Best of
Computers

2007

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

Network Warrior


Gary A. Donahue - 2007
    What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems now dominates. The book covers: The type of networks now in use, from LANs, WANs and MANs to CANsThe OSI Model and the layers involved in sending data Hubs, repeaters, switches, and trunks in practice Auto negotiation and why it 's a common problem in network slowdowns Route maps, routing protocols, and switching algorithms in Cisco routers The resilient Ethernet -- how to make things truly redundant Cisco 6500 multi-layer switches and the Catalyst 3750 switch Telecom nomenclature -- why it 's different from the data world T1 and DS3 Firewall theory, designing access lists, authentication in Cisco devices Server load balancing technology Content switch module in action Designing QOS and what QOS does not do IP design and subnetting made easy The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.

What Every Programmer Should Know About Memory


Ulrich Drepper - 2007
    Hardware designers have come up with ever more sophisticated memory handling and acceleration techniques–such as CPU caches–but these cannot work optimally without some help from the programmer. Unfortunately, neither the structure nor the cost of using the memory subsystem of a computer or the caches on CPUs is well understood by most programmers. This paper explains the structure of memory subsystems in use on modern commodity hardware, illustrating why CPU caches were developed, how they work, and what programs should do to achieve optimal performance by utilizing them.

Absolute Freebsd: The Complete Guide to Freebsd


Michael W. Lucas - 2007
    But it can be even trickier to use than either Unix or Linux, and harder still to master.Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas considers this completely revised and rewritten second edition of his landmark work to be his best work ever; a true product of his love for FreeBSD and the support of the FreeBSD community. Absolute FreeBSD, 2nd Edition covers installation, networking, security, network services, system performance, kernel tweaking, filesystems, SMP, upgrading, crash debugging, and much more, including coverage of how to:Use advanced security features like packet filtering, virtual machines, and host-based intrusion detection Build custom live FreeBSD CDs and bootable flash Manage network services and filesystems Use DNS and set up email, IMAP, web, and FTP services for both servers and clients Monitor your system with performance-testing and troubleshooting tools Run diskless systems Manage schedulers, remap shared libraries, and optimize your system for your hardware and your workload Build custom network appliances with embedded FreeBSD Implement redundant disks, even without special hardware Integrate FreeBSD-specific SNMP into your network management system. Whether you're just getting started with FreeBSD or you've been using it for years, you'll find this book to be the definitive guide to FreeBSD that you've been waiting for.

Core Memory: A Visual Survey of Vintage Computers


John Alderman - 2007
    Vivid photos capture these historically important machinesincluding the Eniac, Crays 13, Apple I and IIwhile authoritative text profiles each, telling the stories of their innovations and peculiarities. Thirty-five machines are profiled in over 100 extraordinary color photographs, making Core Memory a surprising addition to the library of photography collectors and the ultimate geek-chic gift.

Windows via C/C++ (PRO-Developer) (Pro - Developer)


Jeffrey Richter - 2007
    Programming Applications for Microsoft Windows is a classic book (formerly titled Advanced Windows, Third Edition) and is now fully updated for Windows Vista, including the latest information about Windows XP. In-depth and comprehensive, this essential reference covers the Windows operating system and how to program at the API level. Recognized experts provide an inside view of how Windows works and how to use its features in Visual C++ development tasks. Topics covered include processes, thread pooling, virtual memory, DLLs, file I/O, and message crackers. For systems-level programmers, this is a must-have title. Includes code samples in Visual C++.

Windows Powershell in Action


Bruce Payette - 2007
    In the tradition of Manning's ground breaking "In Action" series, this book comes from right from the source. Written by Bruce Payette, one of principal creators of PowerShell, Windows PowerShell in Action shows you how to build scripts and utilities to automate system tasks or create powerful system management tools to handle the day-to-day tasks that drive a Windows administrator's life. Because it's based on the .NET platform, PowerShell is also a powerful tool for developers and power users.Windows PowerShell in Action was written by Bruce Payette, one of the founding members of the Windows PowerShell team, co-designer of the PowerShell language and the principal author of the PowerShell language implementation. The book enables you to get the most out of the PowerShell environment. Using many examples, both small and large, this book illustrates the features of the language and environment and shows how to compose those features into solutions, quickly and effectively.This book is designed for anyone who wants to learn PowerShell and use it well. Rather than simply being a book of recipes to read and apply, this book gives you the deep knowledge about how PowerShell works and how to apply it.

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems


Chris Sanders - 2007
    But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application. But while Wireshark comes with documentation, there's not a whole lot of information to show you how to use it in real-world scenarios. Practical Packet Analysis shows you how to:Use packet analysis to tackle common network problems, such as loss of connectivity, slow networks, malware infections, and more Build customized capture and display filters Tap into live network communication Graph traffic patterns to visualize the data flowing across your network Use advanced Wireshark features to understand confusing packets Build statistics and reports to help you better explain technical network information to non-technical usersBecause net-centric computing requires a deep understanding of network communication at the packet level, Practical Packet Analysis is a must have for any network technician, administrator, or engineer troubleshooting network problems of any kind.

Stealing the Network: How to Own a Shadow


Johnny Long - 2007
    Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries

The R Book


Michael J. Crawley - 2007
    The R language is recognised as one of the most powerful and flexible statistical software packages, and it enables the user to apply many statistical techniques that would be impossible without such software to help implement such large data sets.

Architecture of a Database System


Joseph M. Hellerstein - 2007
    Architecture of a Database System presents an architectural discussion of DBMS design principles, including process models, parallel architecture, storage system design, transaction system implementation, query processor and optimizer architectures, and typical shared components and utilities. Successful commercial and open-source systems are used as points of reference, particularly when multiple alternative designs have been adopted by different groups. Historically, DBMSs were among the earliest multi-user server systems to be developed, and thus pioneered many systems design techniques for scalability and reliability now in use in many other contexts. While many of the algorithms and abstractions used by a DBMS are textbook material, Architecture of a Database System addresses the systems design issues that make a DBMS work. Architecture of a Database System is an invaluable reference for database researchers and practitioners and for those in other areas of computing interested in the systems design techniques for scalability and reliability that originated in DBMS research and development.

Schneier's Cryptography Classics Library: Applied Cryptography / Secrets and Lies / Practical Cryptography


Bruce Schneier - 2007
    Schneier's Cryptography Classics Library: Applied Cryptography. Secrets and Lies. and Practical Cryptography published in the year 2007 was published by John Wiley & Sons. The author of this book is Bruce Schneier . ed page displaying collection of Bruce Schneier books here. This is the Paperback version of the title "Schneier's Cryptography Classics Library: Applied Cryptography. Secrets and Lies. and Practical Cryptography ". Schneier's Cryptography Classics Library: Applied Cryptography. Secrets and Lies. and Practical Cryptography is currently Available with us.

RMAN Recipes for Oracle Database 11g: A Problem-Solution Approach


Darl Kuhn - 2007
    Of all the things you are responsible for as a database administrator, nothing is more important than the data itself. Like it or not, the fearsome responsibility of protecting your organization's most critical data falls squarely upon your shoulders:Lose that data and your company could fail. Lose that data and you could be out of a job.Scared? You should be. But there's help. You are not alone. Oracle experts Darl Kuhn, Sam Alapati, and Arup Nanda have come together in this book to show you the power of Recovery Manager, or RMAN, which is Oracle's backup and recovery tool of choice. RMAN Recipes for Oracle Database 11g helps you take advantage of all that RMAN has to offer by providing easy-to-understand solutions to business-critical backup and recovery operations. This handy guide:Demystifies the steps required to protect your business data Provides ready-made and step-by-step solutions to simple and complex backup, restore, and recovery operations Is task-oriented, making it easy for you to find the solution to pressing backup and recovery problems Respects your time by providing example-based solutions, not endless reading materialWhen the pressure's on, you don't have time for long discussions of theory. This book gets right to the point with quick and easy-to-read, step-by-step solutions that can help you backup and recover your data with confidence.

