viernes, 13 de junio de 2008

Windows Server 2003 Clustering & Load Balancing

Learn to implement clustering and load balancing solutions with Windows 2000 and Windows Server 2003, and deliver nearly 100 percent uptime. With a focus on real world production-based problems, the author delivers detailed high availability solutions that will give you the tools to roll out and troubleshoot these technologies.



Publisher: McGraw-Hill Osborne (April 9, 2003)
Pages: 400
Language: English
ISBN-10: 0072226226
ISBN-13: 978-0072226225
Format:
PDF


Descarga/Download

CodeIgniter for Rapid PHP Application Development

CodeIgniter (CI) is a powerful open-source PHP framework with a very small footprint, built for PHP coders who need a simple and elegant toolkit to create full-featured web applications. CodeIgniter is an MVC framework, similar in some ways to the Rails framework for Ruby, and is designed to enable, not overwhelm.

This book explains how to work with CodeIgniter in a clear logical way. It is not a detailed guide to the syntax of CodeIgniter, but makes an ideal complement to the existing online CodeIgniter user guide, helping you grasp the bigger picture and bringing together many ideas to get your application development started as smoothly as possible.


Publisher:
PACKT (July 31, 2007)
Pages: 260
Language: English
ISBN-10: 1847191746
ISBN-13: 978-1847191748
Format:
PDF


Descarga/Download

How to Cheat at Configuring VMware ESX Server

VMwares ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how!
A virtual evolution in IT shops large and small has begun. VMwares ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress proven How to Cheat methodology to configure and build VMwares ESX Server version 3. This clear, concise guide provides all the information you need to become a virtual whiz!
This book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine templates. Best practices for securing and backing up your virtual environment are also provided. The book concludes with a series of handy, time-saving command and configuration for: bash shell keystrokes, Linux commands, configuration files, common/proc files, VMware ESX commands, and troubleshooting.


Publisher:
Syngress (June 10, 2007)
Pages: 408
Language: English
ISBN-10: 1597491942
ISBN-13: 978-1597491945
Format:
PDF


Descarga/Download

jueves, 12 de junio de 2008

SendMail Cookbook

More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administrators--and not without reason. sendmail configuration languages are as complex as any other programming languages, but used much more infrequently--only when sendmail is installed or configured. The average system administrator doesn't get enough practice to truly master this inscrutable technology. Fortunately, there's help. The sendmail Cookbook provides step-by-step solutions for the administrator who needs to solve configuration problems fast. Say you need to configure sendmail to relay mail for your clients without creating an open relay that will be abused by spammers. A recipe in the Cookbook shows you how to do just that. No more wading through pages of dense documentation and tutorials and creating your own custom solution--just go directly to the recipe that addresses your specific problem. Each recipe in the sendmail Cookbook outlines a configuration problem, presents the configuration code that solves that problem, and then explains the code in detail. The discussion of the code is critical because it provides the insight you need to tweak the code for your own circumstances. The sendmail Cookbook begins with an overview of the configuration languages, offering a quick how-to for downloading and compiling the sendmail distribution. Next, you'll find a baseline configuration recipe upon which many of the subsequent configurations, or recipes, in the book are based.


Publisher:
O'Reilly (December 1, 2003)
Pages: 456
Language: English
ISBN-10: 0596004710
ISBN-13: 978-0596004712
Format:
CHM


Descarga/Download

Developing Application Frameworks in .NET

Application frameworks, which provide a base of common services on which applications are built, offer the benefits of extensibility, modularity, and reusability of both code and design to your applications. This book explains what frameworks are and how they fit into applications, and offers many object-oriented techniques used in application frameworks.

This book also shows you actually how to develop application frameworks through a concrete framework example called Simplified Application Framework (SAF). The SAF framework was developed by Xin Chen in C#. It consists of common services needed by many applications, such as a class factory service, configuration service, event notification service, security service, and transaction service. This book goes into detail on each of these services to explain its benefits, as well as its design and implementation in C#. Through a discussion of each service, you will also learn about many advanced .NET techniques employed by the framework, such as .NET remoting, reflection, custom attributes, multithreading, and serviced components.


