Browse Results

Showing 52,926 through 52,950 of 53,922 results

SSH, The Secure Shell: The Definitive Guide

by Daniel J. Barrett Richard Silverman

SSH (Secure Shell) is a popular, robust, TCP/IP-based product for network security and privacy, supporting strong encryption and authentication. This book covers Unix, Windows, and Macintosh implementations of SSH. It shows both system administrators and end users how to install, maintain, and troubleshoot SSH; configure servers and clients in simple and complex ways; apply SSH to practical problems; and protect other TCP applications through forwarding (tunneling).

Start Right in E-Business

by Bennet Lientz Kathryn Rea

E-business occurs when a company has established critical business procedures and activities to support e-commerce transactions. Using this definition, e-commerce is part of e-business--a company needs e-commerce to implement e-business. Utilizing e-commerce, however, does not mean that a company has transformed into an e-business. E-business is implemented only when a company changes its internal procedures to take advantage of the e-commerce technologies.Interest in the evolution ("e-volution") of e-commerce into e-business is a growth field. With the early November announcement that GM and Ford were forming online marketplaces for their suppliers, they placed themselves at the center of new e-business ecosystems that will transform their entire way of doing business. Many firms are increasingly discovering opportunities to move away from simply selling products on the Internet to being able to reinvent their conventional supply chains (as in the auto makers' case) and to being able to offer custom-built products (as Dell Computers does now).

Subclassing and Hooking with Visual Basic

by Stephen Teilhet

Subclassing & Hooking with Visual Basic offers developers a unique way to customize Windows behavior. Windows is a message-based system. Every action you request creates one or more messages to carry out the action. These messages are passed between objects and carry with them information that gives the recipient more detail on how to interpret and act upon the message. With Subclassing and the Windows hooking mechanism ("hooks"), you can manipulate, modify, or even discard messages bound for other objects within the operating system, in the process changing the way the system behaves. What kinds of results can you achieve using the power of subclassing and hooking? Here are just a few of the possibilities: Determine when a window is being activated or deactivated and respond to this change. Display descriptions of menu items as the mouse moves across them. Disallow a user to move or resize a window. Determine where the mouse cursor is and respond accordingly. Determine when the display resolution has been changed. Monitor the system for a low system resource condition. Modify or disallow keystrokes sent to a window or a control. Create an automated testing application. Determine when an application is idle. Along with this power comes responsibility; Windows is very unforgiving if subclassing and hooking are used incorrectly. Subclassing and Hooking with Visual Basic demonstrates the various techniques for intercepting messages bound for one or more windows or controls: the intercepted message can be left in its original state or modified; afterward, the message can be sent to its original destination or discarded. For both VB 6 and VB.NET developers, Subclassing and Hooking with Visual Basic opens up a wealth of possibilities that ordinarily would be completely unavailable, or at least not easy to implement.

The Superior Project Manager: Global Competency Standards and Best Practices (PM Solutions Research)

by Frank Toney

Describes global best practices, competencies, and standards of superior project organizations based on research conducted by the Top 500 Project Management Forum. It emphasizes the selection process, performance evaluation, and personnel development to provide the key elements for adjusting and adapting to flexible conditions. The text also highli

Teach Yourself Desktop Publishing

by Christopher Lumgair

Desktop publishing has become the industry standard for publishers and freelancers alike. Teach Yourself Desktop Publishing is a practical course in desktop publishing that includes up-to-date information on the latest software and techniques.

Teaching & Learning Online: New Pedagogies for New Technologies (Creating Success Ser.)

by John Stephenson

A guide to teaching and learning online. It presents a wide range of experience and research findings from leading practitioners and organizations around the world, including case studies from the Open University, the BBC, ICL and leading international academics.

A Technical Guide to IPSec Virtual Private Networks

by James S. Tiller

What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become. A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security. Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies. After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.

Technology Enhanced Learning: Opportunities for Change

by Paul S. Goodman

This book focuses on how technology may create new learning environments and enhance basic learning processes. The book identifies and informs some of the strategic decisions involved in designing and implementing new technology to enhance learning. It also examines specific learning applications of TEL in order to understand the context of different learning environments, as well as some of the critical lessons learned in designing these environments. Mixing both conceptual perspectives and actual case experiences should create different learning opportunities for the reader. Technology Enhanced Learning is divided into two parts. Part I deals with strategic issues, such as trends in technology, implications for educational systems, designing infrastructure, and learning environments. Part II looks at specific cases of new learning environments to learn about strategy, infrastructure, impact assessment, and change in TEL learning environments.

