Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Safari Tech Books Online  (122)
  • Safari, an O'Reilly Media Company
  • XML (Document markup language)  (72)
  • Computer networks ; Security measures  (51)
Datenlieferant
Materialart
Sprache
Erscheinungszeitraum
  • 1
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 234 , ill. ; , 24 cm
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers. Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for ExciteHome.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture. How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
    Anmerkung: "Unmasking Identity Management Architecture (IMA)". - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. ; : O'Reilly Media | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 324 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.
    Anmerkung: "Writing, hacking, and modifying security tools"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Cisco | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 454 p. , ill. ; , 24 cm
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions. Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems. Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detectio...
    Anmerkung: Includes bibliographical references (p. [427]-430) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Anmerkung: Includes bibliographical references (p. [389]-395) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 381 p. , ill. ; , 23 cm
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computer security ; United States ; Management ; Data protection ; Data protection ; Management ; Electronic books ; local
    Kurzfassung: Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization's aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board. Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow fin...
    Anmerkung: "Understand the total cost of ownership and return on investment for network security solutions"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxii, 734 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxiv, 798 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: "The book you are about to read will arm you with the knowledge you need to defend your network from attackers-both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." -Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security-one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." -Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." -Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." -Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes-resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools-including Sguil, Argus, and Ethereal-to mine network traffic for full content, session, statistical, and ale...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 645 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    Schlagwort(e): UNIX Shells ; Computer networks ; Security measures ; Data encryption (Computer science) ; Electronic books ; local
    Kurzfassung: Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide . This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
    Anmerkung: "Covers SSH-2 protocol"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 270 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysis But the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.
    Anmerkung: "Solutions and examples for Snort administrators"--Cover. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 372 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer crimes ; Prevention ; Computer networks ; Security measures ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the following topics How denial-of-service attacks are waged How to improve your network's resilience to denial-of-service attacks What to do when you are involved in a denial-of-service attack The laws that apply to these attacks and their implications How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplices The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.
    Anmerkung: Includes bibliographical references (p. 335-350) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 11
    Online-Ressource
    Online-Ressource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxix, 553 p. , ill. ; , 23 cm. +
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques-straight from members of the Microsoft Security Team.
    Anmerkung: Includes bibliographical references (p. 515-526) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 460 p. , ill. ; , 23 cm
    DDC: 005.72
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Developers and system administrators alike are uncovering the true power of XML, the Extensible Markup Language that enables data to be sent over the Internet from one computer platform to another or one application to another and retain its original format. Flexible enough to be customized for applications as diverse as web sites, electronic data interchange, voice mail systems, wireless devices, web services, and more, XML is quickly becoming ubiquitous. XML Hacks is a roll-up-your-sleeves guide that distills years of ingenious XML hacking into a complete set of practical tips, tricks, and tools for web developers, system administrators, and programmers who want to go far beyond basic tutorials to leverage the untapped power of XML.With plenty of useful real-world projects that illustrate how to define, read, create, and manipulate XML documents, XML Hacks shows readers how to put XML's power to work on the Internet and within productivity applications. Each Hack in this book can be read easily in a few minutes, saving programmers and administrators countless hours of searching for the right answer. And this is an O'Reilly Hacks book, so it's not just practical, imminently useful, and time-saving. It's also fun.From Anatomy of an XML Document to Exploring SOAP Messages XML Hacks shows you how to save time and accomplish more with fewer resources. If you want much more than the average XML user--to explore and experiment, do things you didn't know you could do with XML, discover clever shortcuts, and show off just a little--this invaluable book is a must-have.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 13
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 247 p. , ill. ; , 25 cm
    Ausgabe: 1st ed.
    DDC: 004.22
    Schlagwort(e): Computer architecture ; Web services ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Large IT organizations increasingly face the challenge of integrating various web services, applications, and other technologies into a single network. The solution to finding a meaningful large-scale architecture that is capable of spanning a global enterprise appears to have been met in ESB, or Enterprise Service Bus. Rather than conform to the hub-and-spoke architecture of traditional enterprise application integration products, ESB provides a highly distributed approach to integration, with unique capabilities that allow individual departments or business units to build out their integration projects in incremental, digestible chunks, maintaining their own local control and autonomy, while still being able to connect together each integration project into a larger, more global integration fabric, or grid. Enterprise Service Bus offers a thorough introduction and overview for systems architects, system integrators, technical project leads, and CTO/CIO level managers who need to understand, assess, and evaluate this new approach. Written by Dave Chappell, one of the best known and authoritative voices in the field of enterprise middleware and standards-based integration, the book drills down into the technical details of the major components of ESB, showing how it can utilize an event-driven SOA to bring a variety of enterprise applications and services built on J2EE, .NET, C/C++, and other legacy environments into the reach of the everyday IT professional.With Enterprise Service Bus , readers become well versed in the problems faced by IT organizations today, gaining an understanding of how current technology deficiencies impact business issues. Through the study of real-world use cases and integration patterns drawn from several industries using ESB--including Telcos, financial services, retail, B2B exchanges, energy, manufacturing, and more--the book clearly and coherently outlines the benefits of moving toward this integration strategy. The book also compares ESB to other integration architectures, contrasting their inherent strengths and limitations.If you are charged with understanding, assessing, or implementing an integration architecture, Enterprise Service Bus will provide the straightforward information you need to draw your conclusions about this important disruptive technology.
    Anmerkung: Includes bibliographical references (p. 235-238) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 14
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 327 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.13/3
    Schlagwort(e): MySQL (Electronic resource) ; Object-oriented programming (Computer science) ; PHP (Computer program language) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: If you're using PHP 4, then chances are good that an upgrade to PHP 5 is in your future. The more you've heard about the exciting new features in PHP 5, the sooner that upgrade is probably going to be. Although an in-depth, soup-to-nuts reference guide to the language is good to have on hand, it's not the book an experienced PHP programmer needs to get started with the latest release. What you need is a lean and focused guide that answers your most pressing questions: what's new with the technology, what's different, and how do I make the best use of it? In other words, you need a copy of Upgrading to PHP 5 . This book is targeted toward PHP developers who are already familiar with PHP 4. Rather than serve as a definitive guide to the entire language, the book zeroes in on PHP 5's new features, and covers these features definitively. You'll find a concise appraisal of the differences between PHP 4 and PHP 5, a detailed look at what's new in this latest version, and you'll see how PHP 5 improves on PHP 4 code. See PHP 4 and PHP 5 code side-by-side, to learn how the new features make it easier to solve common PHP problems. Each new feature is shown in code, helping you understand why it's there, when to use it, and how it's better than PHP 4. Short, sample programs are included throughout the book. Topics covered in Upgrading to PHP 5 include: The new set of robust object-oriented programming features An improved MySQL extension, supporting MySQL 4.1, prepared statements, and bound parameters Completely rewritten support for XML: DOM, XSLT, SAX, and SimpleXML Easy web services with SOAP SQLite, an embedded database library bundled with PHP 5 Cleaner error handling with exceptions Other new language features, such as iterators, streams, and more. Upgrading to PHP 5 won't make you wade through information you've covered before. Written by Adam Trachtenberg, coauthor of the popular PHP Cookbook , this book will take you straight into the heart of all that's new in PHP 5. By the time you've finished, you'll know PHP 5 in practice as well as in theory.
    Anmerkung: "All that's new in PHP 5, covers MySQL 4.1"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 15
    Online-Ressource
    Online-Ressource
    Bejing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 567 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.72
    Schlagwort(e): Microsoft Office ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: In Microsoft's Office 2003, users experience the merger of the power of the classic Office suite of applications with the fluidity of data exchange inherent in XML. With XML at its heart, the new version of Microsoft's desktop suite liberates the information stored in millions of documents created with Office software over the past fifteen years, making it available to a wide variety of programs. Office 2003 XML offers an in-depth exploration of the relationship between XML and Office 2003, examining how the various products in the Office suite both produce and consume XML. Developers will learn how they can connect Microsoft Office to others systems, while power users will learn to create and analyze XML documents using familiar Office tools. The book begins with an overview of the XML features included in the various Office 2003 components, and explores in detail how Word, Excel, and Access interact with XML. This book covers both the user interface side, creating interfaces so that users can comfortably (and even unknowingly) work with XML, and the back end, exposing Office information to other processes. It also looks at Microsoft's new InfoPath application and how it fits with the rest of Office. Finally, the book's appendices introduce various XML technologies that may be useful in working with Office, including XSLT, W3C XML Schema, RELAX NG, and SOAP. Office 2003 XML provides quick and clear guidance to a anyone who needs to import or export information from Office documents into other systems. Both XML programmers and Office power will learn how to get the most from this powerful new intersection between Office 2003 and XML.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 16
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 298 , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 17
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 531 , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 18
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 745 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 19
    Online-Ressource
    Online-Ressource
    Beijing : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 689 p. , ill. ; , 23 cm
    Ausgabe: 3rd ed.
    Serie: In a nutshell
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: If you're a developer working with XML, you know there's a lot to know about XML, and the XML space is evolving almost moment by moment. But you don't need to commit every XML syntax, API, or XSLT transformation to memory; you only need to know where to find it. And if it's a detail that has to do with XML or its companion standards, you'll find it--clear, concise, useful, and well-organized--in the updated third edition of XML in a Nutshell .With XML in a Nutshell beside your keyboard, you'll be able to: Quick-reference syntax rules and usage examples for the core XML technologies, including XML, DTDs, Xpath, XSLT, SAX, and DOM Develop an understanding of well-formed XML, DTDs, namespaces, Unicode, and W3C XML Schema Gain a working knowledge of key technologies used for narrative XML documents such as web pages, books, and articles technologies like XSLT, Xpath, Xlink, Xpointer, CSS, and XSL-FO Build data-intensive XML applications Understand the tools and APIs necessary to build data-intensive XML applications and process XML documents, including the event-based Simple API for XML (SAX2) and the tree-oriented Document Object Model (DOM) This powerful new edition is the comprehensive XML reference. Serious users of XML will find coverage on just about everything they need, from fundamental syntax rules, to details of DTD and XML Schema creation, to XSLT transformations, to APIs used for processing XML documents. XML in a Nutshell also covers XML 1.1, as well as updates to SAX2 and DOM Level 3 coverage. If you need explanation of how a technology works, or just need to quickly find the precise syntax for a particular piece, XML in a Nutshell puts the information at your fingertips.Simply put, XML in a Nutshell is the critical, must-have reference for any XML developer.
    Anmerkung: "A desktop quick reference"--Cover. - "Covers XML 1.1 & XInclude"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 20
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Anmerkung: Includes bibliographical references (p. 321-326) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 21
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: 355 p. , ill. ; , 24 cm
    DDC: 006.7/4
    Schlagwort(e): Query languages (Computer science) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: XQuery Kick Start delivers a concise introduction to the XQuery standard, and useful implementation advice for developers needing to put it into practice. The book starts by explaining the role of XQuery in the XML family of specifications, and its relationship with XPath. The authors then explain the specification in detail, describing the semantics and data model, before moving to examples using XQuery to manipulate XML databases and document storage systems. Later chapters discuss Java implementations of XQuery and development tools that facilitate the development of Web sites with XQuery. This book is up to date with the latest XQuery specifications, and includes coverage of new features for extending the XQuery language.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 22
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 486 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 006.7/4
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: As developers know, the beauty of XML is that it is extensible, even to the point that you can invent new elements and attributes as you write XML documents. Then, however, you need to define your changes so that applications will be able to make sense of them and this is where XML schema languages come into play. RELAX NG (pronounced relaxing), the Regular Language Description for XML Core--New Generation is quickly gaining momentum as an alternative to other schema languages. Designed to solve a variety of common problems raised in the creation and sharing of XML vocabularies, RELAX NG is less complex than The W3C's XML Schema Recommendation and much more powerful and flexible than DTDs.RELAX NG is a grammar-based schema language that's both easy to learn for schema creators and easy to implement for software developers In RELAX NG , developers are introduced to this unique language and will learn a no-nonsense method for creating XML schemas. This book offers a clear-cut explanation of RELAX NG that enables intermediate and advanced XML developers to focus on XML document structures and content rather than battle the intricacies of yet another convoluted standard. RELAX NG covers the following topics in depth: Introduction to RELAX NG Building RELAX NG schemas using XML syntax Building RELAX NG schemas using compact syntax, an alternative non-XML syntax Flattening schemas to limit depth and provide reusability Using external datatype libraries with RELAX NG W3C XML Schema regular expressions Writing extensible schemas Annotating schemas Generating schemas form different sources Determinism and datatype assignment and much more.If you're looking for a schema language that's easy to use and won't leave you in a labyrinth of obscure limitations, RELAX NG is the language you should be using. And only O'Reilly's RELAX NG gives you the straightforward information and everything else you'll need to take advantage of this powerful and intelligible language.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 23
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxvii, 828 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. The Cisco Intrusion Detection Sensors and Management options work as a united system to provide detection, notification, and aggressive lockdown to malicious network breaches. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS), Second Edition , offers in-depth configuration and deployment information for the reliable and intensive intrusion detection solutions from Cisco Systems. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over the use of both the host-based and network-based IDS options (as well as the Cisco Threat Response functionality) by presenting a consolidated all-inclusive reference on all of the current Cisco IDS sensor platforms and management platforms. Chapter overviews bring you quickly up to speed and help you get to work right away. Configuration examples are designed to show you how to make the most of your IDS system, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with the CIDS sensor and management platforms or a study guide for the 642-531 exam, CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, supports your effective use of the Cisco IDS. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, an...