Thinking about Godel and Turing: Essays on Complexity, 1970-2007


Gregory Chaitin - 2007
    In this volume, Chaitin discusses the evolution of these ideas, tracing them back to Leibniz and Borel as well as Gödel and Turing.This book contains 23 non-technical papers by Chaitin, his favorite tutorial and survey papers, including Chaitin's three Scientific American articles. These essays summarize a lifetime effort to use the notion of program-size complexity or algorithmic information content in order to shed further light on the fundamental work of Gödel and Turing on the limits of mathematical methods, both in logic and in computation. Chaitin argues here that his information-theoretic approach to metamathematics suggests a quasi-empirical view of mathematics that emphasizes the similarities rather than the differences between mathematics and physics. He also develops his own brand of digital philosophy, which views the entire universe as a giant computation, and speculates that perhaps everything is discrete software, everything is 0's and 1's.Chaitin's fundamental mathematical work will be of interest to philosophers concerned with the limits of knowledge and to physicists interested in the nature of complexity.

Excel 2007 Power Programming with VBA (Mr. Spreadsheet's Bookshelf)


John Walkenbach - 2007
    Offers procedures, tips, and ideas for expanding Excel's capabilities with Visual Basic[registered] for Applications.

The Definitive Guide to the Xen Hypervisor


David Chisnall - 2007
    Get under the hood of Xen, the high performance virtualization software, with this text.

Programming Erlang


Joe Armstrong - 2007
    It's used worldwide by companies who need to produce reliable, efficient, and scalable applications. Invest in learning Erlang now.Moore's Law is the observation that the amount you can do on a single chip doubles every two years. But Moore's Law is taking a detour. Rather than producing faster and faster processors, companies such as Intel and AMD are producing multi-core devices: single chips containing two, four, or more processors. If your programs aren't concurrent, they'll only run on a single processor at a time. Your users will think that your code is slow.Erlang is a programming language designed for building highly parallel, distributed, fault-tolerant systems. It has been used commercially for many years to build massive fault-tolerated systems that run for years with minimal failures.Erlang programs run seamlessly on multi-core computers: this means your Erlang program should run a lot faster on a 4 core processor than on a single core processor, all without you having to change a line of code.Erlang combines ideas from the world of functional programming with techniques for building fault-tolerant systems to make a powerful language for building the massively parallel, networked applications of the future.This book presents Erlang and functional programming in the familiar Pragmatic style. And it's written by Joe Armstrong, one of the creators of Erlang.It includes example code you'll be able to build upon. In addition, the book contains the full source code for two interesting applications:A SHOUTcast server which you can use to stream music to every computer in your house, and a full-text indexing and search engine that can index gigabytes of data. Learn how to write programs that run on dozens or even hundreds of local and remote processors. See how to write robust applications that run even in the face of network and hardware failure, using the Erlang programming language.

Designing BSD Rootkits: An Introduction to Kernel Hacking


Joseph Kong - 2007
    Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.Included: The fundamentals of FreeBSD kernel module programming Using call hooking to subvert the FreeBSD kernel Directly manipulating the objects the kernel depends upon for its internal record-keeping Patching kernel code resident in main memory; in other words, altering the kernel's logic while it's still running How to defend against the attacks described Hack the FreeBSD kernel for yourself!

Routing Protocols and Concepts, CCNA Exploration Companion Guide (Cisco Systems Networking Academy Program)


Rick Graziani - 2007
    Book by Graziani, Rick, Johnson, Allan

Memory Systems: Cache, Dram, Disk


Bruce Jacob - 2007
    You learn how to to tackle the challenging optimization problems that result from the side-effects that can appear at any point in the entire hierarchy.As a result you will be able to design and emulate the entire memory hierarchy.

C# 3.0 in a Nutshell: A Desktop Quick Reference


Joseph Albahari - 2007
    C# 3.0 in a Nutshell gets right to the point, covering the essentials of language syntax and usage as well as the parts of the .NET base class libraries you need to build working applications. But unlike earlier editions, this book is now organized entirely around concepts and use cases, providing greater depth and readability. C# 3.0 introduces the most significant enhancements yet to the programming language, and C# 3.0 in a Nutshell delves deep into the subject while assuming minimal prior knowledge of C#-making it accessible to anyone with a reasonable background in programming. In addition to the language, the book covers the .NET CLR and the core Framework assemblies, along with the unified querying syntax called Language Integrated Query (LINQ), which bridges the traditional divide between programs and their data sources. Free of clutter and long introductions, this book provides a map of C# 3.0 knowledge in a succinct and unified style:Opening chapters concentrate purely on C#, starting with the basics of syntax, types and variables, and finishing with advanced topics such as unsafe code and preprocessor directivesLater chapters cover the core .NET 3.5 Framework, including such topics as LINQ, XML, collections, I/O and networking, memory management, reflection, attributes, security, threading, application domains and native interoperabilityDesigned as a handbook for daily use, C# 3.0 in a Nutshell is an ideal companion to any of the vast array of books that focus on an applied technology such as WPF, ASP.NET, or WCF. The areas of the language and .NET Framework that such books omit, this one covers in detail.

Professional Plone Development


Martin Aspeli - 2007
    It covers setting up a development environment, customizing Plone's look and feel, creating new content types and forms, connecting to external databases, managing users and groups intelligently, configuring a production-ready server, LDAP authentication, and caching. Aimed at developers wanting to leverage the proven user interface and flexible infrastructure of this open-source Content Management System, it takes a pragmatic approach, building a realistic example application whose code is included with the book. Built on the Zope application server and written in Python, Plone makes it easy for content authors to create and edit web content, and is also used by developers as a framework to build content-centric web applications like dynamic websites and intranets. Readers need familiarity with Python and basic web technologies such as HTML and CSS, and would also benefit from prior Zope/ Plone experience.

Inside Microsoft SQL Server 2005: Query Tuning and Optimization: Query Tuning and Optimization


Kalen Delaney - 2007
    This in-depth guide delivers best practices, pragmatic advice, and code samples to help you enable efficient, effective queries—and optimize database performance. Discover how to: Create a baseline and monitor workload by using System Monitor and DMVs Design, manipulate, and manage traces to isolate database performance issues Audit user activity by using built-in default, black box, and Common Criteria traces Analyze query execution using scans and seeks, joins, aggregations, unions, and parallelism Generate efficient and cost-effective queries using cached plans or new plans Detect and resolve locking, blocking, and deadlocking concurrency issues Use best practices to diagnose and troubleshoot response time, throughput, and scalability issues PLUS—Includes Transact-SQL code samples and on the Web

Mastering Perl


Brian D. Foy - 2007
    Mastering Perl pulls everything together to show you how to bend Perl to your will. It convey's Perl's special models and programming idioms. This book isn't a collection of clever tricks, but a way of thinking about Perl programming so you can integrate the real-life problems of debugging, maintenance, configuration, and other tasks you encounter as a working programmer. The book explains how to:Use advanced regular expressions, including global matches, lookarounds, readable regexes, and regex debugging Avoid common programing problems with secure programming techniques Profile and benchmark Perl to find out where to focus your improvements Wrangle Perl code to make it more presentable and readable See how Perl keeps track of package variables and how you can use that for some powerful tricks Define subroutines on the fly and turn the tables on normal procedural programming. Modify and jury rig modules to fix code without editing the original source Let your users configure your programs without touching the code Learn how you can detect errors Perl doesn't report, and how to tell users about them Let your Perl program talk back to you by using Log4perl Store data for later use in another program, a later run of the same program, or to send them over a network Write programs as modules to get the benefit of Perl's distribution and testing tools Appendices include "brian's Guide to Solving Any Perl Problem" to improve your troubleshooting skills, as well as suggested reading to continue your Perl education. Mastering Perl starts you on your path to becoming the person with the answers, and, failing that, the person who knows how to find the answers or discover the problem.