Technology for All Assistive Technology in the Classroom

by Overbrook School for the Blind

An easy-to-read, field tested resource for all schools and colleges that need assistive technology in the classroom.

Telecommunications Management

by Richard Gershon

With today's communications industry experiencing major changes on an almost daily basis, media managers must have a clear understanding of the different delivery platforms, as well as a grasp of critical management, planning, and economic factors in order to stay current and move their organizations forward. Telecommunications Management helps current and future media professionals understand the relationship and convergence patterns between the broadcast, cable television, telephony, and Internet communication industries. Author Richard A. Gershon examines telecommunications industry structures and the management practices and business strategies affecting the delivery of information and entertainment services to consumers. He brings in specialists to present the finer points of management and planning responsibilities. Case studies from the International Radio and Television Society (IRTS) competition supplement the main text and offer an invaluable perspective on management issues. Developed for students in telecommunications management, electronic media management, and telecommunication economics, this volume also serves as a practical reference for the professional manager.

Testing .NET Application Blocks

by Microsoft Corporation

Complex software environments require more in-depth testing. This book delivers the detailed guidance you need to plan and execute testing for the solutions you develop with Microsoft PATTERNS & PRACTICES application blocks. Whether you're customizing the application blocks or integrating them into existing applications, you'll understand the key considerations for verifying that your code meets its requirements for performance, availability, scalability, compatibility, globalization, and security features. You'll find code examples, sample test cases, and checklists that demonstrate how to plan and implement each type of test; the guide also recommends tools to use to run the tests. While this book was designed specifically for use in testing Microsoft PATTERNS & PRACTICES application blocks, it also provides an excellent resource for testing other .NET code. All PATTERNS & PRACTICES guides are reviewed and approved by Microsoft engineering teams, consultants, partners, and customers--delivering accurate, real-world information that's been technically validated and tested.

Tools and Algorithms for the Construction and Analysis of Systems

by Axel Legay Tiziana Margaria

This book constitutes the refereed proceedings of the 7th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2001. The 36 revised full papers presented together with an invited contribution were carefully reviewed and selected from a total of 125 submissions. The papers are organized in sections on symbolic verification, infinite state systems - deduction and abstraction, application of model checking techniques, timed and probabilistic systems, hardware - design and verification, software verification, testing - techniques and tools, implementation techniques, semantics and compositional verification, logics and model checking, and ETAPS tool demonstration.

Tools and Algorithms for the Construction and Analysis of Systems

by Axel Legay Tiziana Margaria

This book constitutes the refereed proceedings of the 7th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2001. The 36 revised full papers presented together with an invited contribution were carefully reviewed and selected from a total of 125 submissions. The papers are organized in sections on symbolic verification, infinite state systems - deduction and abstraction, application of model checking techniques, timed and probabilistic systems, hardware - design and verification, software verification, testing - techniques and tools, implementation techniques, semantics and compositional verification, logics and model checking, and ETAPS tool demonstration.

Transform Your Business into E

by Bennet Lientz Kathryn Rea

Surveys indicate that many E-Business efforts either fail or disrupt the basic business processes and transactions. E-Business is sometimes not aligned with the business or IT. Vague vision statements are not translated into specific actions related to E- Business. It is because of these factors that Transform Your Business into e was written. The book covers E-Business from the review of the business at the start to expanding E-Business after it is live.

Tune Up Your PC In A Weekend (In A Weekend Ser.)

by Faithe Wempen

Tachnical downtineAlmost everybody who has a computer wishes it would run better. Perhaps your beef is a game that won't run, a full hard disk, a printer that no longer prints, or some other difficulty. Or maybe your computer just runs sluggishly in general, and you wonder whether there's anything you can do to speed it up.

Unlocking The Clubhouse: Women In Computing

by Jane Margolis Allan Fisher

The information technology revolution is transforming almost every aspect of society, but girls and women are largely out of the loop. Although women surf the Web in equal numbers to men and make a majority of online purchases, few are involved in the design and creation of new technology. It is mostly men whose perspectives and priorities inform the development of computing innovations and who reap the lion's share of the financial rewards. As only a small fraction of high school and college computer science students are female, the field is likely to remain a "male clubhouse," absent major changes. In Unlocking the Clubhouse, social scientist Jane Margolis and computer scientist and educator Allan Fisher examine the many influences contributing to the gender gap in computing. The book is based on interviews with more than 100 computer science students of both sexes from Carnegie Mellon University, a major center of computer science research, over a period of four years, as well as classroom observations and conversations with hundreds of college and high school faculty.

