Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Safari Tech Books Online  (259)
  • Safari, an O’Reilly Media Company
  • Java (Computer program language)  (209)
  • Computer security  (57)
Datenlieferant
Materialart
Sprache
Erscheinungszeitraum
  • 1
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 558 p. , ill. ; , 24 cm. +
    Ausgabe: 4th ed.
    DDC: 005.71262
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: If you have been wanting to learn Java, check out the newly revised fourth edition of the best-seller Sams Teach Yourself Programming with Java in 24 Hours . This step-by-step tutorial will teach you how to create simple Java programs and applets. Comprised of 24 one-hour lessons, this new edition focuses on key programming concepts and essential Java basics, has been improved by dozens of reader comments, and is reorganized to better cover the latest developments in Java. The book's coverage of core Java programming topics has also been expanded. A great starting point for learning Java, this book is also a great primer to reading sams Teach Yourself Java in 21 Days .
    Anmerkung: Includes index. - Previous ed. published as: Sams teach yourself Java 2 in 24 hours. 2003
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: vii, 326 p. , ill. ; , 24 cm
    DDC: 005.2762
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Take your Java programming skills beyond the ordinary. Java After Hours: 10 Projects You'll Never Do at Work will make Java your playground with ten detailed projects that will have you exploring the various fields that Java offers to build exciting new programs. You'll learn to: Create graphics interactively on Web servers Send images to Web browsers Tinker with Java's Swing package to make it do seemingly impossible things Search websites and send e-mail from Java programs Use multithreading, Ant and more! Increase your Java arsenal by taking control of Java and explore its possibilities with Java After Hours .
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Electronic books ; local
    Kurzfassung: "When it comes to software security, the devil is in the details. This book tackles the details." --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies "McGraw's book shows you how to make the 'culture of security' part of your development lifecycle." --Howard A. Schmidt, Former White House Cyber Security Advisor "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the lunchroom wall." --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book's methods without radically changing the way you work. Inside you'll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development lifecycle with the touchpoints described in this book. Let this expert author show you how to build more secure software by building security in.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xii, 185 p. , ill. ; , 23 cm
    Schlagwort(e): Computer programming ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Bruce Tate, author of the Jolt Award-winning Better, Faster, Lighter Java has an intriguing notion about the future of Java, and it's causing some agitation among Java developers. Bruce believes Java is abandoning its base, and conditions are ripe for an alternative to emerge. In Beyond Java , Bruce chronicles the rise of the most successful language of all time, and then lays out, in painstaking detail, the compromises the founders had to make to establish success. Then, he describes the characteristics of likely successors to Java. He builds to a rapid and heady climax, presenting alternative languages and frameworks with productivity and innovation unmatched in Java. He closes with an evaluation of the most popular and important programming languages, and their future role in a world beyond Java. If you are agree with the book's premise--that Java's reign is coming to an end--then this book will help you start to build your skills accordingly. You can download some of the frameworks discussed and learn a few new languages. This book will teach you what a new language needs to succeed, so when things do change, you'll be more prepared. And even if you think Java is here to stay, you can use the best techniques from frameworks introduced in this book to improve what you're doing in Java today.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 519 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Swing (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Swing Hacks helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. If you're a Java developer looking to build enterprise applications with a first-class look and feel, Swing is definitely one skill you need to master. This latest title from O'Reilly is a reference to the cool stuff in Swing. It's about the interesting things you learn over the years--creative, original, even weird hacks--the things that make you say, "I didn't know you could even do that with Swing!" Swing Hacks will show you how to extend Swing's rich component set in advanced and sometimes non-obvious ways. The book touches upon the entire Swing gamut-tables, trees, sliders, spinners, progress bars, internal frames, and text components. Detail is also provided on JTable/JTree, threaded component models, and translucent windows. You'll learn how to filter lists, power-up trees and tables, and add drag-and-drop support. Swing Hacks will show you how to do fun things that will directly enhance your own applications. Some are visual enhancements to make your software look better. Some are functional improvements to make your software do something it couldn't do before. Some are even just plain silly, in print only to prove it could be done. The book will also give you give you a small glimpse of the applications coming in the future. New technology is streaming into the Java community at a blistering rate, and it gives application developers a whole new set of blocks to play with. With its profusion of tips and tricks, Swing Hacks isn't just for the developer who wants to build a better user interface. It's also ideally suited for client-side Java developers who want to deliver polished applications, enthusiasts who want to push Java client application boundaries, and coders who want to bring powerful techniques to their own applications. Whatever your programming needs, Swing Hacks is packed with programming lessons that increase your competency with interface-building tools.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 270 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysis But the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.
    Anmerkung: "Solutions and examples for Snort administrators"--Cover. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xii, 177 p. , ill. ; , 26 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer security ; Computers ; Access control ; Data protection ; Identity theft ; Electronic books ; local
    Kurzfassung: From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances shows you how to regain control of your life. You'll learn how to keep private information private, stop nosy bosses, get off that incredibly annoying mailing list, and more. Unless you know what data is available about you and how to protect it, you're a sitting duck. Computer Privacy Annoyances is your guide to a safer, saner, and more private life. Written by privacy pro Dan Tynan, and based on interviews with privacy experts from all over the globe, Computer Privacy Annoyances serves up real-world advice in bite-sized portions that will help you stop the snoops in their tracks. The book even addresses non-computing threats, from telemarketer-cum-stalkers, thieves at your mailbox, nosy folks in your HR department, cell phone eavesdroppers, and more. The key areas covered include: Privacy at Home Privacy on the Net Privacy at Work Privacy in Public Privacy and Uncle Sam Privacy in the Future Daniel Tynan has written about Internet privacy and security for nearly a decade. His work has appeared in more than 40 national publications. As executive editor at PC World , Tynan edited a special issue on Internet Privacy that won a Grand Neal Award and was a finalist for a National Magazine Award. He has won more than a dozen other honors, including nine Neals, four Maggies, and two Computer Press Association Awards.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 238 p. , ill. ; , 24 cm
    Schlagwort(e): Linux ; Computer security ; Electronic books ; local
    Kurzfassung: The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: A readable and concrete explanation of SELinux concepts and the SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With SELinux , a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 1142 p. , ill. ; , 24 cm
    DDC: 005.4/476
    Schlagwort(e): Microsoft Windows server ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: "Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!" James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker Jamesaccusource.net "Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003." Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com "Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security." Bob Reinsch bob.reinsch@fosstraining.com " Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information." Richard Siddaway, MCSE rsiddaw@hotmail.com "Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security." Michael VonTungeln, MCSE, CTT mvontung@yahoo.com "I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it. Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all." Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net "R...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 582 p. , ill. ; , 24 cm. +
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Open source software ; Electronic books ; local
    Kurzfassung: "If you're a Java developer interested in leveraging open source tools to build multitier applications, Larne Pekowsky can help--this book will walk you all the way through development, build, testing, and deployment. This soup-to-nuts coverage is a rare find." --Angela Yochem, author of J2EE Applications and BEA WebLogic Server, Second Edition (Prentice Hall, 2004) The Jakarta project consists of many powerful open source tools for the Java platform, but most lack tutorials or clear online help documentation. Apache Jakarta and Beyond is the definitive guide to using Jakarta and other Java open source tools to develop Web applications more efficiently and effectively. In this example-packed book, readers will find An introduction to the philosophy behind the Jakarta project Details on many ready-to-use Java toolkits, including Ant, JUnit, Cactus, Log4J, POI, Tomcat, James, Struts, and more In-depth guidelines on how to develop with multiple toolkits A guide to splitting work along lines of "what is available" and "what must be written" Best practices for development, such as the model/view/controller paradigm Numerous examples that can serve as templates for readers' own projects The accompanying CD-ROM contains templates and complete code examples from the book. Whether you are developing client applications, Web applications, or Web services, Apache Jakarta and Beyond will help you use existing code to simplify the task at hand.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 11
    Online-Ressource
    Online-Ressource
    Harlow : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxi, 347 p. , ill. ; , 24 cm. +
    DDC: 005.8
    Schlagwort(e): Business enterprises ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Praise for J.C. Cannon's Privacy "A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between." -Peter Wayner, author of Translucent Databases "Cannon provides an invaluable map to guide developers through the dark forest created by the collision of cutting-edge software development and personal privacy." -Eric Fredericksen, Sr. Software Engineer, PhD., Foundstone, Inc. "Cannon's book is the most comprehensive work today on privacy for managers and developers. I cannot name any technical areas not covered. No practitioners should miss it." -Ray Lai, Principal Engineer, Sun Microsystems, Inc., co-author of Core Security Patterns and author of J2EE Platform Web Services "Every developer should care deeply about privacy and this is the best book I've read on the subject. Get it, read it, and live it." -Keith Ballinger, Program Manager, Advanced Web Services, Microsoft "J.C. Cannon's book demonstrates that information and communication technology can contribute in a significant way to restoring individual privacy and raises more awareness of the complexity and importance of this societal problem." -Dr. John J. Borking, Former Commissioner and Vice-President of the Dutch Data Protection Authority "If you are planning, implementing, coding, or managing a Privacy campaign in your company or your personal computing, there is no more relevant reference. J.C. Cannon nails the issues." -Rick Kingslan, CISSP, Microsoft MVP-Windows Server: Directory Services and Right Management, West Corporation "It's often been said that security is a process, not a product. Privacy is no different! Unlike other privacy books, J.C. Cannon's book has something valuable to convey to everyone involved in the privacy process, from executives to designers and developers, many of whom aren't thinking about privacy but should be." -Keith Brown, Co-founder of Pluralsight and author of The .NET Developer's Guide to Windows Security and Programming Windows Security "J.C. Cannon's new book on electronic privacy is an important addition to the available works in this emerging field of study and practice. Through many humorous (and occasionally frightening) examples of privacy gone wrong, J.C. helps you better understand how to protect your privacy and how to build privacy awareness into your organization and its development process. Keenly illustrating both the pros and cons of various privacy-e...
    Anmerkung: Includes bibliographical references (p. 319-326) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 316 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    Schlagwort(e): Ant (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Soon after its launch, Ant succeeded in taking the Java world by storm, becoming the most widely used tool for building applications in Java environments. Like most popular technologies, Ant quickly went through a series of early revision cycles. With each new version, more functionality was added, and more complexity was introduced. Ant evolved from a simple-to-learn build tool into a full-fledged testing and deployment environment. Ant: The Definitive Guide has been reworked, revised and expanded upon to reflect this evolution. It documents the new ways that Ant is being applied, as well as the array of optional tasks that Ant supports. In fact, this new second edition covers everything about this extraordinary build management tool from downloading and installing, to using Ant to test code. Here are just of a few of the features you'll find detailed in this comprehensive, must-have guide: Developing conditional builds, and handling error conditions Automatically retrieving source code from version control systems Using Ant with XML files Using Ant with JavaServer Pages to build Web applications Using Ant with Enterprise JavaBeans to build enterprise applications Far exceeding its predecessor in terms of information and detail, Ant: The Definitive Guide , 2nd Edition is a must-have for Java developers unfamiliar with the latest advancements in Ant technology. With this book at your side, you'll soon be up to speed on the premiere tool for cross-platform development.Author Steve Holzner is an award-winning author who s been writing about Java topics since the language first appeared; his books have sold more than 1.5 million copies worldwide.
    Anmerkung: Includes index. - Prev. ed. by Jesse Tilly and Eric M. Burke, pub. May 2002
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 13
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.8
    Schlagwort(e): Microsoft Windows (Computer file) ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: "It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding." --Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible." --Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight. "Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine. "Understanding the ultimate attacker's tool provides ...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 14
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxii, 747 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Electronic books ; local
    Kurzfassung: In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company. Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. This shorter version of the original work omits much mathematical formalism, making it more accessible for professionals and students who have a less formal mathematical background, or for readers with a more practical than theoretical interest.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 15
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Data protection ; Electronic books ; local
    Kurzfassung: The Definitive Guide to Protecting Enterprise Data Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecycle Management , leading industry consultant Tom Petrocelli presents a systematic, coherent approach to planning and implementing cost-effective data protection. This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy. Coverage includes A complete, unique framework for considering and planning data protection Understanding storage technology from the standpoint of data protection Architecting more effective backup/restore solutions Using remote copy and replication to keep data synchronized and support immediate failover to hot sites Leveraging core computer security concepts and strategies to protect your most critical data Securing your entire storage infrastructure, not just servers Using policy-driven data protection and Data Lifecycle Management (DLM) to improve security and reduce cost Using ILM to identify your highest-value data and choose the right ways to protect it Data Protection and Information Lifecycle Management is an indispensable resource for IT executives who must plan and implement strategies for data protection; administrators who must protect data on a day-to-day basis; and product managers, consultants, and marketers responsible for crafting superior data-security solutions.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 16
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR ; | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxi, 395 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Schlagwort(e): Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Praise for Rapid J2EE Development "The author provides a good survey of the technologies and approaches for rapid development in the J2EE arena. He touches on all areas that should be of interest to a reader, from design through testing. He illustrates the different phases of rapid development by going into several technologies in depth, and he also lists or otherwise mentions other available technologies. I would recommend this book to anyone looking to get started with developing J2EE applications." -Beth Stearns, Consultant, ComputerEase Publishing "This book has a lot of great material in it. The author really shows his experience in the subject matter. The content is excellent. I haven't seen another book that is as comprehensive or contains as many real-world lessons learned." -Madhu Siddalingaiah, Consultant, SEA Corporation "I think the book does a good job of presenting a set of processes and technologies that enable rapid development. I think this is an extremely useful book, and I would recommend it to others." -Satadip Dutta, Software Engineer, HP "The author skillfully presents a collection of tools, technologies and processes that facilitate rapid development of J2EE applications. I see this book as a valuable addition to any company bookshelf, especially given its broad application across the software lifecycle. It's also quite amazing that a Google search does not reveal any existing publications with this title. This book should neatly fill that hole." -Martin Westacott, Director and Senior Consultant, Solstice Software Limited, U.K. "If you ever needed to put some polish to your J2EE development understanding or would like to move into the role of Senior J2EE Developer, then this is the book for you. The author covers everything you need to take you from design to coding to build process. Along the way he introduces some new valuable 'leading-edge' technologies. All this will leave you with good capabilities to tackle most J2EE projects confidently." -Shane Griggs, J2EE Architect Learn to accelerate J2EE development, from design through testing and beyond. Covers agile development, model-driven architecture, code generation, aspect-oriented programming, test-driven development, and much more. An essential resource for every J2EE developer, project leader, and manager. J2EE is today's premier platform for enterprise-level development, but it's difficult to deliver J2EE solutions as quickly as today's businesses need them. This...