Oracle Database 11g SQL


Jason Price - 2007
    Published by Oracle Press, Oracle Database 11g SQL explains how to retrieve and modify database information, use SQL Plus and SQL Developer, work with database objects, write PL/SQL programs, and much more. Inside, you'll find in-depth coverage of the very latest SQL features and tools, performance optimization techniques, advanced queries, Java support, and XML. This book contains everything you need to master SQL.Explore SQL Plus and SQL DeveloperUse SQL SELECT, INSERT, UPDATE, and DELETE statementsWrite PL/SQL programsCreate tables, sequences, indexes, views, and triggersWrite advanced queries containing complex analytical functionsCreate database objects and collections to handle abstract dataUse large objects to handle multimedia files containing music and moviesWrite Java programs to access an Oracle Database using JDBCTune your SQL statements to make them execute fasterExplore the XML capabilities of the Oracle DatabaseMaster the very latest Oracle Database 11g features, such as PIVOT and UNPIVOT, flashback archives, and much more

Nonlinear Dimensionality Reduction (Information Science And Statistics)


John A. Lee - 2007
    Each description starts from intuitive ideas, develops the necessary mathematical details, and ends by outlining the algorithmic implementation. The text provides a lucid summary of facts and concepts relating to well-known methods as well as recent developments in nonlinear dimensionality reduction. Methods are all described from a unifying point of view, which helps to highlight their respective strengths and shortcomings. The presentation will appeal to statisticians, computer scientists and data analysts, and other practitioners having a basic background in statistics or computational learning.

Regular Expression Pocket Reference: Regular Expressions for Perl, Ruby, PHP, Python, C, Java and .NET


Tony Stubblebine - 2007
    Ideal as a quick reference, Regular Expression Pocket Reference covers the regular expression APIs for Perl 5.8, Ruby (including some upcoming 1.9 features), Java, PHP, .NET and C#, Python, vi, JavaScript, and the PCRE regular expression libraries. This concise and easy-to-use reference puts a very powerful tool for manipulating text and data right at your fingertips. Composed of a mixture of symbols and text, regular expressions can be an outlet for creativity, for brilliant programming, and for the elegant solution. Regular Expression Pocket Reference offers an introduction to regular expressions, pattern matching, metacharacters, modes and constructs, and then provides separate sections for each of the language APIs, with complete regex listings including:Supported metacharacters for each language API Regular expression classes and interfaces for Ruby, Java, .NET, and C# Regular expression operators for Perl 5.8 Regular expression module objects and functions for Python Pattern-matching functions for PHP and the vi editor Pattern-matching methods and objects for JavaScript Unicode Support for each of the languages With plenty of examples and other resources, Regular Expression Pocket Reference summarizes the complex rules for performing this critical text-processing function, and presents this often-confusing topic in a friendly and well-organized format. This guide makes an ideal on-the-job companion.

Virtual Honeypots: From Botnet Tracking to Intrusion Detection


Niels Provos - 2007
    It is comprehensive and well written. The authors provide us with an insider's look at virtual honeypots and even help us in setting up and understanding an otherwise very complex technology.--Stefan Kelm, Secorvo Security ConsultingVirtual Honeypots is the best reference for honeypots today. Security experts Niels Provos and Thorsten Holz cover a large breadth of cutting-edge topics, from low-interaction honeypots to botnets and malware. If you want to learn about the latest types of honeypots, how they work, and what they can do for you, this is the resource you need.--Lance Spitzner, Founder, Honeynet ProjectWhether gathering intelligence for research and defense, quarantining malware outbreaks within the enterprise, or tending hacker ant farms at home for fun, you'll find many practical techniques in the black art of deception detailed in this book. Honeypot magic revealed!--Doug Song, Chief Security Architect, Arbor NetworksSeeking the safest paths through the unknown sunny islands called honeypots? Trying to avoid greedy pirates catching treasures deeper and deeper beyond your ports? With this book, any reader will definitely get the right map to handle current cyber-threats.Designed by two famous white hats, Niels Provos and Thorsten Holz, it carefully teaches everything from the concepts to practical real-life examples with virtual honeypots. The main strength of this book relies in how it covers so many uses of honeypots: improving intrusion detection systems, slowing down and following incoming attackers, catching and analyzing 0-days or malwares or botnets, and so on.Sailing the high seas of our cyber-society or surfing the Net, from students to experts, it's a must-read for people really aware of computer security, who would like to fight against black-hats flags with advanced modern tools like honeypots.--Laurent Oudot, Computer Security Expert, CEAProvos and Holz have written the book that the bad guys don't want you to read. This detailed and comprehensive look at honeypots provides step-by-step instructions on tripping up attackers and learning their tricks while lulling them into a false sense of security. Whether you are a practitioner, an educator, or a student, this book has a tremendous amount to offer. The underlying theory of honeypots is covered, but the majority of the text is a 'how-to' guide on setting up honeypots, configuring them, and getting the most out of these traps, while keeping actual systems safe. Not since the invention of the firewall has a tool as useful as this provided security specialists with an edge in the never-ending arms race to secure computer systems. Virtual Honeypots is a must-read and belongs on the bookshelf of anyone who is serious about security.--Aviel D. Rubin, Ph.D., Computer Science Professor and Technical Director of the Information Security Institute at Johns Hopkins University, and President and Founder, Independent Security EvaluatorsAn awesome coverage of modern honeypot technologies, both conceptual and practical.--Anton ChuvakinHoneypots have grown from simple geek tools to key components in research and threat monitoring at major entreprises and security vendors. Thorsten and Niels comprehensive coverage of tools and techniques takes you behind the scene with real-world examples of deployment, data acquisition, and analysis.--Nicolas Fischbach, Senior Manager, Network Engineering Security, COLT Telecom, and Founder of S�curit�.OrgHoneypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there's a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and cheaper to build, deploy, and maintain.In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you'll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you've never deployed a honeypot before.You'll learn through examples, including Honeyd, the acclaimed virtual honeypot created by coauthor Niels Provos. The authors also present multiple real-world applications for virtual honeypots, including network decoy, worm detection, spam prevention, and network simulation.After reading this book, you will be able toCompare high-interaction honeypots that provide real systems and services and the low-interaction honeypots that emulate them Install and configure Honeyd to simulate multiple operating systems, services, and network environments Use virtual honeypots to capture worms, bots, and other malware Create high-performance hybrid honeypots that draw on technologies from both low- and high-interaction honeypots Implement client honeypots that actively seek out dangerous Internet locations Understand how attackers identify and circumvent honeypots Analyze the botnets your honeypot identifies, and the malware it captures Preview the future evolution of both virtual and physical honeypots

Excel 2007 Formulas [With CDROM]


John Walkenbach - 2007
    Spreadsheet," is one of the world's leading authorities on ExcelThoroughly updated to cover the revamped Excel interface, new file formats, enhanced interactivity with other Office applications, and upgraded collaboration featuresIncludes a valuable CD-ROM with templates and worksheets from the bookNote: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Patterns in Network Architecture: A Return to Fundamentals (Paperback): A Return to Fundamentals