    Anmerkung: Includes index. - Rev. ed. of: Cisco secure intrusion detection system. c2002
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 24
    Sprache: Englisch
    Seiten: xiv, 378 p. , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Web services ; Web sites ; Security measures ; Electronic books ; local
    Kurzfassung: Comprehensive coverage is given in this up-to-date and practical guide to Web services security--the first to cover the final release of new standards SAML 1.1 and WS-Security. Rosenberg and Remy are security experts who co-founded GeoTrust, the #2 Web site certificate authority.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 25
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 269 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Anmerkung: "Intrusion detection with open source tools"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 26
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 536 p. , ill. ; , 24 cm
    DDC: 006.7/4
    Schlagwort(e): Computer architecture ; Web services ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Web services is the integration technology preferred by organizations implementing service-oriented architectures. I would recommend that anybody involved in application development obtain a working knowledge of these technologies, and I'm pleased to recommend Erl's book as a great place to begin. -Tom Glover, Senior Program Manager, Web Services Standards, IBM Software Group, and Chairman of the Web Services Interoperability Organization (WS-I). An excellent guide to building and integrating XML and Web services, providing pragmatic recommendations for applying these technologies effectively. The author tackles numerous integration challenges, identifying common mistakes and providing guidance needed to get it right the first time. A valuable resource for understanding and realizing the benefits of service-oriented architecture in the enterprise. -David Keogh, Program Manager, Visual Studio Enterprise Tools, Microsoft. Leading-edge IT organizations are currently exploring second generation web service technologies, but introductory material beyond technical specifications is sparse. Erl explains many of these emerging technologies in simple terms, elucidating the difficult concepts with appropriate examples, and demonstrates how they contribute to service-oriented architectures. I highly recommend this book to enterprise architects for their shelves. -Kevin P. Davis, Ph. D., Software Architect. Service-oriented integration with less cost and less risk The emergence of key second-generation Web services standards has positioned service-oriented architecture (SOA) as the foremost platform for contemporary business automation solutions. The integration of SOA principles and technology is empowering organizations to build applications with unprecedented levels of flexibility, agility, and sophistication (while also allowing them to leverage existing legacy environments). This guide will help you dramatically reduce the risk, complexity, and cost of integrating the many new concepts and technologies introduced by the SOA platform. It brings together the first comprehensive collection of field-proven strategies, guidelines, and best practices for making the transition toward the service-oriented enterprise. Writing for architects, analysts, managers, and developers, Thomas Erl offers expert advice for making strategic decisions about both immediate and long-term integration issues. Erl addresses a broad spectrum of integration challenges, covering...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 27
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 455 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 006.7/4
    Schlagwort(e): Application program interfaces (Computer software) ; Microsoft .NET Framework ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: If you're seeking ways to build network-based applications or XML-based web services, Microsoft provides most of the tools you'll need. XML is integrated into the .NET Framework and Visual Studio .NET, but if you want to get a grasp on how .NET and XML actually work together, that's a different story. With .NET & XML , you can get under the hood to see how the .NET Framework implements XML, giving you the skills to write understandable XML-based code that interoperates with code written with other tools, and even other languages. .NET & XML starts by introducing XML and the .NET Framework, and then teaches you how to read and write XML before moving on to complex methods for manipulating, navigating, transforming, and constraining it. To demonstrate the power of XML in .NET, author Niel Bornstein builds a simple hardware store inventory system throughout the book. As you move from chapter to chapter, you'll absorb increasingly complex information until you have enough knowledge to successfully program your own XML-based applications. This tutorial also contains a quick reference to the API, plus appendices present additional .NET assemblies that you can use to work with XML, and how to work with the .NET XML configuration file format. One study puts the potential market for new software based on XML at or near $100 billion over the next five years. The .NET Framework gives you a way to become a part of it. But to use XML and .NET effectively, you need to understand how these two technologies work together. This book gives you the insight to take full advantage of the power the two provide.
    Anmerkung: "Understanding the code and markup behind the wizards"--Cover. - Includes biblographic references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 28
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 006.7/6
    Schlagwort(e): Application software ; Development ; Internet programming ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Praise for XForms: XML Powered Web Forms "XForms is an exciting new technology for designing Web forms in an elegant and accessible way. Raman's book provides strong motivations for flexibility in the design of human-machine interactions, and explains how to use XForms to this end in crystal-clear prose." - Eve Maler XML Standards Architect, Sun Microsystems "Interactive forms technology is the logical evolution of Web user interface design. XForms represents a significant leap forward in that evolution." - Sean McGrath CTO, Propylon "The greatest strength of this book is the skill with which T. V. Raman links the XForms technology with the larger context of the Web. The limitations of HTML forms, the ways in which XForms provides a better foundation for Web and Web service user interfaces, and the opportunities for an XForms-powered Web that is accessible to all users and devices are outlined and brought together in a compelling way." - Michael Champion Advisory Research and Development Specialist, Software AG "Raman's book gives the reader an excellent explanation of the emerging W3C XForms recommendation. It's a well-organized and well-written book that begins with a gentle introduction to the concepts that motivated the development of XForms and then provides a reasonable overview of the relevant XML technology related to XForms. Most of the book covers XForms components: user interface controls, model properties, functions, actions, and events. It concludes with XForms as a Web service, offering multi-modal access and accessibility. In light of the October 2003 deadline for U.S. federal agencies to comply with the mandate of the Government Paperwork Elimination Act (GPEA) to give citizens the opportunity to provide information online, this important technical work comes none too soon. As T. V. masterfully elucidates, XForms provides the 'last mile' in 'connecting users to their data.' Insightfully, he also observes 'the document is the human interface' to data-an understanding without which the challenge to make eGov services 'citizen-centered' simply cannot and will not be met." - Owen Ambur Cofounder and Cochair, XML Working Group, U.S. CIO Council "I found the author's straightforward style quite comfortable and informative. I heartily recommend this book, especially for government XML developers interested in the broader area of E-Forms. Understanding XForms is key to developing robust and flexible E-Forms solutions that separate cont...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 29
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 252 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Biometric identification ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application. In Biometrics for Network Security , biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes: An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
    Anmerkung: Includes bibliographical references (p. 239-241) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 30
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxix, 739 p. , ill. ; , 24 cm
    Serie: Networking technology series
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at security design with three included case studies Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way. Beginning where other security books leave off, Network Security Architectures shows you how the various technologies that make up a security system can be used together to improve your network's security. The technologies and best practices you'll find within are not restricted to a single vendor but broadly apply to virtually any network system. This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy. You'll review detailed desig...
    Anmerkung: Includes "Glossary of terms" (p. [673]-677). - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 31
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly Media Inc. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: x, 204 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Apache (Computer file : Apache Group) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Web developers rely on XML to separate data from presentation and create a consistent templating system for a web site. Although limited XML-to-HTML conversion is possible within some browsers, web developers creating dynamic or complex sites will find server-side XML transformation a necessity. Unfortunately, until recently, there have been few XML tools available for server-side XML transformation or authoring. AxKit, a mod_perl and Apache-based XML content delivery solution, was designed to meet that need with a cost-effective and efficient plugin architecture. AxKit allows the developer to quickly design modules to create faster web sites, and deliver them in a wide variety of media formats. AxKit also takes care of caching so the developer doesn't have to worry about it. AxKit meets the demands of the web developer nicely, but, as with any new toolkit, there is a learning curve. For developers who want to flatten that learning curve and get right to work with AxKit, XML Publishing with AxKit provides detailed information on how to install, configure, and deploy AxKit effectively. The first book solely devoted to AxKit, XML Publishing with AxKit also offers a concise and focused look at how to create XSLT and XPathScript-based pipelines for XML data transfer. This solidly useful new book presents web programmers with the hands-on knowledge they need to get really creative with AxKit. It features a thorough introduction to XSP (extensible Server Pages), which applies the concepts of Server Pages technologies (embedded code, tag libraries, etc) to the XML world, and covers integrating AxKit with other tools such as Template Toolkit, Apache:: Mason, Apache::ASP, and plain CGI. The book also includes invaluable reference sections on configuration directives, XPathScript, and XSP. With XML Publishing with AxKit , web developers will have all the tools they need to deliver complex XML-based systems quickly, the power to develop their own systems for style sheet negotiation, and the flexibility to design completely new style sheet languages. XML Publishing with AxKit gives those new to XML all the background and the courage they need to jump right in and deploy AxKit. And it gives XML-savvy professionals everything they need to hit the ground running.