Publisher:
Apress (April 26, 2004)
Pages: 392
Language: English
ISBN-10: 1590592883
ISBN-13: 978-1590592885
Format:
CHM


Descarga/Download

The Zend PHP Certification Practice Test Book: Practice Questions for the Zend Certified Engineer Exam

As the usage of PHP grows, the need for a globally-recognized credentials program for professional developers is becoming more and more important. The Zend Engineer Certification Program, launched by worldwide PHP leader Zend Technologies, finally creates a professional designation that represents consistently high-quality skills and knowledge in the PHP world. Written and edited by four members of the Zend Education Board who also helped create the actual Zend Certification Exam, this book contains 200 questions on every topic that is part of the exam. The Zend Certification Practice Test Book is an invaluable resource in testing your preparedness in every area of the exam, from the basics to the most advanced topics. Each question comes with a clear answer that provides an explanation of the question's topic, its goals and end result. Answering the questions in this book will allow you to clearly and quickly identify the areas of PHP in which you are strong and those in which you need further study before being able to pass the exam! Zend Technologies, Inc. (http://www.zend.com) is the PHP company. Founded by the creators and ongoing innovators of PHP, it is the developer of the Zend Engine, the heart of PHP. Zend focuses on enterprise-class products and services that enable organizations to develop, deploy and manage business-critical PHP applications. NanoBooks are excellent, in-depth resources created by the publishers of php|architect (http://www.phparch.com), the world's premier magazine dedicated to PHP professionals. NanoBooks focus on delivering high-quality content with in-depth analysis and expertise, centered around a single, well-defined topic and without any of the fluff of larger, more expensive books.


Publisher:
Marco Tabini & Associates, Inc. (January 1, 2005)
Pages: 152
Language: English
ISBN-10: 0973589884
ISBN-13: 978-0973589887
Format:
PDF


Descarga/Download

miércoles, 11 de junio de 2008

Configuring NetScreen Firewalls

Configuring NetScreen Firewalls covers all of the aspects of Juniper's NetScreen product line, from SOHO devices to Enterprise NetScreen firewalls. Coverage includes basic policy creation and administration, advanced troubleshooting techniques, the NetScreen Security Manager and VPN configuration. In addition, this book covers both the WebUI and the command line interface of NetScreen ScreenOS 5.0. as well as the NetScreen Security Manager (NSM). As a special bonus, Juniper Networks provides detailed coverage of the new features and enhancements included with ScreenOS 5.1.


Publisher:
Syngress (January 26, 2005)
Pages: 600
Language: English
ISBN-10: 1932266399
ISBN-13: 978-1932266399
Format:
PDF


Descarga/Download

Google Web Toolkit: GWT Java AJAX Programming

This book is for Java developers who want to create Ajax interfaces using the Google Web Toolkit (GWT). It focuses on useful, practical tasks from the first chapter. The book is aimed at programmers who want to use GWT to create interfaces for their professional web applications. It concentrates on the serious side of Ajax: creating powerful, productive applications for browser platforms. GWT Ajax Programming shows you how to create reliable user interfaces that enhance the user experience.

GWT is an open source Java software development framework that makes writing AJAX applications like Google Maps and Gmail easy for developers who don't speak browser quirks as a second language. Writing dynamic web applications today is a tedious and error-prone process; you spend 90% of your time working around subtle incompatibilities between web browsers and platforms, and JavaScript's lack of modularity makes sharing, testing, and reusing AJAX components difficult and fragile. GWT lets you avoid many of these headaches while offering your users the same dynamic, standards-compliant experience. You write your front end in the Java programming language, and the GWT compiler converts your Java classes to browser-compliant JavaScript and HTML.


