Browse Results

Showing 53,301 through 53,325 of 53,652 results

The Internet Bubble: Inside the Over-valued world of High Tech Stocks and What You Need to Know to Avoid the Coming Shakeout

by Anthony B. Perkins Michael C. Perkins

This book exposes the incredible rise of the Silicon Valley wealth machine, before the bubble burst.

Fools Rush In: Steve Case, Jerry Levin, and the Unmaking of AOL Time Warner

by Nina Munk

A carefully explained business debacle.

Learning XML

by Erik T. Ray

XML (Extensible Markup Language) is a flexible way to create "self-describing data"--and to share both the format and the data on the World Wide Web, intranets, and elsewhere. In Learning XML,the author explains XML and its capabilities succinctly and professionally, with references to real-life projects and other cogent examples. Learning XMLshows the purpose of XML markup itself, the CSS and XSL styling languages, and the XLink and XPointer specifications for creating rich link structures.

Unix Backup and Recovery

by W. Curtis Preston

This guide provides a complete overview of all facets of Unix backup and recovery and offers practical, affordable backup and recovery solutions for environments of all sizes and budgets. It explains everything from freely available backup systems to large-scale commercial utilities.

Nessus Network Auditing

by Jay Beale Renaud Deraison Haroon Meer Roelof Temmingh Charl Van Der Walt

This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network.

Microsoft Log Parser Toolkit

by Gabriele Giuseppini

Do you want to find Brute Force Attacks against your Exchange Server? Would you like to know who is spamming you? Do you need to monitor the performance of your IIS Server? Are there intruders out there you would like to find? Would you like to build user logon reports from your Windows Server? Would you like to export your logs to XML? Would you like working scripts to automate all of these tasks and many more for you? If so, this book is for you... "Microsoft Log Parser Toolkit" is co-authored by Microsoft's Log Parser developer providing a complete reference to this SQL-Query driven log analysis tool. The book and accompanying Web site also provide dozens of customized, working scripts, queries, and templates for Windows Server, Snort IDS, Exchange Server, IIS, ISA Server, Snort and more.

Digital Identity

by Phil Windley

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers. Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture. How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.

Using Moodle

by Jason Cole

Developed by an extremely active open source community, Moodle is a sophisticated course management system that's ideal for creating dynamic online learning communities and for supplementing face-to-face learning. Used in more than 115 countries and supporting over 60 languages, Moodle can scale from a single-teacher site to a 40,000- student university. Teachers who use Moodle have access to an array of powerful tools such as assignments, forums, journals, quizzes, surveys, chat rooms, and workshops. Using Moodle is a comprehensive, hands-on guide that explains how the system works, with plenty of examples and best practices for its many features and plug-in modules. Authored by a member of the Moodle community, this authoritative book also exposes little-known but powerful hacks for more technically savvy users. For anyone who is using-or thinking of using-this CMS, Using Moodle is required reading.

Mac OS X Panther for Unix Geeks

by Ernest E. Rothman Brian Jepson

With its rep for being the sort of machine that won't intimidate even the most inexperienced users, what's the appeal of the Mac for hard-core geeks? The Mac has always been an efficient tool, pleasant to use and customize, and eminently hackable. But now with Mac OS X's BSD core, many a Unix developer has found it irresistible. The latest version of Mac OS X, called Panther, makes it even easier for users to delve into the underlying Unix operating system. In fact, you can port Linux and Unix applications and run them side-by-side with your native Aqua apps right on the Mac desktop. Still, even experienced Unix users may find themselves in surprisingly unfamiliar territory as they set out to explore Mac OS X. Even if you know Macs through and through, Mac OS X Panther is unlike earlier Macs, and it's radically different from the Unix you've used before. Enter Mac OS X Panther for Unix Geeks by Brian Jepson and Ernest E. Rothman, two Unix geeks who found themselves in the same place you are. The new edition of this book is your guide to figuring out the BSD Unix system and Panther-specific components that you may find challenging. This concise book will ease you into the Unix innards of Mac OS X Panther, covering such topics as: A quick overview of the Terminal application, including Terminal alternatives like iTerm and GLterm Understanding Open Directory (LDAP) and NetInfo Issues related to using the GNU C Compiler (GCC) Library linking and porting Unix software An overview of Mac OS X Panther's filesystem and startup processes Creating and installing packages using Fink and Darwin Ports Building the Darwin kernel Using the Apple X11 distribution for running X Windows applications on top of Mac OS X The book wraps up with a quick manpage-style reference to the "Missing Manual Pages" --commands that come with Mac OS X Panther, although there are no manpages. If you find yourself disoriented by the new Mac environment, Mac OS X Panther for Unix Geeks will get you acclimated quickly to the foreign new areas of a familiar Unix landscape.