The Unwanted Gaze: The Destruction of Privacy in America

by Jeffrey Rosen

As thinking, writing, and gossip increasingly take place in cyberspace, the part of our life that can be monitored and searched has vastly expanded. E-mail, even after it is deleted, becomes a permanent record that can be resurrected by employers or prosecutors at any point in the future. On the Internet, every website we visit, every store we browse in, every magazine we skim--and the amount of time we skim it--create electronic footprints that can be traced back to us, revealing detailed patterns about our tastes, preferences, and intimate thoughts. In this pathbreaking book, Jeffrey Rosen explores the legal, technological, and cultural changes that have undermined our ability to control how much personal information about ourselves is communicated to others, and he proposes ways of reconstructing some of the zones of privacy that law and technology have been allowed to invade. In the eighteenth century, when the Bill of Rights was drafted, the spectacle of state agents breaking into a citizen's home and rummaging through his or her private diaries was considered the paradigm case of an unconstitutional search and seizure. But during the impeachment of President Bill Clinton, prosecutors were able to subpoena Monica Lewinsky's bookstore receipts and to retrieve unsent love letters from her home computer. And the sense of violation that Monica Lewinsky experienced is not unique. In a world in which everything that Americans read, write, and buy can be recorded and monitored in cyberspace, there is a growing danger that intimate personal information originally disclosed only to our friends and colleagues may be exposed to--and misinterpreted by--a less understanding audience of strangers. Privacy is important, Rosen argues, because it protects us from being judged out of context in a world of short attention spans, a world in which isolated bits of intimate information can be confused with genuine knowledge. Rosen also examines the expansion of sexual-harassment law that has given employers an incentive to monitor our e-mail, Internet browsing habits, and office romances. And he suggests that some forms of offensive speech in the workplace--including the indignities allegedly suffered by Paula Jones and Anita Hill--are better conceived of as invasions of privacy than as examples of sex discrimination. Combining discussions of current events--from Kenneth Starr's tapes to DoubleClick's on-line profiles--with inno-vative legal and cultural analysis, The Unwanted Gaze offers a powerful challenge to Americans to be proactive in the face of new threats to privacy in the twenty-first century.From the Hardcover edition.

VBScript Pocket Reference

by Matt Childs Paul Lomax Ron Petrusha

Microsoft's Visual Basic Scripting Edition (VBScript), a subset of Visual Basic for Applications, is a powerful language for Internet application development, where it can serve as a scripting language for server-side, client-side, and system scripting. Whether you're developing code for Active Server Pages, client-side scripts for Internet Explorer, code for Outlook forms, or scripts for Windows Script Host, VBScript Pocket Reference will be your constant companion.Don't let the pocket-friendly format fool you. Based on the bestsellingVBScript in a Nutshell, this small book details every VBScript language element--every statement, function, and object--both in VBScript itself, and in the Microsoft Scripting Runtime Library. There's a special emphasis on the following details:The syntax, using standard code conventionsThe arguments accepted by the function or procedure, if any existEntries are arranged alphabetically by topic, so that you can, for instance, easily find details about that string-handling function that you can't quite remember. In addition, appendixes list VBScript operators and VBScript intrinsic constants.Regardless of how much VBScript programming experience you have, theVBScript Pocket Reference is the book you'll pick up time and time again as your standard quick reference guide to the VBScript language. It is indispensable for anyone writing scripts with VBScript.

Web Caching

by Duane Wessels

A properly designed web cache, by reducing network traffic and improving access times to popular web sites, is a boon to network administrators and web users alike. This book hands you all the technical information you need to design, deploy, and operate an effective web caching service. It also covers the important political aspects of web caching, including privacy and security issues.

Web Design in a Nutshell, 2nd Edition

by Jennifer Niederst

Web Design in a Nutshell, 2nd Edition contains the nitty-gritty on everything you need to know to design Web pages. It's an excellent reference for HTML 4.01 tags (including tables, frames, forms, color, and cascading style sheets) with special attention given to browser support, platform idiosyncrasies, and standards. You'll also find lots of updated information on using graphics, multimedia, audio and video, and advanced technologies such Dynamic HTML, Javascript, and XML, as well as new chapters on XHTML, WML, and SMIL. This book is an indispensable tool for web designers and authors of all levels.