Publisher:
PACKT (February 15, 2007)
Pages: 248
Language: English
ISBN-10: 1847191002
ISBN-13: 978-1847191007
Format:
PDF


Descarga/Download

The DHCP Handbook (2nd Edition)

The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a different part of the network. The DHCP Handbook, Second Edition is a complete reference for understanding DHCP, deploying and managing DHCP services, and debugging problems with DHCP clients and servers. Chapters devoted to failover, authentication, Windows 2000, DHCPv6, and DHCP/DNS interaction reflect the recent updates to the standard and issues that are most pertinent to network planners and administrators. Throughout the book, the authors are careful to balance conceptual discussions of DHCP with detailed implementation examples and practical advice.


Publisher:
SAMS; 2nd edition (November 7, 2002)
Pages: 624
Language: English
ISBN-10: 0672323273
ISBN-13: 978-0672323270
Format:
PDF


Descarga/Download

sábado, 7 de junio de 2008

Programming Windows Workflow Foundation: Practical WF Techniques and Examples using XAML and C#

A fast-paced and practical developer's road map to working with Windows WF, from compilation to the base activity library to runtime services. Windows Workflow Foundation (WF) is a technology for defining, executing, and managing workflows. It is part of the .NET Framework 3.0 and will be available natively in the Windows Vista operating system. Windows Workflow Foundation might be the most significant piece of middleware to arrive on the Windows platform since COM+ and the Distributed Transaction Coordinator. The difference is, not every application needs a distributed transaction, but nearly every application does have a workflow encoded inside it. In this book, K Scott Allen, author of renowned .NET articles at www.odetocode.com, provides you with all the information needed to develop successful products with Windows Workflow. From the basics of how Windows Workflow can solve the difficult problems inherent in workflow solutions, through authoring workflows in code, learning about the base activity library in Windows Workflow and the different types of workflow provided, and on to building event-driven workflows using state machines, workflow communications, and finally rules and conditions in Windows Workflow, this book will give you the in-depth information you need. Throughout the book, an example "bug reporting" workflow system is developed, showcasing the technology and techniques used. Fast-paced and to-the-point, this book takes you through the important topics of Windows WF development with clear explanations and practical example code. The book's selection of topics is driven by what the working developer needs to know. It is neither a comprehensive reference to the whole WF architecture, nor a strategy guide to the complete application development lifecycle. It's just what you as a C# developer need to know to use WF in your applications. This book is for .NET developers who want to enhance their applications with flexible workflow capabilities using Microsoft Windows Workflow Foundation. The author assumes that you have read other texts on the overall architecture of WF and on WF application design strategies, and instead focuses on real-work implementation issues for C# developers.


Publisher:
PACKT (December 22, 2006)
Pages: 300
Language: English
ISBN-10: 1904811213
ISBN-13: 978-1904811213
Format:
PDF


Descarga/Download

Load Balancing Servers, Firewalls, and Caches

From an industry insider--a close look at high-performance, end-to-end switching solutions
Load balancers are fast becoming an indispensable solution for handling the huge traffic demands of the Web. Their ability to solve a multitude of network and server bottlenecks in the Internet age ranges from dramatic improvements in server farm scalability to removing the firewall as a network bottleneck. This book provides a detailed, up-to-date, technical discussion of this fast-growing, multibillion dollar market, covering the full spectrum of topics--from server and firewall load balancing to transparent cache switching to global server load balancing. In the process, the author delivers insight into the way new technologies are deployed in network infrastructure and how they work. Written by an industry expert who hails from a leading Web switch vendor, this book will help network and server administrators improve the scalability, availability, manageability, and security of their servers, firewalls, caches, and Web sites.


Publisher:
Wiley (January 25, 2002)
Pages: 208
Language: English
ISBN-10: 0471415502
ISBN-13: 978-0471415503
Format:
PDF


Descarga/Download

viernes, 6 de junio de 2008

Teach Yourself Visual Basic 2008 in 24 Hours: Complete Starter Kit

In just 24 sessions of one hour or less, you will be up and running with Visual Basic 2008. Using a straightforward, step-by-step approach, each lesson builds upon a real-world foundation forged in both technology and business matters, allowing you to learn the essentials of Visual Basic 2008 from the ground up. Step-by-step instructions carefully walk you through the most common questions, issues, and tasks. The Q&A section, quizzes, and exercises help you build and test your knowledge.