    Anmerkung: Includes bibliographical references (p. 375-377) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 17
    Online-Ressource
    Online-Ressource
    San Jose, Calif. ; : Novell Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 533 p. , ill. ; , 23 cm
    Ausgabe: 3rd ed. /
    DDC: 005.8
    Schlagwort(e): Linux (Computer file) ; Computer security ; Electronic books ; local
    Kurzfassung: An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall optimization along with some advanced concepts including customizing the Linux kernel to enhance security.The third edition, while distribution neutral, has been updated for the current Linux Kernel and provides code examples for Red Hat, SUSE, and Debian implementations. Don't miss out on the third edition of the critically acclaimed Linux Firewalls .
    Anmerkung: Previous ed.: published as by Robert L. Ziegler. Indianapolis, Ind.: New Riders, 2001
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 18
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 954 p. , ill. ; , 24 cm. +
    Ausgabe: 3rd ed.
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Version 5.0 of the Java 2 Standard Edition SDK is the most important upgrade since Java first appeared a decade ago. With Java 5.0, you'll not only find substantial changes in the platform, but to the language itself-something that developers of Java took five years to complete. The main goal of Java 5.0 is to make it easier for you to develop safe, powerful code, but none of these improvements makes Java any easier to learn, even if you've programmed with Java for years. And that means our bestselling hands-on tutorial takes on even greater significance. Learning Java is the most widely sought introduction to the programming language that's changed the way we think about computing. Our updated third edition takes an objective, no-nonsense approach to the new features in Java 5.0, some of which are drastically different from the way things were done in any previous versions. The most essential change is the addition of "generics", a feature that allows developers to write, test, and deploy code once, and then reuse the code again and again for different data types. The beauty of generics is that more problems will be caught during development, and Learning Java will show you exactly how it's done. Java 5.0 also adds more than 1,000 new classes to the Java library. That means 1,000 new things you can do without having to program it in yourself. That's a huge change. With our book's practical examples, you'll come up to speed quickly on this and other new features such as loops and threads. The new edition also includes an introduction to Eclipse, the open source IDE that is growing in popularity. Learning Java , 3rd Edition addresses all of the important uses of Java, such as web applications, servlets, and XML that are increasingly driving enterprise applications.
    Anmerkung: Accompanying disc contains Java 5 Stand Edition (also known as JDK 1.5), NetBeans 4.1, Eclipse 3.1, Ant 1.4.1, Tomcat 4.0.3, BeanShell 2.0, and full source code for all examples in the book. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 19
    Online-Ressource
    Online-Ressource
    Sebastapol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 714 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Electronic books ; local
    Kurzfassung: Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computerinteraction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security & Usability groups 34 essays into six parts: Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems--how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems--methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The ...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 20
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 1224 p. , ill. ; , 23 cm
    Ausgabe: 5th ed.
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Object-oriented programming (Computer science) ; Web servers ; Electronic books ; local
    Kurzfassung: With more than 700,000 copies sold to date, Java in a Nutshell from O'Reilly is clearly the favorite resource amongst the legion of developers and programmers using Java technology. And now, with the release of the 5.0 version of Java, O'Reilly has given the book that defined the "in a Nutshell" category another impressive tune-up. In this latest revision, readers will find Java in a Nutshell , 5th Edition, does more than just cover the extensive changes implicit in 5.0, the newest version of Java. It's undergone a complete makeover--in scope, size, and type of coverage--in order to more closely meet the needs of the modern Java programmer. To wit, Java in a Nutshell , 5th Edition now places less emphasis on coming to Java from C and C++, and adds more discussion on tools and frameworks. It also offers new code examples to illustrate the working of APIs, and, of course, extensive coverage of Java 5.0. But faithful readers take comfort: it still hasn't lost any of its core elements that made it such a classic to begin with. This handy reference gets right to the heart of the program with an accelerated introduction to the Javaprogramming language and its key APIs--ideal for developers wishing to start writing code right away. And, as was the case in previous editions, Java in a Nutshell , 5th Edition is once again chock-full of poignant tips, techniques, examples, and practical advice. For as longas Java has existed, Java in a Nutshell has helped developers maximize the capabilities of the program's newest versions. And this latest edition is no different.
    Anmerkung: "Covers Java 5.0"--Cover p. [1]. - Contains an accelerated introduction to Java for C and C++ programmers who want to learn the language fast. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 21
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 507 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): Application software ; Internet programming ; Java (Computer program language) ; Struts framework ; Web site development ; Electronic books ; local
    Kurzfassung: The Jakarta Struts Framework is a popular open source platform for building web applications from top to bottom with Java. While this popularity has led to a wealth of online and in-print documentation, developers still find themselves faced with a number of common tasks that are not clearly and succinctly explained.In these situations, programmers can now turn to the Jakarta Struts Cookbook an amazing collection of code solutions to common--and uncommon--problems encountered when working with the Struts Framework. Among many other recipes, this book explains how to: display data in complex HTML tables use JSP, the JSTL, and JavaScript in your user interface define static and dynamic action forms validate data and respond to errors use Logging, Validation, and Exception Handling integrate Struts with persistence frameworks like Hibernate and iBATIS This look-up reference is just what today's time-pressed developers need. With solutions to real-world problems just a few page flips away, information is instantly available. And while the book's solutions focus on getting to the point, each recipe's discussion section imparts valuable concept and insight from a Struts veteran.The Jakarta Struts Cookbook is perfect for independent developers, large development teams, and everyone in between who wishes to use the Struts Framework to its fullest potential. Plus, it s completely up-to-date with the latest versions of Framework, so readers can be sure the information is viable.
    Anmerkung: "Covers Struts 1.2 "--Cover. - "Mastering Jakarta Struts, Solution by Solution"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 22
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxv, 191 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Maven (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Maven is a new project management and comprehension tool which provides an elegant way to share build logic across projects. In terms of capabilities, Maven is an improvement to Apache Ant-thanks to numerous plug-ins and built-in integration with unit testing frameworks such as JUnit. Tired of writing the same build logic for every project? Using Maven, you can leverage the experience of the community to avoid the tedious process of creating yet another build script for each new project. Maven: A Developer's Notebook begins by introducing you to the concept of project object model (POM), and then offers further details on the essential features of Maven. Like all titles in O'Reilly's Developer's Notebook series, this no-nonsense book skips the boring prose and cuts right to the chase. It's an approach that forces you to get your hands dirty by working through a series of poignant labs-exercises that speak to you instead of at you.Plus, Maven: A Developer's Notebook is the first book on the subject to hit the market, so you know the information is fresh and timely. If you're a Java programmer, you'll be armed with all the critical information you need to get up to speed on this powerful new build tool. You'll discover how Maven can help you: manage a project's build, reporting, and documentation, all from a central piece of information break a complex project into a series of smaller subprojects report on code quality, unit tests, code duplication, and project activity create a custom remote repository build simple and complex plug-ins In the end, you'll find yourself spending less time working on your project's build system and more time working on your project's code.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 23
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 735 p. , ill. ; , 24 cm
    Ausgabe: 3rd ed.
    DDC: 005.2762
    Schlagwort(e): Computer networks ; Programming ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: The new third edition of this highly regarded introduction to Java networking programming has been thoroughly revised to cover all of the 100+ significant updates to Java Developers Kit (JDK) 1.5. It is a clear, complete introduction to developing network programs (both applets and applications) using Java, covering everything from networking fundamentals to remote method invocation (RMI). Java Network Programming , 3rd Edition includes chapters on TCP and UDP sockets, multicasting protocol and content handlers, servlets, multithreaded network programming, I/O, HTML parsing and display, the Java Mail API, and the Java Secure Sockets Extension. There's also significant information on the New I/O API that was developed in large part because of the needs of network programmers.This invaluable book is a complete, single source guide to writing sophisticated network applications. Packed with useful examples, it is the essential resource for any serious Java developer.
    Anmerkung: Includes index. - Previous ed.: Beijing; Sebastopol, Calif.: O'Reilly, 2000
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 24
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 445 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): FreeBSD ; OpenBSD ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure.FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems.Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate.Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 25
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 381 p. , ill. ; , 23 cm
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computer security ; United States ; Management ; Data protection ; Data protection ; Management ; Electronic books ; local
    Kurzfassung: Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization's aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board. Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow fin...
    Anmerkung: "Understand the total cost of ownership and return on investment for network security solutions"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 26
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. ; : O'Reilly Media | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 324 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.
    Anmerkung: "Writing, hacking, and modifying security tools"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 27
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 377 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.2/762
    Schlagwort(e): Apache (Computer file : Apache Group) ; Application software ; Development ; Java (Computer program language) ; Open source software ; Electronic books ; local
    Kurzfassung: As a Java developer, you're always looking for tools to help in your web and application development. Maybe you've heard of the Jakarta Commons open source Java tools. The Jakarta Commons is an open source Jakarta subproject where developers create and maintain a collection of twenty-plus independent Java components and utilities that serve useful purposes. Jakarta Commons packages include utilities for web, XML, networking, building and testing applications, and some that help other packages work better together. Jakarta Commons packages are designed to be reusable. Each one is a time saver by itself, and when used in combination the results can be very powerful. But in searching for information on the Jakarta Commons tools, you find it hard to locate documentation relevant to your needs. You don't have lots of time to spend searching for information on a specific Jakarta Commons tool to determine what it does and how to incorporate it in your code. If you are looking for a single source for clear information and samples on how to use the Jakarta Commons tools, then the Jakarta Commons Cookbook is for you. The Jakarta Commons Cookbook summarizes each of the available Jakarta Commons packages and contains practical and efficient recipes for making the most out of the Jakarta Commons open source Java tools. You don't have to be an expert, since the book explains how and why to use a utility, pitfalls to avoid, and where to look for additional information on Jakarta Commons utilities. It introduces design possibilities and explores combining Jakarta Commons utilities in novel assemblies to create complex applications. The book offers detailed code samples and insider tips--making it a valuable resource whether you are an expert Java developer or a novice. If you want to quickly learn how to use Jakarta Commons timing-saving utilities or have an invaluable resource for Jakarta Commons questions and techniques, then the Jakarta Commons Cookbook is for you.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 28
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Anmerkung: Includes bibliographical references (p. [389]-395) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 29
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: ix, 117 p. , ill. ; , 18 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Eclipse is the world's most popular IDE for Java development. And although there are plenty of large tomes that cover all the nooks and crannies of Eclipse, what you really need is a quick, handy guide to the features that are used over and over again in Java programming. You need answers to basic questions such as: Where was that menu? What does that command do again? And how can I set my classpath on a per-project basis? This practical pocket guide gets you up to speed quickly with Eclipse. It covers basic concepts, including Views and editors, as well as features that are not commonly understood, such as Perspectives and Launch Configurations. You'll learn how to write and debug your Java code--and how to integrate that code with tools such as Ant and JUnit. You'll also get a toolbox full of tips and tricks to handle common--and sometimes unexpected--tasks that you'll run across in your Java development cycle. Additionally, the Eclipse IDE Pocket Guide has a thorough appendix detailing all of Eclipse's important views, menus, and commands. The Eclipse IDE Pocket Guide is just the resource you need for using Eclipse, whether it's on a daily, weekly, or monthly basis. Put it in your back pocket, or just throw it in your backpack. With this guide in hand, you're ready to tackle the Eclipse programming environment.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 30
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 233 p. , ill. ; , 24 cm
    DDC: 006.776
    Schlagwort(e): QuickTime ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: QuickTime Java (QJT) is a terrific multimedia toolkit, but it's also terrifying to the uninitiated. Java developers who need to add audio, video, or interactive media creation and playback to their applications find that QTJ is powerful, but not easy to get into. In fact, when it comes to class-count, QuickTime Java is nearly as large as all of Java 1.1. Once you learn the entire scope of Apple's QuickTime software, you really appreciate the problem. At its simplest, QuickTime allows Mac and Windows users to play audio and video on their computers. But QuickTime is many things: a file format, an environment for media authoring, and a suite of applications that includes browser plug-ins for viewing media within a web page, a PictureViewer for working with still pictures, QuickTime Streaming Server for delivering streaming media files on the Internet in real time, and QuickTime Broadcaster for delivering live events on the Internet. Among others. As if that weren't daunting enough, the javadocs on QJT are wildly incomplete, and other books on the topic are long out of date and not well regarded, making progress with QTJ extremely difficult. So what can you do? Our new hands-on guide, QuickTime Java: A Developer's Notebook , not only catches up with this technology, but de-mystifies it. This practical "all lab, no lecture" book is an informal, code-intensive workbook that offers the first real look at this important software. Like other titles in our Developer's Notebook series, QuickTime Java: A Developer's Notebook is for impatient early adopters who want get up to speed on what they can use right now. It's deliberately light on theory, emphasizing example over explanation and practice over concept, so you can focus on learning by doing. QuickTime Java: A Developer's Notebook gives you just the functionality you need from QTJ. Even if you come to realize that 95% of the API is irrelevant to you, this book will help you master the 5% that really counts.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 31
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 470 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: "With this book, Ted Neward helps you make the leap from being a good Java enterprise developer to a great developer!" -John Crupi, Sun Distinguished Engineer coauthor, Core J2EE Patterns If you want to build better Java enterprise applications and work more efficiently, look no further. Inside, you will find an accessible guide to the nuances of Java 2 Platform, Enterprise Edition (J2EE) development. Learn how to: Use in-process or local storage to avoid the network, see item 44 Set lower isolation levels for better transactional throughput, see item 35 Use Web services for open integration, see item 22 Consider your lookup carefully, see item 16 Pre-generate content to minimize processing, see item 55 Utilize role-based authorization, see item 63 Be robust in the face of failure, see item 7 Employ independent JREs for side-by-side versioning, see item 69 Ted Neward provides you with 75 easily digestible tips that will help you master J2EE development on a systemic and architectural level. His panoramic look at the good, the bad, and the ugly aspects of J2EE development will address your most pressing concerns. Learn how to design your enterprise systems so they adapt to future demands. Improve the efficiency of your code without compromising its correctness. Discover how to implement sophisticated functionality that is not directly supported by the language or platform. After reading Effective Enterprise Java , you will know how to design and implement better, more scalable enterprise-scope Java software systems.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 32
    Online-Ressource
    Online-Ressource
    Boston, Mass. ; : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxii, 651 p. ; , 24 cm
    Ausgabe: 3rd ed.