    Anmerkung: "Managing Web content with Perl & XML"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 32
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 388 p. , ill. ; , 23 cm
    Schlagwort(e): Microsoft InfoPath ; Business ; Forms ; Computer programs ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Microsoft InfoPath 2003 Kick Start builds upon the reader's knowledge of the Microsoft Office system to enable them to get right to work making productive use of InfoPath. It is targeted specifically at the early adopters - developers who will use their knowledge of XML and Web development to build sophisticated applications with InfoPath front ends. However it is also, carefully structured to enable "front line" InfoPath users to quickly glean the information they need to be productive when developing their own InfoPath forms - and when working with developers to create more involved InfoPath applications.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 33
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 366 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Schlagwort(e): Hypertext systems ; XML (Document markup language) ; XPath (Computer program language) ; Electronic books ; local
    Kurzfassung: XPath is to XML as SQL is to databases: XML applications need XPath to locate specific data within an XML document for further processing with other XML applications such as XSLT, XQuery, XPointer, XLink and DOM level 3. With XPath, these applications offer developers a full toolkit for transforming, linking, and searching XML data. Developers need to understand XPath to fully exploit XML in their applications, and they have few resources beyond the W3C specification. XPath Kick Start will examine every aspect of XPath in detail, including its influence on and use with these other XML standards. With each technique illustrated with real-world examples, the book starts with coverage of the essentials of XPath, including nodes, expressions, functions and operators. The second half of the book details XPath in practice - from manipulating XML data to transforming, linking and querying XML documents.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 34
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 605 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Schlagwort(e): Business ; Computer programs ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: "This volume offers relentlessly pragmatic solutions to help your business applications get the most out of XML, with a breezy style that makes the going easy. Mike has lived this stuff; he has a strong command of the solutions and the philosophy that underlies them." --Eve Maler, XML Standards Architect, Sun Microsystems Businesses running legacy applications that do not support XML can face a tough choice: Either keep their legacy applications or switch to newer, XML-enhanced applications. XML presents both challenges and opportunities for organizations as they struggle with their data. Does this dilemma sound familiar? What if you could enable a legacy application to support XML? You can. In Using XML with Legacy Business Applications, e-commerce expert Michael C. Rawlins outlines usable techniques for solving day-to-day XML-related data exchange problems. Using an easy-to-understand cookbook approach, Rawlins shows you how to build XML support into legacy business applications using Java and C++. The techniques are illustrated by building converters for legacy formats. Converting CSV files, flat files, and X12 EDI to and from XML will never be easier! Inside you'll find: A concise tutorial for learning to read W3C XML schemas An introduction to using XSLT to transform between different XML formats Simple, pragmatic advice on transporting XML documents securely over the Internet For developers working with either MSXML with Visual C++ or Java and Xerces: See Chapter 3 for a step-by-step guide to enabling existing business applications to export XML documents See Chapter 2 for a step-by-step guide to enabling existing business applications to import XML documents See Chapter 5 for code examples and tips for validating XML documents against schemas See Chapter 12 for general tips on building commerce support into an application For end users who need a simple and robust conversion utility: See Chapter 7 for converting CSV files to and from XML See Chapter 8 for converting flat files to and from XML See Chapter 9 for converting X12 EDI to and from XML See Chapter 11 for tips on how to use these techniques together for complex format conversions The resource-filled companion Web site (www.rawlinsecconsulting.com/booksupplement) includes executable versions of the utilities described in the book, full source code in C++ and Java, XSLT stylesheets, bug fixes, sample input and output files, and more. 0321154940B07142003
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 35
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 647 p. , ill. ; , 23 cm
    Serie: Prentice Hall series in computer networking and distributed systems
    DDC: 005.8
    Schlagwort(e): Computer crimes ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to come "This is a truly outstanding book-enormous technical wealth and beautifully written." -Warwick Ford "Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!" -Harlan Carvey, CISSP "This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." -Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it! This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes: Solutions and examples that cover both UNIX® and Windows® Practical, time-tested, real-world actions you can take to secure your systems Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly! Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home compu...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 36
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxx, 540 p. , ill. ; , 24 cm. +
    DDC: 005.72
    Schlagwort(e): Microsoft Office ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Co-authors are the world-renowned inventor of markup languages and a developer of the W3C XML Schema specification Detailed coverage of Office 2003 Professional XML features, plus all the XML knowledge you need to use them Learn to edit your XML document with Word, analyze its data with Excel, store it with Access, and publish it to the Web with FrontPage® Build dynamic custom XML forms with the remarkable new InfoPath™ 2003-structured data collection with word processing flexibility From the Foreword by Jean Paoli, Microsoft XML Architect and co-editor of the W3C XML specification: "XML enabled the transfer of information from server to server and server to client, even in cross-platform environments. But the desktop, where documents are created and analyzed by millions of information workers, could not easily participate. Business-critical information was locked inside data storage systems or individual documents, forcing companies to adopt inefficient and duplicative business processes. "This is a book on re-inventing the way millions of people write and interact with documents. It succeeds in communicating the novel underlying vision of Office 2003 XML while focusing on task-oriented, hands-on skills for using the product." Desktop XML affects every Office 2003 Professional Edition user! It transforms millions of desktop computers from mere word processors into rich clients for Web services, editing front-ends for XML content management systems, and portals for XML-based application integration. And this book shows you how to benefit from it. You'll learn exactly what XML can do for you, and you'll master its key concepts, all in the context of the Office products you already know and use. With 200 tested and working code and markup examples and over 150 screenshots and illustrations from the actual shipped product (not betas), you'll see step by step how: Office users can share documents more easily, without error-prone rework, re-keying, or cut-and-paste. Office data from your documents can be captured for enterprise databases. Office documents can be kept up-to-date with live data from Web Services and enterprise data stores. Office solutions can overcome traditional limitations by using XML and Smart Documents. BONUS XML SKILLS SECTION! All the XML expertise you'll need, adapted for Office 2003 users from the best-selling Charles F. Goldfarb's XML Handbook, Fifth Edition : the XML language, XML Schema, XPath, XSLT, Web services ... and m...
    Anmerkung: "CD-ROM with full-function trial of Microsoft InfoPath 2003"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 37
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xii, 415 p. , ill. ; , 24 cm
    Schlagwort(e): Application program interfaces (Computer software) ; Java (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: JAX: Java APIs for XML Kick Start covers the JAX APIs - fundamental for development of Java-based Web service applications as well as other e-Commerce applications requiring the exchange and manipulation of data. The book includes an overview of Web service fundamentals including SOAP, UDDI, and WSDL, all of which will be built upon in later examples. The book then covers the current set of JAX APIs for data processing, for messaging, for writing data to registries and for calling remote applications. Each API is covered from an architectural and implementation perspective, using real-world examples and case studies throughout to illustrate their usefulness. The author will demonstrate both Web service and traditional JAX applications, giving a complete picture of the uses of JAX. The final chapter looks ahead to new developments and new APIs in progress at Sun.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 38
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 322 p. , ill. ; , 25 cm
    Ausgabe: 2nd ed.
    DDC: 005.8
    Schlagwort(e): Business enterprises ; Computer networks ; Security measures ; Computer networks ; Security measures ; Public key infrastructure (Computer security) ; Electronic books ; local
    Kurzfassung: PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition , provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery.
    Anmerkung: Revised ed. of: Understanding public-key infrastructure. 1999. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 39
    Online-Ressource
    Online-Ressource
    Beijing : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 208 p. ; , 24 cm
    Paralleltitel: Erscheint auch als
    DDC: 005.7/2
    Schlagwort(e): Metadata ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: RSS is sprouting all over the Web, connecting weblogs and providing news feeds. Originally developed by Netscape in 1999, RSS (which can stand for RDF Site Summary, Rich Site Summary, or Really Simple Syndication) is an XML-based format that allows web developers to describe and syndicate web site content. Using RSS files allows developers to create a data feed that supplies headlines, links, and article summaries from a web site. Other sites can then incorporate them into their pages automatically. Although RSS is in widespread use, people struggle with its confusing and sometimes conflicting documentation and versions. Content Syndication with RSS is the first book to provide a comprehensive reference to the specifications and the tools that make syndication possible. Content Syndication with RSS offers webloggers, developers, and the programmers who support them a thorough explanation of syndication in general and RSS in particular. Written for web developers who want to offer XML-based feeds of their content, as well as developers who want to use the content that other people are syndicating, the book explores and explains metadata interpretation, different forms of content syndication, and the increasing use of web services in this field. This concise volume begins with an introduction to content syndication on the Internet: its purpose, limitations, and traditions, and answers the question of why would you consider "giving your content away" like this? Next, the book delves into the architecture of content syndication with an overview of the entire system, from content author to end user on another site. You'll follow the flow of data: content, referral data, publish-and-subscribe calls, with a detailed look at the protocols and standards possible at each step. Topics covered in the book include: Creating XML syndication feeds with RSS 0.9x and 2.0 Beyond headlines: creating richer feeds with RSS 1.0 and RDF metadata Using feeds to enrich a site or find information Publish and subscribe: intelligent updating News aggregators, such as Meerkat, Syndic8, and Newsisfree, and their web services Alternative industry-centric standards If you're interested in producing your own RSS feed, this step-by-step guide to implementation is the book you'll want in hand.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 40
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 253 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Access control ; Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need.Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting.In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations.If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
    Anmerkung: "Covers Unix and Windows"--Cover. - "Cross-platform authentication & single-sign-on"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 41
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 215 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.7/2
    Schlagwort(e): Application software ; Development ; HTML (Document markup language) ; Internet programming ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: The use of forms on the web is so commonplace that most user interactions involve some type of form. XForms--a combination of XML and forms--offers a powerful alternative to HTML-based forms. By providing excellent XML integration, including XML Schema, XForms allows developers to create flexible, web-based user-input forms for a wide variety of platforms, including desktop computers, handhelds, information appliances, and more. XForms Essentials is an introduction and practical guide to the new XForms specification. Written by Micah Dubinko, a member of the W3C XForms working group and an editor of the specification, the book explains the how and why of XForms, showing readers how to take advantage of them without having to write their own code. You'll learn how to integrate XForms with both HTML and XML vocabularies, and how XForms can simplify the connection between client-based user input and server-based processing. XForms Essentials begins with a general introduction to web forms, including information on history and basic construction of forms. The second part of the book serves as a reference manual to the XForms specification. The third section offers additional hints, guidelines, and techniques for working with XForms. Topics covered in the book include: creating XForms files in a text or XML editor converting existing forms (electronic or paper) to XForms collecting XML data from users in a user-friendly way reducing the amount of JavaScript needed within browser interfaces increasing the security and reliability of your current forms system by combining client-side and server-side checks into a common code base creating interactive websites using the latest standard technology XForms Essentials focuses on the practical application of XForms technology. If you work with forms, HTML, or XML information, XForms Essentials will provide you with a much simpler route to more sophisticated interactions with users.
    Anmerkung: "Gathering and managing XML information"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 42
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 391 p. , ill. ; , 25 cm
    Serie: Prentice Hall PTR series in computer networking and distributed systems
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Enterprise security for real netadmins in the real worldThis book shows how to secure an enterprise network in the real world--when you're on the front lines, constantly under attack, and you don't always get the support you need. Symantec security engineer and former UUNet network architect Allan Liska addresses every facet of network security, from risk profiling through access control, Web/email security through day-to-day monitoring. He systematically identifies today's most widespread security mistakes and vulnerabilities--and offers realistic solutions you can begin implementing right away.Coverage Includes: Quantifying security risks and "selling" security throughout the organization Defining security models that reflect your company's philosophy Translating your security model into effective, enforceable policies Making your routers and switches your first lines of network defense Controlling access via authentication, authorization, and accounting Configuring secure VPNs and remote access Securing wireless LANs and WANs Establishing a DMZ between your network and the public Internet Securing Web/application servers, DNS servers, email servers, and file/print servers Implementing effective day-to-day network security administration, monitoring, and logging Responding to attacks: detect, isolate, halt, report, and prosecute Liska integrates these techniques in an end-to-end case study, showing you how to redesign an insecure enterprise network for maximum security--one step at a time.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 43
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 340 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Kurzfassung: With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rules and known exploits. The lack of usable information made using Snort a frustrating experience. The average Snort user needs to learn how to actually get their systems up-and-running. Snort Intrusion Detection provides readers with practical guidance on how to put Snort to work. Opening with a primer to intrusion detection and Snort, the book takes the reader through planning an installation to building the server and sensor, tuning the system, implementing the system and analyzing traffic, writing rules, upgrading the system, and extending Snort.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 44
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 945 p. , ill. ; , 23 cm. +
    Ausgabe: 4th ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Kurzfassung: Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.
    Anmerkung: Includes bibliographical references (p. [731]-759) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 45
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: vii, 292 p. , ill. ; , 21 cm
    DDC: 005.7/2
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: XML is the de-facto standard for manipulating and sharing data among applications. It is supported by every major programming tool and language, including Java, Microsoft .NET, Oracle, SQL Server, etc. All professional developers and administrators - even those who don't intend to build XML applications - need a basic understanding of it just to read and maintain data they receive and process. Many of them don't have the time for a thick reference book or detailed tutorial. Sams Teach Yourself XML in 10 Minutes quickly covers the basics of XML and its family of related concepts, including basic syntax, DTDs, XML Schema, DOM, SAX, XSL, and XPath. Each topic is illustrated with an example to ensure readers' understanding.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 46
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 286 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 004.68
    Schlagwort(e): Computer networks ; Security measures ; Wireless communication systems ; Security measures ; Wireless communication systems ; Standards ; Electronic books ; local
    Kurzfassung: It's an increasingly wired world, but many people are finding that the best way to get connected is to do away with wires entirely. From cable replacement to universal Internet connectivity, wireless technology is changing the way we connect to our machines and to each other. As with any new technology, buying your gear is only the first step. Understanding how to make the best use of it is another story. Wireless Hacks offers 100 industrial-strength tips about wireless networking, contributed by experts who apply what they know in the real world every day. Each Hack can be read in just a few minutes, but can save you hours of research. Inside, you will find a wealth of useful techniques for making the most out of wireless technology, including: Making sense of the alphabet soup of the 802.11 standards, and understanding which technology makes sense for your solving particular problem Using Bluetooth, mobile radios, mobile data networks, and other exotic methods to keep you connected, no matter where you are Practical methods for detecting, analyzing, and monitoring wireless networks Extending the range of your network, and making the best possible use of the available radio spectrum Designing and building your own antennas Engineering long distance network links that span several miles Understanding the security issues of wireless networking, and protecting yourself and your users from unauthorized access and eavesdropping Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done.
    Anmerkung: "100 industrial-strength tips & tools"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 47
    Online-Ressource
    Online-Ressource
    Beijing : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 693 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Microsoft .NET ; Electronic books ; local
    Kurzfassung: With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.The book works as both a comprehensive tutorial and reference to security issues for .NET application development, and contains numerous practical examples in both the C# and VB.NET languages. With Programming .NET Security , you will learn to apply sound security principles to your application designs, and to understand the concepts of identity, authentication and authorization and how they apply to .NET security. This guide also teaches you to: use the .NET run-time security features and .NET security namespaces and types to implement best-practices in your applications, including evidence, permissions, code identity and security policy, and role based and Code Access Security (CAS) use the .NET cryptographic APIs , from hashing and common encryption algorithms to digital signatures and cryptographic keys, to protect your data. use COM+ component services in a secure manner If you program with ASP.NET will also learn how to apply security to your applications. And the book also shows you how to use the Windows Event Log Service to audit Windows security violations that may be a threat to your solution.Authors Adam Freeman and Allen Jones, early .NET adopters and long-time proponents of an "end-to-end" security model, based this book on their years of experience in applying security policies and developing products for NASDAQ, Sun Microsystems, Netscape, Microsoft, and others. With the .NET platform placing security at center stage, the better informed you are, the more secure your project will be.
