Browse Results

Showing 901 through 925 of 82,737 results

How to Cheat at Configuring VmWare ESX Server (How to Cheat)

by David Rule Jr.

A virtual evolution in IT shops large and small has begun. VMware’s ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress’ proven “How to Cheat" methodology to configure and build VMware’s ESX Server version 3. This clear, concise guide provides all the information you need to become a virtual whiz!This book will detail the default and custom installation of VMware’s ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine templates. Best practices for securing and backing up your virtual environment are also provided. The book concludes with a series of handy, time-saving command and configuration for: bash shell keystrokes, Linux commands, configuration files, common/proc files, VMware ESX commands, and troubleshooting.• Reap the Benefits of Server VirtualizationRealize improved ROI, ensure efficient mergers and acquisitions, and reduce compliance risk exposure through server virtualization and consolidation.• Build a Virtual MachineCreate a Gold Master and use your VMlibrary to leverage the power and flexibility of VMware. • Manage Your Virtual InfrastructureUse VMware tools to partition physical servers and manage virtual machines.• Set Up Scripted InstallationSee how a scripted installation method can be a fast and efficient way to provision ESX hosts.• Master ESX Native ToolsUse tools like Esxtop to diagnose performance issues and vmkfstools to import and export• Install and Use VMware Scripting APIsDevelop programs to help automate and ease administration—even with a limited background in scripting or programming.• Learn the Fundamentals of a VM BackupVMware ESX ships with three scripts that work together to create a backup and restore system: vmsnap.pl, vmsnap_all.pl, and vmres.pl.• Extend a Cloned Windows VM’s Root PartitionUse Microsoft’s Sysprep utility to extend a newly deployed virtual machine’s root partition from the original clone size to a larger size.

Letting Go of the Words: Writing Web Content that Works (Interactive Technologies)

by Janice (Ginny) Redish

"Redish has done her homework and created a thorough overview of the issues in writing for the Web. Ironically, I must recommend that you read her every word so that you can find out why your customers won't read very many words on your website -- and what to do about it."-- Jakob Nielsen, Principal, Nielsen Norman Group“There are at least twelve billion web pages out there. Twelve billion voices talking, but saying mostly nothing. If just 1% of those pages followed Ginny’s practical, clear advice, the world would be a better place. Fortunately, you can follow her advice for 100% of your own site’s pages, so pick up a copy of Letting Go of the Words and start communicating effectively today."--Lou Rosenfeld, co-author, Information Architecture for the World Wide WebOn the web, whether on the job or at home, we usually want to grab information and use it quickly. We go to the web to get answers to questions or to complete tasks – to gather information, reading only what we need. We are all too busy to read much on the web.This book helps you write successfully for web users. It offers strategy, process, and tactics for creating or revising content for the web. It helps you plan, organize, write, design, and test web content that will make web users come back again and again to your site. Learn how to create usable and useful content for the web from the master − Ginny Redish. Ginny has taught and mentored hundreds of writers, information designers, and content owners in the principles and secrets of creating web information that is easy to scan, easy to read, and easy to use. This practical, informative book will help anyone creating web content do it better.Features* Clearly-explained guidelines with full color illustrations and examples from actual web sites throughout the book. * Written in easy-to-read style with many "befores" and "afters."* Specific guidelines for web-based press releases, legal notices, and other documents.* Tips on making web content accessible for people with special needs.Janice (Ginny) Redish has been helping clients and colleagues communicate clearly for more than 20 years. For the past ten years, her focus has been helping people create usable and useful web sites. She is co-author of two classic books on usability: A Practical Guide to Usability Testing (with Joseph Dumas), and User and Task Analysis for Interface Design (with JoAnn Hackos), and is the recipient of many awards.* Clearly-explained guidelines with full color illustrations and examples from actual web sites throughout the book.* Written in easy-to-read style with many "befores" and "afters."* Specific guidelines for web-based press releases, legal notices, and other documents. * Tips on making web content accessible for people with special needs.