    Serie: The Java series
    DDC: 005.71262
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Written by the inventors of the technology, The Java™ Language Specification, Third Edition , is the definitive technical reference for the Java™ programming language. If you want to know the precise meaning of the language's constructs, this is the source for you. The book provides complete, accurate, and detailed coverage of the Java programming language. It provides full coverage of all new features added since the previous edition, including generics, annotations, asserts, autoboxing, enums, for-each loops, variable arity methods, and static import clauses.
    Anmerkung: Previous ed.: 2000
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 33
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive book on Security Patterns, which are critical for secure programming. --Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your development efforts. --Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. --Judy Lin, Executive Vice President, VeriSign, Inc. Core Security Patterns provides a comprehensive patterns-driven approach and methodology for effectively incorporating security into your applications. I recommend that every application developer keep a copy of this indispensable security reference by their side. --Bill Hamilton, author of ADO.NET Cookbook , ADO.NET in a Nutshell , and NUnit Pocket Reference As a trusted advisor, this book will serve as a Java developers security handbook, providing applied patterns and design strategies for securing Java applications. --Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase Like Core J2EE Patterns , this book delivers a proactive and patterns-driven approach for designing end-to-end security in your applications. Leveraging the authors strong security experience, they created a must-have book for any designer/developer looking to create secure applications. --John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE Patterns Core Security Patterns is the hands-on practitioners guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisionin...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 34
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Direct from the creators of the Java™ programming language, the completely revised fourth edition of The Java™ Programming Language is an indispensable resource for novice and advanced programmers alike. Developers around the world have used previous editions to quickly gain a deep understanding of the Java programming language, its design goals, and how to use it most effectively in real-world development. Now, Ken Arnold, James Gosling, and David Holmes have updated this classic to reflect the major enhancements in Java™ 2 Standard Edition 5.0 (J2SE™ 5.0). The authors systematically cover most classes in Java's main packages, java.lang.* , java.util, and java.io, presenting in-depth explanations of why these classes work as they do, with informative examples. Several new chapters and major sections have been added, and every chapter has been updated to reflect today's best practices for building robust, efficient, and maintainable Java software. Key changes in this edition include New chapters on generics, enums, and annotations, the most powerful new language features introduced in J2SE 5.0 Changes to classes and methods throughout to reflect the addition of generics Major new sections on assertions and regular expressions Coverage of all the new language features, from autoboxing and variable argument methods to the enhanced for-loop and covariant return types Coverage of key new classes, such as Formatter and Scanner The Java™ Programming Language, Fourth Edition, is the definitive tutorial introduction to the Java language and essential libraries and an indispensable reference for all programmers, including those with extensive experience. It brings together insights you can only get from the creators of Java: insights that will help you write software of exceptional quality.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 35
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 282 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: "Every programming language has its quirks. This lively book reveals oddities of the Java programming language through entertaining and thought-provoking programming puzzles." --Guy Steele, Sun Fellow and coauthor of The Java™ Language Specification "I laughed, I cried, I threw up (my hands in admiration)." --Tim Peierls, president, Prior Artisans LLC, and member of the JSR 166 Expert Group How well do you really know Java? Are you a code sleuth? Have you ever spent days chasing a bug caused by a trap or pitfall in Java or its libraries? Do you like brainteasers? Then this is the book for you! In the tradition of Effective Java™ , Bloch and Gafter dive deep into the subtleties of the Java programming language and its core libraries. Illustrated with visually stunning optical illusions, Java™ Puzzlers features 95 diabolical puzzles that educate and entertain. Anyone with a working knowledge of Java will understand the puzzles, but even the most seasoned veteran will find them challenging. Most of the puzzles take the form of a short program whose behavior isn't what it seems. Can you figure out what it does? Puzzles are grouped loosely according to the features they use, and detailed solutions follow each puzzle. The solutions go well beyond a simple explanation of the program's behavior--they show you how to avoid the underlying traps and pitfalls for good. A handy catalog of traps and pitfalls at the back of the book provides a concise taxonomy for future reference. Solve these puzzles and you'll never again fall prey to the counterintuitive or obscure behaviors that can fool even the most experienced programmers.
    Anmerkung: Includes bibliographical references (p. 265-269) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 36
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.1
    Schlagwort(e): Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Build Powerful, Cross-Platform Rich Client Applications Eclipse is more than a state-of-the-art IDE: its Rich Client Platform (RCP) plug-ins form an outstanding foundation for any desktop application, from chat applications to enterprise software front-ends. In Eclipse Rich Client Platform , two leaders of the Eclipse RCP project show exactly how to leverage Eclipse for rapid, efficient, cross-platform desktop development. In addition to explaining the power of Eclipse as a desktop application development platform, the authors walk step-by-step through developing a fully featured, branded RCP application. They introduce a wide range of techniques, including developing pluggable and dynamically extensible systems, using third-party code libraries, and packaging applications for diverse environments. You'll build, refine, and refactor a complete prototype; customize the user interface; add Help and Update features; and build, brand, and ship the finished software. For every Java developer, regardless of previous Eclipse experience Thoroughly covers Eclipse 3.1's new RCP features and its extensive new tools for designing, coding, and packaging RCP applications Presents techniques for branding and customizing the look and feel of RCP applications Shows how to overcome the challenges and "rough edges" of RCP development Discusses the similarities and differences between RCP and conventional plug-in development Includes an overview of OSGi, the base execution framework for Eclipse If you want to develop and deploy world-class Java applications with rich, native GUIs, and use Eclipse RCP- get this book . CD-ROM contains the Eclipse 3.1 SDK, Eclipse 3.1 RCP SDK, and Eclipse 3.1 RCP Delta Pack appropriate for Windows, Linux, and Mac OS X. It also contains all the code samples developed in the book. © Copyright Pearson Education. All rights reserved.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 37
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvii, 713 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Computer viruses ; Electronic books ; local
    Kurzfassung: "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." -Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code-and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies © Copyright Pearson Education. All rights reserved.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 38
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 338 p. , ill. ; , 24 cm
    DDC: 005.2762
    Schlagwort(e): Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Easy-to-follow coverage of twelve indispensable Jakarta Commons packages Code examples that show innovative uses of Commons components, including using HttpClient to access Web resources, FileUpload for handling HTTP file uploads, and BeanUtils for easy form generation Detailed instructions for combining the Commons project libraries with the popular Eclipse IDE Save time and money with reusable open source Java™ components Master the Jakarta Commons Library of Open Source JavaTM Components Using the Apache Jakarta Commons reusable Java™ components, you can leverage the work of the global open-source community to solve common programming problems reliably, quickly, and inexpensively. But, to use the Commons libraries effectively, you need far more guidance than the official documentation offers. In Apache Jakarta Commons: Reusable Java™ Components, Will Iverson covers what Java developers need to know to take full advantage of Jakarta Commons-starting right now. Iverson begins with a definitive overview of the Commons project: goals, installation, and getting started with Commons components. Next, he presents example-rich chapters on the twelve most useful Commons packages, covering topics ranging from HTTP FileUpload to database connectivity. Iverson provides detailed code samples for every component he describes. After you've mastered the core Jakarta Commons packages, you'll constantly rely on this book's handy seventy-five page quick-reference. Iverson's coverage includes Downloading Commons project libraries and installing them into Eclipse Programmatically accessing resources via HTTP, FTP, NNTP, and other Internet protocols Using the Jakarta Commons suite of configurable object pools Managing database connectivity in Swing applications-and anywhere containers aren't doing it for you Using BeanUtils to generate forms and gain runtime access to information provided by JavaBeans-style objects Traversing complex object graphs with JXPath Using Jakarta Commons' advanced collections tools to establish richer object relationships Extending java.lang with better methods for manipulating core classes Implementing conversion routines, configurable logging, command-line help, and more Exploring the newest packages, including emerging "sandbox" packages Whether you're building code for front-end Web applications, client-side software, or back-end servers, learning Jakarta Commons will make you far more efficient. Apache Jakarta Commons is the faste...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 39
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 695 p. , ill. ; , 24 cm
    Serie: IBM Press series--information management
    Schlagwort(e): WebSphere ; Application software ; Development ; Java (Computer program language) ; Web servers ; Computer programs ; Web site development ; Electronic books ; local
    Kurzfassung: The expert guide to deploying and managing any WebSphere Application Server V5.x application and environment If you're a WebSphere Application Server administrator or developer, this is your advanced guide for delivering applications rapidly, running them smoothly, and administering them efficiently. Four leading IBM consultants draw on their years of experience to illuminate the key steps involved in taking WebSphere Application Server applications from development to production. They focus on the areas most crucial to success, including application assembly and build, application and infrastructure configuration and administration, and application testing and verification. Along the way, they show how to implement automated deployment processes that can be executed frequently, reliably, and quickly-so you can get your applications to market fast. The focus is on WebSphere Application Server Version 5.1, but much of the information applies to other versions. Coverage includes Installing, testing, and managing WebSphere Application Server environments: clustering, security, messaging, integration, and more Deploying and managing key J2EE technologies: JDBC, Connectors, EJB, container managed and message driven beans, transactions, JMS, JavaMail, and more Deploying highly available, scalable multi-node WebSphere Application Server environments: clustering, distributed session management, and edge components Advanced considerations: working with Java Management Extensions, caching, and much more Performance-tuning tools Troubleshooting Leveraging key WebSphere deployment and administration tools: ANT, wsadmin, Admin Console, and the Application Server Toolkit Advanced discussions of J2EE and architectural concepts you need to deploy successfully-with practical examples © Copyright Pearson Education. All rights reserved.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 40
    Online-Ressource
    Online-Ressource
    Santa Clara, Calif. : Sun Microsystems Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 762 p. , ill. ; , 24 cm
    Ausgabe: 7th ed.