Advanced Perl Programming

by Sriram Srinivasan

This book covers complex techniques for managing production-ready Perl programs and explains methods for manipulating data and objects that may have looked like magic before. It gives you necessary background for dealing with networks, databases, and GUIs, and includes a discussion of internals to help you program more efficiently and embed Perl within C or C within Perl.

Python in a Nutshell

by Alex Martelli

In the tradition of O'Reilly's "In a Nutshell" series, Python in a Nutshelloffers Python programmers one place to look when they need help remembering or deciphering the syntax of this open source language and its many modules. This comprehensive reference guide makes it easy to look up all the most frequently needed information--not just about the Python language itself, but also the most frequently used parts of the standard library and the most important third-party extensions.

Oracle PL/SQL Programming, 4th Edition

by Steven Feuerstein Bill Pribyl

For the past ten years, O'Reilly's Oracle PL/SQL Programming has been the bestselling book on PL/SQL, Oracle's powerful procedural language. Packed with examples and helpful recommendations, the book has helped everyone--from novices to experienced developers, and from Oracle Forms developers to database administrators--make the most of PL/SQL. The fourth edition is a comprehensive update, adding significant new content and extending coverage to include the very latest Oracle version, Oracle Database 10 g Release 2. It describes such new features as the PL/SQL optimizing compiler, conditional compilation, compile-time warnings, regular expressions, set operators for nested tables, nonsequential collections in FORALL, the programmer-defined quoting mechanism, the ability to backtrace an exception to a line number, a variety of new built-in packages, and support for IEEE 754 compliant floating-point numbers. The new edition adds brand-new chapters on security (including encryption, row-level security, fine-grained auditing, and application contexts), file, email, and web I/O (including the built-in packages DBMS_OUTPUT, UTL_FILE, UTL_MAIL, UTL_SMTP, and UTL_HTTP) and globalization and localization. Co-authored by the world's foremost PL/SQL authority, Steven Feuerstein, this classic reference provides language syntax, best practices, and extensive code, ranging from simple examples to complete applications--making it a must-have on your road to PL/SQL mastery. A companion web site contains many more examples and additional technical content for enhanced learning.

Buffer Overflow Attacks: Detect, Exploit, Prevent

by James C. Foster

Will the Code You Write Today Headline Tomorrow's BugTraq Mail List? Includes Numbered-by-Line Exploit Code Examples That Illustrate the Differences Between Stack Overflows, Heap Corruption, and Format String Bugs Provides Case Studies for Most Major Platforms and Environments, Including Windows, FreeBSD, FrontPage, and Linux Avoid Worm or Custom Exploits by Analyzing Your Source Code to Detect Buffer Overflow Vulnerabilities Forensic investigations of notorious Internet attacks, such as the SQL Slammer and Blaster Worms, reveal buffer overflows to be the sophisticated hacker's "vulnerability of choice". These worms crippled the Internet and cost billions of dollars to clean up. Now, even more powerful and insidious threats have appeared in the form of "custom exploits". These one-time only exploits are custom crafted to attack your enterprise, making them even more difficult to detect and defend. No catchy names, no media coverage; just your own personal disaster. James C. Foster's Buffer Overflow Attacks clearly demonstrates that the only way to defend against the endless variety of buffer overflow attacks is to implement a comprehensive design, coding and test plan for all of your applications. From Dave Aitel's Foreword through the last appendix, this is the only book dedicated exclusively to detecting, exploiting, and preventing buffer overflow attacks. CONTENTS OF THIS BOOK INCLUDE Buffer Overflows: The Essentials Understanding Shellcode Writing Shellcode Win32 Assembly Case Study: FreeBSD NN Exploit Code Case Study: xlockmore User Supplied Format String Vulnerability (CVE-2000-0763) Case Study: FrontPage Denial of Service Utilizing WinSock Stack Overflows Heap Corruption Format String Attacks Windows Buffer Overflows Case Study: cURL buffer overflow on Linux Case Study: OpenSSL SSLv2 Malformed Client Key Remote Buffer Overflow Vulnerability (CAN-2002-0656) Case Study: X11R6 4.2 XLOCALEDIR Overflow Case Study: Microsoft MDAC Denial of Service Case Study: Local UUX Buffer Overflow on HPUX Finding Buffer Overflows in Source Case Study: InlineEgg I Case Study: InlineEgg II Case Study: Seti@Home Exploit Code Case Study: Microsoft CodeBlue Exploit Code The Complete Data Conversion Table Useful Syscalls Additional Exploit References