Publisher:
SAMS (May 26, 2008)
Pages: 576
Language: English
ISBN-10: 0672329840
ISBN-13: 978-0672329845
Format:
PDF


Descarga/Download

Mastering Microsoft System Center Operations Manager 2007

If you're an IT professional, you're busy enough trying to manage multiple systems and stay proactive with the technology demands of today's fast-moving companies. System Center Operations Manager 2007 is designed to make your life easier, and this comprehensive book is your one-stop gateway to it all. With intermediate to advanced coverage, this book gives you the information you need to deploy, manage, and maintain SCOM 2007, and use it to monitor your network.


Publisher:
Sybex (September 18, 2007)
Pages: 456
Language: English
ISBN-10: 0470119306
ISBN-13: 978-0470119303
Format:
PDF


Descarga/Download

Complete Guide to CISM Certification

The Certified Information Security Manager®(CISM®) certification program was developed by the Information Systems Audit and Controls Association (ISACA®). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The Complete Guide to CISM® Certification examines five functional areassecurity governance, risk management, information security program management, information security management, and response management.

Presenting definitions of roles and responsibilities throughout the organization, this practical guide identifies information security risks. It deals with processes and technical solutions that implement the information security governance framework, focuses on the tasks necessary for the information security manager to effectively manage information security within an organization, and provides a description of various techniques the information security manager can use. The book also covers steps and solutions for responding to an incident. At the end of each key area, a quiz is offered on the materials just presented. Also included is a workbook to a thirty-question final exam.


Publisher:
Auerbach (December 13, 2006)
Pages: 480
Language: English
ISBN-10: 0849353564
ISBN-13: 978-0849353567
Format:
PDF


Descarga/Download

jueves, 5 de junio de 2008

Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services

This practical introduction to OpenLDAP for Application Developers emphasizes how to get things done, going into Lightweight Directory Access Protocol (LDAP) theory only to answer practical questions. It demystifies OpenLDAP, providing a solid understanding of how to use its directory and covering building directory services, integrating directory services, and developing directory-enabled PHP or Python applications. Readers need only basic Linux system administration experience, not LDAP experience. Open-source OpenLDAP directory server is included in all major Linux distributions; many open-source and proprietary applications can use OpenLDAP's services. Client applications use LDAP to connect to OpenLDAP, search the directory, and (if authorized) modify and manipulate records. Most often used to provide network-based authentication services for users, LDAP servers have many other uses: address book, DNS database, organizational tool, even network object store for applications.


Publisher:
PACKT (August 31, 2007)
Pages: 484
Language: English
ISBN-10: 1847191029
ISBN-13: 978-1847191021
Format:
PDF


Descarga/Download

Learn OpenOffice.org Spreadsheet Macro Programming

Learn how to extend and customize Calc, the OpenOffice.org spreadsheet, using OOoBasic, OOo's built-in programming language. You don't need to be a developer to create useful and powerful routines and applications. This well structured and practical tutorial will walk you though every step, and inspire you with great ways to save time and increase your productivity using Calc. Adding macros to your spreadsheets enables you to add data processing features to your work, automate repetitive tasks, and even create complete data-driven programs that use the spreadsheet as their back end. This book teaches the OOoBasic language and the Calc object model, so that you can manipulate spreadsheets and data from within your programs. You will also see how to create dialog boxes and windows for friendly user interfaces, and how to integrate your spreadsheets with other applications, for example writing spreadsheet data to a document, or capturing data from a database, and using the spreadsheet for generating advanced calculations and reports. Calc is OpenOffice.org's spreadsheet module. Like the rest of OpenOffice.org Calc can be programmed using the built-in language OOoBasic. Both simple macros and complex applications can be developed in this language by controlling Calc through its object model. The book is compatible with the commercial version of OpenOffice.org, StarOffice, and the StarBasic language.