    Anmerkung: "Writing secure applications using C# or Visual Basic .NET"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 48
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 400 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 006.74
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: This second edition of the bestselling Learning XML provides web developers with a concise but grounded understanding of XML (the Extensible Markup Language) and its potential-- not just a whirlwind tour of XML.The author explains the important and relevant XML technologies and their capabilities clearly and succinctly with plenty of real-life projects and useful examples. He outlines the elements of markup--demystifying concepts such as attributes, entities, and namespaces--and provides enough depth and examples to get started. Learning XML is a reliable source for anyone who needs to know XML, but doesn't want to waste time wading through hundreds of web sites or 800 pages of bloated text.For writers producing XML documents, this book clarifies files and the process of creating them with the appropriate structure and format. Designers will learn what parts of XML are most helpful to their team and will get started on creating Document Type Definitions. For programmers, the book makes syntax and structures clear. Learning XML also discusses the stylesheets needed for viewing documents in the next generation of browsers, databases, and other devices. Learning XML illustrates the core XML concepts and language syntax, in addition to important related tools such as the CSS and XSL styling languages and the XLink and XPointer specifications for creating rich link structures. It includes information about three schema languages for validation: W3C Schema, Schematron, and RELAX-NG, which are gaining widespread support from people who need to validate documents but aren't satisfied with DTDs. Also new in this edition is a chapter on XSL-FO, a powerful formatting language for XML. If you need to wade through the acronym soup of XML and start to really use this powerful tool, Learning XML , will give you the roadmap you need.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 49
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvii, 577 p. , ill. ; , 24 cm. +
    DDC: 005.2/76
    Schlagwort(e): Microsoft Visual BASIC ; Internet programming ; Microsoft .NET Framework ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: "You are holding in your hands my favorite book on Web services and .NET. What else can I say? Buy this book now, and be prepared for a new way of coding!" -Keith Ballinger, Program Manager for XML Web Services, Microsoft "If you've been searching for a book that goes beyond the Web services hype, and distills the benefits of the actual platform, look no further, you've found the right one." -Aaron Skonnard, Instructor and Author, DevelopMentor Real World XML Web Services is the Visual Basic programmer's definitive guide to designing and building Web services. It provides developers with a comprehensive understanding of Web services, covering everything from basic concepts and solutions to interoperability problems. This book begins with a concise and practical introduction to Web services and the foundation on which they are built, including Web Services Description Language (WSDL) and Simple Object Access Protocol (SOAP). Readers learn, by example, how to use each tool for developing Web services, starting with the SOAP Toolkit and the .NET framework. Visual Basic programmers discover how to: Use XML Schema to define Web service messages Use SOAP for messaging and Remote Procedure Calls (RPC) Read and modify WSDL documents Build Web services with the SOAP Toolkit Create and invoke Web services using the .NET framework Implement SOAP headers and use SOAP Fault Develop interface-based Web services Handle data in .NET Web services, including objects, arrays, and DataSets Use SOAP extensions to build reusable infrastructure for security and compression Use Universal Description Discovery and Integration (UDDI) at design time and run time Understand the architecture of other popular toolkits, such as Apache SOAP for Java, and learn how to solve interoperability problems The book closes by walking the reader through the creation of a Web service with .NET and Visual Basic 6 clients. Real World XML Web Services empowers Visual Basic programmers to design and build the next generation of applications using Web services. 0201774259B08192002
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 50
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxix, 603 p. , ill. ;c 24 cm.
    DDC: 005.7/2
    Schlagwort(e): Metadata ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: The explosive growth of the World Wide Web is fueling the need for a new generation of technologies for managing information flow, data, and knowledge. This developer's overview and how-to book provides a complete introduction and application guide to the world of topic maps, a powerful new means of navigating the World Wide Web's vast sea of information. With contributed chapters written by today's leading topic map experts, XML Topic Maps is designed to be a "living document" for managing information across the Web's interconnected resources. The book begins with a broad introduction and a tutorial on topic maps and XTM technology. The focus then shifts to strategies for creating and deploying the technology. Throughout, the latest theoretical perspectives are offered, alongside discussions of the challenges developers will face as the Web continues to evolve. Looking forward, the book's concluding chapters provide a road map to the future of topic map technology and the Semantic Web in general. Specific subjects explored in detail include: Topic mapping and the XTM specification Using XML Topic Maps to build knowledge repositories Knowledge Representation, ontological engineering, and topic maps Transforming an XTM document into a Web page Creating enterprise Web sites with topic maps and XSLT Open source topic map software XTM, RDF, and topic maps Semantic networks and knowledge organization Using topic maps in education Topic maps, pedagogy, and future perspectives Featuring the latest perspectives from today's leading topic map experts, XML Topic Maps provides the tools, techniques, and resources necessary to plot the changing course of information management across the World Wide Web. 0201749602B08282002
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 51
    Sprache: Englisch
    Seiten: xxxvi, 641 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Schlagwort(e): Database management ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: "This is an excellent book that combines a practical and analytical look at the subject." -Leo Korman, Principal Software Engineer, KANA Software As organizations begin to employ XML within their information-management and exchange strategies, data management issues pertaining to storage, retrieval, querying, indexing, and manipulation increasingly arise. Moreover, new information-modeling challenges also appear. XML Data Management -with its contributions from experts at the forefront of the XML field-addresses these key issues and challenges, offering insights into the advantages and drawbacks of various XML solutions, best practices for modeling information with XML, and developing custom, in-house solutions. In this book, you will find discussions on the newest native XML databases, along with information on working with XML-enabled relational database systems. In addition, XML Data Management thoroughly examines benchmarks and analysis techniques for performance of XML databases. Topics covered include: The power of good grammar and style in modeling information to alleviate the need for redundant domain knowledge Tamino's XML storage, indexing, querying, and data access features The features and APIs of open source eXist Berkeley DB XML's ability to store XML documents natively IBM's DB2 Universal Database and its support for XML applications Xperanto's method of addressing information integration requirements Oracle's XMLType for managing document centric XML documents Microsoft SQL Server 2000's support for exporting and importing XML data A generic architecture for storing XML documents in a relational database X007, XMach-1, XMark, and other benchmarks for evaluating XML database performance Numerous case studies demonstrate real-world problems, industry-tested solutions, and creative applications of XML data management solutions. Written for both XML and relational database professionals, XML Data Management provides a promising new approach to data management, one that is sure to positively impact the way organizations manage and exchange information. 0201844524B01302003
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 52
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Cisco | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvii, 774 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Examinations ; Study guides ; Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. Lack of customer, partner, and employee access to e-commerce and data servers can impact both revenue and productivity. Even so, most networks do not have the proper degree of security. Network Security Principles and Practices provides an in-depth understanding of the policies, products, and expertise that brings organization to this extremely complex topic and boosts your confidence in the performance and integrity of your network systems and services. Written by a CCIE engineer who participated in the development of the CCIE Security exams, Network Security Principles and Practices is the first book that provides a comprehensive review of topics important to achieving CCIE Security certification. Network Security Principles and Practices is a comprehensive guide to network security threats and the policies and tools developed specifically to combat those threats. Taking a practical, applied approach to building security into networks, the book shows you how to build secure network architectures from the ground up. Security aspects of routing protocols, Layer 2 threats, and switch security features are all analyzed. A comprehe...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 53
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 385 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Mac OS ; Computer networks ; Security measures ; Computer security ; Macintosh (Computer) ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.
    Anmerkung: Includes bibliographical references (p. 361-369) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 54
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxiv, 1162 p. , ill. ; , 23 cm
    DDC: 005.7/2
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Steven Holzner's friendly, easy-to-read style has turned this book (formerly known as Inside XML ) into the leading reference on XML. Unlike other XML books, this one is packed with hundreds of real-world examples, fully tested and ready to use! Holzner teaches you XML like no other author can, covering every major XML topic today and detailing the ways XML is used now--connecting XML to databases (both locally and on web servers), stying XML for viewing in today's web browsers, reading and parsing XML documents in browsers, writing and using XML schemas, creating graphical XML browsers, working with the Simple Object Access Protocol (SOAP), and a great deal more. Real World XML is designed to be the standard in XML coverage--more complete, and more accessible, than any other. "The author's approach is definitely bottom up, written in a highly personable tone. He makes efficient use of example code, which sets this book apart from many I have read in the past. His examples bring to life the code without overwhelming the reader, and he does not present any examples for which the reader has not been prepared. In addition, no prior knowledge of XML is assumed. As such, this is an excellent book for both beginners and intermediate level web designers and programmers. Experts, too, will find this book of value, due to its emphasis on real world applicability. Overall, this book will benefit all web developers and programmers, with a special emphasis on beginner and intermediate developers."--Donna A. Dulo, MS, MA, Senior Systems Engineer, U.S. Department of Defense "This book will provide a brilliant basis for anyone wishing to keep up to speed with the new XML developments."--Mr. Andrew Madden, Department of Computer Science, University of Wales "I found this book's strengths to be: its exhaustive specification reference for the conscientious developer; access to the official specs, which is key; the wide variety of choices provided for all aspects of XML; several alternatives provided for each editor, browser, parser, stylesheet transform engine, and programming language; and working examples that show the power of the tools used."--Jaime Ryan, Software Developer/Documentation Manager, Blue Titan Software
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 55
    Online-Ressource
    Online-Ressource
    Beijing ; Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 311 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Linux ; Computer networks ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are: Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more Monitoring your network with tcpdump, dsniff, netstat, and other tools Protecting network connections with Secure Shell (SSH) and stunnel Safeguarding email sessions with Secure Sockets Layer (SSL) Encrypting files and email messages with GnuPG Probing your own security with password crackers, nmap, and handy scripts This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.
    Anmerkung: "Security tools & techniques"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 56
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 176 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; IEEE 802.11 (Standard) ; Wireless communication systems ; Security measures ; Electronic books ; local
    Kurzfassung: Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your own secure wireless network. 802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent Privacy component of 802.11. You'll learn how to configure a wireless client and to set up a WAP using either Linux or Free BSD. You'll also find thorough information on controlling network access and encrypting client traffic. Beginning with an introduction to 802.11b in general, the book gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. Next, the book details the technical setup instructions needed for both the Linux and FreeBSD operating systems. Some of the topics covered include: Station Security for Linux, FreeBSD, Open BSD, Mac OS X and Windows Setting Up Access Point Security Gateway Security, including building Gateways, firewall Rules, Auditing, etc. Authentication and Encryption FreeBSD IPsec client and gateway configuration Linux IPsec client and gateway configuration 802.1x authentication 802.11 Security is a book whose time has come. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b-based systems, you'll want this book beside you every step of the way.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 57
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxvi, 322 p. , ill. ; , 25 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Standards ; Electronic information resources ; Access control ; Electronic books ; local
    Kurzfassung: TCPA: Building computing platforms upon a solid foundation of trust. As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms , leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future. What trusted computing platforms are, how they work, and what problems they will solve Transforming standard platforms into trusted platforms cost-effectively Scenarios for managers: TCPA applications in the security-focused business Protected storage: how TCPA can ensure the confidentiality of stored data Software integrity: ensuring that a system's software environment hasn't been tampered with Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead Trusted platforms in practice: TCPA for developers and technical professionals How trusted platforms can be used to protect user privacy The TCPA initiative: its history, status, and next steps forward Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology-and with this book, you will.
    Anmerkung: Includes bibliographical references (p. 305-308) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 58
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 198 p. , ill. ; , 24 cm
    DDC: 005.4/465
    Schlagwort(e): Solaris (Computer file) ; UNIX Shells ; Computer networks ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: The best practices guide to building, scaling and deploying Open SSH for legacy Solaris (2.6, 7, and 8) and Solaris 9 OE systems. Covers the new Solaris Secure Shell for all versions of Solaris. Shows how to secure remote logins, integrate Secure Shell into existing scripts and avoid common problems. Written by Jason Reid, a member of the Solaris System Test group at Sun Microsystems, Inc.