    DDC: 005.133
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Completely revised and up-to-date coverage of Generic programming, restrictions and limitations, type bounds, wilcard types, and generic reflection Swing GUI development, including input validation and other enhancements Exception handling and debugging, including chained exceptions, stack frames, assertions, and logging Streams and files, the new I/O API, memory-mapped files, file locking, and character set encoders/decoders Regular expressions using the powerful java.util.regex package Inner classes, reflection, and dynamic proxies Application packaging and the Preferences API The seventh edition of Core Java™ 2, Volume I, covers the fundamentals of the Java 2 Platform, Standard Edition (J2SE™). A no-nonsense tutorial and reliable reference, this book features thoroughly tested real-world examples. The most important language and library features are demonstrated with deliberately simple sample programs, but they aren't fake and they don't cut corners. More importantly, all of the programs have been updated for J2SE 5.0 and should make good starting points for your own code. You won't find any toy examples here. This is a book for programmers who want to write real code to solve real problems. Volume I concentrates on the fundamental concepts of the Java language, along with the basics of user-interface programming and provides detailed coverage of Object-oriented programming Reflection and proxies Interfaces and inner classes The event listener model Graphical user-interface design with the Swing UI toolkit Exception handling Stream input/output and object serialization Generic programming For the same real-world treatment of enterprise features and advanced user-interface programming, look for the forthcoming new edition of Core Java™ 2, Volume II-Advanced Features. It includes new sections on metadata and other J2SE 5.0 enhancements along with complete coverage of: Multithreading • Distributed objects • Databases • Advanced GUI components • Native methods • XML Processing • Network programming • Collection classes • Advanced graphics • Internationalization • JavaBeans
    Anmerkung: "J2SE 5.0"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 41
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Pearson Education/PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 337 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Schlagwort(e): BEA WebLogic server ; BEA WebLogic workshop ; Client/server computing ; Java (Computer program language) ; Web services ; Electronic books ; local
    Kurzfassung: "Very impressive work. This book is valuable for beginning and intermediate technologists." Dwight Mamanteo, Technical Manager, BEA Systems "Provides explanations of Web services, tuning tips, and discussions on security that will likely be of benefit to developers as they create their Web services." Robert W. Husted, Member, Technical Staff, Requisite Software Build Web services infrastructure based on service-oriented architecture (SOA) Implement enterprise-class Web services using WebLogic and J2EE Complete lifecycle coverage with best practices: design, prototyping, development, testing, deployment, and management Real-world enterprise Web services implementation with J2EE and WebLogic You've seen plenty of theory about Web services. This book is about the reality: what it takes to successfully implement J2EE Web services with BEA WebLogic in complex enterprise environments. Anjali Anagol-Subbarao, one of the world's leading Web services experts, offers powerful insights for every stage of the Web services lifecycle: design, prototyping, development, testing, deployment, and management. Anagol-Subbarao draws on her experience architecting and building Web services infrastructure for HP's worldwide operations and takes on the challenges that face every enterprise implementer. She demonstrates how to design robust Web services that align with business processes, smoothly integrate with existing infrastructure, deliver superior performance and security, and can be managed effectively. Coverage includes Primers on WebLogic Workshop, WebLogic Server, WLI, and J2EE Web services technology Building effective service-oriented architectural (SOA) frameworks Translating designs into working code Designing for end-to-end security and tuning for high performance Testing Web services and deploying them to production environments Addressing the unique challenges associated with managing distributed Web services © Copyright Pearson Education. All rights reserved.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 42
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: v. 〈1 〉 , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.2/762
    Schlagwort(e): JavaServer pages ; Java (Computer program language) ; Servlets ; Web servers ; Electronic books ; local
    Kurzfassung: The J2EE(TM) Platform has become the technology of choice for developing professional e-commerce applications, interactive Web sites, and Web-enabled applications and services. Servlet and JSP(TM) technology is the foundation of this platform: it provides the link between Web clients and server-side applications. In this 2nd edition of the worldwide bestseller, the authors show you how to apply the latest servlet and JSP capabilities. Unlike other books that treat servlet or JSP technology in isolation, Core Servlets and JavaServer Pages provides a unified treatment, showing you when servlet technology is best, when the JSP approach is preferred, and when (and how) servlets and JSP should work together. Part I provides exhaustive coverage of the servlet 2.4 specification. It starts with server configuration, basic syntax, the servlet life cycle, and use of form data. It moves on to applying HTTP 1.1, cookies, and session tracking. Advanced topics include compressing Web content, incrementally updating results, dynamically generating images, and creating shopping carts. Part II gives an in-depth guide to JSP 2.0. It covers both the "classic" JSP scripting elements and the new JSP 2.0 expression language. It shows how to control the content type, designate error pages, include files, and integrate JavaBeans components. Advanced topics include sharing beans, generating Excel spreadsheets, and dealing with concurrency. Part III covers two key supporting technologies: HTML forms and database access with JDBC(TM). It explains every standard HTML input element and shows how to use appropriate JDBC drivers, perform database queries, process results, and perform updates. Advanced topics include parameterized queries, stored procedures, and transaction control. Design strategies include ways to integrate servlet and JSP technology, best practices for invoking Java code from JSP pages, plans for dealing with missing and malformed data, and application of the MVC architecture. Handy guides walk you through use of three popular servlet and JSP engines (Apache Tomcat, Macromedia JRun, and Caucho Resin) and some of the most widely used database systems (MySQL, Oracle9i, Microsoft Access). Volume 2 of this book covers advanced topics: filters, custom tag libraries, database connection pooling, Web application security, the JSP Standard Tag Library (JSTL), Apache Struts, JavaServer Faces (JSF), JAXB, and more. The same clear step-by-step explanations that made...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 43
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 243 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Java (Computer program language) ; Handbooks, manuals, etc ; Electronic books ; local
    Kurzfassung: Sometimes the simplest answer is the best. Many Enterprise Java developers, accustomed to dealing with Java's spiraling complexity, have fallen into the habit of choosing overly complicated solutions to problems when simpler options are available. Building server applications with "heavyweight" Java-based architectures, such as WebLogic, JBoss, and WebSphere, can be costly and cumbersome. When you've reached the point where you spend more time writing code to support your chosen framework than to solve your actual problems, it's time to think in terms of simplicity.In Better, Faster, Lighter Java , authors Bruce Tate and Justin Gehtland argue that the old heavyweight architectures are unwieldy, complicated, and contribute to slow and buggy application code. As an alternative means for building better applications, the authors present two "lightweight" open source architectures: Hibernate--a persistence framework that does its job with a minimal API and gets out of the way, and Spring--a container that's not invasive, heavy or complicated.Hibernate and Spring are designed to be fairly simple to learn and use, and place reasonable demands on system resources. Better, Faster, Lighter Java shows you how they can help you create enterprise applications that are easier to maintain, write, and debug, and are ultimately much faster.Written for intermediate to advanced Java developers, Better, Faster, Lighter Java , offers fresh ideas--often unorthodox--to help you rethink the way you work, and techniques and principles you'll use to build simpler applications. You'll learn to spend more time on what's important. When you're finished with this book, you'll find that your Java is better, faster, and lighter than ever before.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 44
    Online-Ressource
    Online-Ressource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 331 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.117
    Schlagwort(e): Java (Computer program language) ; Object-oriented programming (Computer science) ; Electronic books ; local
    Kurzfassung: When Object Oriented programming (OO) first appeared, it was a revelation. OO gave developers the ability to create software that was more flexible and robust, but as time went on and applications became more sophisticated, too, certain areas of "traditional" OO architectures were found wanting. Aspect-oriented programming (AOP) addresses those issues by extending the OO approach even further.Many developers are interested in AOP--especially in AspectJ, the open source extension of the Java programming language that explicitly supports the AOP approach. Yet, although AspectJ is included with Eclipse, the increasingly popular open source IDE for Java, finding a practical and non-theoretical way to learn this language and other AOP tools and techniques has been a real problem.Until now. The AspectJ Cookbook offers a hands-on solution--in fact, several--with a wide variety of code recipes for solving day-to-day design and coding problems using AOP's unique approach.AOP allows the global properties of a program to determine how it's compiled into an executable program. Before AOP, important program design decisions were difficult to capture in actual code. Instead, the implementation of those design decisions--known as "aspects"--were scattered throughout, resulting in "tangled" code that was hard to develop and maintain. AOP has been compared to the manufacturing of cloth, in which threads are automatically interwoven. Without AOP, programmers must stitch the threads by hand.The AspectJ Cookbook shows readers why, and how, common Java development problems can be solved by using AOP techniques. With our popular problem-solution-discussion format, the book presents real world examples to demonstrate that AOP is more than just a concept; it's a development process that will benefit users in an immediate and visible manner.If you're interested in how AOP is changing the way software is developed, and how you can use AspectJ to make code more modular, easier to develop, maintain, evolve and deploy, this is the book that really delivers.
    Anmerkung: "Real-world Aspect-oriented programming with Java"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 45
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxiv, 386 p. , ill. ; , 23 cm. +
    DDC: 005
    Schlagwort(e): Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: "I had a question about how to use a new Eclipse 3.0 feature, job scheduling, so I thought I would try out this book. I immediately found the answer with a concise explanation. Cool!" --Erich Gamma Official Eclipse 3.0 FAQs is the convenient source for answers to your most crucial questions about writing Eclipse plug-ins. Whether you're creating simple extensions for personal use or commercial Eclipse-based applications, you'll find hundreds of concise solutions here--including many that aren't answered anywhere else. John Arthorne and Chris Laffra have worked with Eclipse technology since the very beginning; both are active members of the Eclipse development community and frequently answer questions on Eclipse newsgroups and mailing lists. Here, they cover an extraordinary range of topics, from workspace management to documentation, SWT to JFace, JDT to natural language support. Many FAQs include code samples and references to other information, making the book an invaluable desk reference for anyone working with Eclipse. Just a few of the 350+ questions answered here... How do I upgrade Eclipse? Page 29 What is new in Eclipse 3.0? Page 34 How can I add my views and actions to an existing perspective? Page 187 How do I set up a Java project to share in a repository? Page 58 How do I declare my own extension point? Page 74 How do I display a Web page in SWT? Page 141 How do I support multiple natural languages in my plug-in messages? Page 253 How do I save settings for a dialog or wizard? Page 166 How do I provide syntax coloring in an editor? Page 269 How do I hook into global actions, such as Copy and Delete? Page 225 How do I create a Rich Client application? Page 241 What is the purpose of activities? Page 229 How do I create and examine an AST? Page 369
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 46
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Anmerkung: Includes bibliographical references (p. 321-326) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 47
    Online-Ressource
    Online-Ressource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Sprache: Englisch
    Schlagwort(e): Java (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Kurzfassung: Bridge the gap between the Microsoft .NET Framework and Java 2 Enterprise Edition (J2EE) by implementing the best interoperability solutions available today-and by learning to build compatible solutions and workarounds of your own.
    Anmerkung: Includes index. - Title from title screen
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 48
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 177 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Serie: The developer's notebook series
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Java 5.0, code-named "Tiger", promises to be the most significant new version of Java since the introduction of the language. With over a hundred substantial changes to the core language, as well as numerous library and API additions, developers have a variety of new features, facilities, and techniques available. But with so many changes, where do you start? You could read through the lengthy, often boring language specification; you could wait for the latest 500 page tome on concepts and theory; you could even play around with the new JDK, hoping you figure things out--or you can get straight to work with Java 5.0 Tiger: A Developer's Notebook . This no-nonsense, down-and-dirty guide by bestselling Java authors Brett McLaughlin and David Flanagan skips all the boring prose and lecture, and jumps right into Tiger. You'll have a handle on the important new features of the language by the end of the first chapter, and be neck-deep in code before you hit the halfway point. Using the task-oriented format of this new series, you'll get complete practical coverage of generics, learn how boxing and unboxing affects your type conversions, understand the power of varargs, learn how to write enumerated types and annotations, master Java's new formatting methods and the for/in loop, and even get a grip on concurrency in the JVM. Light on theory and long on practical application, Java 5.0 Tiger: A Developer's Notebook allows you to cut to the chase, getting straight to work with Tiger's new features. The new Developer's Notebooks series from O'Reilly covers important new tools for software developers. Emphasizing example over explanation and practice over theory, they focus on learning by doing--you'll get the goods straight from the masters, in an informal and code-intensive style that suits developers. If you've been curious about Tiger, but haven't known where to start, this no-fluff, lab-style guide is the solution.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 49
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 343 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: You've probably heard the buzz about Eclipse, the powerful open source platform that gives Java developers a new way to approach development projects. It's like a shiny new car--no longer content to just admire Eclipse, you're now itching to get in and drive. Eclipse is to Java developers what Visual Studio is to .NET developers--it's an integrated development environment (IDE) that combines a code editor, compiler, debugger, text editor, graphical user interface (GUI) builder, and other components into a single, user-friendly application. It provides a solid foundation that enables Java developers to construct and run integrated software-development tools for web development, application design, modeling, performance, testing, and much more. As with any extensive programming tool, however, there's a lot to learn. And there s no better guy than well-known Java expert Steve Holzner to teach you. An award-winning and best-selling author who has been writing about Java topics since the language first appeared, Holzner delivers just the kind of targeted, practical, everyday knowledge you need to hone your mastery of Eclipse. Perfect as a companion to an Eclipse programming tutorial (such as Holzner's own Eclipse , O'Reilly, April 2004) or an ideal stand-alone for all those developers who either don't want or don't need the tutorial approach, the Eclipse Cookbook contains task-oriented recipes for more than 800 situations you may encounter while using this new Java platform--from deploying a web application automatically to reverse engineering compiled code, from re-naming all references to a class across multiple packages to initializing the SWT JNI libraries. Each recipe in the ever-popular and utterly practical problem-solution-discussion format for O'Reilly cookbooks contains a clear and thorough description of the problem, a brief but complete discussion of a solution, and in-action examples illustrating that solution. The Eclipse Cookbook will satiate Java programmers at all levels who are ready to go beyond tutorials--far beyond writing plug-ins and extensions--and actually use the powerful and convenient Eclipse day to day.
    Anmerkung: "Covers Eclipse 3.0"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 50
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: x, 268 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering . These techniques will show you how to better understand and work with third-party applications. Each chapter focuses on a technique to solve a specific problem, such as obfuscation in code or scalability vulnerabilities, outlining the issue and demonstrating possible solutions. Summaries at the end of each chapter will help you double check that you understood the crucial points of each lesson. You will also be able to download all code examples and sample applications for future reference from the publisher's website. Let Covert Java help you crack open mysterious codes!
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 51
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 828 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 006.7
    Schlagwort(e): BEA WebLogic server ; Application software ; Development ; Client/server computing ; Java (Computer program language) ; Web servers ; Electronic books ; local
    Kurzfassung: BEA's WebLogic Server implements the full range of J2EE technologies, and includes many additional features such as advanced management, clustering, and web services. Widely adopted, it forms the core of the WebLogic platform, providing a stable framework for building scalable, highly available, and secure applications. In fact, in the long list of WebLogic's strengths and features, only one shortcoming stands out: the documentation that comes with the WebLogic server often leaves users clamoring for more information. WebLogic: The Definitive Guide presents a 360-degree view of the world of WebLogic. Providing in-depth coverage of the WebLogic server, the book takes the concept of "definitive" to a whole new level. Exhaustive treatment of the WebLogic server and management console answers any question that developers or administrators might think to ask. Developers will find a useful guide through the world of WebLogic to help them apply their J2EE expertise to build and manage applications. Administrators will discover all they need to manage a WebLogic-based setup. And system architects will appreciate the detailed analysis of the different system architectures supported by WebLogic, the overall organization of a WebLogic domain and supporting network infrastructure, and more. WebLogic: The Definitive Guide is divided into three sections that explore WebLogic and J2EE, Managing the WebLogic Environment, and WebLogic Enterprise APIs. Some of the topics covered in this comprehensive volume include: Building web applications on the WebLogic Server Building and optimizing RMI applications Using EJBs with WebLogic, including CMP entity beans Packaging and deploying applications Understanding WebLogic's support for clustering Performance tuning and related configuration settings Configuring WebLogic's SSL support Maximizing WebLogic's security features Building web services with XML Using WebLogic's JMX services and MBeans Anyone who has struggled with mastering the WebLogic server will appreciate the thorough, clearly written explanations and examples in this book. WebLogic: The Definitive Guide is the definitive documentation for this popular J2EE application server.