Publisher:
PACKT (December 30, 2006)
Pages: 220
Language: English
ISBN-10: 1847190979
ISBN-13: 978-1847190970
Format:
PDF


Descarga/Download

OSSEC HIDS Host-Based Intrusion Detection Guide

This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems.


Publisher:
Syngress (February 18, 2008)
Pages: 416
Language: English
ISBN-10: 159749240X
ISBN-13: 978-1597492409
Format:
PDF


Descarga/Download

Effective Oracle Database 10g Security by Design

Oracle expert David Knox has written the most practical, up-to-date book on Oracle Database 10g security available. With an emphasis on real-world problems and detailed solutions, Effective Oracle Database 10g Security by Design provides all the information you need to develop and deploy secure database applications. The entire security cycle is covered--from identification and authentication to fine-grained access control and encryption to effective auditing techniques. The material is presented with comprehensive yet easy-to-understand examples that show how to use all the security technologies in a complementary way.


Publisher:
McGraw-Hill Osborne (June 10, 2004)
Pages: 560
Language: English
ISBN-10: 0072231300
ISBN-13: 978-0072231304
Format:
CHM


Descarga/Download

lunes, 2 de junio de 2008

Business Intelligence with Microsoft Office PerformancePoint Server 2007

This comprehensive volume covers every aspect of PerformancePoint 2007, the latest in Microsoft's line of Business Intelligence applications. You will learn to collect and warehouse corporate data, perform fiscal analysis, distribute dynamic reports across the enterprise, and forecast business trends.

Business Intelligence with Microsoft Office PerformancePoint 2007 provides full details on creating scorecards, dashboards, and analytics and shows how to integrate PerformancePoint with Microsoft Office 2007 and SQL Server 2005 Reporting Services. You will get full coverage of the cutting-edge financial planning, reporting, security, and delivery tools available in PerformancePoint 2007.


Publisher:
McGraw-Hill Osborne (January 22, 2008)
Pages: 358
Language: English
ISBN-10: 0071493700
ISBN-13: 978-0071493703
Format:
PDF


Descarga/Download

IPsec Virtual Private Network Fundamentals

IPsec Virtual Private Network Fundamentals provides a basic working knowledge of IPsec on various Cisco routing and switching platforms. It provides the foundation necessary to understand the different components of Cisco IPsec implementation and how it can be successfully implemented in a variety of network topologies and markets (service provider, enterprise, financial, government). This book views IPsec as an emerging requirement in most major vertical markets, explaining the need for increased information authentication, confidentiality, and non-repudiation for secure transmission of confidential data. The book is written using a layered approach, starting with basic explanations of why IPsec was developed and the types of organizations relying on IPsec to secure data transmissions. It then outlines the basic IPsec/ISAKMP fundamentals that were developed to meet demand for secure data transmission. The book covers the design and implementation of IPsec VPN architectures using an array of Cisco products, starting with basic concepts and proceeding to more advanced topics including high availability solutions and public key infrastructure (PKI). Sample topology diagrams and configuration examples are provided in each chapter to reinforce the fundamentals expressed in text and to assist readers in translating concepts into practical deployment scenarios. Additionally, comprehensive case studies are incorporated throughout to map topics to real-world solutions.


Publisher:
Cisco Press (Jul 19, 2006)
Pages: 480
Language: English
ISBN-10: 1-58705-207-5
ISBN-13: 978-1-58705-207-1
Format:
CHM


Descarga/Download

Authorized Self-Study Guide Cisco IP Telephony (CIPT), 2nd Edition

Cisco IP Telephony (CIPT), Second Edition, is a Cisco®-authorized, self-paced learning tool for CCVP IP telephony foundation learning. This book provides you with the knowledge needed to install, configure, and maintain a Cisco IP telephony solution. By reading this book, you will gain a thorough understanding of Cisco Unified CallManager version 4.1, the call routing and signaling component for the Cisco IP telephony solution.