    Anmerkung: "Sun Microsystems Press, A Prentice Hall Title". - Includes bibliographical references (p. 185-190) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 59
    Online-Ressource
    Online-Ressource
    Boston : Addison Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.7/2
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Praise for Effective XML "This is an excellent collection of XML best practices: essential reading for any developer using XML. This book will help you avoid common pitfalls and ensure your XML applications remain practical and interoperable for as long as possible." - Edd Dumbill , Managing Editor, XML.com and Program Chair, XML Europe "A collection of useful advice about XML and related technologies. Well worth reading both before, during, and after XML application development." - Sean McGrath , CTO, Propylon "A book on many best practices for XML that we have been eagerly waiting for." - Akmal B. Chaudhri , Editor, IBM developerWorks "The fifty easy-to-read items cover many aspects of XML, ranging from how to use markup effectively to what schema language is best for what task. Sometimes controversial, but always relevant, Elliotte Rusty Harold's book provides best practices for working with XML that every user and implementer of XML should be aware of." - Michael Rys , Ph.D., Program Manager, SQL Server XML Technologies, Microsoft Corporation " Effective XML is an excellent book with perfect timing. Finally, an XML book everyone needs to read! Effective XML is a fount of XML best practices and solid advice. Whether you read Effective XML cover to cover or randomly one section at a time, its clear writing and insightful recommendations enlighten, entertain, educate, and ultimately improve the effectiveness of even the most expert XML developer. I'll tell you what I tell all my coworkers and customers: You need this book." - Michael Brundage , Technical Lead, XML Query Processing, Microsoft WebData XML Team "This book provides great insight for all developers who write XML software, regardless of whether the software is a trivial application-specific XML processor or a fullblown W3C XML Schema Language validator. Mr. Harold covers everything from a very important high-level terminology discussion to details about parsed XML nodes. The well-researched comparisons of currently available XML-related software products, as well as the key criteria for selecting between XML technologies, exemplify the thoroughness of this book." - Cliff Binstock , Author, The XML Schema Complete Reference If you want to become a more effective XML developer, you need this book. You will learn which tools to use when in order to write legible, extensible, maintainable and robust XML code. Page 36: How do you write DTDs that are independent of namespace prefixes? Pa...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 60
    Online-Ressource
    Online-Ressource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 696 p. , ill. ; , 23 cm
    DDC: 005.7/2
    Schlagwort(e): Microsoft .NET ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Get the expert advice you need to succeed in building .NET-connected applications with XML! XML is everywhere in the Microsoft .NET Framework, from Remoting to Web services, and from data access to configuration. Learn about the extensive XML core classes in .NET and find out how to program against its parser in this in-depth guide-written by an expert programming author and consultant on cutting-edge technologies such as Microsoft ASP.NET and Microsoft ADO.NET. You'll find authoritative explanations of technologies such as schemas, transformations, and XPath, plus extensive discussion of data access issues such as synchronization and serialization, the DiffGram format, and the XML extensions in Microsoft SQL Server™ 2000. Along the way, you'll learn exactly how to get the best performance out of XML in the .NET world. You'll also get answers to common questions such as, "When should I use XML Web services instead of Remoting?".
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 61
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. ; : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxi, 404 p. , ill. ; , 24 cm
    DDC: 025.04
    Schlagwort(e): Business enterprises ; Directories ; Web sites ; Directories ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Explains business registry paradigm, competitive landscape, and UDDI registry technology Demonstrates how to incorporate UDDI in the Web services lifecycle Describes business modeling techniques, tModels, publishing and inquiry interactions and advanced architectures using UDDI Contains extensive examples and sample codeÑincluding both Java and .NET and detailed case studies in B2E, B2B, and B2C application areas A comprehensive guide to UDDI including business modeling, service publishing, inquiry, and beyond. Now there is an essential guide to using this breakthrough standard in real-world Web services development, deployment, and integration. UDDI: Building Registry-based Web Services Solutions contains examples in both Java and .NET paradigms. Experts Naresh Apte and Toral Mehta start with the fundamentals of business registries and Web services ecosystems. Next, using realistic case studies and sample code, they illuminate every facet of UDDI-based Web services lifecycle. Coverage includesÑ UDDI-based business registries: value proposition and key challenges How UDDI fits into the Web services paradigm Business modeling for registries: tModels, service providers/consumers, service bindings, and more Publishing and discovering business entities, service interactions, and services-including discussion on UDDI data structures UDDI-related API specificationsÑincluding language-specific APIs such as UDDI4J, , and UDDI .NET SDK Best practices for registry-based solution development Comparative survey of competitive initiatives and technologies such as ebXML, CORBA, J2EE, and .NET Building sophisticated solutions that draw on UDDIÕs most advanced features Enhancements in Version 3.0 specification
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 62
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxi, 492 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Web sites ; Security measures ; Electronic books ; local
    Kurzfassung: "Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems and shopping carts, and critical vulnerabilities associated with URLs. This book is a virtual battle plan that will help you identify and eliminate threats that could take your Web site off line..." --From the Foreword by William C. Boni, Chief Information Security Officer, Motorola "Just because you have a firewall and IDS sensor does not mean you aresecure; this book shows you why." --Lance Spitzner, Founder, The Honeynet Project Whether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. Organizations using Web-based business applications are increasingly at risk. Web Hacking: Attacks and Defense is a powerful guide to the latest information on Web attacks and defense. Security experts Stuart McClure (lead author of Hacking Exposed ), Saumil Shah, and Shreeraj Shah present a broad range of Web attacks and defense. Features include: Overview of the Web and what hackers go after Complete Web application security methodologies Detailed analysis of hack techniques Countermeasures What to do at development time to eliminate vulnerabilities New case studies and eye-opening attack scenarios Advanced Web hacking concepts, methodologies, and tools "How Do They Do It?" sections show how and why different attacks succeed, including: Cyber graffiti and Web site defacements e-Shoplifting Database access and Web applications Java™ application servers; how to harden your Java™ Web Server Impersonation and session hijacking Buffer overflows, the most wicked of attacks Automated attack tools and worms Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. Web Hacking informs from the trenches. Experts show you how to connect the dots--how to put the stages of a Web hack together so you can best defend against them. Written for maximum brain absorption with unparalleled technical content and battle-tested analysis, Web Hacking will help you combat potentially costly security threats and attacks. 0201761769B07192002
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 63
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxvii, 1071 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Schlagwort(e): Java (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Praise for Elliotte Rusty Harold's Processing XML with Java ™ "The sophistication and language are very appropriate for Java and XML application developers. You can tell by the way the author writes that he too is a developer. He delves very deeply into the topics and has really taken things apart and investigated how they work. I especially like his coverage of 'gotchas,' pitfalls, and limitations of the technologies." - John Wegis , Web Engineer, Sun Microsystems, Inc. "Elliotte has written an excellent book on XML that covers a lot of ground and introduces current and emerging technologies. He helps the novice programmer understand the concepts and principles of XML and related technologies, while covering the material at a level that's deep enough for the advanced developer. With a broad coverage of XML technologies, lots of little hints, and information I haven't seen in any other book on the topic, this work has become a valuable addition to my technical library." - Robert W. Husted , Member, Technical Staff, Requisite Technology, Inc. "The code examples are well structured and easy to follow. They provide real value for someone writing industrial-strength Java and XML applications. The time saved will repay the cost of this book a hundred times over. "The book also contains more of the pearls of wisdom we've come to expect from Elliotte Rusty Harold-the kind of pointers that will save developers weeks, if not months, of time." - Ron Weber , Independent Software Consultant Written for Java programmers who want to integrate XML into their systems, this practical, comprehensive guide and reference shows how to process XML documents with the Java programming language. It leads experienced Java developers beyond the basics of XML, allowing them to design sophisticated XML applications and parse complicated documents. Processing XML with Java™ provides a brief review of XML fundamentals, including XML syntax; DTDs, schemas, and validity; stylesheets; and the XML protocols XML-RPC, SOAP, and RSS. The core of the book comprises in-depth discussions on the key XML APIs Java programmers must use to create and manipulate XML files with Java. These include the Simple API for XML (SAX), the Document Object Model (DOM), and JDOM (a Java native API). In addition, the book covers many useful supplements to these core APIs, including XPath, XSLT, TrAX, and JAXP. Practical in focus, Processing XML with Java™ is filled with over two hundred examples that ...
    Anmerkung: Includes bibliographical references (p. 989-991) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 64
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 590 p. ; , 23 cm
    Schlagwort(e): Active server pages ; ActiveX ; C# (Computer program language) ; Microsoft .NET ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: This is the book every C# developer needs to read to understand how to create effective Internet applications using ASP.NET. As recognized experts in the field, Jeffrey P. McManus and Chris Kinsman explain how to build applications through effective use of ASP.NET, XML, and ADO.NET. In addition, this book will provide: Information about the Common Language Runtime and .NET Foundation Classes, which form the building blocks for application development in the .NET universe Practical C# code examples that illustrate operations used most often by application developers Thorough reference material to the objects available in the Foundation Class libraries 0672321556B11152002
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 65
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 654 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 006.7/4
    Schlagwort(e): XML (Document markup language) ; XSLT (Computer program language) ; Electronic books ; local
    Kurzfassung: Critical for converting XML documents, and extremely versatile, the XSLT language nevertheless has complexities that can be daunting. The XSLT Cookbook is a collection of hundreds of solutions to problems that Extensible Stylesheet Language Transformations (XSLT) developers regularly face. The recipes range from simple string-manipulation and mathematical processing to more complex topics like extending XSLT, testing and debugging XSLT stylesheets, and graphics creation with SVG. Recipes can be run directly or tweaked to fit your particular application's needs more precisely. Each recipe walks through a problem and a solution, with explanations of the choices made and techniques used in creating that solution, and many recipes include alternate solutions and explore issues like convenience and performance. Topics covered include: String manipulation Mathematical processing Date and time handling Interactions between calendar systems Selecting content in source documents Efficient tree-manipulation Conversions from XML to plain text Tweaking XML documents with stylesheets Using XSLT to query XML documents Generating HTML with XSLT Creating charts and graphs with SVG and XSLT Generating C and XSLT code using XSLT Processing Visio documents in XSLT Working with XML Topic Maps (XTM) Using XSLT to create SOAP documentation from WSDL Extending XSLT with additional functions Embedding XSLT in other processing Testing and debugging XSLT stylesheets Creating generic XSLT processors which work on many XML vocabularies The XSLT Cookbook provides an ideal companion both for developers still figuring out XSLT's template-based approach who want to learn by example, and for developers who know XSLT and want a collection of quickly reusable recipes. XSLT frequently offers a number of ways to perform a transformation, and the best solution may not always be the most straightforward. The recipes in this Cookbook demonstrate and explain XSLT's template-based logic, a frequent stumbling block for developers new to XSLT. Among the variety of XSLT books now available, none has the explicit solution-oriented approach of this Cookbook.
    Anmerkung: "Solutions and examples for XML and XSLT developers"--Cover. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 66
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 379 p. , ill. ; , 24 cm
    DDC: 005.72
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: If you need to create or use formal descriptions of XML vocabularies, the W3C's XML Schema offers a powerful set of tools for defining acceptable document structures and content. An alternative to DTDs as the way to describe and validate data in an XML environment, XML Schema enables developers to create precise descriptions with a richer set of datatypes?such as booleans, numbers, currencies, dates and times?that are essential for today?s applications.Schemas are powerful, but that power comes with substantial complexity. This concise book explains the ins and outs of XML Schema, including design choices, best practices, and limitations. Particularly valuable are discussions of how the type structures fit with existing database and object-oriented program contexts. With XML Schema, you can define acceptable content models and annotate those models with additional type information, making them more readily bound to programs and objects. Schemas combine the easy interchange of text-based XML with the more stringent requirements of data exchange, and make it easier to validate documents based on namespaces.You?ll find plenty of examples in this book that demonstrate the details necessary for precise vocabulary definitions. Topics include: Foundations of XML Schema syntax Flat, "russian-doll", and other schema approaches Working with simple and complex types in a variety of contexts The built-in datatypes provided by XML Schema Using facets to extend datatypes, including regular expression-based patterns Using keys and uniqueness rules to limit how and where information may appear Creating extensible schemas and managing extensibility Documenting schemas and extending XML Schema capabilities through annotations In addition to the explanatory content, XML Schema provides a complete reference to all parts of both the XML Schema Structures and XML Schema Datatypes specifications, as well as a glossary. Appendices explore the relationships between XML Schema and other tools for describing document structures, including DTDs, RELAX NG, and Schematron, as well as work in progress at the W3C to more tightly integrate XML Schema with existing specifications.No matter how you intend to use XML Schema - for data structures or document structures, for standalone documents or part of SOAP transactions, for documentation, validation, or data binding ? all the foundations you need are outlined in XML Schema .