Security+ Study Guide

by Ido Dubrawsky Jeremy Faircloth

Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study Guides The Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test preparation software for the edge you need to achieve certification on your first try! This system is comprehensive, affordable, and effective! * Completely Guaranteed Coverage of All Exam Objectives All five Security+ domains are covered in full: General Security Concepts, Communication Security, Infrastructure Security, Basics of Cryptography, and Operational / Organizational Security * Fully Integrated Learning This package includes a Study Guide and one complete practice exam. * Each chapter starts by explaining the exam objectives covered in the chapter You will always know what is expected of you within each of the exam’s domains. * Exam-Specific Chapter Elements Notes, Tips, Alerts, Exercises, Exam’s Eyeview, and Self Test with fully explained answers. * Test What You Learned Hundreds of self-test review questions test your knowledge of specific exam objectives. A Self Test Appendix features answers to all questions with complete explanations of correct and incorrect answers.Revision to market-leading first editionRealistic, Web-based practice exams included

Dr. Tom Shinder's ISA Server 2006 Migration Guide

by Thomas W Shinder

Dr. Tom Shinder’s ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ.* Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.* Learn to Publish Exchange Server 2007 Using ISA Server 2006.* Create a DMZ using ISA Server 2006.Dr. Tom Shinder’s previous two books on configuring ISA Server have sold more than 50,000 units worldwide.Dr. Tom Shinder is a Microsoft Most Valuable Professional (MVP) for ISA Server and a member of the ISA Server beta testing team.

How to Cheat at Securing SQL Server 2005

by Mark Horninger

The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help in order to get SQL Server secured as quickly and safely as possible.Provides the multi-tasked Sys Admin with the essential information needed to perform the daily tasksCovers SQL Server 2005, which is a massive product with significant challenges for IT managersEmphasizes best-practice security measures

Open Source Fuzzing Tools

by Noam Rathaus Gadi Evron

Fuzzing is often described as a “black box" software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. Such program errors and crashes are indicative of the existence of a security vulnerability, which can later be researched and fixed.Fuzz testing is now making a transition from a hacker-grown tool to a commercial-grade product. There are many different types of applications that can be fuzzed, many different ways they can be fuzzed, and a variety of different problems that can be uncovered. There are also problems that arise during fuzzing; when is enough enough? These issues and many others are fully explored.Fuzzing is a fast-growing field with increasing commercial interest (7 vendors unveiled fuzzing products last year).Vendors today are looking for solutions to the ever increasing threat of vulnerabilities. Fuzzing looks for these vulnerabilities automatically, before they are known, and eliminates them before release.Software developers face an increasing demand to produce secure applications---and they are looking for any information to help them do that.

Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring

by Harlan Carvey

I decided to write this book for a couple of reasons. One was that I’ve now written a couple of books that have to do with incident response and forensic analysis on Windows systems, and I used a lot of Perl in both books. Okay…I’ll come clean…I used nothing but Perl in both books! What I’ve seen as a result of this is that many readers want to use the tools, but don’t know how…they simply aren’t familiar with Perl, with interpreted (or scripting) languages in general, and may not be entirely comfortable with running tools at the command line. This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). My hope is that not only will consultants (such as myself) find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics.*Perl Scripting for Live ResponseUsing Perl, there’s a great deal of information you can retrieve from systems, locally or remotely, as part of troubleshooting or investigating an issue. Perl scripts can be run from a central management point, reaching out to remote systems in order to collect information, or they can be "compiled" into standalone executables using PAR, PerlApp, or Perl2Exe so that they can be run on systems that do not have ActiveState’s Perl distribution (or any other Perl distribution) installed.*Perl Scripting for Computer Forensic AnalysisPerl is an extremely useful and powerful tool for performing computer forensic analysis. While there are applications available that let an examiner access acquired images and perform some modicum of visualization, there are relatively few tools that meet the specific needs of a specific examiner working on a specific case. This is where the use of Perl really shines through and becomes apparent.*Perl Scripting for Application MonitoringWorking with enterprise-level Windows applications requires a great deal of analysis and constant monitoring. Automating the monitoring portion of this effort can save a great deal of time, reduce system downtimes, and improve the reliability of your overall application. By utilizing Perl scripts and integrating them with the application technology, you can easily build a simple monitoring framework that can alert you to current or future application issues.

Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

by Josh Shaul Aaron Ingram

This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database.The only practical, hands-on guide for securing your Oracle database published by independent experts.Your Oracle database does not exist in a vacuum, so this book shows you how to securely integrate your database into your enterprise.