Cisco IP Telephony (CIPT) expands your knowledge of voice over IP (VoIP) and public switched telephone network (PSTN) components and technologies. This book teaches you how to describe, install, configure, and support Cisco Unified CallManager 4.1 in a Cisco network including such features as security and video; how to configure gateways, gatekeepers, and switches; and how to build route plans to place intra- and intercluster Cisco IP phone calls. Chapter review questions, detailed configuration examples, network diagrams, and thorough explanations help reinforce learning.


Publisher: Cisco Press (Oct 24, 2006)
Pages: 912
Language: English
ISBN-10: 1-58705-261-X
ISBN-13: 978-1-58705-261-3
Format:
CHM


Descarga/Download

domingo, 1 de junio de 2008

Building Websites with Joomla!

This book is a fast paced tutorial to creating a website using Joomla!. If you’ve never used Joomla!, or even any web content management system before, then this book will walk you through each step in a friendly and accessible way. From installation, to initial set up and content entry and then on to customization for your own look and feel, this book will get you to a stable and working Joomla! based web site fast. You don’t have to be an experienced web developer or designer to get a great looking site with a full set of functions using this book and Joomla! This book will guide through every step.


Publisher:
PACKT (January 20, 2006)
Pages: 340
Language: English
ISBN-10: 1904811949
ISBN-13: 978-1904811947
Format:
PDF


Descarga/Download

Xen Virtualization: A Practical Handbook

This concise handbook targeted at Linux administrators and virtualization enthusiasts is ideal for professionals wanting an easy-to-navigate reference when working with Xen and virtualization. It offers bite-sized practical walkthroughs and experiential solutions for many common virtualization tasks using Xen. Using Fedora Core as host operating system, it shows how to add Xen support and create guest domains running different operating systems, then dissects a range of common virtualization tasks. Originally developed in 2003 at the University of Cambridge Computer Laboratory, Xen is an open-source paravirtualization technology allowing multiple operating systems to run on one physical hardware resource with near native performance. Xen supports several operating systems-Linux, FreeBSD, Windows, and NetBSD. There are now commercial versions of Xen that build on of the open-source version with additional enterprise features; this book explores and uses the open-source version of Xen.


Publisher:
PACKT (December 19, 2007)
Pages: 148
Language: English
ISBN-10: 1847192483
ISBN-13: 978-1847192486
Format:
PDF


Descarga/Download

CNET Do-It-Yourself Digital Home Office Projects

Today's home office is much more than a desk and a computer. In this easy-to-follow guide, you'll find out how to set up a connected, collaborative, portable, and secure digital workspace in your home. Produced in conjunction with CNET.com, the place you go for the latest in tech and consumer electronics, this book explains how to get the most out of the latest wireless and Web-based technologies.

Inside, you'll find 24 self-contained projects, step-by-step instructions, a list of tools needed at the beginning of each project, and hundreds of clear photos and screenshots. With CNET Do-It-Yourself Digital Home Office Projects, you'll be able to manage a competitive business from the comfort of your home.


Publisher:
McGraw-Hill (June 22, 2007)
Pages: 303
Language: English
ISBN-10: 0071489835
ISBN-13: 978-0071489836
Format:
PDF


Descarga/Download

Next Generation IPTV Services and Technologies

The television entertainment industry is currently experiencing a major transformation as broadband subscribers and improvements in compression techniques for digital video content continue to grow. This growth is fueling the demand for a new generation of technology professionals who will be responsible for implementing IP-based video services and digital home services around the world. Next Generation IPTV Services and Technologies explores key challenges associated with successfully managing the technical operation of an IPTV networking infrastructure and provides networking and IT specialists entering the IPTV sector with sound coverage of state-of-the-art technologies used to build end-to-end IPTV systems.