    Anmerkung: "The W3C's object-oriented descriptions for XML"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 67
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xii, 202 p. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.72
    Schlagwort(e): Perl (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: XML is a text-based markup language that has taken the programming world by storm. More powerful than HTML yet less demanding than SGML, XML has proven itself to be flexible and resilient. XML is the perfect tool for formatting documents with even the smallest bit of complexity, from Web pages to legal contracts to books. However, XML has also proven itself to be indispensable for organizing and conveying other sorts of data as well, thus its central role in web services like SOAP and XML-RPC.As the Perl programming language was tailor-made for manipulating text, few people have disputed the fact that Perl and XML are perfectly suited for one another. The only question has been what's the best way to do it. That's where this book comes in. Perl & XML is aimed at Perl programmers who need to work with XML documents and data. The book covers all the major modules for XML processing in Perl, including XML::Simple, XML::Parser, XML::LibXML, XML::XPath, XML::Writer, XML::Pyx, XML::Parser::PerlSAX, XML::SAX, XML::SimpleObject, XML::TreeBuilder, XML::Grove, XML::DOM, XML::RSS, XML::Generator::DBI, and SOAP::Lite. But this book is more than just a listing of modules; it gives a complete, comprehensive tour of the landscape of Perl and XML, making sense of the myriad of modules, terminology, and techniques.This book covers: parsing XML documents and writing them out again working with event streams and SAX tree processing and the Document Object Model advanced tree processing with XPath and XSLT Most valuably, the last two chapters of Perl & XML give complete examples of XML applications, pulling together all the tools at your disposal. All together, Perl & XML is the single book that gives you a solid grounding in XML processing with Perl.
    Anmerkung: "XML processing with Perl"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 68
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 455 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Jabber (Computer network protocol) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Jabber is a set of protocols expressed in XML, and an extensible framework that allows people and applications to exchange all sorts of information, from simple text messages to being used to extend the backbone of an enterprise data system. Jabber gives you the power to build applications that have identity, presence, and that can take part in conversations . Programming Jabber offers developers a chance to learn and understand the Jabber technology and protocol from an implementer's point of view. Detailed information of each part of the Jabber protocol is introduced, explained, and discussed in the form of mini-projects, or simple and extended examples. Programming Jabber provides this foundation by: Showing you how to install and configure the Jabber server Providing a detailed overview of the server architecture and configuration options Covering the core Jabber technologies such as XML streams and Jabber identifiers Referencing all of Jabber's XML namespaces Examining the client registration and authentication phases Showing how to deploy your own Jabber-based messaging solutions Demonstrating how to embed XML-RPC-style call mechanisms into Jabber Programming Jabber is divided into two parts. The first part serves as an introduction to Jabber; you'll learn about its features, why it's more than an IM system, and how to install and configure a Jabber server of your own. The second part provides detailed information about the Jabber protocol, and a series of practical examples, which can be used to solve everyday problems. The examples, in Perl, Python, and Java, use various Jabber features as a way of illustrating parts of the protocol. Programming Jabber provides the foundation and framework for developers to hit the ground running, and is the essential book on Jabber.
    Anmerkung: "Extending XML messaging"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 69
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 360 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.7/2
    Schlagwort(e): Python (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: If you are a Python programmer who wants to incorporate XML into your skill set, this is the book for you. Python has attracted a wide variety of developers, who use it either as glue to connect critical programming tasks together, or as a complete cross-platform application development language. Yet, because it is object-oriented and has powerful text manipulation abilities, Python is an ideal language for manipulating XML. Python & XML gives you a solid foundation for using these two languages together. Loaded with practical examples, this new volume highlights common application tasks, so that you can learn by doing. The book starts with the basics then quickly progresses to complex topics, like transforming XML with XSLT, querying XML with XPath, and working with XML dialects and validation. It also explores the more advanced issues: using Python with SOAP and distributed web services, and using Python to create scalable streams between distributed applications (like databases and web servers).The book provides effective practical applications, while referencing many of the tools involved in XML processing and Python, and highlights cross-platform issues along with tasks relevant to enterprise computing. You will find ample coverage of XML flow analysis and details on ways in which you can transport XML through your network.Whether you are using Python as an application language, or as an administrative or middleware scripting language, you are sure to benefit from this book. If you want to use Python to manipulate XML, this is your guide.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 70
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 391 p. , ill. ; , 23 cm. +
    DDC: 0056.2/76
    Schlagwort(e): Cross-platform software development ; Internet programming ; Object-oriented programming (Computer science) ; Simple Object Access Protocol (Computer network protocol) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Leverage the power of SOAP on any platform, with any leading programming language! Integrate your enterprise applications across the Web! The platform-independent guide to SOAP SOAP programming with C++, Perl, C#, Visual Basic, and Java Build an industrial-strength SOAP system from scratch CD-ROM: SOAP for Windows, Linux and Unix, plus extensive source code library! Technical Reviewers: Yves LaFon, Chair of the SOAP W3C Committee John Montgomery, Lead SOAP Developer, Microsoft Kent Sharkey, .NET Frameworks Technical Evangelist, Microsoft SOAP is the universal "glue" that can integrate virtually any distributed system, helping enterprises streamline processes and communications across the Internet as never before. SOAP: Cross Platform Web Services Development Using XML is the practical, hands-on introduction to using SOAP on Windows, Linux, and UNIX platforms, using any of five leading programming languages. Discover how SOAP leverages key Internet standards such as XML and HTTP to solve distributed computing problems that DCOM and CORBA can't! Coverage includes: All the XML you need to get started with SOAP SOAP's basic syntax: HTTP headers, SOAP payloads, error handling, data types, encoding structures, and more Extending SOAP to support heterogeneous and legacy environments SOAP programming with C++, C#, Perl, Visual Basic, and Java Comparing today's leading SOAP servers The last six chapters of this book present a start-to-finish SOAP case study application-from requirements and design through coding. Whether you're constructing Internet applications, integrating existing applications within or between enterprises, or simply evaluating SOAP, this book contains the insights-and practical examples-you're looking for. CD-ROM INCLUDED The accompanying CD-ROM contains complete SOAP implementations for Windows, Linux, and UNIX, plus all source code from the book.
    Anmerkung: CD-ROM includes: SOAP implementations for Microsoft Windows, Linux, & UNIX, plus all of the source code from the book. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 71
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Que | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 699 p. , ill. ; , 23 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical information. The book offers clear discussion of privacy issues as they affect everyday users of digital devices, covering all current and near-future devices and technologies that pose privacy risks to users.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 72
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: x, 196 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Schlagwort(e): Internet programming ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Referring to specific information inside an XML document is a little like finding a needle in a haystack: how do you differentiate the information you need from everything else? XPath and XPointer are two closely related languages that play a key role in XML processing by allowing developers to find these needles and manipulate embedded information. XPath describes a route for finding specific items by defining a path through the hierarchy of an XML document, abstracting only the information that's relevant for identifying the data. XPointer extends XPath to identify more complex parts of documents. The two technologies are critical for developers seeking needles in haystacks in various types of processing. XPath and XPointer fills an essential need for XML developers by focusing directly on a critical topic that has been covered only briefly. Written by John Simpson, an author with considerable XML experience, the book offers practical knowledge of the two languages that underpin XML, XSLT and XLink. XPath and XPointer cuts through basic theory and provides real-world examples that you can use right away.Written for XML and XSLT developers and anyone else who needs to address information in XML documents, the book assumes a working knowledge of XML and XSLT. It begins with an introduction to XPath basics. You'll learn about location steps and paths, XPath functions and numeric operators. Once you've covered XPath in depth, you'll move on to XPointer--its background, syntax, and forms of addressing. By the time you've finished the book, you'll know how to construct a full XPointer (one that uses an XPath location path to address document content) and completely understand both the XPath and XPointer features it uses. XPath and XPointer contains material on the forthcoming XPath 2.0 spec and EXSLT extensions, as well as versions 1.0 of both XPath and XPointer. A succinct but thorough hands-on guide, no other book on the market provides comprehensive information on these two key XML technologies in one place.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 73
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 367 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): OpenSSL ; Computer network protocols ; Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols. Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included.OpenSSL may well answer your need to protect sensitive data. If that?s the case, Network Security with OpenSSL is the only guide available on the subject.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 74
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 173 p. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Routers (Computer networks) ; Electronic books ; local
    Kurzfassung: As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics: The importance of router security and where routers fit into an overall security plan Different router configurations for various versions of Cisco?s IOS Standard ways to access a Cisco router and the security implications of each Password and privilege levels in Cisco routers Authentication, Authorization, and Accounting (AAA) control Router warning banner use (as recommended by the FBI) Unnecessary protocols and services commonly run on Cisco routers SNMP security Anti-spoofing Protocol security for RIP, OSPF, EIGRP, NTP, and BGP Logging violations Incident response Physical security Written by Thomas Akin, an experienced Certified Information Systems Security Professional (CISSP) and Certified Cisco Academic Instructor (CCAI), the book is well organized, emphasizing practicality and a hands-on approach. At the end of each chapter, Akin includes a Checklist that summarizes the hardening techniques discussed in the chapter. The Checklists help you double-check the configurations you have been instructed to make, and serve as quick references for future security procedures.Concise and to the point, Hardening Cisco Routers supplies you with all the tools necessary to turn a potential vulnerability into a strength. In an area that is otherwise poorly documented, this is the one book that will help you make your Cisco routers rock solid.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 75
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 358 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.7/2
    Schlagwort(e): PHP (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: XML and PHP is designed to introduce PHP developers to the synergies that become visible when their favorite web-scripting language is combined with one of the most talked about technologies of recent times, XML. XML and PHP teaches PHP developers how to use PHP's XML functions to develop and maintain XML-based web applications and sites, and it demonstrates the power inherent in the XML/PHP combination. This book provides information on all hte major XML technologies supported in PHP, demonstrating how the XML/PHP combination can be used to deliver cutting-edge web applications through practical examples and real-world case studies. XML and PHP serves as both an implementation guide to the topic and a handy desktop reference for quick lookups-combining all the information that developers need into a single, focused package.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 76
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 247 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Strategic XML analyses the IT systems of a typical large corporation and gives specific, fully-functional examples that show how XML can solve problems today while positoning your company for the demands of tomorrow. Strategic XML addresses: XML Web content publishing, a simple workflow system, an offline order processing system, SOAP client and server examples, legacy system integration (using COBOL), and a unified Web and print documentation system based on XML and XSL.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 77
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 490 p. , ill. ; , 23 cm
    Ausgabe: 3rd ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Kurzfassung: The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 78
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 377 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.7/2
    Schlagwort(e): Perl (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: If you are a Perl programmer looking to explore Perl's XML capabilities or an XML developer with a basic understanding of Perl, this book will provide you with all the tools required for XML processing with Perl. XML and Perl teaches you to create portable, powerful, and extensible applications when you use XML and Perl together. You'll also learn to customize your XML processing facilities to accomplish unique tasks. Authors Mark Riehl and Ilya Sterin, who have written Perl XML modules and administer the official Perl XML web site (www.perlxml.net), have filled this book with practical code samples and exercises that will help you test drive your new knowledge. With this book, you'll quickly see the advantages of using XML and Perl together, and you'll be able to perform even complicated tasks more easily with powerful Perl XML modules.
    Anmerkung: Includes bibliographical references (p. [351]-352) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 79
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 483 p. , ill. ; , 24 cm. +
    Ausgabe: 1st ed.