    Anmerkung: "Covers versions 7 & 8.1"--Cover. - "Development, deployment & maintenance"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 52
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 745 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 53
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 269 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Anmerkung: "Intrusion detection with open source tools"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 54
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 392 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Microsoft Windows (Computer file) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Kurzfassung: "As usual, Keith masterfully explains complex security issues in down-to-earth and easy-to-understand language. I bet you'll reach for this book often when building your next software application." --Michael Howard, coauthor, Writing Secure Code "When it comes to teaching Windows security, Keith Brown is 'The Man.' In The .NET Developer's Guide to Windows Security, Keith has written a book that explains the key security concepts of Windows NT, Windows 2000, Windows XP, and Windows Server 2003, and teaches you both how to apply them and how to implement them in C# code. By organizing his material into short, clear snippets, Brown has made a complicated subject highly accessible." --Martin Heller, senior contributing editor at Byte.com and owner of Martin Heller & Co. "Keith Brown has a unique ability to describe complex technical topics, such as security, in a way that can be understood by mere mortals (such as myself). Keith's book is a must read for anyone attempting to keep up with Microsoft's enhancements to its security features and the next major version of .NET." --Peter Partch, principal software engineer, PM Consulting "Keith's book is a collection of practical, concise, and carefully thought out nuggets of security insight. Every .NET developer would be wise to keep a copy of this book close at hand and to consult it first when questions of security arise during application development." --Fritz Onion, author of Essential ASP.NET with Examples in C# The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Windows Server 2003, Windows XP, and Windows 2000. Author Keith Brown crystallizes his application security expertise into 75 short, specific guidelines. Each item is clearly explained, cross-referenced, and illustrated with detailed examples. The items build on one another until they produce a comprehensive picture of what tools are available and how developers should use them. The book highlights new features in Windows Server 2003 and previews features of the upcoming version 2.0 of the .NET Framework. A companion Web site includes the source code and examples used throughout the book. Topics covered include: Kerberos authentication Access control Impersonation Network security Constrained delegation Protocol transition Securing enterprise servi...
    Anmerkung: Includes bibliographical references (p. 379-380) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 55
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 566 p. , ill. ; , 24 cm
    Ausgabe: 3rd ed.
    Serie: In a nutshell
    Serie: Java series
    Schlagwort(e): Java (Computer program language) ; Object-oriented programming (Computer science) ; Web servers ; Electronic books ; local
    Kurzfassung: The author of the best-selling Java in a Nutshell has created an entire book of real-world Java programming examples that you can learn from. If you learn best "by example," this is the book for you.This third edition covers Java 1.4 and contains 193 complete, practical examples: over 21,900 lines of densely commented, professionally written Java code, covering 20 distinct client-side and server-side APIs. It includes new chapters on the Java Sound API and the New I/O API. The chapters on XML and servlets have been rewritten to cover the latest versions of the specifications and to demonstrate best practices for Java 1.4. New and updated examples throughout the book demonstrate many other new Java features and APIs. Java Examples in a Nutshell is a companion volume to Java in a Nutshell , Java Foundation Classes in a Nutshell , and Java Enterprise in a Nutshell . It picks up where those quick references leave off, providing a wealth of examples for both novices and experts. This book doesn't hold your hand; it simply delivers well-commented working examples with succinct explanations to help you learn and explore Java and its APIs. Java Examples in a Nutshell contains examples that demonstrate: Core APIs, including I/O, New I/O, threads, networking, security, serialization, and reflection Desktop APIs, highlighting Swing GUIs, Java 2D graphics, preferences, printing, drag-and-drop, JavaBeans, applets, and sound Enterprise APIs, including JDBC (database access), JAXP (XML parsing and transformation), Servlets 2.4, JSP 2.0 (JavaServer Pages), and RMI The book begins with introductory examples demonstrating structured and object-oriented programming techniques for new Java programmers. A special index at the end of the book makes it easy to look up examples that use a particular Java class or accomplish a desired task. In between, each chapter includes exercises that challenge readers and suggest further avenues for exploration.
    Anmerkung: Covers Java 2, version 1.4 - cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 56
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Electronic books ; local
    Kurzfassung: When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and respond to such attacks and breaches. The Effective Incident Response Team is the first complete guide to forming and managing a Computer Incident Response Team (CIRT). In this book, system and network administrators and managers will find comprehensive information on establishing a CIRT's focus and scope, complete with organizational and workflow strategies for maximizing available technical resources. The text is also a valuable resource for working teams, thanks to its many examples of day-to-day team operations, communications, forms, and legal references. IT administrators and managers must be prepared for attacks on any platform, exploiting any vulnerability, at any time. The Effective Incident Response Team will guide readers through the critical decisions involved in forming a CIRT and serve as a valuable resource as the team evolves to meet the demands of ever-changing vulnerabilities. Inside, readers will find information on: Formulating reactive or preventative operational strategy Forming, training, and marketing the CIRT Selecting penetration-testing, intrusion-detection, network-monitoring, and forensics tools Recognizing and responding to computer incidents and attacks, including unauthorized access, denial-of-service attacks, port scans, and viruses Tracking, storing, and counting incident reports and assessing the cost of an incident Working with law enforcement and the legal community Benefiting from shared resources Scrutinizing closed incidents to further prevention Offering services such as user-awareness training, vulnerability and risk assessments, penetration testing, and architectural reviews Communicating the CIRT's return on investment through management reporting 0201761750B10062003
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 57
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvi, 426 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): JavaBeans ; Computer security ; Java (Computer program language) ; Servlets ; Web services ; Electronic books ; local
    Kurzfassung: J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place, at the right time, and in the right way. Kumar covers every significant J2SE and J2EE security mechanism, presenting practical implementation techniques for the entire J2EE project lifecycle: analysis, design, development, deployment and operations. The book's example-rich coverage includes: Implementing cryptography with the JCA (Java Cryptography Architecture) and JCE (Java Cryptography Extension) security APIs Building PKI systems with Java: implementing X.509 certificates, Certification Authorities, Certificate Revocation Lists, and repositories Java security managers, policy files, and JAAS: implementing access control based on code origin, code signer and user credentials Securing the wire: Using SSL and the JSSE API to secure data exchange over unprotected networks Ensuring XML message integrity, authentication, and confidentiality with the standards: XML Signature & XML Encryption using the VeriSign TSIK, and Infomosaic SecureXML libraries Addressing security issues in RMI-based distributed applications Developing and deploying servlets and EJBs for authenticated and secure access Securing Web services with transport- and message-based security: SSL for transport-based and WS Security for message-based security Covering security aspects of best-of-breed products: Apache Tomcat, Apache Axis, and BEA WebLogic Server.
    Anmerkung: Includes bibliographical references (p. 413-414) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 58
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 252 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Biometric identification ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application. In Biometrics for Network Security , biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes: An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
    Anmerkung: Includes bibliographical references (p. 239-241) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 59
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 317 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Java programmers know how finicky Java can be to work with. An omitted semi-colon or the slightest typo will cause the Java command-line compiler to spew pages of annoying error messages across your screen. And it doesn't fix them--that's up to you: fix them, compile again, and hope that nothing goes wrong this time.Eclipse, the popular Java integrated development environment (IDE) provides an elegant and powerful remedy for this common, frustrating scenario. It doesn't just catch your errors before you compile, it also suggests solutions. All you need to do is point and click. And it's free--what could be better? Still, if you're like most programmers, mastering a new technology--no matter how productive it will make you in the long run--is going to take a chunk out of your productivity now. You want to get up to speed quickly without sacrificing efficiency.O'Reilly's new guide to the technology, Eclipse , provides exactly what you're looking for: a fast-track approach to mastery of Eclipse. This insightful, hands-on book delivers clear and concise coverage, with no fluff, that gets down to business immediately. The book is tightly focused, covering all aspects of Eclipse: the menus, preferences, views, perspectives, editors, team and debugging techniques, and how they're used every day by thousands of developers. Development of practical skills is emphasized with dozens of examples presented throughout the book.From cover-to-cover, the book is pure Eclipse, covering hundreds of techniques beginning with the most basic Java development through creating your own plug-in editors for the Eclipse environment. Some of the topics you'll learn about include: Using Eclipse to develop Java code Testing and debugging Working in teams using CVS Building Eclipse projects using Ant The Standard Widget Toolkit (SWT) Web development Developing Struts applications with Eclipse From basics to advanced topics, Eclipse takes you through the fundamentals of Eclipse and more. You may be an Eclipse novice when you pick up the book, but you'll be a pro by the time you've finished.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 60
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR ; | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 330 p. , ill. ; , 24cm
    DDC: 005.13/3
    Schlagwort(e): WebSphere ; Application software ; Development ; Electronic mail systems ; Java (Computer program language) ; Telecommunication ; Message processing ; Electronic books ; local
    Kurzfassung: The real-world guide to JMS messaging with IBM WebSphere technologies This book offers start-to-finish guidance for building reliable, high-performance JMS-based messaging infrastructure with IBM WebSphere technologies. IBM expert Kareem Yusuf systematically introduces the latest versions of JMS-both 1.1 and 1.02b. Once you've thoroughly mastered JMS development on any platform, Yusuf turns to the exceptional JMS support found in IBM's WebSphere products. Using extensive code examples, he walks you step-by-step through WebSphere JMS development, configuration, deployment, and administration in several real-world scenarios. Coverage includes: Roles and goals of messaging infrastructure in the enterprise Key JMS concepts: messaging domains, messages, and Application Server Facilities Defining/structuring content, choosing message types, and manipulating messages The JMS API, explained through detailed code examples Using JMS with EJB, message-driven beans, servlets, and portlets Working with IBM WebSphere JMS providers, administered objects, and tools Hands-on tutorials: EJB message exchange, integration with non-JMS applications, and SSL security Resource location and physical topologies for maximizing availability and efficiency Whether you're developing enterprise messaging infrastructure, architecting it, or managing it, this book delivers indispensable guidance-straight from the frontlines. On the Web Download an extensive library of code samples for JMS 1.1 and 1.02b, including complete functional prototypes built for JMS 1.02b.
    Anmerkung: Includes bibliographical references (p. 315-318) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 61
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 298 , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 62
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 1002 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    DDC: 005.13/3
    Schlagwort(e): Business ; Data processing ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: J2EE has become required knowledge for any serious Java developer, but learning this large and complex specification requires a substantial investment of time and energy. Sams Teach Yourself J2EE in 21 Days, 2/E presents the enterprise Java architecture in accessible, easy-to-comprehend lessons, describing how each J2EE tool solves the challenges of n-Tier development. Using the architecture as a roadmap, chapters describe Enterprise JavaBeans (EJB), JavaServer Pages (JSP), Java Servlets, and more, giving readers a full understanding of J2EE development. Further chapters cover the role of XML, custom JSP tags, creating J2EE Web Services, and how Java Connectors allow J2EE applications to interact with legacy and non-Java systems. The book finishes with sample applications which put all the pieces together, including an example using J2EE to create Web Services. Along the way, every concept is illustrated with practical, real-world examples to ensure understanding by Java students as well as experts.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 63
    Online-Ressource
    Online-Ressource
    Sebastopol, CA ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 390 p. , ill. ; , 24 cm. +
    Ausgabe: 1st ed.
    DDC: 005.446
    Schlagwort(e): Linux ; Java (Computer program language) ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: The Java Desktop System (TM), from Sun Microsystems, is a modern system for all kinds of users, novice through expert. As an unusually robust, well-integrated desktop system, it may become the first to fulfill the promise of mass adoption for open source. JDS brings Linux and other open source software up to a level of usability that makes them suitable for the enormous base of Personal Computer users including office workers, students, mobile and home users. It behaves pretty much the way a Windows or Mac user would expect, but with many more powerful features. JDS has seen widespread adoption in the United States, Britain, China, and elsewhere. This book is the ideal guide to JDS: it is clear and direct, but loaded with insights from authors who have spent time working with, supporting, and enhancing the system. Tom Adelstein is an award winning polymath system designer; Sam Hiser is a respected business consultant with an itch that led him to become the marketing project lead for OpenOffice.org. Both are advocates for open source and founders of the Open Government Interoperability Project, members of the Open Source Software Institute and contributors to the JDShelp.org project. This book carefully covers such housekeeping chores as setting up networking, updates, and backups. Then it enters into great depth concerning the key productivity tools every user needs: email, web browsing, instant messaging, word processing, spreadsheets, and slide presentations. A number of chapters and appendices concerning useful tools, including things you can add to your system, rounds out this remarkably useful book. It has plenty to offer the new user as well as the seasoned Linux professional.
    Anmerkung: "Linux for prime time with the Java Desktop System"--Cover. - CD-ROM contains Sun Microsystem's Java Desktop System. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 64
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 829 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: You have a choice: you can wade your way through lengthy Java tutorials and figure things out by trial and error, or you can pick up Java Cookbook , 2nd Edition and get to the heart of what you need to know when you need to know it.With the completely revised and thoroughly updated Java Cookbook , 2nd Edition, Java developers like you will learn by example, try out new features, and use sample code to understand how new additions to the language and platform work--and how to put them to work for you.This comprehensive collection of problems, solutions, and practical examples will satisfy Java developers at all levels of expertise. Whether you're new to Java programming and need something to bridge the gap between theory-laden reference manuals and real-world programs or you're a seasoned Java programmer looking for a new perspective or a different problem-solving context, this book will help you make the most of your Java knowledge.Packed with hundreds of tried-and-true Java recipes covering all of the major APIs from the 1.4 version of Java, this book also offers significant first-look recipes for the most important features of the new 1.5 version, which is in beta release. You get practical solutions to everyday problems, and each is followed by a detailed, ultimately useful explanation of how and why the technology works. Java Cookbook , 2nd Edition includes code segments covering many specialized APIs--like those for working with Struts, Ant and other new popular Open Source tools. It also includes expanded Mac OS X Panther coverage and serves as a great launching point for Java developers who want to get started in areas outside of their specialization.In this major revision, you'll find succinct pieces of code that can be easily incorporated into other programs. Focusing on what's useful or tricky--or what's useful and tricky-- Java Cookbook , 2nd Edition is the most practical Java programming book on the market.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 65
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 763 p. , ill. ; , 24 cm
    Ausgabe: 4th ed.
