Book picks similar to
Solaris Security by Peter H. Gregory
computers
unix
security
albabbage
The Protocols (TCP/IP Illustrated, Volume 1)
W. Richard Stevens - 1993
In eight chapters, it provides the most thorough coverage of TCP available. It also covers the newest TCP/IP features, including multicasting, path MTU discovery and long fat pipes. The author describes various protocols, including ARP, ICMP and UDP. He utilizes network diagnostic tools to actually show the protocols in action. He also explains how to avoid silly window syndrome (SWS) by using numerous helpful diagrams. This book gives you a broader understanding of concepts like connection establishment, timeout, retransmission and fragmentation. It is ideal for anyone wanting to gain a greater understanding of how the TCP/IP protocols work.
The Full Tilt Poker Strategy Guide: Tournament Edition
Michael CraigTed Forrest - 2007
Their accomplishments are unparalleled, with countless World Series of Poker and World Poker Tour championships to their names and well in excess of $100 million in winnings in private games. Now, this group of poker legends has banded together to create The Full Tilt Poker Strategy Guide, which will stand as an instant classic of the genre and is sure to become the industry standard.
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson - 2008
Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
Building Scalable Web Sites
Cal Henderson - 2006
Culled from the experience of the Flickr.com lead developer, Building Scalable Web Sites offers techniques for creating fast sites that your visitors will find a pleasure to use. Creating popular sites requires much more than fast hardware with lots of memory and hard drive space. It requires thinking about how to grow over time, how to make the same resources accessible to audiences with different expectations, and how to have a team of developers work on a site without creating new problems for visitors and for each other. Presenting information to visitors from all over the world Integrating email with your web applications Planning hardware purchases and hosting options to have as much as you need without breaking your wallet Partitioning and distributing databases to support large datasets and simultaneous transactions Monitoring your applications to find and clear bottlenecks * Providing services APIs and using services from other providers to increase your site's reach and capabilities Whether you're starting a small web site with hopes of growing big or you already have a large system that needs maintenance, you'll find Building Scalable Web Sites to be a library of ideas for making things work.
The Unified Software Development Process
Ivar Jacobson - 1999
This book demonstrates how the notation and process complement one another, using UML models to illustrate the new process in action. It describes the constructs such as use cases, actors, and more.
Tata
Morgen Witzel - 2010
1 Lakh/ below US$ 2500 car), is set to change our perception of India': on the threshold of becoming a truly global brand.*s oldest and most respected corporate brand. With a major international presence, in a variety of areas including steel, tea, chemicals, communications and software, Tata now stands 65th in the world brand valuation league. But what is the Tata brand all about? What are its values? How do people perceive it, in India and around the world? In this absorbing and informed book Morgen Witzel digs into the heart of the Tata enterprise, describes its origins, how Tata's reputation and image evolved, and how the group has worked to transform that image into a powerful and valuable brand. Tata: The Evolution of a Corporate Brand goes to the core of the Tata ethos to explore the unique relationship between the Tata group and the Indian people, a relationship that goes beyond the achievements of a successful business to its social contributions for its employees and the society at large. Finally it asks how that reputation will be perceived and understood as Tata moves into global markets. Whether you re an entrepreneur, a manager, a marketer, or an interested Tata loyalist this book will help you understand the durability of the brand and inspire you with the values it holds onto in the global economy.
MySQL
Paul DuBois - 1999
As an important contributor to the online documentation for MySQL, Paul uses his day-to-day experience answering questions users post on the MySQL mailing list to pinpoint the problems most users and administrators encounter. The principal MySQL developer, Monty Widenius, along with a network of his fellow developers, reviewed the manuscript, providing Paul with the kind of insight no one else could supply. Instead of merely giving you a general overview of MySQL, Paul teaches you how to make the most of its capabilities. Through two sample databases that run throughout the book, he gives you solutions to problems you'll likely face. He helps you integrate MySQL efficiently with third-party tools, such as PHP and Perl, enabling you to generate dynamic Web pages through database queries. He also teaches you to write programs that access MySQL databases.
MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing, Configuring, and Administering Microsoft Windows XP Professional
Walter Glenn - 2005
Work at your own pace through a system of lessons, hands-on exercises, troubleshooting labs, and review questions.The Readiness Review Suite on CD, featuring advanced technology from MeasureUp, provides 425 challenging questions for in-depth self-assessment and practice. You can choose timed or untimed testing mode, generate random tests, or focus on specific objectives. You get detailed explanations for right and wrong answers--including a customized learning path that describes how and where to focus your studies.Maximize your performance on the exam by learning how to: Perform an installation or upgrade, including remote deploymentConfigure and customize the desktop environmentAdminister disks, device drivers, printers, file systems, and other resourcesManage TCP/IP networking and support remote and mobile usersMonitor, troubleshoot, and tune system performanceNEW!--Administer security settings and services, including the advances in Windows XP Service Pack 2Readiness Review Suite on CD Powered by MeasureUpYour kit includes: NEW--Fully reengineered self-paced study guide with expert exam tips. NEW--Readiness Review Suite featuring 425 questions and multiple testing options. NEW--Case scenarios and troubleshooting labs for real-world expertise. NEW--120-day evaluation version of Windows XP Professional software with Windows XP Service Pack 2.NEW--eBook in PDF format. NEW--Microsoft Encyclopedia of Security eBook. NEW--Microsoft Encyclopedia of Networking, Second Edition eBook.For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
The Mind's Sky: Human Intelligence in a Cosmic Context
Timothy Ferris - 1992
Other chapters look at comet strikes as a source of species extinction; near-death experience; apocalyptic prophecies; information theory; and the origin of laughter.