    Schlagwort(e): Enhydra XMLC ; Compilers (Computer programs) ; Java (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Enhydra XMLC Java Presentation Development is written for computer professionals, with a special focus on application architects, Java Web application developers, and those who are just ramping up on Java and are excited about immersing themselves into Web application development. Taking a task view wherever possible, this book is written to support those seeking a more elegant, maintainable, and flexible mechanism for building Web application presentations. While we spend some time introducing the Enhydra application server for those who are new to the topic of application server development, this book is focused primarily on the topic of Enhydra XMLC and how to use it to improve the lifecycle requirements of your Web application.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 80
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 263 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.72
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: No matter how flexible and convenient digital information has become, we haven't done away with the need to see information in print. Extensible Style Language-Formatting Objects, or XSL-FO, is a set of tools developers and web designers use to describe page printouts of their XML (including XHTML) documents. If you need to produce high quality printed material from your XML documents, then XSL-FO provides the bridge. XSL-FO is one of the few books to go beyond a basic introduction to the technology. While many books touch on XSL-FO in their treatment of XSLT, this book offers in-depth coverage of XSL-FO's features and strengths. Author Dave Pawson is well known in the XSLT and XSL-FO communities, and maintains the XSLT FAQ. An online version of this book has helped many developers master this technology. XSL-FO is the first time this reference is available in print.The first part of the book provides an overview of the technology and introduces the XSL-FO vocabulary. The author discusses how to choose among today's implementations, explains how to describe pages, and shows you what is going on in the processor in terms of layout. You'll learn about the basics of formatting and layout as well as readability.The second part focuses on smaller pieces: blocks, inline structures, graphics, color and character level formatting, concluding by showing how to integrate these parts into a coherent whole. XSL-FO also explores organizational aspects you'll need to consider?how to design your stylesheets strategically rather than letting them evolve on their own. XSL-FO is more than just a guide to the technology; the book teaches you how to think about the formatting of your documents and guides you through the questions you'll need to ask to ensure that your printed documents meet the same high standards as your computer-generated content. Written for experienced XML developers and web designers, no other book contains as much useful information on this practical technology.
    Anmerkung: "Making XML look good in print"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 81
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 200 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Application program interfaces (Computer software) ; Java (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: More Java developers today want to work with XML, the technology that enables data to be transported intact over the Internet, but they don't have time to become XML experts. If this describes you, then you'll appreciate data binding, the new way of converting XML documents into Java objects, so those documents can be worked on and manipulated like any other Java object, then converted back to XML This new title provides an in-depth technical look at XML Data Binding. The book offers complete documentation of all features in both the Sun Microsystems JAXB API and popular open source alternative implementations (Enhydra Zeus, Exolabs Castor and Quick). It also gets into significant detail about when data binding is appropriate to use, and provides numerous practical examples of using data binding in applications. As Author Brett McLaughlin says "Too many books are written about technologies by people who barely understand them. I've already written two data binding implementations (Zeus, and a previous one for IBM DeveloperWorks.) I've actually used data binding for longer than the official specification has been in existence, and I've really been able to dig into what it takes to code an effective data biding implementation, as well as use one correctly. This book is part user guide, part under-the-hood manual, and part use-case. It's a powerful combination, and one I think people need."
    Anmerkung: "Converting XML documents into Java objects"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 82
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: ix, 228 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.7/2
    Schlagwort(e): Application software ; Development ; User interfaces (Computer systems) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: This concise book gives you the information you need to effectively use the Simple API for XML (SAX2), the dominant API for efficient XML processing with Java. With the SAX2 API, developers have access to the information in XML documents as they are read, without imposing major memory constraints or a large code footprint. SAX2 is often used by other APIs "under the covers", and provides a foundation for processing and creating both XML and non-XML information. While generally considered the most efficient approach to handling XML document parsing, SAX2 also carries a significant learning curve. In SAX2 , author David Brownell explores the many details of managing XML parsers, filtering the information those parsers return, generating your own SAX2 events to convert non-XML information to an XML form, and developing strategies for using event-based parsing in a variety of application scenarios. Created in a public process by the XML-Dev mailing list, the SAX2 API is compact and highly functional. SAX2 uses callbacks to report the information in an XML document as the document is read, allowing you to create your own program structures around the content of documents. No intermediary model of an entire XML document is necessary, and the mapping from XML structures to Java structures and back is straightforward. Both developers learning about SAX2 for the first time and developers returning for reference and advanced material about SAX2 will find useful information in this book. Chapters provide detailed explanations and examples of many different aspects of SAX2 development, while appendices provide a reference to the API and an explanation of the relationships between the SAX2 API and the XML Information Set. While the core of the API is quite approachable, many of its more advanced features are both obscure and powerful. You can use SAX2 to filter, modify, and restructure information in layers of processing which make it easy to reuse generic tools. SAX2 also has some significant limitations that applications need to address in their own ways. This new book gives you the detail and examples required to use SAX2 to its full potential, taking advantage of its power while avoiding its limitations.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 83
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 430 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Linux ; Client/server computing ; Computer networks ; Security measures ; Web servers ; Electronic books ; local
    Kurzfassung: Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured--some of which rival expensive commercial equivalents--making Linux a particularly appropriate platform for providing secure Internet services. Building Secure Servers with Linux will help you master the principles of reliable system and network security by combining practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the larger Internet--and shows readers how to harden their hosts against attacks. Author Mick Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. The book does not cover firewalls, but covers the more common situation where an organization protects its hub using other systems as firewalls, often proprietary firewalls. The book includes: Precise directions for securing common services, including the Web, mail, DNS, and file transfer. Ancillary tasks, such as hardening Linux, using SSH and certificates for tunneling, and using iptables for firewalling. Basic installation of intrusion detection tools. Writing for Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Building Secure Servers with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages. An all-inclusive resource for Linux users who wish to harden their systems, the book covers general security as well as k...
    Anmerkung: "Tools & best practices for bastion hosts"--Cover. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 84
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 244 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.2/76
    Schlagwort(e): Internet programming ; Object-oriented programming (Computer science) ; Simple Object Access Protocol (Computer network protocol) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: The web services architecture provides a new way to think about and implement application-to-application integration and interoperability that makes the development platform irrelevant. Two applications, regardless of operating system, programming language, or any other technical implementation detail, communicate using XML messages over open Internet protocols such as HTTP or SMTP. The Simple Open Access Protocol (SOAP) is a specification that details how to encode that information and has become the messaging protocol of choice for Web services. Programming Web Services with SOAP is a detailed guide to using SOAP and other leading web services standards--WSDL (Web Service Description Language), and UDDI (Universal Description, Discovery, and Integration protocol). You'll learn the concepts of the web services architecture and get practical advice on building and deploying web services in the enterprise. This authoritative book decodes the standards, explaining the concepts and implementation in a clear, concise style. You'll also learn about the major toolkits for building and deploying web services. Examples in Java, Perl, C#, and Visual Basic illustrate the principles. Significant applications developed using Java and Perl on the Apache Tomcat web platform address real issues such as security, debugging, and interoperability. Covered topic areas include: The Web Services Architecture SOAP envelopes, headers, and encodings WSDL and UDDI Writing web services with Apache SOAP and Java Writing web services with Perl's SOAP::Lite Peer-to-peer (P2P) web services Enterprise issues such as authentication, security, and identity Up-and-coming standards projects for web services Programming Web Services with SOAP provides you with all the information on the standards, protocols, and toolkits you'll need to integrate information services with SOAP. You'll find a solid core of information that will help you develop individual Web services or discover new ways to integrate core business processes across an enterprise.
    Anmerkung: Includes index. - SOAP, Simple Object Access Protocol
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 85
    Online-Ressource
    Online-Ressource
    Boston ; : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 834 p. , ill. ; , 24 cm
    Ausgabe: 3rd ed.
    DDC: 005.72
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: This work covers all the features of XML, and sets them within an applied setting. In addition to the specifications of XML, readers will learn how to create powerful Web applications and see the actual workings of XML.
    Anmerkung: Includes index. - Previous ed.: 2000
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 86
    Online-Ressource
    Online-Ressource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 532 p. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Computer security ; Data encryption (Computer science) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Extensible Markup Language (XML) is the environment of choice for creating many of today's technologically sophisticated and security-sensitive Web applications. With Secure XML, developers now have the hands-on guide they need to combine a strong foundation in XML with proven, practical techniques for enabling the secure transmission of data across the Web. Broad-based and comprehensive, Secure XML fully documents every feature and issue involved with XML security. Opening with a complete introduction to XML, the book then provides detailed coverage of authentication, canonicalization, keying, encryption, algorithms, and more. Notes, background information, guidelines, and "soapbox," or heretical comments, expand on the book's practical focus throughout. In all, this book features the most comprehensive roadmap to digital security and XML encryption available. Topics covered in-depth include: XML basics-documents, namespaces, structures, DTDs and schemas, and stylesheets XPath, XPointer, and SOAP Digital cryptography basics--secret and public key ciphers, asymmetric keys, digital signatures, and certificates XML canonicalization, signatures, and authentication XML encryption Key management and combining encryption with signatures Cryptographic algorithms and noncryptographic algorithms Detailed and practical, this book provides reliable solutions for securing XML and for safeguarding information flow across today's sophisticated Web. 0201756056B06262002
    Anmerkung: Includes bibliographical references (p.495-506) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 87
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 558 p. , ill. ; , 24 cm. +
    DDC: 005.7/2
    Schlagwort(e): Internet programming ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Gain total control over your information with XSLT and XPath! Master XSLT and XPath-the "keys to the XML kingdom" Build custom XML output solutions that won't become obsolete Learn everything from basic XML-to-HTML conversions to leading edge techniques CD-ROM includes all examples from the book Mastering XSLT and XPath gives you unprecedented control over your information-and helps you leverage virtually every new XML technology, from XLink to schemas. Discover XSLT's powerful vocabulary of easy, programming-like features, and learn how to build custom solutions that resist obsolescence. By the end of the first chapter, you'll be performing XML-to-HTML conversions for display in any Web browser. Then build on your knowledge through a series of hands-on examples that transform you into an XSLT/XPath expert! XSLT as an XML document instance: leveraging your existing XML skills XSLT stylesheet concepts and constructs: fundamental through advanced level XPath patterns and functions XSLT subroutine functions and variables XSLT processing of multiple nodes: iterative and conditional XSLT elements Controlling output options XSLT extensions, and more Whether you're an experienced programmer or a novice markup specialist, here's your chance to master XML's most potent tools for organizing, updating, and delivering digital information-any data, anywhere, any time!
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 88
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders Pub. | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 384 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Compuer crimes ; Investigation ; Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: This book teaches readers what they need to know to not only set up an incident response effort, but also how to improve existing incident response efforts. The book provides a comprehensive approach to incident response, covering everything necessary to deal with all phases of incident response effectively ¿ spanning from pre-incident conditions and considerations to the end of an incident. Although technical considerations, (e.g. the particular binaries in Unix and Linux and dynamically linked libraries in Windows NT and Windows 2000) that need to be inspected in case they are corrupted, the types of logging data available in major operating systems and how to interpret it to obtain information about incidents, how network attacks can be detected on the basis of information contained in packets, and so on ¿ the major focus of this book is on managerial and procedural matters. Incident Response advances the notion that without effective management, incident response cannot succeed.
    Anmerkung: Includes bibliographical references (p. 342-353) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 89
    Online-Ressource
    Online-Ressource
    Boston ; : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 224 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Schlagwort(e): Application software ; Development ; SQL (Computer program language) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: "Dan's book provides something that the formal standards and development manuals sorely lack: a context that helps developers understand how to use XML in their own projects." --Tim Kientzle, Independent Software Consultant XML and SQL: Developing Web Applications is a guide for Web developers and database programmers interested in building robust XML applications backed by SQL databases. It makes it easier than ever for Web developers to create and manage scalable database applications optimized for the Internet. The author offers an understanding of the many advantages of both XML and SQL and provides practical information and techniques for utilizing the best of both systems. The book explores the stages of application development step by step, featuring a real-world perspective and many examples of when and how each technology is most effective. Specific topics covered include: Project definition for a data-oriented application Creating a bullet-proof data model DTDs (document type definitions) and the design of XML documents When to use XML, and what parts of your data should remain purely relational Related standards, such as XSLT and XML Schema How to use the XML support incorporated into Microsoft's SQL Server™ 2000 The XML-specific features of J2EE™ (Java™ 2 Enterprise Edition) Throughout this book, numerous concrete examples illustrate how to use each of these powerful technologies to circumvent the other's limitations. If you want to use the best part of XML and SQL to create robust, data-centric systems then there is no better resource than this book. 0201657961B10152001
    Anmerkung: Includes bibliographical references (p. 209-210) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 90
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 480 p. , ill. ; , 23 cm. +
    Ausgabe: 1st ed.
