A Methodology for Developing and Deploying Internet and Intranet Solutions


Book Description

Today's Intranet, Internet, and client/server deployments involve more sites, more participants, more technologies, and more complexity than ever before. Now a top Hewlett-Packard project manager introduces a complete, reusable methodology for successfully integrating and deploying practically any new technology.




J2EE and JAX


Book Description

CD-ROM contains: Source code -- Tools for developing and deploying Web services.




OpenView Network Node Manager


Book Description

PLEASE PROVIDE COURSE INFORMATION PLEASE PROVIDE




MPE/iX System Administration Handbook


Book Description

This book will provide a complete reference to the essential tools and skills required for successful MPE/iX system management. The handbook offers hands-on examples, solutions to common problems, and tips on how to streamline operations and get the most out of your "HP e3000" system.




NET Programming


Book Description

Tapadiya takes a straightforward, hands-on approach to explain everything readers need to know from development to deployment and maintenance for this platform--all from a developer's perspective. Using C# as the primary language, and with plenty of code examples throughout, this book is an excellent way to learn.




Halting the Hacker


Book Description

Get into the hacker's mind--and outsmart him! Fully updated for the latest threats, tools, and countermeasures Systematically covers proactive, reactive, and preemptive security measures Detailed, step-by-step techniques for protecting HP-UX, Linux, and UNIX systems "Takes on even more meaning now than the original edition!" --Denny Georg, CTO, Information Technology, Hewlett-Packard Secure your systems against today's attacks--and tomorrow's. Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Top Hewlett-Packard security architect Donald L. Pipkin has updated this global bestseller for today's most critical threats, tools, and responses. Pipkin organizes this book around the processes hackers use to gain access, privileges, and control--showing you exactly how they work and the best ways to respond. Best of all, Pipkin doesn't just tell you what to do, but why. Using dozens of new examples, he gives you the skills and mindset to protect yourself against any current exploit--and attacks that haven't even been imagined yet. How hackers select targets, identify systems, gather information, gain access, acquire privileges, and avoid detection How multiple subsystems can be used in harmony to attack your computers and networks Specific steps you can take immediately to improve the security of any HP-UX, Linux, or UNIX system How to build a secure UNIX system from scratch--with specifics for HP-UX and Red Hat Linux Systematic proactive, reactive, and preemptive security measures Security testing, ongoing monitoring, incident response, and recovery--in depth Legal recourse: What laws are being broken, what you need to prosecute, and how to overcome the obstacles to successful prosecution About the CD-ROM The accompanying CD-ROM contains an extensive library of HP-UX and Linux software tools for detecting and eliminating security problems and a comprehensive information archive on security-related topics.




Customer Relationship Management


Book Description

An ETHS graduate of 1962 provides a blueprint for customer relationship management in business and technical organizations.




Trusted Computing Platforms


Book Description

The TCPA 1.0 specification finally makes it possible to build low-cost computing platforms on a rock-solid foundation of trust. In Trusted Computing Platforms, leaders of the TCPA initiative place it in context, offering essential guidance for every systems developer and decision-maker. They explain what trusted computing platforms are, how they work, what applications they enable, and how TCPA can be used to protect data, software environments, and user privacy alike.




SAP Hardware Solutions


Book Description

The goal of this text is to describe the technical design aspects of the IT infrastructure; it does not give the details of installing and customizing SAP software, nor business process reengineering. Using primarily HP products for the solution examples, the chapters guide the reader through the foundation of the systems from an IT perspective, reviews its business application and architecture and introduces the server systems, then describes data storage, high availability and recovery solutions, client PCs with front-end user interfaces, output management and printing solutions, network infrastructure and requirements, cabling designs, LANs and WANs, and connecting mySAP.com to the Internet. Both authors are members of the HP-SAP International Competence Center. Annotation copyrighted by Book News, Inc., Portland, OR




HP-UX 11i Systems Administration Handbook and Toolkit


Book Description

HP-UX 11i System Administration Handbook and Toolkit, second edition, is your singlesource for everything HP-UX administrators need to know! Now updated to cover new HP-UX 11i andpartitioning enhancements, plus every essential UNIX command. Covers installation, boot, kernel,devices, users, groups, SAM, Veritas VM, LVM, optimization, networking, GNOME, auditing, UNIXfile types and commands, vi, and shell programming. Includes extensive new disk partitioningcoverage: vPars, PRM, nPartitions, and MC/ServiceGuard. CD-ROM: new HP-UX performance managementtrialware, sysadmin "Cheat Sheets," and more.