be a one-stop, in-depth reference guide to Solaris 9, a UNIX operating system by Sun Microsystems. It focuses on the reader gaining real-life exposure to the functions of the operating system. This book avoids jargon, and emphasizes brevity and clarity. It also covers key features of Solaris 9 such as NIS/NIS+, Solstice DiskSuie, Solstice AdminSuite, WebFS, JumpStart, and WebStart.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxi, 1344 p. , ill. ; , 24 cm
    DDC: 005.4/4769
    Keywords: Microsoft Windows server ; Microsoft .NET ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Inside Windows .NET Server contains comprehensive information on deploying, managing, and troubleshooting systems using both Windows .NET and its predecessor. Readers get the in-depth, practical knowledge they need to master the hundreds of complex and often frustrating features found in Windows .NET Server. Inside Windows .NET Server is structured around a production deployment of Windows .NET in a global enterprise. Each chapter contains a lively feature description followed by extensively illustrated procedures for setting up and managing each service. All along the way, Boswell includes proven advice for improving stability, performance, and security. Readers of Boswell's Inside Windows 2000 Server declared it to be the best resource on the market. Inside Windows .NET Server improves coverage of existing features while expanding the scope to include the new features and improvements that make Windows .NET a must-have upgrade.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xvi, 434 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/465
    Keywords: Mac OS ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else. The book concentrates on teaching Cocoa development first, and then takes that knowledge and teaches in-depth, advanced Mac OS X development through detailed examples. Topics covered include: writing applications in Cocoa, supporting plug-in architectures, using shell scripts as startup items, understanding property lists, writing screen savers, implementing preference panes and storing global user preferences, custom color pickers, components, core and non-core services, foundations, frameworks, bundles, tools, applications and more. Source code in Objective-C, Perl, Java, shell script, and other languages are included as appropriate. These solutions are necessary when developing Mac OS X software, but many times are overlooked due to their complexities and lack of documentation and examples. The project-oriented approach of Mac OS X Advanced Development Techniques lends itself perfectly to those developers who need to learn a specific aspect of this new OS. Stand-alone examples allow them to strike a specific topic with surgical precision. Each chapter will be filled with snippets of deep, technical information that is difficult or impossible to find anywhere else.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Beijing ; : Pogue Press/O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 763 p. , ill., portraits ; , 24 cm
    Edition: 1st ed.
    DDC: 005.4/465
    Keywords: Mac OS ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Apple says that Mac OS X 10.3 introduces 150 new features--but that's not really true. In fact, "Panther" includes many more than that. It's faster, more polished, and much more efficient. But it still comes without a manual. With 300,000 copies in print, the first two versions of this book became industry bestsellers. Now David Pogue brings his humor and expertise to this completely rewritten, greatly expanded edition. It covers: Getting started . The early chapters demystify the Dock, windows, and the unfamiliar Mac OS X folder structure--an ideal introduction. New technologies . Mac OS X 10.3 brings breakthroughs in window management (Expose, the Sidebar); security (File Vault, Secure Empty Trash); and productivity (faxing, Fast User Switching). Bonus software . Panther comes with over 50 free programs--and this book gives you expertise in all of them. This beefed-up edition includes all-new mini-manuals on iMovie, iDVD, iPhoto, iChat AV, and Safari. Basics of Unix . You can completely ignore Panther's Unix core. But if the command line intrigues you, this book offers a gentle introduction. Finding familiar features . Two "Where'd It Go?" Dictionaries make it easy for Mac OS 9 and Windows refugees to look up a traditional feature--and find out where it went in Mac OS X 10.3. As always, Mac OS X: The Missing Manual offers warm, witty writing, and bursts with the shortcuts, surprises, and design touches that make the Mac the most passionately championed computer in the world.