John Day - 2007
    Piercing the fog of history, he bridges the gap between our experience from the original ARPANET and today's Internet to a new perspective on networking. Along the way, he shows how socioeconomic forces derailed progress and led to the current crisis. Beginning with the seven fundamental, and still unanswered, questions identified during the ARPANET's development, Patterns in Network Architecture returns to bedrock and traces our experience both good and bad. Along the way, he uncovers overlooked patterns in protocols that simplify design and implementation and resolves the classic conflict between connection and connectionless while retaining the best of both. He finds deep new insights into the core challenges of naming and addressing, along with results from upper-layer architecture. All of this in Day's deft hands comes together in a tour de force of elegance and simplicity with the annoying turn of events that the answer has been staring us in the face: Operating systems tell us even more about networking than we thought. The result is, in essence, the first "unified theory of networking," and leads to a simpler, more powerful--and above all--more scalable network infrastructure. The book then lays the groundwork for how to exploit the result in the design, development, and management as we move beyond the limitations of the Internet. Using this new model, Day shows how many complex mechanisms in the Internet today (multihoming, mobility, and multicast) are, with this collapse in complexity, now simply a consequence of the structure. The problems of router table growth of such concern today disappear. The inescapable conclusion is that the Internet is an unfinished demo, more in the tradition of DOS than Unix, that has been living on Moore's Law and 30 years of band-aids. It is long past time to get networking back on track. - Patterns in network protocols that synthesize "contradictory" approaches and simplify design and implementation - "Deriving" that networking is interprocess communication (IPC) yielding - A distributed IPC model that repeats with different scope and range of operation - Making network addresses topological makes routing purely a local matter - That in fact, private addresses are the norm--not the exception--with the consequence that the global public addresses required today are unnecessary - That mobility is dynamic multihoming and unicast is a subset of multicast, but multicast devolves into unicast and facilitates mobility - That the Internet today is more like DOS, but what we need should be more like Unix - For networking researchers, architects, designers, engineers Provocative, elegant, and profound, Patterns in Network Architecture transforms the way you envision, architect, and implement networks. Preface: The Seven Unanswered Questions xiii Chapter 1: Foundations for Network Architecture 1 Chapter 2: Protocol Elements 23 Chapter 3: Patterns in Protocols 57 Chapter 4: Stalking the Upper-Layer Architecture 97 Chapter 5: Naming and Addressing 141 Chapter 6: Divining Layers 185 Chapter 7: The Network IPC Model 235 Chapter 8: Making Addresses Topological 283 Chapter 9: Multihoming, Multicast, and Mobility 317 Chapter 10: Backing Out of a Blind Alley 351 Appendix A: Outline for Gedanken Experiment on Separating Mechanism and Policy 385 Bibliography 389 Index 399

Filthy Rich Clients: Developing Animated and Graphical Effects for Desktop Java� Applications


Chet Haase - 2007
    They suck the user in from the outset and hang on to them with a death grip of excitement. Filthy Rich Clients: Developing Animated and Graphical Effects for Desktop Java(TM) Applications shows you how to build better, more effective, cooler desktop applications that intensify the user experience.The keys to Filthy Rich Clients are graphical and animated effects. These kinds of effects provide ways of enhancing the user experience of the application through more attractive GUIs, dynamic effects that give your application a pulse, and animated transitions that keep your user connected to the logical flow of the application. The book also discusses how to do so effectively, making sure to enrich applications in sensible ways.In-depth coverage includesGraphics and GUI fundamentals: Dig deep into the internals of how Swing and Java 2D work together to display GUI applications onscreen. Learn how to maximize the flexibility of these libraries and use them most effectively. Performance: Follow in-depth discussions and tips throughout the book that will help you write high-performing GUI applications. Images: Understand how images are created and used to make better Java applications. Advanced graphics: Learn more about elements of Swing and Java 2D that are of particular benefit to Filthy Rich Clients. Animation: Discover general concepts of animation, as well as how to use the facilities provided in the Java platform. Learn new utility libraries that vastly simplify animations in Java. Effects: Learn how to create, customize, and use static and animated effects--the mainstays of Filthy Rich Clients. Code examples illustrate key concepts, and the book's companion Web site, http: //filthyrichclients.org, includes extensive demos, utility libraries, additional information on related technologies, and more.Informal, fun, and, most of all, useful, this book is great for any developer working with Java to build desktop applications.

CCNA - Cisco Certified Network Associate Study Guide: Exam 640-802


Todd Lammle - 2007
    Completely Revised for the New 2007 Version of the CCNA Exam (#640-802) Cisco networking authority Todd Lammle has completely updated this new edition to cover all of the exam objectives for the latest version of the CCNA exam.

Microsoft® Office Excel® 2007 Visual Basic® for Applications Step by Step


Reed Jacobson - 2007
    With Step By Step, you set the pace—building and practicing the skills you need, just when you need them!Create macros to automate repetitive tasksAutomatically format charts, shapes, and textManipulate tables and other objects—even build PivotTable reportsWrite your own functions and proceduresUse loops and conditions to add decision logic to macrosBuild custom command buttons, dialog boxes, and user forms Your all-in-one learning experience includes:Files for building skills and practicing the book’s lessonsFully searchable eBookWindows Vista® Product Guide eReference—plus other resources on CD A Note Regarding the CD or DVD The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via OReilly Medias Digital Distribution services. To download this content, please visit OReillys web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Computer Forensics Library Boxed Set


Keith J. Jones - 2007
    Forensic Discovery unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder. I highly recommend reading this book. --Richard Bejtlich, TaoSecurity Praise for Real Digital Forensics Real Digital Forensics is as practical as a printed book can be. In a very methodical fashion, the authors cover live response (Unix, Windows), network-based forensics following the NSM model (Unix, Windows), forensics duplication, common forensics analysis techniques (such as file recovery and Internet history review), hostile binary analysis (Unix, Windows), creating a forensics toolkit and PDA, flash and USB drive forensics. The book is both comprehensive and in-depth; following the text and trying the investigations using the enclosed DVD definitely presents an effective way to learn forensic techniques.--Anton Chuvakin, LogLogic Praise for File System Forensic Analysis Carrier has achieved what few technical authors do, namely a clear explanation of highly technical topics that retains a level of detail making it valuable for the long term. For anyone looking seriously at electronic forensics, this is a must have. File System Forensic Analysis is a great technical resource. --Jose Nazario, Arbor Networks The Computer Forensics Library With the ever-increasing number of computer-related crimes, more and more professionals find themselves needing to conduct a forensics examination. But where to start? What if you don't have the time or resources to take a lengthy training course? We've assembled the works of today's leading forensics experts to help you dive into forensics, give you perspective on the big picture of forensic investigations, and arm you to handle the nitty-gritty technicalities of the toughest cases out there. Forensic Discovery, the definitive guide, presents a thorough introduction to the field of computer forensics. Authors Dan Farmer and Wietse Venema cover everything from file systems to memory andkernel hacks and malware.They expose many myths about forensics that can stand in the way of success. This succinct book will get you started with the realities of forensics. Real Digital Forensics allows you to dive right in to an investigation and learn by doing. Authors Keith J. Jones, Richard Bejtlich, and Curtis W. Rose walk you through six detailed, highly realistic investigations and provide a DVD with all the data you need to follow along and practice. Once you understand the big picture of computer forensics, this book will show you what a Unix or Windows investigation really looks like. File System Forensic Analysis completes the set and provides the information you need to investigate a computer's file system. Most digital evidence is stored within the computer's file system, so many investigations will inevitably lead there. But understanding how the file system works is one of the most technically challenging concepts for digital investigators. With this book, expert Brian Carrier closes out the set by providing details about file system analysis available nowhere else.

The Art and Science of Java


Eric S. Roberts - 2007
    By following the recommendations of the Association of Computing Machinery's Java Task Force, this first edition text adopts a modern objects-first approach that introduces readers to useful hierarchies from the very beginning.KEY TOPICS: Introduction; Programming by Example; Expressions; Statement Forms; Methods; Objects and Classes; Objects and Memory; Strings and Characters; Object-Oriented Graphics; Event-Driven Programs; Arrays and ArrayLists; Searching and Sorting; Collection Classes; Looking Ahead.MARKET: A modern objects-first approach to the Java programming language that introduces readers to useful class hierarchies from the very beginning.