Publisher:
Wiley (January 2, 2008)
Pages: 512
Language: English
ISBN-10: 0470163720
ISBN-13: 978-0470163726
Format:
PDF


Descarga/Download

sábado, 31 de mayo de 2008

Security Sage's Guide to Hardening the Network Infrastructure

Security Sage's Guide to Hardening the Network Infrastructure will be the only publication that provides security and Information Technology (IT) professionals an in-depth and comprehensive view of network devices, protocols and architectures. It provides detailed guidance on real-world network threats and exposures. While most network security books focus on ancillary topics, such as operating systems, RDBMS, groupware, and other applications, this book will concentrate strictly on the nuts and bolts of networks, such as routers, firewalls, Intrusion Detection Systems (IDS) and the networking protocols that work in congress with them. It has over 200 pages dedicated to the most up-to-date network layer attacks and mitigation techniques across an wide assortment of vendors and not just the typical attention paid to market leaders such as Cisco and Checkpoint. This expanded breadth will help reach a wider range of network engineers who may not have the budget to purchase and install best-of-breed hardware, but want to know how to make the most out of what they do have. In addition, this book provides detailed network architecture and design techniques to help lessen the impact or feasibility of potential attacks. This book focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuration yet ignore the infrastructure connecting the two. While others tend to focus on theory and basic security background, this publication will dive right into the content and help provide real solutions to common IT security problems.


Publisher:
Syngress (March 1, 2004)
Pages: 608
Language: English
ISBN-10: 1931836019
ISBN-13: 978-1931836012
Format:
PDF


Descarga/Download

Smarty PHP Template Programming and Applications

Smarty is a templating engine for PHP. Designers who are used to working with HTML files can work with Smarty templates, which are HTML files with simple tags while programmers work with the underlying PHP code. The Smarty engine brings the code and templates together. The result of all this is that designers can concentrate on designing, programmers can concentrate on programming, and they don't need to get in each others way so much. Even if you are developing a site on your own, Smarty is a powerful way to make your code clearer to you and others, as well as easier to debug and modify later. This book is a comprehensive guide to all aspects of using Smarty. It will help you to: * Install and configure Smarty on your Web server * Understand how Smarty affects your web site architecture, and build site foundations that make the most of what Smarty offers * Designers will learn to work with templates that contain variables and logic, to modify layouts or content of Smarty web sites * See how Smarty caching can improve the performance of your sites * Develop custom Smarty functions and plug-ins to incorporate into your templates Using a step-by-step approach based on realistic examples, the expert authors show you how to use Smarty in your own PHP development.


Publisher:
PACKT (March 20, 2006)
Pages: 256
Language: English
ISBN-10: 190481140X
ISBN-13: 978-1904811404
Format:
PDF


Descarga/Download

Microsoft IIS 7 Implementation and Administration

Microsoft's IIS 7 is a radical departure from previous versions, and it promises administrators a new level of control over their Web servers. This book guides you beyond the networking technology and concepts you already know and teaches you the crucial new features of IIS 7 that will help you succeed with this dramatically different Web server. From navigating the new interface to configuring IIS 7 for maximum security and more, this book covers the techniques, tricks, and basic instruction you need.


Publisher:
Sybex (September 24, 2007)
Pages: 364
Language: English
ISBN-10: 0470178930
ISBN-13: 978-0470178935
Format:
PDF


Descarga/Download

viernes, 30 de mayo de 2008

Pro InfoPath 2007

Pro InfoPath 2007 is an excellent book for developers trying to learn the scope and range of application forms that can be built with Microsoft Office InfoPath 2007. InfoPath is now in its 2nd generation and it enables the creation of rich desktop and web forms using XML technologies and allows gathering of structured, business-critical information. Together with Microsoft Windows SharePoint Server 2007, InfoPath allows built-in integration with back-end processes, databases, and work flow, and provides developers with rich tools to build enterprise-wide forms solutions.

During the development and stabilization phase of InfoPath 2007, Philo worked closely with the product team to testfeatures, provide feedback on scenarios, and to build and apply solutions for the government and public sector. He haspoured all that experience in an engaging manner into this booka great read for every developer trying to learnInfoPath.