Digital Watermarking and Steganography (The Morgan Kaufmann Series in Multimedia Information and Systems)

by Ingemar Cox Matthew Miller Jeffrey Bloom Jessica Fridrich Ton Kalker

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.This new edition now contains essential information on steganalysis and steganographyNew concepts and new applications including QIM introducedDigital watermark embedding is given a complete update with new processes and applications

Information Assurance: Dependability and Security in Networked Systems (ISSN)

by Yi Qian Prashant Krishnamurthy James Joshi David Tipper

In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology settingLeading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assuranceAdditional focus on security and survivability issues in wireless networks

Mobile 3D Graphics: with OpenGL ES and M3G (The Morgan Kaufmann Series in Computer Graphics)

by Kari Pulli Tomi Aarnio Ville Miettinen Kimmo Roimela Jani Vaarala

Graphics and game developers must learn to program for mobility. This book will teach you how. "This book - written by some of the key technical experts...provides a comprehensive but practical and easily understood introduction for any software engineer seeking to delight the consumer with rich 3D interactive experiences on their phone. Like the OpenGL ES and M3G standards it covers, this book is destined to become an enduring standard for many years to come." - Lincoln Wallen, CTO, Electronic Arts, Mobile“This book is an escalator, which takes the field to new levels. This is especially true because the text ensures that the topic is easily accessible to everyone with some background in computer science...The foundations of this book are clear, and the authors are extremely knowledgeable about the subject." - Tomas Akenine-Möller, bestselling author and Professor of Computer Science at Lund University "This book is an excellent introduction to M3G. The authors are all experienced M3G users and developers, and they do a great job of conveying that experience, as well as plenty of practical advice that has been proven in the field." - Sean Ellis, Consultant Graphics Engineer, ARM LtdThe exploding popularity of mobile computing is undeniable. From cell phones to portable gaming systems, the global demand for multifunctional mobile devices is driving amazing hardware and software developments. 3D graphics are becoming an integral part of these ubiquitous devices, and as a result, Mobile 3D Graphics is arguably the most rapidly advancing area of the computer graphics discipline. Mobile 3D Graphics is about writing real-time 3D graphics applications for mobile devices. The programming interfaces explained and demonstrated in this must-have reference enable dynamic 3D media on cell phones, GPS systems, portable gaming consoles and media players. The text begins by providing thorough coverage of background essentials, then presents detailed hands-on examples, including extensive working code in both of the dominant mobile APIs, OpenGL ES and M3G. C/C++ and Java Developers, graphic artists, students, and enthusiasts would do well to have a programmable mobile phone on hand to try out the techniques described in this book. The authors, industry experts who helped to develop the OpenGL ES and M3G standards, distill their years of accumulated knowledge within these pages, offering their insights into everything from sound mobile design principles and constraints, to efficient rendering, mixing 2D and 3D, lighting, texture mapping, skinning and morphing. Along the way, readers will benefit from the hundreds of included tips, tricks and caveats.Written by experts at Nokia whose workshops at industry conferences are blockbustersThe programs used in the examples are featured in thousands of professional courses each year

Reconfigurable Computing: The Theory and Practice of FPGA-Based Computation (ISSN #Volume 1)

by Scott Hauck André DeHon

Reconfigurable Computing marks a revolutionary and hot topic that bridges the gap between the separate worlds of hardware and software design— the key feature of reconfigurable computing is its groundbreaking ability to perform computations in hardware to increase performance while retaining the flexibility of a software solution. Reconfigurable computers serve as affordable, fast, and accurate tools for developing designs ranging from single chip architectures to multi-chip and embedded systems. Scott Hauck and Andre DeHon have assembled a group of the key experts in the fields of both hardware and software computing to provide an introduction to the entire range of issues relating to reconfigurable computing. FPGAs (field programmable gate arrays) act as the “computing vehicles" to implement this powerful technology. Readers will be guided into adopting a completely new way of handling existing design concerns and be able to make use of the vast opportunities possible with reconfigurable logic in this rapidly evolving field.Designed for both hardware and software programmersViews of reconfigurable programming beyond standard programming languagesBroad set of case studies demonstrating how to use FPGAs in novel and efficient ways