Randomness and Complexity, from Leibniz to Chaitin


Cristian S. Calude - 2007
    This is a unique volume including technical contributions, philosophical papers and essays.

Look Smarter than You Are with Hyperion Essbase


Edward Roske - 2007
    To survive and be productive in the business world, you need to take control of Essbase. If you don't have time (and money in the budget) to go to a class, if you just want to learn at your own pace, or if you want the information not covered in classes, this book will show you the way. Whether you're an end user looking to better analyze information or an admin building new applications, you will become a master of Essbase as your fellow workers look at you in sheer, dumbstruck awe. You will learn how to: Use the Excel Add-In and Smart View Add-in to retrieve and analyze data. Create dynamic reports that change as new data is uploaded. Build different types of applications quickly and easily following the proven steps provided in this guide. Use advanced techniques such as tuning and optimization, calc scripts, and MaxL.

Outlook 2007 All-In-One Desk Reference for Dummies


Jennifer Fulton - 2007
    Nine minibooks spanning more than 800 pages make this an indispensable guide for Outlook power users Covers the new Outlook interface and features and offers detailed coverage of Outlook tools, techniques, and tricks Minibooks include: Outlook basics; e-mail, RSS, and news; personal information management; managing and controlling information; collaboration; functional forms; VBA programming; managing business information; and maintenance, management, and troubleshooting Office has more than 120 million users worldwide-90 percent of the business productivity software market-and most of these users look to Outlook for e-mail, calendaring, and personal information management

Microsoft Excel & Access Integration: With Office 2007


Michael Alexander - 2007
    In this book, you'll discover how Access benefits from Excel's flexible presentation layer and versatile analysis capabilities, while Access's relational database structure and robust querying tools enhance Excel. Once you learn to make the two work together, you'll find that your team's productivity is the real winner.

How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access


Henrik Walther - 2007
    For the average system administrator, it will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat will help you get Exchange Server 2007 up and running as quickly and safely as possible.- Understand Exchange 2007 PrerequisitesReview hardware and software requirements, Active Directory requirements, and more.- Manage Recipient FilteringCreate a custom MMC that contains the Exchange 2007 Recipients work center, which can be used, for example, by the helpdesk staff in your organization.- Manage Outlook AnywhereOutlook Anywhere makes it possible for your end users to remotely access their mailboxes from the Internet using their full Outlook clients.- Manage Outlook Web Access 2007See how Outlook Web Access 2007 was completely rewritten in managed code to make it scale even better.- Use the Exchange 2007 Queue ViewerYou can now view information about queues and examine the messages held within them.- Master Powerful Out-of-the-Box Spam ProtectionThe Edge Transport server supports SMTP, provides several antispam filtering agents, and supports antivirus extensibility.- Manage a Single-Copy Cluster-Based SetupSCC-based cluster provides service failover and still has a single point of failure when it comes to the databases.- Recover Mailbox DatabasesUse the improved database portability feature to port and recover a Mailbox database to any server in the Exchange 2007 organization.

Guide to Tactical Perimeter Defense: Becoming a Security Network Specialist


Randy Weaver - 2007
    Written to map to the Security Certified Network Specialist certification (SCO-451), this book includes coverage of network security threats and goals, advanced TCP/IP concepts, router security, intrusion detection, firewall design and configuration, IPSec and virtual private network (VPN) design, and wireless network design and security.

Oracle Automatic Storage Management: Under-The-Hood & Practical Deployment Guide


Nitin Vengurlakar - 2007
    Written by a team of database experts, Oracle Automatic Storage Management: Under-the-Hood & Practical Deployment Guide explains how to build and maintain a dynamic, highly available Oracle database storage environment. Inside, you'll learn how to configure storage for Oracle ASM, build disk groups, use data striping and mirroring, and optimize performance. You'll also learn how to ensure consistency across server and storage platforms, maximize data redundancy, and administer Oracle ASM from the command line.Manage Oracle ASM Instances and configure Oracle RDBMS instances to leverage Oracle ASMDefine, discover, and manage disk storage under Oracle ASMCreate external, normal-redundancy, and high-redundancy disk groupsAdd and remove Oracle ASM storage without affecting RDMS instance availabilityLearn how Oracle ASM provides even I/O distributionWork with Oracle ASM directories, files, templates, and aliasesImprove storage performance and integrity using the ASMLIB APISimplify system administration with the Oracle ASM command line interfaceUnderstand key internal Oracle ASM structures and algorithms

Character Animation: 2D Skills for Better 3D


Steve Roberts - 2007
    Traditional animation skills and techniques are presented in both 2D and 3D space. The companion CD features demonstration animations and exercises conducted in each of the major animation packages including 3ds Max, LightWave, Maya, and XSI Softimage.• Readers will achieve improved 3D animation with a practical understanding of foundational animation skills • Theory is balanced with practical exercises in drawn and 3D animation.• Companion CD-ROM includes short demonstration movies, 3D exercises, and 20 rigged models for practice.

Advanced Microsoft® Office Documents 2007 Edition Inside Out


Stephanie Krieger - 2007
    This book is packed with advanced timesaving tips and troubleshooting methods to help you learn the smartest, simplest ways to create powerful documents. Discover how the experts approach document production—and reach new levels of mastery!Exploit the power of tables, Themes, and templates Produce professional-quality graphics using new SmartArt diagrams, custom shapes, and other drawing tools Customize and reuse content with Building Blocks and Content Controls Learn advanced techniques for managing slide masters and custom layouts for effective presentations Design PivotTables for more powerful data analysis and reporting Build sophisticated Excel 2007 chart types and customize chart elements Use Microsoft Visual Basic for Applications (VBA) to automate document production and customize templates Customize the Office Fluent Ribbon and troubleshoot your documents with Office Open XML CD includes:Fully searchable eBook Sample documents and templates VBA and Office Open XML code samples Author webcasts—see advanced techniques in action Tool for binding custom XML to content controls in Word 2007 Files for customizing the Fluent Ribbon Links to articles blogs, and developer learning resources Windows Vista Product Guide eReference and other eBooks A Note Regarding the CD or DVDThe print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Microsoft Office Excel 2007 Step by Step


Curtis D. Frye - 2007
    With Step By Step, you set the pace—building and practicing the skills you need, just when you need them! Create formulas, calculate values, and analyze data Present information visually with graphics, charts, and diagrams Build PivotTable dynamic views—even easier with new data tables Reuse information from databases and other documents Share spreadsheets for review and manage changes Create macros to automate repetitive tasks and simplify your work Your all-in-one learning experience includes: Files for building skills and practicing the book’s lessons Fully searchable eBook Bonus quick reference to the Ribbon, the new Microsoft Office interface Windows Vista® Product Guide eReference—plus other resources on CD A Note Regarding the CD or DVD The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via OReilly Medias Digital Distribution services. To download this content, please visit OReillys web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Apple Training Series: Mac OS X Support Essentials


Kevin M. White - 2007
    Following the learning objectives of the Apple Certified Support Professional exam, the lessons in this self-paced volume serve as a perfect guide for Apple’s own training class and a first-rate primer for computer support personnel who need to troubleshoot and optimize Mac OS X as part of their jobs. Lesson-review quizzes reinforce the knowledge gained along the way.