Essential Business Process Modeling

by Mike Havey

Ten years ago, groupware bundled with email and calendar applications helped track the flow of work from person to person within an organization. Workflow in today's enterprise means more monitoring and orchestrating massive systems. A new technology called Business Process Management, or BPM, helps software architects and developers design, code, run, administer, and monitor complex network-based business processes. BPM replaces those sketchy flowchart diagrams that business analysts draw on whiteboards with a precise model that uses standard graphical and XML representations, and an architecture that allows it converse with other services, systems, and users. Sound complicated? It is. But it's downright frustrating when you have to search the Web for every little piece of information vital to the process. Essential Business Process Modeling gathers all the concepts, design, architecture, and standard specifications of BPM into one concise book, and offers hands-on examples that illustrate BPM's approach to process notation, execution, administration and monitoring. Author Mike Havey demonstrates standard ways to code rigorous processes that are centerpieces of a service-oriented architecture (SOA), which defines how networks interact so that one can perform a service for the other. His book also shows how BPM complements enterprise application integration (EAI), a method for moving from older applications to new ones, and Enterprise Service BUS for integrating different web services, messaging, and XML technologies into a single network. BPM, he says, is to this collection of services what a conductor is to musicians in an orchestra: it coordinates their actions in the performance of a larger composition. Essential Business Process Modeling teaches you how to develop examples of process-oriented applications using free tools that can be run on an average PC or laptop. You'll also learn about BPM design patterns and best practices, as well as some underlying theory. The best way to monitor processes within an enterprise is with BPM, and the best way to navigate BPM is with this valuable book.

Swing Hacks

by Chris Adamson Joshua Marinacci

Swing Hacks helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. If you're a Java developer looking to build enterprise applications with a first-class look and feel, Swing is definitely one skill you need to master. This latest title from O'Reilly is a reference to the cool stuff in Swing. It's about the interesting things you learn over the years--creative, original, even weird hacks--the things that make you say, "I didn't know you could even do that with Swing!" Swing Hacks will show you how to extend Swing's rich component set in advanced and sometimes non-obvious ways. The book touches upon the entire Swing gamut-tables, trees, sliders, spinners, progress bars, internal frames, and text components. Detail is also provided on JTable/JTree, threaded component models, and translucent windows. You'll learn how to filter lists, power-up trees and tables, and add drag-and-drop support. Swing Hacks will show you how to do fun things that will directly enhance your own applications. Some are visual enhancements to make your software look better. Some are functional improvements to make your software do something it couldn't do before. Some are even just plain silly, in print only to prove it could be done. The book will also give you give you a small glimpse of the applications coming in the future. New technology is streaming into the Java community at a blistering rate, and it gives application developers a whole new set of blocks to play with. With its profusion of tips and tricks, Swing Hacks isn't just for the developer who wants to build a better user interface. It's also ideally suited for client-side Java developers who want to deliver polished applications, enthusiasts who want to push Java client application boundaries, and coders who want to bring powerful techniques to their own applications. Whatever your programming needs, Swing Hacks is packed with programming lessons that increase your competency with interface-building tools.

Podcasting Hacks

by Jack Herrington

Podcasting does for Internet audio listeners what TiVo does for television viewers--it puts you in charge of when you enjoy a program. Podcasting is a web-based broadcast medium that sends audio content (most commonly in the MP3 format) directly to an iPod or other digital audio player. You subscribe to audio feeds, receive new files automatically, and listen to them at your convenience. As you can imagine, podcasting is taking the "blogsphere" by storm. A podcast is a professional-quality Internet radio broadcast, and like blogging and HTML before it, this revolutionary new way of publishing to the Internet has become the new outlet for personal expression. If you've got Internet access and a copy of Podcasting Hacks, you can find out just how easy it is to listen to and create your own Internet audio programs. With Podcasting Hacks , Jack Herrington, a software engineer with 20 years of experience developing applications using a diverse set of languages and tools, delivers the ultimate how-to of podcasting for anyone looking to get the most out of this hot new medium. Since August 2004 (the month that iPodder.com editor Adam Curry considers the start of podcasting), audio blogging has exploded. Podcasts cover every conceivable topic, including sex, relationships, technology, religion, home brewing, recreational drugs, rock 'n roll, food, entertainment, politics, and much more. There were podcasts from the Democratic National Convention in Fall 2004, and some programs on Air America and NPR are also podcasts. Podcasting Hacks offers expert tips and tools for blogging out loud--for transmitting (and receiving) audio content worldwide with ease. This groundbreaking volume covers both entry-level and advanced topics perfect for aspiring and experienced podcasters. Herrington shows you how to get started, create quality sound, use the right software, develop a great show, distribute a podcast, and build an audience. More advanced topics include audio editing, podcasting on the go, and even videocasting.

