Web Database Primer Plus


Book Description

Mohseni provides the reader with the knowledge necessary to set up a database and link it to the World Wide Web. It includes a complete discussion of HTML, plenty of information on CGI, and the entire application development process from design to testing within the WWW programming paradigm. The CD contains all example documents, source codes, sample applications, and utilities.




JavaScript Primer Plus


Book Description

This complete, step-by-step guide to JavaScript provides an easy-to-use tutorial. After introducing the reader to JavaScript, the book explains in-depth design and usage of JavaScript's built in functions and objects, gradually building toward more complex and sophisticated concepts. The CD contains all source code from the book, examples and more.




Java 2 Primer Plus


Book Description

Organized in an instructional style with review questions and projects, this book is based upon the new Java 1.4 platform. Haines uses the most recent examples and information from the technology industry to provide students with sound Java programming skills.




XML Primer Plus


Book Description

This handbook presents XML programming from a conceptual perspective, teaching not just the technology, but the background and thinking behind it. Developers learn to do it right, gaining an understanding of the hows and the whys. Rather than teaching programmers to memorize specific APIs, Chase teaches them how to think about XML programming in a language-neutral way.




Visual Basic .Net Primer Plus


Book Description

This title teaches Object-Oriented Programming using Visual Basic .NET instead of Java or C++. The chapters are sequenced in a manner that continually builds a solid foundation of understanding for the next topic.




C# Primer Plus


Book Description

C# Primer Plus teaches the C# programming language and relevant parts of the .NET platform from the ground up, walking you through the basics of object-oriented programming, important programming techniques and problem solving while providing a thorough coverage of C#'s essential elements - such as classes, objects, data types, loops, branching statements, arrays, and namespaces. In early chapters guided tours take you sightseeing to the main attractions of C# and provide a fast learning-path that enables you to quickly write simple C# programs. Your initial programming skills are then gradually expanded, through the many examples, case studies, illustrations, review questions and programming exercises, to include powerful concepts - like inheritance, polymorphism, interfaces and exception handling, along with C#'s most innovative features - such as properties, indexers, delegates and events. With C# Primer Plus's dual emphasis on C# as well as fundamental programming techniques, this friendly tutorial will soon make you a proficient C# programmer building Windows applications on the .NET platform.




A Semantic Web Primer, third edition


Book Description

A new edition of the widely used guide to the key ideas, languages, and technologies of the Semantic Web The development of the Semantic Web, with machine-readable content, has the potential to revolutionize the World Wide Web and its uses. A Semantic Web Primer provides an introduction and guide to this continuously evolving field, describing its key ideas, languages, and technologies. Suitable for use as a textbook or for independent study by professionals, it concentrates on undergraduate-level fundamental concepts and techniques that will enable readers to proceed with building applications on their own and includes exercises, project descriptions, and annotated references to relevant online materials. The third edition of this widely used text has been thoroughly updated, with significant new material that reflects a rapidly developing field. Treatment of the different languages (OWL2, rules) expands the coverage of RDF and OWL, defining the data model independently of XML and including coverage of N3/Turtle and RDFa. A chapter is devoted to OWL2, the new W3C standard. This edition also features additional coverage of the query language SPARQL, the rule language RIF and the possibility of interaction between rules and ontology languages and applications. The chapter on Semantic Web applications reflects the rapid developments of the past few years. A new chapter offers ideas for term projects. Additional material, including updates on the technological trends and research directions, can be found at http://www.semanticwebprimer.org.




The Waite Group's COM/DCOM Primer Plus


Book Description

Hands-on guidance on how to construct real-world business software components using Microsoft's Component Object Model (COM) and Distributed Component Object Model (DCOM), the breakthrough technologies behind Microsoft's Windows DNA. The CD-ROM includes all the code and examples for the readers' convenience.




Unix System Management


Book Description

Annotation Thsi book jump-starts the educational process, providing the essential concepts and fundamental strategies that are used by UNIX system administrators every day. Offers a thorough and detailed approach to the concepts and methodologies that govern UNIX system management. Covers a wide range of systems topics not covered in any other books on UNIX system administration. Written by an practicing UNIX system administrator with eight years of experience managing enterprise-level UNIX systems. UNIX System Management Primer Plusdescribes in detail the concepts and methodologies that govern UNIX system administration. Its focus is both analytical and task-oriented. It covers the entire lifecycle of a system, from design to decommission, and explores the readers role as an administrator. Topics not usually covered in more specific books are discussed, such as collocation facilities, user communication, and disaster recovery. The focus of this book is "how to be a system administrator," not "how to administer your system." Jeffrey S. Horwitzhas worked with UNIX systems for over eight years, both as a user and an administrator. He has administered a wide range of systems, from single-user workstations to highly tuned enterprise database servers. At the University of Michigan, he managed several campus UNIX services for over 65,000 users. In the ISP world at LaserLink.Net and Covad Communications, he managed over 150 servers providing e-mail, dial-up, and billing services to over 800,000 users across the country. Currently he is the manager of production systems at TargetRx, Inc., where he maintains their entire UNIX infrastructure, having designed and built it from scratch. Jeff holds a B.S in Cellular & Molecular Biology from the University of Michigan, is an active member of Usenix and SAGE, and is a Sun Certified System Administrator.




The Tao of Network Security Monitoring


Book Description

"The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." —Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security—one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." —Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." —Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." —Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes—resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools—including Sguil, Argus, and Ethereal—to mine network traffic for full content, session, statistical, and alert data. Best practices for conducting emergency NSM in an incident response scenario, evaluating monitoring vendors, and deploying an NSM architecture. Developing and applying knowledge of weapons, tactics, telecommunications, system administration, scripting, and programming for NSM. The best tools for generating arbitrary packets, exploiting flaws, manipulating traffic, and conducting reconnaissance. Whether you are new to network intrusion detection and incident response, or a computer-security veteran, this book will enable you to quickly develop and apply the skills needed to detect, prevent, and respond to new and emerging threats.