    DDC: 005.13/3
    Schlagwort(e): JavaBeans ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: The new 2.1 version of the Enterprise JavaBeans (EJB) spec extends its support for web services and the Java Web Services APIs, expands its asynchronous messaging support, adds XML Schema for deployment descriptors, and introduces a new Timer service, which allows for scheduling EJB jobs. The essential--and award winning--book on EJBs, Enterprise JavaBeans , has been completely revised and updated in this new fourth edition, to provide the real-world, nitty-gritty detail developers need to master EJB 2.1. Previous editions of this clear and engaging introduction to EJBs were voted the "Best Java Book" by the editors and readers of Java Developer's Journal , the "Best Java Book for Experts," by JavaPro editors, and one of the Top Computer Books by Amazon.com. The fourth edition lives up to--and surpasses--the excellent reputation earned by its predecessors. This authoritative and thorough guide includes everything that made previous editions the single must-have book for EJB developers: the authors solid grasp on the complexities of EJBs coupled with his succinct, easy-to-follow style; hundreds of clear, practical examples; adept coverage the key concepts EJBs ; and diagrams to illustrate the concepts presented. It also includes everything you need to get up to speed quickly on the changes wrought by EJB version 2.1, an architecture overview, information on resource management and primary services, design strategies, and XML deployment descriptors. In this edition, we're adding an EJB workbook for JBoss 4.0. The workbook shows how to deploy all of the examples on the JBoss 4.0 application server. It addresses an important problem with EJB: deploying the software on a server can be extremely difficult. JBoss is an open source project that has become the most widely used J2EE application server. Good technical authors may lay the facts before you, but great ones offer the distilled essence of their own experience and insight. Richard Monson-Haefel has provided just what Java developers need to know to harness the complexity of EJBs. What makes Monson-Haefel a master of technical authoring can be seen in his well-thought-out and logical progression of ideas, and in his examples practical, precise, usable examples, large enough to test key concepts but still small enough to be comprehensible taken apart and explained in the detail you need to deploy those principles in other situations. If you work with EJBs--or want to--this book will earn a favor...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 66
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 315 p. , ill. ; , 23 cm. +
    DDC: 005.13/3
    Schlagwort(e): BEA WebLogic workshop ; Client/server computing ; Java (Computer program language) ; Web services ; Electronic books ; local
    Kurzfassung: BEA WebLogic Workshop 8.1 Kick Start shows you how to make J2EE programming easier, providing the fastest path to productivity with BEA WebLogic Workshop 8.1. The authors show how Workshop leverages the power of BEA WebLogic Platform 8.1, including WebLogic Server, WebLogic Portal, and WebLogic Integration. With BEA WebLogic Workshop 8.1 Kick Start , you'll learn to build J2EE applications and see how each concept works within a real-world online casino application developed over the course of the book. You'll see how Workshop 8.1 facilitates every step of the development process, from design to deployment. The authors' expert insights and tips, along with dozens of practical examples that you can put to use immediately, will have you up and running at full speed in nothing flat. The included CD-ROM contains the Developer's Edition of BEA WebLogic Platform 8.1 (including WebLogic Workshop 8.1) and all the sample code and examples, with a complete version of the casino application developed over the course of the book. In addition you can view the entire book in searchable electronic form.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 67
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 271 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    DDC: 005.1/17
    Schlagwort(e): Java (Computer program language) ; Microsoft .NET ; Object-oriented programming (Computer science) ; Electronic books ; local
    Kurzfassung: A new edition of this title is available, ISBN-10: 0672330164 ISBN-13: 9780672330162 The Object-Oriented Thought Process, Second Edition will lay the foundation in object-oriented concepts and then explain how various object technologies are used. Author Matt Weisfeld introduces object-oriented concepts, then covers abstraction, public and private classes, reusing code, and devloping frameworks. Later chapters cover building objects that work with XML, databases, and distributed systems (including EJBs, .NET, Web Services and more).Throughout the book Matt uses UML, the standard language for modeling objects, to provide illustration and examples of each concept.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 68
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 723 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.2/762
    Schlagwort(e): JavaServer pages ; Java (Computer program language) ; Servlets ; Web site development ; Electronic books ; local
    Kurzfassung: With literally hundreds of examples and thousands of lines of code, the Java Servlet and JSP Cookbook yields tips and techniques that any Java web developer who uses JavaServer Pages or servlets will use every day, along with full-fledged solutions to significant web application development problems that developers can insert directly into their own applications. Java Servlet and JSP Cookbook presents real-world problems, and provides concise, practical solutions to each. Finding even one tested code "recipe" that solves a gnarly problem in this comprehensive collection of solutions and best practices will save hours of frustration--easily justifying the cost of this invaluable book.But "Java Servlet and JSP Cookbook" is more than just a wealth of cut-and-paste code. It also offers clear explanations of how and why the code works, warns of potential pitfalls, and directs you to sources of additional information, so you can learn to adapt the problem-solving techniques to similar situations.These recipes include vital topics like the use of Ant to setup a build environment, extensive coverage of the WAR file format and web.xml deployment descriptor, file-uploading, error-handling, cookies, logging, dealing with non-HTML content, multimedia, request filtering, web services, I18N, web services, and a host of other topics that frustrate even the most seasoned developers.For Java web developers of all levels who are eager to put into practice the theory presented in other API-focused books, the solutions presented in this practical book will prove invaluable over and over again. This is painless way for less experienced developers who prefer to learn by doing to expand their skills and productivity, while accomplishing practical solutions to the pressing problems they face every day. More experienced developers can use these recipes to solve time-consuming problems quickly, freeing up their time for the more creative aspects of their work.
    Anmerkung: Includes bibliographic references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 69
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 324 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Focuses on the little-touched but critical parts of the Java programming language that the expert programmers use. Learn about extremely powerful and useful programming techniques such as reflection, advanced data modeling, advanced GUI design, and advanced aspects of JDO, EJB, and XML-based web clients. This unique book reveals the true wizardry behind the complex and often mysterious Java environment--O'Reilly web site.
    Anmerkung: "Secrets of the Java masters"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 70
    Online-Ressource
    Online-Ressource
    Boston : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxii, 972 p. , ill. ; , 23 cm
    DDC: 794.817/11
    Schlagwort(e): Computer games ; Programming ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: If you already have Java programming experience and are looking to program games, this book is for you. David Brackeen , along with co-authors Bret Barker and Lawrence Vanhelsuwe , show you how to make fast, full-screen action games such as side scrollers and 3D shooters. Key features covered in this book include Java 2 game programming techniques, including latest 2D graphics and sound technologies, 3D graphics and scene management, path-finding and artificial intelligence, collision detection, game scripting using BeanShell, and multi-player game engine creation.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 71
    Online-Ressource
    Online-Ressource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.13/3
    Schlagwort(e): JavaServer pages ; Java (Computer program language) ; Servlets ; Electronic books ; local
    Kurzfassung: Servlets and JavaServer Pages™ is the first complete guide to building dynamic Java-based Web applications using the new JavaServer Pages 2.0 and Servlets 2.4. Servlets and JavaServer Pages (JSP) provide a robust solution to developing large, complex Web applications, including multiserver projects. In addition to built-in security, portability, and a Web server, they offer developers the freedom to work with any operating system that supports Java-be it Linux, Windows, OSX, or Solaris. This authoritative book begins by explaining how to set up a Servlet and JSP development environment, including a discussion of containers, Java support, and installing and configuring Tomcat. The authors then thoroughly explore servlets and JSP, including significant coverage of custom tag libraries, newly available filters, and popular servlet and JSP design patterns. Readers can then test-drive the knowledge gained by constructing a book-support Web site. Among the topics covered in-depth are: Exception handling JavaBeans and the new JSP Expression Language (JSP EL) The JavaServer Pages Standard Tag Library (JSTL) and coding custom tag libraries Filters Error handling Session and state management Security Design patterns, including Struts Internationalization Multiclient support Database connectivity The actual book-support site (www.jspbook.com) features frequently asked questions, working code examples, and references. With Servlets and JavaServer Pages™ as their guide, readers will learn how to fully harness the power of these flexible Java technologies. 0321136497B05082003
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 72
    Online-Ressource
    Online-Ressource
    Boston : Prentice Hall Professional Technical Reference, c2005 : [Verlag nicht ermittelbar] | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxi, 567 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): Linux ; Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Linux is the fastest-growing Java development platform because it saves money and time by serving as a platform for both development and deployment. But developers face significant platform-specific challenges when managing and deploying Java applications in a controlled production environment. Written for Java and Linux developers alike, Java™ Application Development on Linux® is the hands-on guide to the full Java application development lifecycle on Linux. Determined to spare other developers hours of trial and error, Albing and Schwarz demonstrate the platform, tools, and application development by showing realistic, easy-to-follow examples. After a simple command-line application introduces basic tools, this program leads readers through business-logic object analysis, database design, Java servlet UIs, Java Server Pages (JSP) UIs, Swing GUIs, and Standard Widget Toolkit (SWT) GUIs. Scaling up to the enterprise level provides the opportunity to use both the JBoss Application Server and the Apache Geronimo Application Servers, and Enterprise JavaBeans (EJB). Readers learn how to Use development tools available on Linux, such as the GNU Compiler for Java (gcj), Ant, the NetBeans IDE, IBM's Eclipse Java IDE, JUnit, and SunONE Studio Develop business logic layers using Java DataBase Connectivity (JDBC) Add a Web interface using servlets and JSPs Add a GUI using Sun's Abstract Window Toolkit (AWT) and IBM's SWT Deploy EJBs in Linux The authors conclude by demonstrating how a hierarchy of budgets can be created, tracked, and shared with Concurrent Versions System (CVS). A companion Website includes all source code and a link to each tool described. Java™ Application Development on Linux® can propel you from a standing start to the full-speed development and deployment of Java applications on Linux.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 73
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall/PTR ; | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 578 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Schlagwort(e): Application software ; Development ; Business enterprise ; Data processing ; Java (Computer program language) ; Web services ; Electronic books ; local
    Kurzfassung: Build robust, scalable, end-to-end business solutions with J2EE™ Web Services. This is the definitive practitioner's guide to building enterprise-class J2EE Web Services that integrate with any B2B application and interoperate with any legacy system. Sun senior architect Ray Lai introduces 25 vendor-independent architectural patterns and best practices for designing Web Services that deliver outstanding performance, scalability, and reliability. Lai takes you to the frontiers of emerging Web Services technologies, showing how to make the most of today's leading-edge tools, from Java Web Services Developer Pack to Apache Axis. Coverage includes: Web Services: making the business case, and overcoming the technical and business challenges Real-life examples and scenarios, and a start-to-finish application case study Expert guidance on reducing risk and avoiding implementation pitfalls Building complete business solutions with rich messaging and workflow collaboration Mainframe interoperability and B2B integration within and beyond the enterprise Framework and methodology to develop your Web Services patterns and best practices Up-to-the-minute coverage of Web Services security New applications: service consolidation, wireless, and more An extensive library of links to Web resources, reference material, and vendors Whether you're an architect, designer, project leader, or developer, these are the best practices, patterns, and techniques you need to succeed with Web services in your enterprise environment. Enterprises seeking to leverage Web Services to revolutionize the ways they deliver services to customers, partners, and employees will find the answers they need in this book. "Ray Lai's J2EETM Platform Web Services is a comprehensive look at J2EE platform architecture and should be a must read for any serious Web Services developer." -Larry Tabb, Senior Strategic Advisor, Tower Group "This is a book for true practitioners. It's for those interested in designing and implementing Web Services now-and preparing for new opportunities on the horizon." -Jonathan Schwartz, Executive Vice President, Sun Microsystems
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 74
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xlv, 1507 p. , ill. ; , 24 cm. +
    Ausgabe: 2nd ed.