Accelerated VB 2008


Trey Nash - 2007
    Even someone familiar with Visual Basic 6.0 who is looking for an object-oriented language will find VB 2008 easy to pick up. However, though VB 2008, coupled with .NET, provides a quick path for creating simple applications, you still must know a wealth of information and understand how to use it correctly in order to produce sophis- cated, robust, fault-tolerant applications. We teach you what you need to know and explain how best to use your knowledge so that you can quickly develop true VB 2008 expertise. Idioms and design patterns are invaluable for developing and applying expertise, and we show you how to use many of them to create applications that are efficient, robust, fault-tolerant, and exception-safe. Although many are familiar to C++ and Java programmers, some are unique to .NET and the Common Language Runtime (CLR). We show you how to apply these indispen- ble idioms and design techniques to seamlessly integrate your VB 2008 applications with the .NET runtime, focusing on the new capabilities of VB 2008. Design patterns document best practices in application design that many different p- grammers have discovered and rediscovered over time. In fact, .NET itself implements many well-known design patterns. You will see these practices detailed throughout this book. Also, it is important to note that the invaluable tool chest of techniques is evolving constantly.

An Introduction to HTML and JavaScript for Scientists and Engineers


David R. Brooks - 2007
    This book presents HTML and JavaScript in a way that uniquely meets the needs of students in both engineering and the sciences. The author shows how to create simple client-side applications for scientific and engineering calculations. Complete HTML/JavaScript examples with science/engineering applications are used throughout to guide the reader comprehensively through the subject. The book gives the reader a sufficient understanding of HTML and JavaScript to write their online applications. This book emphasises basic programming principles in a modern Web-oriented environment, making it suitable for an introductory programming course for non-computer science majors. It is also ideal for self-study.

Mac OS X Leopard for Dummies


Bob LeVitus - 2007
    While the Mac has built its reputation in part on being user-friendly, OS X Leopard has lots of features that do lots of things--and that's where Mac OS X Leopard For Dummies puts you a step ahead. If you're meeting your first Mac, start at the beginning and you'll feel like a pro in no time. If you're familiar with earlier incarnations of OS X, you can jump right to the chapters on organizing your files and getting a sneak peek with Quick Look, backing up with the cool new Time Machine, using Spaces to manage Finder and application windows, and getting down with all the cool Mac multimedia features.Mac OS X Leopard For Dummies shows you how to:Customize your Dock and desktop Search smarter with Spotlight Sync your contacts and calendars Watch movies, play music, and download digital photos or video Start video chats on the fly Surf the Web with Safari--safely Get organized with Spaces Run Microsoft Windows on an Intel-based Mac Protect your kids with Parental Controls Set up a network and share files Written by Bob LeVitus, a.k.a. "Dr. Mac," Mac OS X Leopard For Dummies is quite likely the fastest and easiest way to tame a Leopard!

Professional C# 2005 with .Net 3.0


Christian Nagel - 2007
    Preparing readers to program in C#, this authoritative guide provides the necessary background information on how the .NET architecture works Begins with a tutorial on C# 2005 and the .NET 3.0 Framework, then moves through the vast .NET class library, showing how C# can be used to solve various tasks Includes coverage of the new .NET 3.0 Framework, Generics, ObjectSpaces, .NET 3.0 in SQL Server, ASP.NET 3.0, Windows Communication Foundation, Windows Workflow Foundation, Windows Presentation Foundation, arrays, system transactions, tracing, and event logging Additional coverage includes such topics as writing Windows applications and Windows services, writing Web pages and Web services with ASP.NET 3.0, manipulating XML using C# 2005, and generating graphics using C# 2005

Mastering Joomla! 1.5 Extension and Framework Development


James Kennard - 2007
    The world's hottest open-source content management system, and winner of the 2006 Open Source CMS Prize, standard Joomla! does a great job managing website content; but its true power lies in its application framework, which facilitates creating sophisticated add-ons that extend Joomla! in virtually unlimited directions. If you've mastered the basics of creating Joomla! extensions using PHP, this book takes you to the next level, covering: best-practice design and coding for Joomla! components, modules, plugins, and other extensions; customizing page output; using JavaScript effects; using Web Services from within Joomla!; and ensuring your code is secure and error-free. A unique and comprehensive reference to the main areas of interest within the Joomla! framework is also included.

Digital Art Masters: Volume 2


3DTotal.com Ltd - 2007
    More than just a gallery book - in Digital Arts Masters each artist has written a breakdown overview, with supporting imagery of how they made their piece of work. With Digital Arts Masters you'll understand the artists' thought process and discover the tips, tricks and techniques which really work. Key Features: * 50+ artists and 900 stunning color images show the best in today's digital art* More than just a gallery - each artist offers insight into how their image was created* From the team at 3Dtotal.com - cutting edge imagery and techniqes

The Book of Pf: A No-Nonsense Guide to the Openbsd Firewall


Peter Hansteen - 2007
    Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF. The Book of PF is the product of Hansteen's knowledge and experience, teaching good practices as well as bare facts and software options. Throughout the book, Hansteen emphasizes the importance of staying in control by having a written network specification, using macros to make rule sets more readable, and performing rigid testing when loading in new rules.Today's system administrators face increasing challenges in the quest for network quality, and The Book of PF can help by demystifying the tools of modern *BSD network defense. But, perhaps more importantly, because we know you like to tinker, The Book of PF tackles a broad range of topics that will stimulate your mind and pad your resume, including how to:Create rule sets for all kinds of network traffic, whether it is crossing a simple home LAN, hiding behind NAT, traversing DMZs, or spanning bridges Use PF to create a wireless access point, and lock it down tight with authpf and special access restrictions Maximize availability by using redirection rules for load balancing and CARP for failover Use tables for proactive defense against would-be attackers and spammers Set up queues and traffic shaping with ALTQ, so your network stays responsive Master your logs with monitoring and visualization, because you can never be too paranoidThe Book of PF is written for BSD enthusiasts and network admins at any level of expertise. With more and more services placing high demands on bandwidth and increasing hostility coming from the Internet at-large, you can never be too skilled with PF.

Microsoft® Exchange Server 2007 Administrator's Pocket Consultant


William R. Stanek - 2007
    Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You’ll get the focused information you need to solve problems and get the job done—whether you’re at your desk or in the field!Get fast facts to:Configure and manage Exchange clientsSet up users, contacts, distribution lists, and address booksAdminister permissions, rules, policies, and security settings Manage databases and storage groups Optimize message processing, logging, and anti-spam filtering Administer at the command line using Exchange Management Shell Configure SMTP, connectors, links, and Edge subscriptions Manage mobile device features and client access Back up and restore systems

Programming Languages: Application and Interpretation


Shriram Krishnamurthi - 2007
    PDF version here: http://cs.brown.edu/courses/cs173/201...

MCITP Self-Paced Training Kit (Exam 70-685): Windows® 7 Enterprise Desktop Support Technician: Windows 7 Enterprise Desktop Support Technician


Tony Northrup - 2007
    This 2-in-1 kit includes the official Microsoft® study guide, plus practice tests on CD to help you assess your skills. It comes packed with the tools and features exam candidates want most-including in-depth, self-paced training based on final exam content; rigorous, objective-by-objective review; exam tips from expert, exam-certified authors; and customizable testing options. It also provides real-world scenarios, case study examples, and troubleshooting labs to give you the skills and expertise you can use on the job. Work at your own pace through the lessons and lab exercises. The official study guide covers identifying and resolving desktop application, networking, security, and performance issues; supporting mobile users; and providing support for hardware failures.Then assess yourself using the 200 practice questions on CD, featuring multiple customizable testing options to meet your specific needs. Choose timed or untimed testing mode, generate random tests, or focus on discrete objectives. You get detailed explanations for right and wrong answers-including pointers back to the book for further study. You also get an exam discount voucher-making this kit an exceptional value and a great career investment.Assess your skills with practice tests. You can work through hundreds of questions using multiple testing modes to meet your specific learning needs. You get detailed explanations for right and wrong answers—including a customized learning path that describes how and where to focus your studies.

