Macromedia Flash MX Fast & Easy Web Development

Author: Mike Puleio
ISBN: 1931841594/9781931841597
Pages: 320
Publication Date: 2002-09-11

Don't spend your time wading through manuals to learn Macromedia Dreamweaver MX. Spend it doing what you do best-creating Web pages! Design, develop, and deliver Web pages like a pro. Integrate graphics, animations, or documents into your Web pages with ease. Combining easy-to-understand instructions with visual examples, Macromedia Dreamweaver MX Fast & Easy Web Development offers a unique, hands-on approach that you won't find anywhere else. Less time, less effort, more results!
Download

Posted in Label: | 0 komentar

The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall

Author: Peter Hansteen
ISBN: 1593271654/9781593271657
Pages: 184
Publication Date: 2008-01-11

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF. The Book of PF is the product of Hansteen's knowledge and experience, teaching good practices as well as bare facts and software options. Throughout the book, Hansteen emphasizes the importance of staying in control by having a written network specification, using macros to make rule sets more readable, and performing rigid testing when loading in new rules.

Today's system administrators face increasing challenges in the quest for network quality, and The Book of PF can help by demystifying the tools of modern *BSD network defense. But, perhaps more importantly, because we know you like to tinker, The Book of PF tackles a broad range of topics that will stimulate your mind and pad your resume, including how to:

  • Create rule sets for all kinds of network traffic, whether it is crossing a simple home LAN, hiding behind NAT, traversing DMZs, or spanning bridges
  • Use PF to create a wireless access point, and lock it down tight with authpf and special access restrictions
  • Maximize availability by using redirection rules for load balancing and CARP for failover
  • Use tables for proactive defense against would-be attackers and spammers
  • Set up queues and traffic shaping with ALTQ, so your network stays responsive
  • Master your logs with monitoring and visualization, because you can never be too paranoid

The Book of PF is written for BSD enthusiasts and network admins at any level of expertise. With more and more services placing high demands on bandwidth and increasing hostility coming from the Internet at-large, you can never be too skilled with PF.

Download

Posted in Label: | 0 komentar

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort

Author: Michael Rash
ISBN: 1593271417/9781593271411
Pages: 336
Publication Date: 2007-09-15

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.

Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:

  • Passive network authentication and OS fingerprinting
  • iptables log analysis and policies
  • Application layer attack detection with the iptables string match extension
  • Building an iptables ruleset that emulates a Snort ruleset
  • Port knocking vs. Single Packet Authorization (SPA)
  • Tools for visualizing iptables logs

    Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables-along with psad and fwsnort-to detect and even prevent compromises.

  • Download

    Posted in Label: | 0 komentar

    Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)

    Author: David Hucaby
    ISBN: 1587054574/9781587054570
    Pages: 912
    Publication Date: 2007-08-09

    Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX®, and the Catalyst® Firewall Services Module (FWSM).

    Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation.

    Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components.

    Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources.

    “Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco.”

    –Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco

    David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.

    • Learn about the various firewall models, user interfaces, feature sets, and configuration methods
    • Understand how a Cisco firewall inspects traffic
    • Configure firewall interfaces, routing, IP addressing services, and IP multicast support
    • Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP
    • Authenticate, authorize, and maintain accounting records for firewall users
    • Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning
    • Define security policies that identify and act on various types of traffic with the Modular Policy Framework
    • Increase firewall availability with firewall failover operation
    • Understand how firewall load balancing works
    • Generate firewall activity logs and learn how to analyze the contents of the log
    • Verify firewall operation and connectivity and observe data passing through a firewall
    • Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module

    This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

    Category: Networking: Security

    Covers: Cisco ASA 8.0, PIX 6.3, and FWSM 3.2 version firewalls

    $60.00 USA / $69.00 CAN

    Download

    Posted in Label: | 0 komentar

    Implementing SAP R/3 Sales and Distribution

    Author: Glynn C. Williams
    ISBN: 0072124040/9780072124040
    Pages: 528
    Publication Date: 2000-02-24

    One of the world’s leading SAP Sales & Distribution consultants delivers the first comprehensive and practical guide to implementing this new module in the R/3 system. Inside this book you’ll get complete information on the ins and outs of the software, including basic functions, sales document flow, invoicing, and how the S&D module interfaces with other modules. Sales processes and delivery systems are crucial functions in today’s businesses and no other Sales & Distribution guide can bring you the same focused, reliable advice that’s found inside this first-rate user’s guidebook.
    Download