The New New Thing: A Silicon Valley Story

by Michael Lewis

A biography of the founder of Netscape serves as a illustration of the profound changes in the 1980s due to the Internet.

Talk Is Cheap

by James E. Gaskin

Fed up with the high tolls charged by your ordinary telephone service? If you're itching to cut the copper cord with your costly, traditional phone service, you need Talk is Cheap, the new, easy-to-understand guide to understanding and using Voice over Internet Protocol (VoIP) and other Internet telephone options. Technologies such as VoIP are gaining a great deal of attention these days as more people switch from standard telephone service to phone service via the Internet. But while the cost savings are outstanding, there are some issues with Internet telephony that you should know about. Are the connections reliable? Is the quality comparable? Will it include 911 services? James Gaskin's Talk is Cheap addresses these issues and many more by explaining how to make the switch and what the trade-offs will be if you opt for Internet telephony over traditional phone services. Talk is Cheap focuses on the increasingly popular services from Vonage, which uses VoIP, and Skype--a free service that operates as a peer-to-peer (P2P) network with the ability to turn any PC, Mac, or Pocket PC into a telephone. The book explains your options; explores the background behind, the workings of, and differences between VoIP and P2P networks; and discusses the advantages and drawbacks of both technologies (including service offerings, quality, capabilities, completion rates, and more). Talk is Cheap then goes into detail on what you can expect in Internet service from traditional phone companies such as Verizon and ATT. In addition, you will learn more advanced techniques, including how to turn your Palm or Pocket PC into an Internet phone and how to work with Wi-Fi phones and videophones. A straightforward, quick introduction to the ins and outs of using Internet telephone services, this book provides everything you need to make informed telephone decisions--whether you're thinking about the switch from traditional phone service or have already made it and want to get the most out of your new Internet telephone.

Windows XP Annoyances for Geeks, 2nd Edition

by David A. Karp

Offering dozens of on-target tips, workarounds, and warnings, Windows XP Annoyances for Geeks allows users to improve their overall experience with the popular XP operating system. And now, with this updated edition, users can also expect detailed coverage of the newly released Service Pack 2 (SP2) technology, which provides protection against viruses, hacker, and worms. It's the ultimate resource for the ever-expanding Windows XP market.

Windows Server Hacks

by Mitch Tulloch

The tools, or hacks in this book reveal techniques that go well beyond basic management tasks found in most handbooks. Hacks range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, performance, security, and backup and recovery. No matter which Windows Server you use--NT, IIS, 2000, or 2003-- Windows Server Hacks will put the knowledge and expertise of veteran system administrators to work for you.

Optimizing Oracle Performance

by Cary Millsap

Oracle DBAs and developers are all too familiar with the outlay of time and resources, blown budgets, missed deadlines, and marginally effective performance fiddling that is commonplace with traditional methods of Oracle performance tuning. In Optimizing Oracle Performance , Cary Millsap, former VP of Oracle's System Performance Group, clearly and concisely explains how to use Oracle's response time statistics to diagnose and repair performance problems. Cary also shows how "queueing theory" can be applied to response time statistics to predict the impact of upgrades and other system changes. The price of this essential book will be paid back in hours saved the first time its methods are used.

Managing and Using MySQL, 2nd Edition

by Tim King George Reese Randy Jay Yarger

Learn how to use MySQL, a popular database product that supports key subsets of SQL on Linux and Unix systems. Using C/C++, Java, Perl, PHP, or Python, you can write programs to interact with a MySQL database, either as a stand-alone application or through a web page. This book covers the whole process, from installation to programming interfaces and database administration. It includes ample tutorial material and examples.

LPI Linux Certification in a Nutshell

by Jeff Dean

LPI Linux Certification in a Nutshell prepares system administrators for the basic LPI General Linux 101 exam and the more advanced 102 exam. The book is divided into two parts, one for each of the LPI exams. Each part features a summary of the exam, a Highlighter's Index, labs, suggested exercises, and practice exams to help you pass the LPI exams with flying colors.

Inside .Mac

by Chuck Toporek

This handy, quick reference offers a clear overview of the entire .Mac package and many of its not-so-obvious features. You'll learn how to set up and manage your account quickly and without fuss. Each .Mac service is discussed in an objective, no-frills fashion that'll show you how to use--and what to expect from--iDisk, web mail, your personal web site, and everything else that .Mac offers.

Essential System Administration, 3rd Edition

by Leen Frisch

Whether you use a standalone Unix system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, Essential System Administrationis for you. This comprehensive and invaluable book combines the author's years of practical experience with technical expertise to help you manage Unix systems as productively and painlessly as possible.

Refine Search

Showing 53,301 through 53,325 of 53,652 results