Rule the Web: How to Do Anything and Everything on the Internet--Better, Faster, Easier
Mark Frauenfelder - 2007
But aren't you curious about what else the Web can do for you? Or if there are better, faster, or easier ways to do what you're already doing? Let the world's foremost technology writer, Mark Frauenfelder, help you unlock the Internet's potential--and open up a richer, nimbler, and more useful trove of resources and services, including:EXPRESS YOURSELF, SAFELY. Create and share blogs, podcasts, and online video with friends, family, and millions of potential audience members, while protecting yourself from identity theft and fraud.DIVIDE AND CONQUER. Tackle even the most complex online tasks with ease, from whipping up a gorgeous Web site to doing all your work faster and more efficiently within your browser, from word processing to investing to planning a party.THE RIGHT WAY, EVERY TIME. Master state-of-the-art techniques for doing everything from selling your house to shopping for electronics, with hundreds of carefully researched tips and tricks.TIPS FROM THE INSIDERS. Mark has asked dozens of the best bloggers around to share their favorite tips on getting the most out of the Web.
Fuzzy Logic: The Revolutionary Computer Technology That Is Changing Our World
Daniel McNeill - 1993
Professor Lofti Zadeh masterminded "fuzzy logic"--a way of programming computers to "make decisions" bases on imprecise data and complex situations. In "Fuzzy Logic," Daniel McNeill and Paul Freiberger relate the compelling tale of this remarkable new technology, the genius who brought it to life, and how it will soon affect the lives of every one of us.
LDAP System Administration
Gerald Carter - 2003
That's what LDAP System Administration is all about.System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately see the updated information.Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux(R) distributions and Mac OS(R) X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses:Configuration and access controlDistributed directories; replication and referralUsing OpenLDAP to replace NISUsing OpenLDAP to manage email configurationsUsing LDAP for abstraction with FTP and HTTP servers, Samba, and RadiusInteroperating with different LDAP servers, including Active DirectoryProgramming using Net:: LDAPIf you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.
Grand Obsession: A Piano Odyssey
Perri Knize - 2008
Filled with little-known facts about the instrument and its mystique, this work is as enlightening as it is engaging.
Kindle Fire HDX & HD User's Guide Book: Unleash the Power of Your Tablet!
Shelby Johnson - 2012
With the new tablet, I absolutely love its many standard features and capabilities, but have found there is so much more that can be done with this amazing gadget. I’ve learned a lot of great things you can do with a Kindle Fire HD and want to help others get more out of their Kindle Fire HDX and HD devices. I've developed a comprehensive guide book to help users along on their device, including tips and tricks to really unlock and unleash the possibilities with the tablet. Here’s just some of the great info you’ll find in this User’s Guide Book: - Getting to know the various settings of your Kindle Fire HDX or HD - Browsing your Kindle and carousel - How to store your favorite content items on the device - Setting up security options to safeguard your device - Setting up your e-mail, contacts and calendar info - Setting up and using wireless networks - How to print from your Kindle Fire HD - How to install the Dolphin Browser with Adobe Flash - How to install the Google Chrome browser on your tablet - Pairing your Kindle Fire HD with a compatible Bluetooth phone or computer - How to set-up FreeTime for your kids to use your Kindle with restrictions - How to listen to the radio on your tablet - How to use your tablet to make phone calls for free! - How to download YouTube videos to your Kindle Fire HD - How to take photos and videos with your Kindle Fire HD camera - How to sideload apps on your Kindle Fire HD - Some of the best apps you can get for your tablet - Suggested apps to take your tablet to the next level! You’ll learn all of the above and more in this book which features color screenshots straight from the Kindle and step-by-step instructions on the processes involved in unleashing more powerful features for your Kindle Fire HD! There's also helpful links throughout the guide to take you right to the apps and websites being discussed. In all, this is a must-have ebook to get for any Kindle Fire HD user who wants to take their device to the next level! Note: Many of the tips and how-to's covered in this guide will also apply to the previous generation of the Kindle Fire HD, released in 2012. Please note this book is for owners of the American version of the Kindle Fire HDX & Kindle Fire HD tablets sold as of October 2013 in the United States.
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Michael Hale Ligh - 2014
As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.