    Posted in Label: | 0 komentar

    Data Mining Methods and Models

    Author: Daniel T. Larose
    ISBN: 0471666564/9780471666561
    Pages: 344
    Publication Date: 2006-01-30

    Provides an introduction into data mining methods and models, including association rules, clustering, K-nearest neighbor, statistical inference, neural networks, linear and logistic regression, and multivariate analysis Presents a unified approach based on CRISP methodology, which involves Strategic Risk Assessment based on Organizational Mode A companion Web site features downloads of large data sets used in the chapter projects, with a discussion area and message board, where readers are encouraged to exchange ideas

    Download

    Posted in Label: | 0 komentar

    CCDP: Cisco Internetwork Design Study Guide

    Author: Robert Padjen,Todd Lammle
    ISBN: 0782126391/9780782126396
    Pages: 580
    Publication Date: 2000-04-21


    Looking to advance your career as a network designer or integrator? Here's the study guide you need to prepare for the Cisco Internetwork Design exam, the final step in the Cisco Certified Design Professional program. With full coverage of each Cisco exam objective, this study guide delivers the goods on crucial design issues--from CANs, MANs, and WANs to desktop protocols and SNA. The CD includes test-preparation software with hundreds of practice questions.
    Download

    Posted in Label: | 0 komentar

    Navigation and MIS in Orthopedic Surgery

    This textbook offers new insights into the use of computer assisted surgery and minimally invasive surgery in orthopaedic surgery. A comprehensive presentation of scientific work and clinical experience is included encompassing areas of spine, trauma, sports and reconstructive surgery. We have added sections that discuss minimally invasive surgery, as we believe CAS will be an enabling technology for these more challenging approaches by providing a virtual digital "surgical exposure". Finally, we have explored areas of new endeavor that may not have current applications. We believe that this textbook will be attractive to those new to this area as well as providing an update for existing users.

    Download

    Posted in Label: | 0 komentar

    Securing Java: Getting Down to Business with Mobile Code, 2nd Edition

    Author: Gary McGraw,Edward W. Felten
    ISBN: 047131952X/9780471319528
    Pages: 324
    Publication Date: 1999-01-25

    Information Security/Java "This book is mandatory reading for every user and developer of Webware." -Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent role. But as Java evolves, its security issues and architectures get more complicated. Written by the world's leading experts on mobile code security, this updated and expanded edition of the groundbreaking guide to Java security includes lessons for Web users, developers, system administrators, and business decision-makers alike. This book navigates the uncharted waters of mobile code security and arms the reader with the knowledge required for securing Java. It provides in-depth coverage of:
    * The base Java security sandbox, made up of the Verifier, Class Loaders, and the Security Manager
    * Code signing, stack inspection, and the new Java 2 security architecture
    * The pros and cons of language-based enforcement models and trust models
    * All known Java security holes and the attack applets that exploit them
    * Techniques commonly used in malicious applets
    * Twelve rules for developing more secure Java code, with explicit examples
    * Hard questions to ask third-party Java security tools vendors
    * Analysis of competing systems for mobile code, including ActiveX and JavaScript
    * Card Java security, smart card risks, and their impact on e-commerce security
    On the companion Web site www.securingjava.com you'll find:
    * The Java Security Hotlist: Over 100 categorized and annotated Java security-related Web links
    * An e-mail list to keep subscribers abreast of breaking Java security news
    * A complete electronic edition of this book
    Download

    Posted in Label: | 0 komentar

    Symbian OS C++ for Mobile Phones (Symbian Press)

    Author:
    ISBN: 0470066415/9780470066416
    Pages: 834
    Publication Date: 2007-08-24

    Richard Harrison’s existing books are the bestsellers in the Symbian Press Portfolio. His latest book, co-written with Mark Shackman is the successor to "Symbian OS C++ for Mobile Phones" Volumes One and Two. Written in the same style as the two previous volumes, this is set to be another gem in the series.Â

    The existing material from the volumes will be combined, with explanations and example code updated to reflect the introduction of Symbian OS v9. New and simplified example application will be introduced, which will be used throughout the book. The reference and theory section in particular sets this book apart from the competition and complements other books being proposed at this time.

    Anyone looking for a thorough insight into Symbian OS C++ before moving onto specialize on particular Symbian OS phones need this book! It will not teach people how to program in C++, but it will reinforce the techniques behind developing applications in Symbian OS C++, and more.

    This innovative new book covers Symbian OS fundamentals, core concepts and UI.

    Key highlights include:

    • A quick guide to Kernel
    • Platform security
    • Publishing Applications
    • View Architecture
    • Multi-User games
    Download

    Posted in Label: | 0 komentar