Penetration Tester's Open Source Toolkit

by Jeremy Faircloth Chris Hurley

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.• Perform Network ReconnaissanceMaster the objectives, methodology, and tools of the least understood aspect of a penetration test.• Demystify Enumeration and ScanningIdentify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services.• Hack Database ServicesUnderstand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system.• Test Web Servers and ApplicationsCompromise the Web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications.• Test Wireless Networks and DevicesUnderstand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools.• Examine Vulnerabilities on Network Routers and SwitchesUse Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices.• Customize BackTrack 2Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations.• Perform Forensic Discovery and Analysis with BackTrack 2Use BackTrack in the field for forensic analysis, image acquisition, and file carving.• Build Your Own PenTesting LabEverything you need to build your own fully functional attack lab.

The Best Damn Cybercrime and Digital Forensics Book Period

by Jack Wiles Anthony Reyes

Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market. This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.* Digital investigation and forensics is a growing industry* Corporate I.T. departments investigating corporate espionage and criminal activities are learning as they go and need a comprehensive guide to e-discovery* Appeals to law enforcement agencies with limited budgets

Linksys WRT54G Ultimate Hacking

by Paul Asadoorian Larry Pesce

This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G’s hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more! This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system.Never before seen and documented hacks, including wireless spectrum analysisMost comprehensive source for documentation on how to take advantage of advanced features on the inexpensive wrt54g platformFull coverage on embedded device development using the WRT54G and OpenWRT

Microsoft Vista for IT Security Professionals

by Anthony Piltzecker

Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. The book begins with a discussion of Microsoft's Trustworthy Computing Initiative and Vista's development cycle, which was like none other in Microsoft's history. Expert authors will separate the hype from the reality of Vista’s preparedness to withstand the 24 x 7 attacks it will face from malicious attackers as the world’s #1 desktop operating system.Microsoft Windows operating systems run more than 90% of the desktop PCs in the world and Vista is the first major Windows release in more than 5 yearsThis is currently the only book on Windows Vista Security

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

by Anton Chuvakin Branden R. Williams

Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information.PCI Data Security standards apply to every company globally that processes or transmits credit card transaction dataInformation to develop and implement an effective security strategy to keep infrastructures compliantWell known authors have extensive information security backgrounds

Windows Forensic Analysis DVD Toolkit

by Harlan Carvey

Windows Forensic Analysis DVD Toolkit addresses and discusses in-depth forensic analysis of Windows systems. The book takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources not available anywhere else. This book covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. This book also brings this material to the doorstep of system administrators, who are often the front line troops when an incident occurs, but due to staffing and budgets do not have the necessary knowledge to effectively respond. All disc-based content for this title is now available on the Web.Contains information about Windows forensic analysis that is not available anywhere else. Much of the information is a result of the author’s own unique research and workContains working code/programs, in addition to sample files for the reader to work with, that are not available anywhere elseThe companion DVD for the book contains significant, unique materials (movies, spreadsheet, code, etc.) not available any place else

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

by Rob Cameron Neil R. Wyler

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.Complete coverage of the Juniper Networks Secure Access SSL VPN line including the 700, 2000, 4000, 6000, and 6000 SP.Learn to scale your appliances to meet the demands of remote workers and offices.Use the NEW coordinated threat control with Juniper Networks IDP to manage the security of your entire enterprise.

Web Application Vulnerabilities: Detect, Exploit, Prevent

by Steven Palmer

In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications.Learn to defend Web-based applications developed with AJAX, SOAP, XMLPRC, and more.See why Cross Site Scripting attacks can be so devastating.

The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server

by Rogier Dittner David Rule Jr.

Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot. Virtualization allows you to consolidate many servers onto a single physical server reducing hardware, electrical, cooling, and administrative costs. These virtual servers run completely independent of each other so if one crashes the other are not affected. Planning and implementing a server consolidation is a complex process. This book details the requirements for such a project, includes sample forms and templates, and delivers several physical to virtual migration strategies which will save both time and costs. Readers of this book will easily be able to plan and deploy VMware, Microsoft Virtual Server, and Xen. Create a virtual network to exchange information or provide a service to other virtual machines or computersUse virtualization to support removable media such as CD or DVD optical disksReduce server costs, administration overhead, and complexity

Microsoft SharePoint 2007 Technologies: Planning, Design and Implementation

by Kevin Laahs Emer McKenna Veli-Matti Vanamo

SharePoint provides a vital service to businesses--content sharing over Intranet and Internet sites. Microsoft is investing tons of research and development money into content sharing technologies: SharePoint is the "next big thing" for MS Office users, especially in a world where many work teams are becoming geographically dispersed. SharePoint 2007 is a big improvement over former releases, due to enhanced security, better search capabilities, and more robust functionality. Lots of change means that users will have to come up to speed on the new enhancements. With Microsoft SharePoint 2007 Technologies, readers will gain a working knowledge of the architecture, administration, and end user features offered by SharePoint 2007. This book also provides practical techniques to help IT professionals integrate Sharepoint with other MS products such as Exchange Server. The expertise of the authors, who have helped many businesses leverage Microsoft technologies, makes this book an invaluable tool to anyone interested in deploying Sharepoint '07.More than 50,000 HP employees already use SharePoint, and that's just one company!SharePoint 2007 enables businesses to share documents, implement version controls, intensify security, and create workgroups, all in real-timeAll companies using MS Exchange Server will examine the latest iteration of SharePoint

Digital Modeling of Material Appearance (The Morgan Kaufmann Series in Computer Graphics)

by Julie Dorsey Holly Rushmeier François Sillion

Computer graphics systems are capable of generating stunningly realistic images of objects that have never physically existed. In order for computers to create these accurately detailed images, digital models of appearance must include robust data to give viewers a credible visual impression of the depicted materials. In particular, digital models demonstrating the nuances of how materials interact with light are essential to this capability. Digital Modeling of Material Appearance is the first comprehensive work on the digital modeling of material appearance: it explains how models from physics and engineering are combined with keen observation skills for use in computer graphics rendering. Written by the foremost experts in appearance modeling and rendering, this book is for practitioners who want a general framework for understanding material modeling tools, and also for researchers pursuing the development of new modeling techniques. The text is not a "how to" guide for a particular software system. Instead, it provides a thorough discussion of foundations and detailed coverage of key advances. Practitioners and researchers in applications such as architecture, theater, product development, cultural heritage documentation, visual simulation and training, as well as traditional digital application areas such as feature film, television, and computer games, will benefit from this much needed resource. ABOUT THE AUTHORS Julie Dorsey and Holly Rushmeier are professors in the Computer Science Department at Yale University and co-directors of the Yale Computer Graphics Group. François Sillion is a senior researcher with INRIA (Institut National de Recherche en Informatique et Automatique), and director of its Grenoble Rhône-Alpes research center.First comprehensive treatment of the digital modeling of material appearanceProvides a foundation for modeling appearance, based on the physics of how light interacts with materials, how people perceive appearance, and the implications of rendering appearance on a digital computerAn invaluable, one-stop resource for practitioners and researchers in a variety of fields dealing with the digital modeling of material appearance

Network Simulation Experiments Manual (ISSN)

by Emad Aboelela

Network Simulation Experiments Manual, Second Edition, enables networking professional to visualize how networks work by providing free access to easy-to-install OPNET software. This software provides a virtual environment for modeling, analyzing, and predicting the performance of IT infrastructures, including applications, servers, and networking technologies. The book also goes a step further by providing detailed experiments on core networking topologies for use in this simulation environment. Each experiment is also accompanied by review questions, a lab report, and exercises. This book is recommended for graduate students and networking designers and professionals.Useful experimentation for professionals in the workplace who are interested in learning and demonstrating the capability of evaluating different commercial networking productsThe experiments in this manual are closely tied to Peterson/Davie: Computer Networks, fourth edition (a best-selling Morgan Kaufmann title), making it a perfect companion book.

The Best Damn Firewall Book Period

by Thomas W Shinder

The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point.Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit. Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP applications around firewalls, and analyzing security log files.Sections are organized by major vendor, and include hardware, software and VPN configurations for each product line.New to this Edition: Microsoft firewall protection, from Windows Firewall to ISA Server 2006Cisco PIX Version 7, including VPN configuration and IDSAnalyzing Firewall Logs and ReportsVoIP and Firewall Bypassing

Refine Search

Showing 901 through 925 of 82,737 results