    DDC: 005.2/762
    Schlagwort(e): Business ; Data processing ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: The J2EE™ Tutorial, Second Edition , is the complete guide to all major components of the Java 2 Platform, Enterprise Edition (J2EE) version 1.4. Written by members of the J2EE platform team at Sun Microsystems, this is the task-oriented and example-driven book that will have new and intermediate Java programmers building J2EE applications right away. The first chapters introduce the J2EE 1.4 platform architecture and APIs, the Sun Java System Application Server Platform Edition 8, and the basics of working with XML and Web applications. The greater part of the book is devoted to describing and demonstrating the Java XML, Web-tier, and Enterprise JavaBeans technologies and platform services. Extensive examples and case studies show you how to put these technologies to work in the real world. The technologies and services detailed include: Java API for XML Processing (JAXP) Java API for XML-Based RPC (JAX-RPC) SOAP with Attachments API for Java (SAAJ) Java API for XML Registries (JAXR) Java Servlet JavaServer Pages (JSP) JSP Standard Tag Library (JSTL) JavaServer Faces Internationalization and localization Enterprise JavaBeans (EJB) Transactions Resource connections Security Java Message Service API (JMS API) The J2EE™ Tutorial, Second Edition, will give you a head start in developing and deploying J2EE applications. The accompanying CD-ROM includes the tutorial examples (binary and source code) and the J2EE Software Development Kit, Enterprise Edition 1.4 (J2EE 1.4 SDK), which contains the Sun Java System Application Server Platform Edition 8, Java 2 Software Development Kit (J2SE SDK), and BluePrints sample applications.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 75
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.2/762
    Schlagwort(e): Internet programming ; Java (Computer program language) ; Web services ; Electronic books ; local
    Kurzfassung: " J2EE™ Web Services is written in the tradition of great books people have come to expect from author Richard Monson-Haefel. More than a complete and concise Web services reference, this essential guide is the way for J2EE developers to quickly master Web services architecture and development." - Floyd Marinescu Author, EJB Design Patterns Director, TheServerSide.com "Written in a straightforward and approachable style, Monson-Haefel's latest book is a mustread for any Java developer who is serious about understanding and applying the J2EE APIs in support of Web services. By concentrating on the core technologies endorsed by the WS-I, it clearly explains why Web services will succeed in realizing the interoperability promise where previous attempts have failed." - James McCabe Software IT Architect IBM "This is the best-and most complete-description of J2EE Web services that I've seen. If you're a Java developer, you need this book." - David Chappell Chappell & Associates "For Java Web service developers, this book is going to be there on their desk next to their PC for easy reference. The book has it all, clear guides as to what WSDL, SAAJ, UDDI are, and how they are used in a variety of examples. Monson-Haefel has created another classic with this volume." - Dr. Bruce Scharlau Department of Computing Science University of Aberdeen, Scotland "Richard Monson-Haefel provides the most comprehensive analysis of J2EE Web services that I've seen so far to date. This book covers the core Web services technologies (XML, SOAP, WSDL, and UDDI), as well as the Java APIs for Web services (JAX-RPC, SAAJ, JAXR, JAXP, and Web Services for J2EE, version 1.1). Richard also goes into detail on issues such as fault handling, type mapping, and JAX-RPC handlers. Developers will find this book to be a very valuable reference." - Anne Thomas Manes Research Director, Burton Group Author, Web Services: A Manager's Guide " J2EE™ Web Services is an excellent reference and tutorial for both beginning and seasoned Web services architects and developers. This book is the first to fully cover the WS-I 1.0 Web services standards and their integration with J2EE 1.4 components. Spend time with this book, and you'll soon master J2EE Web Services and be able to successfully use this technology to solve key business integration problems in your enterprise." - Tom Marrs Senior J2EE/XML/Web Services Architect Distributed Computing Solutions, Inc. Web services are revolutionizing ...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 76
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 452 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Wireless communication systems ; Electronic books ; local
    Kurzfassung: Industrial-strength J2ME™ for enterprise developers, architects, and decision-makers J2ME offers an extraordinarily flexible and robust platform for developing mobile applications with enterprise-class performance, reliability, and value. Now, leading mobile developer Michael Yuan covers every aspect of building industrial-strength applications with J2ME: design, architecture, tools, processes, business issues, and more. Yuan introduces innovations that make the platform even more powerful, ranging from new J2ME profiles and wireless messaging APIs to mobile databases and web services tools. These innovations allow existing Java™ developers (especially J2EE™ developers) to leverage their skills and add mobility to enterprise applications. Yuan also presents more than a dozen complete sample applications-including the application that earned him the grand prize in Nextel, Sun, and Motorola's nationwide wireless developer contest. Coverage includes: Patterns and best practices for building end-to-end mobile applications Emerging mobile "killer applications": driving productivity and cost reduction "Smart client" applications: architecture and construction Advanced HTTP techniques for authentication and session tracking Overcoming hardware and network limitations Leading-edge mobile enterprise messaging techniques Mobile databases and synchronization engines XML and mobile web services, including the J2ME Web Services Optional Package New options for mobile security in the enterprise
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 77
    Online-Ressource
    Online-Ressource
    Santa Clara, Calif. : Sun Microsystems Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 816 p. , ill. ; , 24 cm
    Ausgabe: 6th ed.
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: The #1 introduction to J2SE 1.5 and enterprise/server-side development! An international bestseller for eight years, Just Java™ 2 is the complete, accessible Java tutorial for working programmers at all levels. Fully updated and revised, this sixth edition is more than an engaging overview of Java 2 Standard Edition (J2SE 1.5) and its libraries: it's also a practical introduction to today's best enterprise and server-side programming techniques. Just Java™ 2, Sixth Edition, reflects both J2SE 1.5 and the latest Tomcat and servlet specifications. Extensive new coverage includes: New chapters on generics and enumerated types New coverage of Web services, with practical examples using Google and Amazon Web services Simplified interactive I/O with printf() Autoboxing and unboxing of primitive types Static imports, foreach loop construct, and other new language features Peter van der Linden delivers expert advice, clear explanations, and crisp sample programs throughout-including dozens new to this edition. Along the way, he introduces: The core language: syntax, objects, interfaces, nested classes, compiler secrets, and much more Key libraries: date and calendar, pattern matching, network software, mapped I/O, utilities and generic collections Server-side technology: network server systems, a complete tiny HTML Web server, and XML in Java Enterprise J2EE: Sql and JDBC™ tutorial, servlets and JSP and much more Client-side Java: fundamentals of JFC/Swing GUI development, new class data sharing details Companion Web Site All the book's examples and sample programs are available at http://afu.com.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 78
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxix, 1426 p. , ill. ; , 23 cm
    Schlagwort(e): BEA WebLogic server ; Java (Computer program language) ; Web servers ; Electronic books ; local
    Kurzfassung: BEA® WebLogic Platform 7 is a fast-paced introduction to the new WebLogic Platform. The focus of this book is to provide you with an in-depth knowledge of the WebLogic Platform 7.0 product and how you can leverage its capabilities and new features to create, configure, manage, and monitor an optimal operational environment for your J2EE applications. Hence, the primary technical topics discussed in this book fall under the realm of WebLogic Server Administration. This book covers in J2EE concepts and how to develop J2EE applications targeted for the WebLogic Platform. Become versed on the capabilities, new features and technical architecture of the WebLogic Server 7.0. Master how to install and efficiently configure a WebLogic Server. Configure the WebLogic Server to use BEA¿s performance-based JRockit JVM. Leverage the WebLogic Server¿s administration and deployment tools. Extend a WebLogic Server domain through the introduction of remote managed servers. Configure network resources for your WebLogic Servers. Implement an administration and monitoring framework using Node Manager in conjunction with the WebLogic Server¿s new Self-Health Monitoring System. Activate and configure your WebLogic Server¿s logging capabilities. Architect and implement highly available and scalable application deployment solutions using the WebLogic Server cluster. Optimally package J2EE Web and Enterprise applications and deploy them to your WebLogic Server. Performance tune the WebLogic Server¿s internal subsystems. Optimize the WebLogic Server¿s default HotSpot JVM.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 79
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 581 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Enterprise Java™ Security: Building Secure J2EE™ Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java™ 2 Platform, Enterprise Edition (J2EE), and Java™ 2 Platform, Standard Edition (J2SE™), security architectures and offers practical solutions and usage patterns to address the challenges of Java security. To aid developers who need to build secure J2EE applications, Enterprise Java™ Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP™), and Enterprise JavaBeans™ (EJB™)-technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security. Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology. The relationship between Java and cryptographic technologies is covered in great detail, including: Java Cryptography Architecture (JCA) Java Cryptography Extension (JCE) Public-Key Cryptography Standards (PKCS) Secure/Multipurpose Internet Mail Extensions (S/MIME) Java Secure Socket Extension (JSSE)
    Anmerkung: Includes bibliographical references (p. 563) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 80
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 418 p. , ill. ; , 23 cm. +
    DDC: 005.13/3
    Schlagwort(e): Application software ; Development ; Internet programming ; Java (Computer program language) ; Web servers ; Web site development ; Java (Langage de programmation) ; Logiciels d'application ; Développement ; Programmation sur Internet ; Serveurs Web ; Sites Web ; Développement ; Electronic books ; local
    Kurzfassung: Written by Sun Microsystems' Java™ BluePrints team, Designing Web Services with the J2EE™ 1.4 Platform is the authoritative guide to the best practices for designing and integrating enterprise-level Web services using the Java 2 Platform, Enterprise Edition (J2EE) 1.4. This book provides the guidelines, patterns, and real-world examples architects and developers need in order to shorten the learning curve and start building robust, scalable, and portable solutions. The authors use the Java Adventure Builder application to bring the design process to life and help illustrate the use of Java APIs for XML Processing (JAXP), Java APIs for XML-Based RPC (JAX-RPC), and other Web service and Java-XML technologies. Key topic coverage includes: Web service requirements and design issues Support for Web services provided by the J2EE 1.4 platform Designing and implementing Web service end points Writing efficient Web service client applications Designing and developing XML-based applications Integrating applications and data using Web services The J2EE platform security model as it applies to Web services A coherent programming model for designing and developing Web service endpoints and clients Designing Web Services with the J2EE™ 1.4 Platform provides the insight, advice, and detail that make it easier to create effective Web service applications using the J2EE 1.4 platform.
    Anmerkung: Includes bibliographical references (p. xx-xxii) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 81
    Online-Ressource
    Online-Ressource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.13/3
    Schlagwort(e): C# (Computer program language) ; Java (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Kurzfassung: .NET for Java Developers is the definitive guide to leveraging your Java programming experience in the .NET environment. Understanding the similarities and differences between the C# and Java APIs enables Java programmers to quickly begin rapid application Windows development using C#. The numerous code examples, which have been tested using Visual Studio® .NET 2003 and Java 1.4, show readers how to create feature-rich .NET applications by translating Java coding practices into C#. The authors begin by detailing the .NET Framework and then immediately introduce readers to coding and the Visual Studio® .NET IDE. They compare the features of C# and Java, and provide a systematic analysis of how the two languages relate to each other. Readers cover the essentials of C# programming, from object creation to event programming, before moving into advanced areas, such as database access, XML processing, GUI programming, and reflection. Key topics that explain how to do smart C# programming rather than emulating Java code in C#: Database access Inheritance and polymorphism Thread programming Garbage collection and memory management C# application deployment Delegates Processing XML .NET for Java Developers provides Java developers, programmers, and architects with experience-based advice for a successful transition into the .NET environment. 0672324024B06242003
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 82
    Sprache: Englisch
    Seiten: p. cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Computer security ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Inside Java™ 2 Platform Security , the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java experts at Sun Microsystems, provides a detailed look into the central workings of the Java security architecture and describes tools and techniques for successful implementation on even the most demanding network computing environment. While Java has always provided a stronger security model than other platforms, this book reviews all the methods and practices required to improve security without sacrificing functionality. With tips on how to customize, extend, and refine the Java security architecture, users will have everything they need to protect their information assets from both external and internal threats. This book's in-depth coverage encompasses security architecture, deployment, customization, new developments, and much more. Security fundamentals Secure class loading Specifying fine-grained security policy Enforcing security policy with AccessController, SecurityManager, and more Digital certificates, certification paths, signed code, JAAS, and other authentication measures Java-based cryptography with code examples JSSE, Java GSS-API, and RMI for network security Previews of other platforms for security, including Java Card, J2ME and Jini Designed for both the system administrator and software practitioner, this book delivers vital knowledge for building and maintaining a secure system using the Java 2 platform. With detailed code and usage examples throughout, Inside Java™ 2 Platform Security, Second Edition , is an indispensable resource for all platform security needs. The Java™ Series is supported, endorsed, and authored by the creators of the Java technology at Sun Microsystems, Inc. It is the official place to go for complete, expert, and definitive information on Java technology. The books in this Series provide the inside information you need to build effective, robust, and portable applications and applets. The Series is an indispensable resource for anyone targeting the Java™ 2 platform.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 83
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 647 p. , ill. ; , 23 cm
    Serie: Prentice Hall series in computer networking and distributed systems
    DDC: 005.8
    Schlagwort(e): Computer crimes ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to come "This is a truly outstanding book-enormous technical wealth and beautifully written." -Warwick Ford "Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!" -Harlan Carvey, CISSP "This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." -Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it! This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes: Solutions and examples that cover both UNIX® and Windows® Practical, time-tested, real-world actions you can take to secure your systems Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly! Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home compu...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 84
    Online-Ressource
    Online-Ressource
    Harlow, England ; : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.13/3
    Schlagwort(e): C# (Computer program language) ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: The fastest way for Java developers to pick up C# and .Net - by leveraging on what they already know in Java to learn the new language. Allows a Java developer to pick up C# as quickly as possible by highlighting the similarities and differences between the two languages. Extensive detailed coverage of the new features in C# not found in Java. A useful introduction to the .NET platform and how the new architecture works. It's important for a C# developer to know what happens behind the scenes. User Level: Intermediate. Audience: All intermediate Java developers. Technology: C# is a new programming language which is promoted by Microsoft as the successor to C++. C# together with Visual Basic .NET are the two most popular programming languages .NET developers use to write applications targeted at the .NET platform. Author Biography: Mok Heng Ngee is an experienced software developer and architect who has been involved in numerous large-scale software enterprise projects based on the Java 2 Platform, Enterprise Edition (J2EE). Mok has writes for Computer Times and has been invited to speak at the official launch of Visual Studio .NET in Singapore. He has been accorded MVP (Most Valuable Professional) status by Microsoft Asia.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 85
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 405 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 004.692
    Schlagwort(e): Electronic mail systems ; Java (Computer program language) ; Telecommunication ; Message processing ; Electronic books ; local
    Kurzfassung: The authoritative guide to JMS for enterprise developers. JMS API is gaining important popularity for Enterprise applications and there is no adequate documentation for JMS for the J2EE platform. This book covers not only the concepts, but also present simple examples to explain the concepts and real sample applications to show how to use those concepts and techniques. J2EE is commonly used for enterprise applications. The Java(tm) Message Service (JMS) API has been developed by Sun working in close cooperation with the leading enterprise messaging vendors. Enterprise messaging is now recognized as an essential tool for building enterprise applications. By combining Java technology with enterprise messaging, the JMS API provides a new, powerful tool for solving enterprise computing problems. Enterprise messaging provides a reliable, flexible service for the asynchronous exchange of critical business data and events throughout an enterprise. The JMS API adds to this a common API and provider framework that enables the development of portable, message based applications in the Java programming language.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 86
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxix, 703 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Schlagwort(e): JavaBeans ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: The definitive guide to industrial-strength EJB 2.0 development. A comprehensive guide to enterprise-class EJB 2.0 development In-depth coverage of transactions, security, performance, and Web services Features a full-scale, real-world case study Applied Enterprise JavaBeans Technology takes you under the hood of EJB 2.0, offering unprecedented insight into how EJB really works-and shows you how to leverage its full power to build industrial-strength distributed applications. EJB expert Kevin Boone starts from first principles and progresses to state-of-the-art approaches for building Java applications that are distributed, transactional, and secure. Along the way, Boone reveals aspects of the EJB architecture that are normally hidden but offer even more power to developers who understand them. Applied Enterprise JavaBeans Technology offers all this and more: Demonstrates powerful techniques for maximizing distributed application security Introduces high-performance resource pooling and optimization strategies Helps developers choose and implement the best approach to distributed transaction processing Presents in-depth coverage of integration with related technologies, including servlets, Web services, messaging, directories, and CORBA Includes extensive cross-references to the official EJB 2.0 specifications From EJB "first principles" to the state of the art Emphasizes accuracy, depth, and comprehensiveness: never oversimplifies! Focuses on mission-critical development techniques that other books ignore Illuminates powerful capabilities typically left "transparent" to the programmer Shows how to use EJB to implement comprehensive security policies Contains in-depth coverage of automatically generated EJB proxies
    Anmerkung: "Sun Microsystems Press, a Prentice Hall title". - Includes bibliographical references (p. 691) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 87
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxix, 746 p. , ill. ; , 24 cm
    Ausgabe: 3rd ed.