IBM System i APIs at Work


Bruce Vining - 2007
    Many System i programmers, however, do not have a working knowledge of the APIs available within i5/OS. Worse still, programmers who are familiar with the use of APIs may not be taking full advantage of the APIs and processing techniques available to them.In this book, author and noted IBM API expert Bruce Vining is your guide to making sense, and effectively mastering, the wide variety of APIs available with System i. Each chapter is full of real business-world examples that you can modify and use in your own environment.In recent years, the business programmer has had to integrate applications—often from different operating systems and programming platforms—using different languages to integrate business rules and requirements. APIs allow you to gain access to the underlying structure of an application. With this book you will soon realize that APIs are among the most powerful tools in your toolbox.New for this edition:• New chapters covering topics such as exit point concepts, Integrated File System, date and time, cryptographic services, TCP/IP, and more• Sorting, character data conversion, and user application information• APIs are covered in depth• Fully updated code on previous APIs to bring them up to newer standards• Updates to API changes since the previous edition• Modernized RPG code to demonstrate current coding style• An Appendix with COBOL examples and implementation including API equivalents for RPG support of memory management, bit testing, edit words, and more• Check Your Knowledge tasks at the conclusion of each chapter with solutions provided in RPG and COBOL Write client and server applications that enable your System i to communicatewith other systems, such as PCs, using sockets

Video Game Design Revealed


Guy W. Lecky-Thompson - 2007
    Videogame Design Revealed focuses on taking an idea, and creating a video game from it, taking into account all of the various approaches that may be taken, and their influence on the final product. This book is divided into three distinct parts - you are taken through a journey that begins with a look at how videogames have evolved over the years, as well as those designs that are have and those that have failed. Including chapters on platforms and technologies, videogame design in practice, game mechanics, videogame AI design, and more, this book is great for anyone interested in learning more about videogame creation.

Teach Yourself VISUALLY Flash CS3 Professional


Sherry Willard Kinkoph Gunter - 2007
    No long-winded explanations, just easy, visual directions for performing such necessary operations as creating objects, symbols, and instances; controlling playback with the Timeline; adding interactivity with buttons; organizing project assets with the Library; creating animation with tweens; and adding sound and video . Helpful sidebars offer practical tips and tricks, and it's all presented for the visual learner.

Toward Brain-Computer Interfacing


Guido Dornhege - 2007
    The brain-computer interface (BCI) would allow humans to operate computers, wheelchairs, prostheses, and other devices, using brain signals only. BCI research may someday provide a communication channel for patients with severe physical disabilities but intact cognitive functions, a working tool in computational neuroscience that contributes to a better understanding of the brain, and a novel independent interface for human-machine communication that offers new options for monitoring and control. This volume presents a timely overview of the latest BCI research, with contributions from many of the important research groups in the field. The book covers a broad range of topics, describing work on both noninvasive (that is, without the implantation of electrodes) and invasive approaches. Other chapters discuss relevant techniques from machine learning and signal processing, existing software for BCI, and possible applications of BCI research in the real world.

Gadgets, Games, and Gizmos for Learning: Tools and Techniques for Transferring Know-How from Boomers to Gamers


Karl M. Kapp - 2007
    The book outlines how gamer values such as the use of cheat codes, the love of gadgets, the need to play games, and the desire to be constantly connected can be used as methods for moving information from the heads of the boomers to the fingertips and gadgets of the gamers. As organizations begin to think strategically about how to attract, retain, and train new talent, this book, written by Karl Kapp, named one of 2007's Top 20 Most Influential Training Professionals by TrainingIndustry, Inc., will be an invaluable resource.

Videogames and Art


Andy Clarke - 2007
    Acknowledging the increasing cultural impact of this rapidly changing industry on artistic and creative practices, Videogames and Art features in-depth essays that offer an unparalleled overview of the field.Together, the contributions position videogame art as an interdisciplinary mix of digital technologies and the traditional art forms. Of particular interest in this volume are machinima, game console artwork, politically oriented videogame art, and the production of digital art. This new and revised edition features an extended critical introduction from the editors and updated interviews with the foremost artists in the field. Rounding out the book is a critique of the commercial videogame industry comprising essays on the current quality and originality of videogames.

Exploring Microsoft Office Excel 2007: Comprehensive (With CD-ROM)


Robert T. Grauer - 2007
    " The goal of the "Exploring Series" has been to move students beyond the point and click, helping them understand the why and how behind each skill. Students go to college now with a different set of skills than they did 5 years ago. The new edition of Exploring moves students beyond the basics of the software at a faster pace, without sacrificing fundamental skills to ensure that they will be engaged throughout the book.

Building Robots with Lego Mindstorms NXT


Mario Ferrari - 2007
    This book updates the robotics information to be compatible with the new set and to show how sound, sight, touch, and distance issues are now dealt with.The LEGO MINDSTORMS NXT and its predecessor, the LEGO MINDSTORMS Robotics Invention System (RIS), have been called the most creative play system ever developed. This book unleashes the full power and potential of the tools, sensors, and components that make up LEGO MINDSTORMS NXT. It also provides a unique insight on newer studless building techniques as well as interfacing with the traditional studded beams. Some of the world's leading LEGO MINDSTORMS inventors share their knowledge and development secrets. You will discover an incredible range of ideas to inspire your next invention. This is the ultimate insider's look at LEGO MINDSTORMS NXT system and is the perfect book whether you build world-class competitive robots or just like to mess around for the fun of it.Featuring an introduction by astronaut Dan Barry and written by Dave Astolfo, Invited Member of the MINDSTORMS Developer Program and MINDSTORMS Community Partners (MCP) groups, and Mario and Guilio Ferrari, authors of the bestselling Building Robots with LEGO Mindstorms, this book covers:Understanding LEGO GeometryPlaying with GearsControlling MotorsReading SensorsWhat's New with the NXT?Building StrategiesProgramming the NXTPlaying Sounds and MusicBecoming MobileGetting Pumped: PneumaticsFinding and Grabbing ObjectsDoing the MathKnowing Where You AreClassic ProjectsBuilding Robots That WalkRobotic AnimalsSolving a MazeDrawing and WritingRacing Against TimeHand-to-Hand CombatSearching for Precision

Cobit 4.1


IT Governance Institute - 2007
    COBIT enables clear policy development and good practice for IT control throughout organizations. COBIT emphasizes regulatory compliance, helps organizations to increase the value attained from IT, enables alignment and simplifies implementation of the COBIT framework. COBIT 4.1 refines and fine-tunes the material presented in COBIT 4.0 the first major update of the COBITcore content since the release of COBIT 3rd Edition in 2000. COBIT 4.1 includes guidance for boards of directors and all levels of management. It consists of four sections in a single publication: The executive overview The framework The core content (IT process description, control objectives, management guidelines and maturity models) Appendices (mappings, cross-references and a glossary) The core content is divided according to the 34 IT process. Each process is covered in four sections of approximately one page each, combining to give a complete picture of how to control, manage and measure the process. The four sections for each process, in order, are: The IT process description, which summarizes process goals, metrics and practices, and presents a mapping of the process to the process domains, information criteria and IT resources. The control objectives for the process Management guidelines: the process inputs and outputs, a RACI (Responsible, Accountable, Consulted and/or Informed) chart, goals and metrics The maturity model for the process A reference card is included that contains the main reference diagrams from the COBIT 4.1 publication, including the domain/process overview diagram; the process mapping tables; business goals/IT goals/IT processes tables; relationship among processes, goals and metrics; and the COBIT products schematic.