    Schlagwort(e): Cocoon (Electronic resource) ; Application software ; Development ; Internet programming ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Cocoon: Building XML Applications is the guide to the Apache Cocoon project. The book contains the much needed documentation on the Cocoon project, but it does not limit itself to just being a developer¿s handbook. The book motivates the use of XML and XML software (in particular open source software). It contains everything a beginner needs to get going with Cocoon as well as the detailed information a developer needs to develop new and exciting components to extend the XML publishing framework. Although each chapter builds upon the previous ones, the book is designed so that the chapters can also be read as individual guides to the topics they discuss. Varied "hands-on" examples are used to make the underlying concepts and technologies absolutely clear to anyone starting out with Cocoon. Chapters that detail the author¿s experience in building Internet applications are used to embed Cocoon into the "real world" and complete the picture. mdMatthew Langham and Carsten Ziegeler
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 91
    Online-Ressource
    Online-Ressource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 575 p. , ill. ; , 23 cm
    DDC: 005.7/2
    Schlagwort(e): JavaServer pages ; Application software ; Development ; Web sites ; Design ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: The first Internet revolution was all about delivering information to people. We are now in the second revolution, which focuses on delivering information to systems. XML is the tool that makes this new revolution a reality, and Web services are the methods by which businesses will drive system-to-system communication. JSP(TM) and XML takes you beyond the basics, giving you practical advice and in-depth coverage. In the book, you'll learn the technologies and techniques needed to create your own Web services for use in JSP applications. Written by programmers for programmers, the book will help you successfully utilize these exciting technologies with minimal hassle and maximum speed. In JSP™ and XML you will: Learn how to use XML, XSLT, and XPath in your JSP site Program SAX to speed up your XML document processing Understand DOM to learn the W3C standard method of working with XML Coordinate cross-browser client-side XML utilization Understand the Web services alphabet Learn how to leverage Web services to simplify access to your data Learn how SOAP, WSDL, and UDDI integrate into Web Services Use JDOM and dom4J to easily work with XML files Design a balanced JSP site using XML Expand your knowledge of JSP to add new functionality to your Web pages Learn how to practically apply Servlet filters and listeners to a Web site Build dynamic JSP pages that can self- modify, making sites easier to maintain Understand how the new JSP XML syntax works Review the basics of database access within JSP Learn JSP tag library design and how tag libraries simplify using XML and Web Services
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 92
    Online-Ressource
    Online-Ressource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    ISBN: 9780768664256 , 076866425X , 9781281084811 , 1281084816
    Sprache: Englisch
    Seiten: xv 842 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.7/2
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Special Edition Using XML, Second Edition gives developers a formal introduction to XML technology, starting with in-depth coverage of basic syntax and fundamental "pieces" of XML, including DTDs, Schemas, and Namespaces. The authors then cover various applications of XML, including transforming and displaying XML documents using CSS and XSL, locating data within XML documents using Xpath, Xlink and Xpointer, programming XML with SAX or DOM, including XML in Java or .NET applications, XML Scripting with Perl, XHTML and WML for presentation on traditional and hand-held Web browsers, and querying data or documents with Xquery. The final chapters cover technologies related to XML such as SVG, SMIL, and RDF, focusing on the practical features developers can put to use today.
    Anmerkung: Rev. ed. of: The complete idiot's guide to XML, c2000. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 93
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: x, 260 p. , ill. ; , 24 cm
    DDC: 005.8
    Schlagwort(e): Cisco IOS ; Computer networks ; Access control ; Computer networks ; Security measures ; Electronic books ; local
    Kurzfassung: Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet. Cisco IOS Access Lists covers three critical areas: Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking. Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, and Cisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers. The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet. Cisco IOS Access Lists differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 94
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : SAMS | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: ix, 415 p. , ill. ; , 24 cm
    Schlagwort(e): Internet programming ; Microsoft .NET ; Simple Object Access Protocol (Computer network protocol) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: This book takes the reader from the architecture of .NET to real-world techniques they can use in their own Internet applications. The reader is introduced to .NET and Web Services and explores (in detail) issues surrounding the fielding of successful Web Services. Practical guidelines as well as solutions are provided that the rader may use in their own projects. Some of the issues involve lack of specific guidance in the SOAP specification, while others transcend SOAP and involve issues Internet developers have grappled with since the inception of the World Wide Web. At this time, this book has no competition.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 95
    Online-Ressource
    Online-Ressource
    [Indianapolis, IN] : Que | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 1413 p. , ill. ; , 24 cm
    Schlagwort(e): Java (Computer program language) ; XHTML (Document markup language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Platinum Edition XHTML, XML and Java 2 is separated into several sections, each of which focuses on a specific technology, including XHTML, XML, JavaScript, Dynamic HTML, CGI programming with Perl, Server-side Programming with ASP, ColdFusion and PHP, and Java 2. Throughout the book, the authors focus on the features and benefits of each technology, giving readers a well-rounded education in current web development tools and techniques. In addition, the authors demonstrate the value of combining various technologies (such as Java and XML) for more powerful web solutions.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 96
    Online-Ressource
    Online-Ressource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 509 , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 005.7/2
    Schlagwort(e): Java (Computer program language) ; Web publishing ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: While the XML "buzz" still dominates talk among Internet developers, the critical need is for information that cuts through the hype and lets Java programmers put XML to work. Java & XML shows how to use the APIs, tools, and tricks of XML to build real-world applications, with the end result that both the data and the code are portable. This second edition of Java & XML adds chapters on Advanced SAX and Advanced DOM, new chapters on SOAP and data binding, and new examples throughout. A concise chapter on XML basics introduces concepts, and the rest of the book focuses on using XML from your Java applications. Java developers who need to work with XML, or think that they will in the future--as well as developers involved in the new peer-to-peer movement, messaging, or web services--will find the new Java & XML a constant companion. This book covers: The basics of XML, including DTDs, namespaces, XML Schema, XPath, and XSL The SAX API, including all handlers, the SAX 2 extensions, filters, and writers The DOM API, including DOM Level 2, Level 3, and the Traversal, Range, CSS, Events, and HTML modules. The JDOM API, including the core, a look at XPath support, and JDOM as a JSR Using web publishing frameworks like Apache Cocoon Developing applications with XML-RPC Using SOAP and UDDI for web services Data Binding, using both DTDs and XML Schema for constraints Building business-to-business applications with XML Building information channels with RSS and dynamic content with XSP Includes a quick reference on SAX 2.0, DOM Level 2, and JDOM.
    Anmerkung: Previous ed.: 2000. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 97
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 213 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.7/2
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Have you ever needed to share processing between two or more computers running programs written in different languages on different operating systems? Or have you ever wanted to publish information on the Web so that programs other than browsers could work with it? XML-RPC, a system for remote procedure calls built on XML and the ubiquitous HTTP protocol, is the solution you've been looking for. Programming Web Services with XML-RPC introduces the simple but powerful capabilities of XML-RPC, which lets you connect programs running on different computers with a minimum of fuss, by wrapping procedure calls in XML and establishing simple pathways for calling functions. With XML-RPC, Java programs can talk to Perl scripts, which can talk to Python programs, ASP applications, and so on. You can provide access to procedure calls without having to worry about the system on the other end, so it's easy to create services that are available on the Web.XML-RPC isn't the only solution for web services; the Simple Object Access Protocol (SOAP) is another much-hyped protocol for implementing web services. While XML-RPC provides fewer capabilities than SOAP, it also has far fewer interoperability problems and its capabilities and limitations are much better understood. XML-RPC is also stable, with over 30 implementations on a wide variety of platforms, so you can start doing real work with it immediately. Programming Web Services with XML-RPC covers the details of five XML-RPC implementations, so you can get started developing distributed applications in Java, Perl, Python, ASP, or PHP. The chapters on these implementations contain code examples that you can use as the basis for your own work. This book also provides in-depth coverage of the XML-RPC specification, which is helpful for low-level debugging of XML-RPC clients and servers. And if you want to build your own XML-RPC implementation for another environment, the detailed explanations in this book will serve as a foundation for that work.
    Anmerkung: "Creating Web application gateways"--At head of front cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 98
    Online-Ressource
    Online-Ressource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xii, 354 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: The arrival of support for XML--the Extensible Markup Language--in browsers and authoring tools has followed a long period of intense hype. Major databases, authoring tools (including Microsoft's Office 2000), and browsers are committed to XML support. Many content creators and programmers for the Web and other media are left wondering, "What can XML and its associated standards really do for me?" Getting the most from XML requires being able to tag and transform XML documents so they can be processed by web browsers, databases, mobile phones, printers, XML processors, voice response systems, and LDAP directories, just to name a few targets. In Learning XML, the author explains XML and its capabilities succinctly and professionally, with references to real-life projects and other cogent examples. Learning XML shows the purpose of XML markup itself, the CSS and XSL styling languages, and the XLink and XPointer specifications for creating rich link structures. The basic advantages of XML over HTML are that XML lets a web designer define tags that are meaningful for the particular documents or database output to be used, and that it enforces an unambiguous structure that supports error-checking. XML supports enhanced styling and linking standards (allowing, for instance, simultaneous linking to the same document in multiple languages) and a range of new applications. For writers producing XML documents, this book demystifies files and the process of creating them with the appropriate structure and format. Designers will learn what parts of XML are most helpful to their team and will get started on creating Document Type Definitions. For programmers, the book makes syntax and structures clear It also discusses the stylesheets needed for viewing documents in the next generation of browsers, databases, and other devices.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 99
    Online-Ressource
    Online-Ressource
    Cambridge, Mass. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 756 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed. expanded & updated.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; Web sites ; Security measures ; World Wide Web ; Security measures ; Electronic books ; local
    Kurzfassung: Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Explorer and Netscape Navigator, and a wide range of current programs and products. In vast detail, the book covers: Web technology--The technological underpinnings of the modern Internet and the cryptographic foundations of e-commerce are discussed, along with SSL (the Secure Sockets Layer), the significance of the PKI (Public Key Infrastructure), and digital identification, including passwords, digital signatures, and biometrics. Web privacy and security for users--Learn the real risks to user privacy, including cookies, log files, identity theft, spam, web logs, and web bugs, and the most common risk, users' own willingness to provide e-commerce sites with personal information. Hostile mobile code in plug-ins, ActiveX controls, Java applets, and JavaScript, Flash, and Shockwave programs are also covered. Web server security--Administrators and service providers discover how to secure their systems and web services. Topics include CGI, PHP, SSL certificates, law enforcement issues, and more. Web content security--Zero in on web publishing issues for content providers, including intellectual property, copyright and trademark issues, P3P and privacy policies, digital payments, client-side digital signatures, code signing, pornography filtering and PICS, and other controls on web content. Nearly double the size of the first edition, this completely updated volume is destined to be the definitive reference on Web security risks and the techniques and technologies you can use to protect your privacy, your organization, your system, and your network.
    Anmerkung: Rev. ed. of: Web security & commerce. 1997. - Includes bibliographical references (p. 716-734) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 100
    Online-Ressource
    Online-Ressource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xix, 504 p. , ill. ; , 24 cm. +
    DDC: 005.7/2
    Schlagwort(e): Application software ; Enterprise application integration (Computer systems) ; Java (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: High-value solutions for integrating enterprise and legacy systems XML, Enterprise JavaAPIs, and much more Techniques for building flexible, extensible EIA solutions Easy-to-read, fully-documented code throughout CD-ROM includes leading-edge software and code library for XML/Java integration! "XML is the amazing new web standard for universal data interchange. With this book and XML you can integrate your applications without converting the code!" -Charles F. Goldfarb Integrate your enterprise with XML and Java! Enterprise Application Integration (EAI) links diverse applications, platforms, and operating systems so they work as one-and deliver powerful business results seamlessly. Platform-independent Java is one powerful tool for building EAI applications, and XML adds the missing link: robust mechanisms to exchange data with non-Java applications. Now there's a complete, step-by-step guide to using Java and XML together to deliver enterprise integration solutions that work! Enterprise Application Integration With XML and Java covers all this, and more: Demonstrating why XML is such a powerful EAI infrastructure solution Identifying your key requirements for sharing and exchanging data Building robust, high-performance Java applications for parsing and processing XML documents Moving data between Java and non-Java applications Integrating XML with relational databases Serializing Java objects into XML, and asynchronous messaging with XML Providing convenient references to XML 1.0 grammar and the W3C Document Object Model Whether you're a technical manager planning for enterprise application integration, or a Java developer tasked with delivering it, Enterprise Application Integration With XML and Java delivers the in-depth solutions and real-world expertise you need. CD-ROM INCLUDED The CD-ROM contains extensive source code from the book, plus a remarkable library of leading-edge software and trialware, including: Bluestone Visual-XML desktop XML development environment; IBM XML4J Java-based parser; and Push-technologies SpiritWAVE2 implementation of the Java Messaging Service!
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...