    DDC: 005.8
    Schlagwort(e): Computer security ; Data protection ; Privacy, Right of ; Electronic books ; local
    Kurzfassung: The classic guide to information security-fully updated for the latest attacks and countermeasures Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike. This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats and vulnerabilities, and offers practical guidance for responding to them. Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more Security in Internet-based, distributed, desktop and traditional centralized applications New attacks, including scripted vulnerability probing, denial of service, and buffer overflows-with symptoms and cures Clear, accessible introduction to cryptography-without sophisticated math Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography Thoroughly revamped coverage of software engineering practices designed to enhance program security Expanded coverage of risk management, contingency planning, and security policies Detailed presentation of protection in general-purpose and trusted operating systems Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security. The companion website (http://www.phptr.com/pfleeger/) contains additional information, book updates, and instructor's resources.
    Anmerkung: Includes bibliographical references (p. 691-725) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 88
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 945 p. , ill. ; , 23 cm. +
    Ausgabe: 4th ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.
    Anmerkung: Includes bibliographical references (p. [731]-759) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 89
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: x, 417 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): JavaServer pages ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: The JSP Standard Tag Library is a collection of commonly used functions and tools invaluable to JSP developers to avoid re-creating the same functions on site after site. Sun has indicated that JSP development should be based around using tag libraries going forward, and will relase JSP STL, as their official library. This book starts with an in-depth deiscussion of the JSP STL, then goes beyond the standard library to teach developers to create their own tags to further encapsulate the most common features of their specific applications. Along the way, readers will also learn to use tags to access data, process XML, handle expressions, and further customize pages for international visitors. Later chapters explain how readers can expand the Standard Tab Library by creating their own tags.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 90
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 614 p. , ill. ; , 23 cm
    Schlagwort(e): JavaBeans ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Sams Teach Yourself EJB in 21 Days introduces the development and deployment aspects of EJB, the fastest growing standards in developing Java applications in and enterprise environment. EJBs are, functionally, distributed network aware components for developing secure, scalable, transactional, and multi-user components in a J2EE environment. Sams Teach Yourself EJB in 21 Days covers the new features of EJB 2.0, such as local interface, CMP, and CMR. It provides hands-on examples based on practical solutions found in the industry. Tips and best practices give beginners an edge to avoid repeated mistakes. The review questions provide the reader with a study guide. Source code for a complete credit approval process in a transactional e-Commerce environment is provided.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 91
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 267 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Paralleltitel: Erscheint auch als
    DDC: 005.13/3
    Schlagwort(e): Database design ; Java (Computer program language) ; Relational databases ; Electronic books ; local
    Kurzfassung: When creating complex Java enterprise applications, do you spend a lot of time thumbing through a myriad of books and other resources searching for what you hope will be the API that's right for the project at hand? Java Database Best Practices rescues you from having to wade through books on each of the various APIs before figuring out which method to use! This comprehensive guide introduces each of the dominant APIs (Enterprise JavaBeans, Java Data Objects, the Java Database Connectivity API (JDBC) as well as other, lesser-known options), explores the methodology and design components that use those APIs, and then offers practices most appropriate for different types and makes of databases, as well as different types of applications. Java Database Practices also examines database design, from table and database architecture to normalization, and offers a number of best practices for handling these tasks as well. Learn how to move through the various forms of normalization, understand when to denormalize, and even get detailed instructions on optimizing your SQL queries to make the best use of your database structure. Through it all, this book focuses on practical application of these techniques, giving you information that can immediately be applied to your own enterprise projects.Enterprise applications in today's world are about data-- whether it be information about a product to buy, a user's credit card information, or the color that a customer prefers for their auto purchases. And just as data has grown in importance, the task of accessing that data has grown in complexity. Until now, you have been left on your own to determine which model best suits your application, and how best to use your chosen API. Java Database Practices is the one stop reference book to help you determine what's appropriate for your specific project at hand. Whether it's choosing between an alphabet soup of APIs and technologies--EJB, JDO, JDBC, SQL, RDBMS, OODBMS, and more on the horizon, this book is an indispensable resource you can't do without.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 92
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 420 p. ; , 24 cm
    DDC: 005.1
    Schlagwort(e): Oracle (Computer file) ; Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: The hands-on tutorial for Java developers who want to integrate their applications with the industy leading Oracle 8i and 9i databases. Provides an introduction to database design, including the essentials of SQL, to get Java programmers started with Oracle comfortably, confidently and quickly! Covers important Java database technologies, such as JDBC and JDO-step-by-step, with examples. Covers both Oracle 8i and 9I-including new 9i features, such as object-relational features, all highlighted with examples.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 93
    Online-Ressource
    Online-Ressource
    Beijing : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 356 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Object-oriented programming (Computer science) ; Electronic books ; local
    Kurzfassung: Java Data Objects revolutionizes the way Java developers interact with databases and other datastores. JDO allows you to store and retrieve objects in a way that's natural to Java programmers. Instead of working with JDBC or EJB's container-managed persistence, you work directly with your Java objects. You don't have to copy data to and from database tables or issue SELECTs to perform queries: your JDO implementation takes care of persistence behind-the-scenes, and you make queries based on the fields of your Java objects, using normal Java syntax. The result is software that is truly object-oriented: not code that is partially object-oriented, with a large database-shaped lump on the back end. JDO lets you save plain, ordinary Java objects, and does not force you to use different data models and types for dealing with storage. As a result, your code becomes easier to maintain, easier to re-use, and easier to test. And you're not tied to a specific database vendor: your JDO code is entirely database-independent. You don't even need to know whether the datastore is a relational database, an object database, or just a set of files. This book, written by the JDO Specification Lead and one of the key contributors to the JDO Specification, is the definitive work on the JDO API. It gives you a thorough introduction to JDO, starting with a simple application that demonstrates many of JDO's capabilities. It shows you how to make classes persistent, how JDO maps persistent classes to the database, how to configure JDO at runtime, how to perform transactions, and how to make queries. More advanced chapters cover optional features such as nontransactional access and optimistic transactions. The book concludes by discussing the use of JDO in web applications and J2EE environments. Whether you only want to read up on an interesting new technology, or are seriously considering an alternative to JDBC or EJB CMP, you'll find that this book is essential. It provides by far the most authoritative and complete coverage available.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 94
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 202 p. , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Electronic books ; local
    Kurzfassung: Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable government and military computers --at an alarming rate. Despite their myriad manifestations and different targets, nearly all attacks have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding , by Mark G. Graff and Ken vanWyk, looks at the problem of bad code in a new way. Packed with advice based on the authors' decades of experience in the computer security field, this concise and highly readable book explains why so much code today is filled with vulnerabilities, and tells readers what they must do to avoid writing code that can be exploited by attackers. Writing secure code isn't easy, and there are no quick fixes to bad code. To build code that repels attack, readers need to be vigilant through each stage of the entire code lifecycle: Architecture: during this stage, applying security principles such as "least privilege" will help limit even the impact of successful attempts to subvert software. Design: during this stage, designers must determine how programs will behave when confronted with fatally flawed input data. The book also offers advice about performing security retrofitting when you don't have the source code -- ways of protecting software from being exploited even if bugs can't be fixed. Implementation: during this stage, programmers must sanitize all program input (the character streams representing a programs' entire interface with its environment -- not just the command lines and environment variables that are the focus of most security analysis). Testing: during this stage, programs must be checked using both static code checkers and runtime testing methods -- for example, the fault injection systems now available to check for the presence of such flaws as buffer overflow. Operations: during this stage, patch updates must be installed in a timely fashion. In early 2003, sites that had diligently applied Microsoft SQL Server updates were spared the impact of the Slammer worm that did serious damage to thousands of systems. Beyond the technical, Secure Coding sheds new light on the economic, psychological, and sheer practical reasons why...
    Anmerkung: Includes bibliographical references (p. 185-194) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 95
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 1032 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): Business ; Data processing ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Technologies, architecture, and Java patterns for building robust multi-tier J2EE applications. All you need to build robust, multi-tier J2EE applications Presents in-depth coverage of J2EE technologies, architecture, and Java design patterns Covers Web services, XML, security, messaging, networking, and much more Complete case study covers the design, construction, and integration of every application tier To build high-performance Web applications and services with J2EE, developers need deep mastery over J2EE's diverse technologies and effective architectural strategies for designing distributed multi-tier applications. In J2EE and Beyond, a leading J2EE developer delivers both. Art Taylor ranges far beyond JSPs, EJBs, and servlets, offering practical insight into many crucial J2EE APIs, and presenting powerful design patterns that illuminate the effective use of J2EE 1.3 and J2SE 1.4. Taylor's example-rich coverage encompasses all this, and more: JAXM, JAXP, and other J2EE APIs for XML and Web services development Java security APIs: JSSE for SSL support, JCE for cryptography, and JAAS for authentication and authorization Effective strategies for utilizing RMI and Java networking The latest enhancements to JDBC database connectivity Making the most of logging and other J2SE 1.4 enhancements Java messaging (JMS), directory services (JNDI), and much more J2EE and Beyond also includes a complete case study demonstrating how every tier, each core J2EE technology, and related technologies such as XML all come together to create a J2EE application.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 96
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 309 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Electronic books ; local
    Kurzfassung: "This is a really good book ... it spells out the motherhood and apple pie of information security in a highly readable way." -Warwick Ford, CTO, VeriSign, Inc. "An excellent security read! Breaks down a complex concept into a simple and easy-to-understand concept." -Vivek Shivananda, President Redefine your organization's information security Learn to think and act like a top security guru! Understand the founding principles of security itself and make better decisions Make your security solutions more effective, easily manageable, and less costly! Make smarter, more informed security decisions for your company Organizations today commit ever-increasing resources to information security, but are scarcely more secure than they were four or five years ago! By treating information security like an ordinary technological practice-that is, by throwing money, a handful of the latest technologies, and a lineup of gurus at the problem-they invariably wind up with expensive, but deeply flawed, solutions. The only way out of this trap is to change one's way of thinking about security: to grasp the reasoning, philosophy, and logic that underlie all successful security efforts. In Inside the Security Mind: Making the Tough Decisions , security expert Kevin Day teaches you how to approach information security the way the top gurus do-as an art, rather than a collection of technologies. By applying this discipline, your solutions will be more secure and less burdensome in time, expense, and effort. The first part of the book explains the practice of breaking security decisions down into a set of simple rules. These rules may then be applied to make solid security decisions in almost any environment. In the second part, Day uses a series of practical examples to illustrate exactly how the discipline works in practice. Additional material covers: Designing an enterprise security plan, including perimeter/firewall and Internal defenses, application, system, and hardware security Ongoing security measures-recurring audits, vulnerability maintenance, logging and monitoring, and incident response, plus risk assessment Choosing between open source and proprietary solutions; and wired, wireless, and virtual private networks This book is essential reading for anyone working to keep information secure. Technical and non-technical IT professionals alike can apply Day's concepts and strategies to become security gurus, while seasoned practitioners will benefit from th...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 97
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 340 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rules and known exploits. The lack of usable information made using Snort a frustrating experience. The average Snort user needs to learn how to actually get their systems up-and-running. Snort Intrusion Detection provides readers with practical guidance on how to put Snort to work. Opening with a primer to intrusion detection and Snort, the book takes the reader through planning an installation to building the server and sensor, tuning the system, implementing the system and analyzing traffic, writing rules, upgrading the system, and extending Snort.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 98
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 385 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Mac OS ; Computer networks ; Security measures ; Computer security ; Macintosh (Computer) ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.
    Anmerkung: Includes bibliographical references (p. 361-369) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 99
    Online-Ressource
    Online-Ressource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 768 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Computer security ; Data encryption (Computer science) ; Electronic books ; local
    Kurzfassung: Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process-from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors-two battle-scarred veterans who have solved some of the industry's toughest security problems-provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft .NET security, and Microsoft ActiveX development, plus practical checklists for developers, testers, and program managers.
    Anmerkung: Includes bibliographical references (p. 741-745) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 100
    Online-Ressource
    Online-Ressource
    Indianapolis : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 990 p. , ill. ; , 23 cm. +
    Schlagwort(e): JBuilder ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: JBuilder Developer's Guide provides comprehensive coverage of JBuilder from the practitioner's viewpoint. The authors develop a consolidated application throughout the chapters, allowing conceptual cohesion and illustrating the use of JBuilder to build 'real-world' applications. The examples can be compiled and run under JBuilder Personal edition, a free edition of JBuilder. JBuilder Developer's Guide is not version specific but explains the latest JBuilder 6, 7, and 8 features such as enterprise J2EE application development, CORBA, SOAP, XML tools, Enterprise JavaBeans, JavaServer Pages/Servlets, and JavaBeans technology. JBuilder repeatedly wins "developer's choice" awards as the best visual tool for developing Java applications.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...