    Note: "Covers version 10.3"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 392 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/469
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Windows XP is the latest, most reliable, and best-looking version of the Windows operating system to emerge yet. As the result of the unification of Microsoft's corporate series (Windows NT and 200) with the home series (Windows 95, 98, and Me), Windows XP offers much that is pleasing to its users: rock-solid stability and a fresh new look. But power users who want to take command of their operating systems will find the same old frustrations: it's never been easy to get under the hood of a Windows system and Windows XP is no exception. Now power users can rejoice! Windows XP Hacks offers tips, tools, and know-how to bend Windows XP to your will. The book delves into XP topics such as controlling the control panel, changing unchangeable icons, removing uninstallable XP components, stopping pop-up ads, taking a bite out of cookies, speeding up file downloads, protecting yourself with firewalls and proxy servers, and more. Users of both Windows XP Home Edition and Windows XP Pro Edition will find smart, timesaving, fun, and useful hacks for virtually every feature in their operating system. Even if you're not a power user yet, this book will have you well on your way. Each Hack in the book can be read easily in a few minutes, saving countless hours of searching for the right answer. Windows XP Hacks provides direct, hands-on solutions that can be applied to the challenges facing both those meeting Windows XP for the first time as well as long-time users who know what they want from their operating system and just wants tips on how to get it. Windows XP Hacks is the latest in O'Reilly's new Hacks Series which aims to begin reclaiming the term "hacking" for the good guys. In recent years, the term has come to be associated with those nefarious black hats who break into computers to snoop, steal information or disrupt Internet traffic. But the term originally had a more benign meaning, and you'll still hear it used this way whenever developers get together. Our new Hacks books are written in the spirit of the true hackers -- the people who drive innovation.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: vi, 181 p. ; , 18 cm
    Edition: 1st ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Windows XP Pocket Reference is a handy book for power users and system administrators who need a solid reference with quick answers, but not a lot of explanation. This book is a powerful tool that quickly covers XP's applications and tools, tasks and settings, and commands. Windows XP Pocket Reference covers the following topics: Getting Started Mouse and Keyboard Shortcuts Components of Windows XP Setting Locator Registry Tweaks Command Prompt & Recovery Console Error Messages Packed with information in an easy-to-read format, Windows XP Pocket Reference is perfect for someone familiar with Windows who wants to get the most out of Windows XP or needs to support other users as part of their job.
    Note: "A compact guide to Windows XP"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Beijing, China ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 801 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/465
    Keywords: Mac OS ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Complete overview of Mac OS Jaguar (Mac OS X 10.2) including basic system and network administration features, hundreds of tips and tricks, with an overview of Mac OS X's Unix text editors and CVS.
    Note: "Covers Mac OS X 10.2"--Cover. - Includes bibliographical references (p. 763-768) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Language: English
    Pages: xxix, 954 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.8
    Keywords: UNIX (Computer file) ; Computer security ; Internet ; Congresses ; Operating systems (Computers) ; Electronic books ; local
    Abstract: When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more. Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.
    Note: Includes bibliographical references (p. 873-895) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Harlow, England ; : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 877 p. , ill. ; , 24 cm
    DDC: 005.4/3
    Keywords: Electronic data processing ; Distributed processing ; Operating systems (Computers) ; Parallel programming (Computer science) ; Electronic books ; local
    Abstract: Modern software systems rely on the concepts of concurrency, modularity and distribution, both within the design of the operating system and those systems that it supports. Underlying this book is the premise that distributed systems are now commonplace and a reader is more likely to be using one than a centralized time-sharing system. This modern approach therefore avoids the focus on centralized systems, instead placing the operating system within its context and providing an overview of system components and their relationships.The book is divided into four parts: System Design, covering the basic operating system functions and describing the abstraction and implementation of a system as a community of (possibly distributed) concurrent processes. Distributed systems are introduced and a chapter on system security is included. Concurrency Control in Main Memory, focusing on concurrency control in operating systems and application-level systems and exploring inter-process communication (IPC) in the context of (distributed) system design. Transactions, demonstrating the general applicability of concurrent composite operations. Case Studies, considering different systems in the light of the perspective developed in the book: Classical UNIX; Linux, Solaris and Contemporary Unix; Extensible Systems; Windows 2000; Web Programming; Middleware; and Transaction Processing Systems.The Java language has been used throughout to illustrate object-oriented concepts, concurrent algorithms and distributed programming and the book includes a chapter on system security. The case studies, covering a full suite of professional operating systems, enable the course to be taught as a blend of theory and practice, so that on completion of the course a student is able to adapt and build real operating systems that function within a distributed environment.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxix, 746 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Privacy, Right of ; Electronic books ; local
    Abstract: The classic guide to information security-fully updated for the latest attacks and countermeasures Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike. This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats and vulnerabilities, and offers practical guidance for responding to them. Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more Security in Internet-based, distributed, desktop and traditional centralized applications New attacks, including scripted vulnerability probing, denial of service, and buffer overflows-with symptoms and cures Clear, accessible introduction to cryptography-without sophisticated math Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography Thoroughly revamped coverage of software engineering practices designed to enhance program security Expanded coverage of risk management, contingency planning, and security policies Detailed presentation of protection in general-purpose and trusted operating systems Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security. The companion website (http://www.phptr.com/pfleeger/) contains additional information, book updates, and instructor's resources.
    Note: Includes bibliographical references (p. 691-725) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xx, 340 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rules and known exploits. The lack of usable information made using Snort a frustrating experience. The average Snort user needs to learn how to actually get their systems up-and-running. Snort Intrusion Detection provides readers with practical guidance on how to put Snort to work. Opening with a primer to intrusion detection and Snort, the book takes the reader through planning an installation to building the server and sensor, tuning the system, implementing the system and analyzing traffic, writing rules, upgrading the system, and extending Snort.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...