Web Security, Privacy and Commerce, 2nd Edition

by Simson Garfinkel

This much expanded new edition explores web security risks and how to minimize them. Aimed at web users, administrators, and content providers, Web Security, Privacy and Commerce covers cryptography, SSL, the Public Key Infrastructure, digital signatures, digital certificates, privacy threats (cookies, log files, web logs, web bugs), hostile mobile code, and web publishing (intellectual property, P3P, digital payments, client-side digital signatures, code signing, PICS).

Windows 2000 Administration in a Nutshell

by Mitch Tulloch

Anyone who installs Windows 2000, creates a user, or adds a printer is a 2000 system administrator. This book covers all the important day-to-day administrative tasks, and includes the tools for performing each task in an alphabetical reference for easy look-up. What's the same and what's different between Windows 2000 and Windows NT? Has the GUI or the networking architecture changed, and if so, how? This book will help you bridge the gap between Windows NT and Windows 2000.

Windows 2000 Commands Pocket Reference

by Æleen Frisch

Windows administrators can accomplish many of their routine tasks much more quickly by using the command line (similar to the command line of DOS or Unix-based systems) than by going through the graphical user interface that most users associate with Windows. Windows 20000 Commands Pocket Reference documents the Windows command mode. It's designed for system administrators, but will also be valuable to many users. It includes most available Windows 2000 commands, as well as the most useful system administration command-line utilities from the Resource Kit. Weeded out of this book are Windows commands and command options that are obscure, obsolete, broken, unacceptably insecure, or frankly inadvisable, as well a few special-purpose classes of commands. Whenever several utilities perform essentially identical tasks, we include only the best of them. Commands are grouped according to their purpose and function; within a group, commands are arranged alphabetically. Options for each command are grouped by function and ordered by importance. The Windows 2000 Commands Pocket Reference complements Windows 2000 Administration in a Nutshell by conveying the kind of no-nonsense, boiled-down information typical of O'Reilly's highly successful companion Pocket Reference series. It's a valuable, concise reference to Windows 2000 commands and command-line utilities.

Windows 2000 Quick Fixes

by Jim Boyce

Windows 2000 Quick Fixes provides fixes to common problems in a clear, well-organized fashion. It extensively troubleshoots both the Windows 2000 Professional and the Windows 2000 Server editions, taking power users through installation, complex networking configuration problems, and important backup and security concerns. When the pressure is on and there's no time to waste hunting for Windows 2000 solutions, this is the book to reach for.

Windows 98/Me Para Todos

by Jaime Restrepo

¿Sabe cómo más o menos usar las computadoras, pero no sabe cómo sacarle provecho a todo lo que ofrece el sistema operativo Windows® 98/Me?¿No sabe cómo usar el teclado para poder escribir en español más fácilmente?¿No entiende la terminología de lengua inglesa que se usa en la computación?¿Quiere usar el programa Windows® 98/Me para obtener archivos cibernéticos, pero no sabe cómo hacerlo?¿Sabe ya cómo entrar en el Internet pero le cuesta trabajo encontrar todo lo que ofrece?Escrito en español para los hispanoparlantes y con ilustraciones detalladas, Windows® 98/Me para todos es un recurso imprescindible que esclarece todos los pormenores que se necesita saber para usar el sistema operativo de computación más popular del mundo de forma eficaz, ya sea para uso personal, para hacer compras, en el trabajo, para desarrollar un negocio, o para pasar el tiempo.Paso a paso, Windows® 98/Me para todos abarca todo sobre el uso de todas las funciones y las opciones que ofrece Windows® 98/Me: > cómo instalar los programas que funcionan con Windows® 98/Me > cómo usar los CD-ROM y tocar los CD de música grabada> cómo trabajar con los LAN o redes locales. Además, el autor explica el vocabulario inglés que domina la computación al presentarlo de una manera comprensible para cualquiera que no se sienta cómodo con ese idioma. Windows® 98/Me para todos también incluye un útil glosario de terminología de computadoras de interés para los hispanos.En Windows® 98/Me para todos, Jaime Restrepo le abre a la familia hispana la puerta al mundo de la informática, educación, negocios y diversión.From the Trade Paperback edition.

Refine Search

Showing 52,926 through 52,950 of 53,922 results