Next Generation Java Testing: TestNG and Advanced Concepts


Cedric Beust - 2007
     Next Generation Java(TM) Testing introduces breakthrough Java testing techniques and TestNG, a powerful open source Java testing platform.Cedric Beust, TestNG's creator, and leading Java developer Hani Suleiman, present powerful, flexible testing patterns that will work with virtually any testing tool, framework, or language. They show how to leverage key Java platform improvements designed to facilitate effective testing, such as dependency injection and mock objects. They also thoroughly introduce TestNG, demonstrating how it overcomes the limitations of older frameworks and enables new techniques, making it far easier to test today's complex software systems.Pragmatic and results-focused, Next Generation Java(TM) Testing will help Java developers build more robust code for today's mission-critical environments.This bookIlluminates the tradeoffs associated with testing, so you can make better decisions about what and how to test Introduces TestNG, explains its goals and features, and shows how to apply them in real-world environments Shows how to integrate TestNG with your existing code, development frameworks, and software libraries Demonstrates how to test crucial code features, such as encapsulation, state sharing, scopes, and thread safety Shows how to test application elements, including JavaEE APIs, databases, Web pages, and XML files Presents advanced techniques: testing partial failures, factories, dependent testing, remote invocation, cluster-based test farms, and more Walks through installing and using TestNG plug-ins for Eclipse, and IDEA Contains extensive code examples Whether you use TestNG, JUnit, or another testing framework, the testing design patterns presented in this book will show you how to improve your tests by giving you concrete advice on how to make your code and your design more testable.

The Designer's Desktop Manual


Jason Simmons - 2007
    This in depth guide offers insight into the technological issues and step-by-step skills needed to bring design to a professional standard. Readers will also find historical background on key topics, allowing them to put up-to-date techniques into context with the evolution of design.

Essential ActionScript 3.0


Colin Moock - 2007
    The enhancements to ActionScript's performance, feature set, ease of use, cleanliness, and sophistication are considerable. Essential ActionScript 3.0 focuses on the core language and object-oriented programming, along with the Flash Player API. Essential ActionScript has become the #1 resource for the Flash and ActionScript development community, and the reason is the author, Colin Moock. Many people even refer to it simply as "The Colin Moock book."And for good reason: No one is better at turning ActionScript inside out, learning its nuances and capabilities, and then explaining everything in such an accessible way. Colin Moock is not just a talented programmer and technologist; he's also a gifted teacher.Essential ActionScript 3.0 is a radically overhauled update to Essential ActionScript 2.0. True to its roots, the book once again focuses on the core language and object-oriented programming, but also adds a deep look at the centerpiece of Flash Player's new API: display programming. Enjoy hundreds of brand new pages covering exciting new language features, such as the DOM-based event architecture, E4X, and namespaces--all brimming with real-world sample code.The ActionScript 3.0 revolution is here, and Essential ActionScript 3.0's steady hand is waiting to guide you through it.Adobe Developer Library is a co-publishing partnership between O'Reilly Media and Adobe Systems, Inc. and is designed to produce the number one information resources for developers who use Adobe technologies. Created in 2006, the Adobe Developer Library is the official source for comprehensive learning solutions to help developers create expressive and interactive web applications that can reach virtually anyone on any platform. With top-notch books and innovative online resources covering the latest in rich Internet application development, the Adobe Developer Library offers expert training and in-depth resources, straight from the source.

Head First SQL


Lynn Beighley - 2007
    Using the latest research in neurobiology, cognitive science, and learning theory to craft a multi-sensory SQL learning experience, Head First SQL has a visually rich format designed for the way your brain works, not a text-heavy approach that puts you to sleep. Maybe you've written some simple SQL queries to interact with databases. But now you want more, you want to really dig into those databases and work with your data. Head First SQL will show you the fundamentals of SQL and how to really take advantage of it. We'll take you on a journey through the language, from basic INSERT statements and SELECT queries to hardcore database manipulation with indices, joins, and transactions. We all know "Data is Power" - but we'll show you how to have "Power over your Data". Expect to have fun, expect to learn, and expect to be querying, normalizing, and joining your data like a pro by the time you're finished reading!

Professional BizTalk Server 2006


Darren Jefford - 2007
    Authored by highly-regarded consultants with a wealth of knowledge on designing, building, and operating enterprise applications using BizTalk, this comprehensive guide gives you the techniques and best practices you'll need to develop effective projects. Darren Jefford is a Principal Consultant with the Microsoft UK Application Development Consulting (ADC) team who has extensive real-world experience with BizTalk Server and the broader Microsoft platform. Kevin B. Smith formerly worked as a Technical Lead Software Design Engineer for the BizTalk Server Product Team and helped ship three versions of BizTalk Server. Ewan Fairweather works as a Premier Field Engineer for Microsoft, providing onsite support to enterprise customers, including maintaining and optimizing their BizTalk Server solutions.Achitects, developers, testers, and administrators will achieve instant success when they apply the deep technical information covered in this book. They will better appreciate the internal workings of BizTalk Server and will understand detailed solutions for challenges often experienced with BizTalk-based systems.

Formulas and Functions with Microsoft Office Excel 2007


Paul McFedries - 2007
    And if you're already an expert and you're moving up to Excel 2007, this book will quickly show you features you've only dreamed of until now..." --Thomas 'Duffbert' Duff, Duffbert's Random Musings, http: //www.twduff.com Develop your Microsoft Excel expertise instantly with proven techniquesMaster Excel Ranges Create Powerful Arrays Troubleshoot Formula Problems Validate Worksheet Data Perform What-If Analysis Model Your Business Track Trends and Make Forecasts Analyze Data Find Optimal Solutions Build Dynamic Loan Schedules Most Microsoft(R) Excel users learn only a small percentage of the program's features. They know they could get more out of Excel if they could just get a leg up on building formulas and using functions. Unfortunately, this side of Excel appears complex and intimidating to the uninitiated--shrouded in the mysteries of mathematics, finance, and impenetrable spreadsheet jargon. Sound familiar? If you're a businessperson who needs to use Excel as an everyday part of your job, then you've come to the right book. Formulas and Functions with Microsoft(R) Office Excel 2007 demystifies worksheet formulas and presents the most useful Excel functions in an accessible, jargon-free way. This book not only takes you through Excel's intermediate and advanced formula-building features, it also tells you why these features are useful to you and shows you how to use them in everyday situations. Throughout the book you'll find no-nonsense, step-by-step tutorials and lots of practical examples aimed directly at business users. - Focuses like a laser on the four technologies that you must master to get the most out of Excel: ranges, formulas, functions, and data analysis tools. - Shuns spreadsheet theory in favor of practical know-how that you can put to use right away. - Provides numerous real-world examples and techniques to help you learn and understand the importance of each section. Introduction 1 Getting the Most Out of Ranges 2 Using Range Names 3 Building Basic Formulas 4 Creating Advanced Formulas 5 Troubleshooting Formulas II Harnessing the Power of Functions 6 Understanding Functions 7 Working with Text Functions 8 Working with Logical and Information Functions 9 Working with Lookup Functions 10 Working with Date and Time Functions 11 Working with Math Functions 12 Working with Statistical Functions III Building Business Models 13 Analyzing Data with Tables 14 Analyzing Data with PivotTables 15 Using Excel's Business-Modeling Tools 16 Using Regression to Track Trends and Make Forecasts 17 Solving Complex Problems with Solver IV Building Financial Formulas 18 Building Loan Formulas 19 Building Investment Formulas 20 Building Discount Formulas Paul McFedries is well-known as a teacher of Windows and Office, particularly Excel, and is the president of Logophilia Limited, a technical writing company. Paul has been working with spreadsheets for more than 20 years and has been developing Excel solutions since the late 1980s. Now primarily a writer, Paul has written more than 50 books that have sold more than three million copies worldwide. These books include Microsoft Office Access 2007 Forms, Reports, and Queries; Tricks of the Microsoft Office 2007 Gurus (all from Que); and Microsoft Windows Vista Unleashed (Sams). Category Office Productivity Suite Covers Microsoft Office Excel 2007 User Level Intermediate - Advanced