Publisher:
Apress (February 21, 2007)
Pages: 278
Language: English
ISBN-10: 1590597303
ISBN-13: 978-1590597309
Format:
PDF


Descarga/Download

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses your home network just because you can? Do you spend countless hours coding applications for the sheer joy and challenge? Do you have a coin jar labeled “Trip to DEFCON/Black Hat Fund”? If you want to refine those skills to land a top InfoSec job and employer-funded trip to Vegas next year, you’ve come to the right place. The authors of this book have all succeeded in applying their inherent hacker skills to build successful InfoSec careers. From them you will learn about the variety of available jobs and the skills required to excel in each one. Also, the authors provide advice on how to develop the necessary management and personal skills required to hack your way to the top.


Publisher:
Syngress (April 1, 2005)
Pages: 448
Language: English
ISBN-10: 1597490113
ISBN-13: 978-1597490115
Format:
PDF


Descarga/Download

Fault-Tolerant IP and MPLS Networks

Fault-Tolerant IP and MPLS Networks provides you with an in-depth analysis of the mechanisms that improve the reliability and availability of IP and MPLS control plane components. The IP/MPLS control-plane architecture and all its restart mechanisms are explained with examples and deployment considerations.

This explanation of IP/MPLS control-plane architecture begins with a service view of the network, moves on to the node-level view by partitioning the network into its constituent network elements, and then advances to the component-level view to explore various techniques that can be used to improve the reliability and availability of each component. The top-down and example-oriented approach facilitates a solid understanding of the constituent components before moving on to more advanced MPLS applications involving multiple components.

Fault-Tolerant IP and MPLS Networks is your practical guide for understanding, designing, and deploying carrier class IP/MPLS networks.


Publisher:
Cisco Press (Nov 11, 2004)
Pages: 336
Language: English
ISBN-10: 1-58705-126-5
ISBN-13: 978-1-58705-126-5
Format:
CHM


Descarga/Download

How to Cheat at Deploying and Securing RFID

RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.

For security professionals needing to get up and running fast with the topic of RFID, this How to Cheat approach to the topic is the perfect "just what you need to know" book!


Publisher:
Syngress (October 29, 2007)
Pages: 448
Language: English
ISBN-10: 1597492302
ISBN-13: 978-1597492300
Format:
PDF


Descarga/Download

jueves, 29 de mayo de 2008

openSUSE Linux Unleashed

openSUSE Linux Unleashed presents comprehensive coverage of the community version of SUSE Linux, one of the most popular and most complete Linux distributions in the world.

This book provides detailed information on installing, using, and administering openSUSE. You’ll learn how to unleash the vast array of software products included in openSUSE so that you can use it as a desktop computer, as a professional workstation, or as a powerful server.

openSUSE Linux Unleashed includes a broad range of coverage: from using software you need everyday–such as email clients, web browsers, and productivity software including the OpenOffice.org productivity suite–to configuring and administering a wide range of network and server products, such as the Apache web server, and MySQL database.

Additionally, this book provides details on openSUSE’s acclaimed YaST administration tools, web programming, networking, and choosing from a wide selection of graphical interfaces and desktop environments, including both KDE and GNOME.


Publisher:
SAMS (November 8, 2007)
Pages: 744
Language: English
ISBN-10: 067232945X
ISBN-13: 978-0672329456
Format:
PDF


Descarga/Download

SOA in Practice: The Art of Distributed System Design

This book demonstrates service-oriented architecture (SOA) as a concrete discipline rather than a hopeful collection of cloud charts. Built upon the author's firsthand experience rolling out a SOA at a major corporation, SOA in Practice explains how SOA can simplify the creation and maintenance of large-scale applications. Whether your project involves a large set of Web Services-based components, or connects legacy applications to modern business processes, this book clarifies how -- and whether -- SOA fits your needs. SOA has been a vision for years. This book brings it down to earth by describing the real-world problems of implementing and running a SOA in practice. After defining SOA's many facets, examining typical use patterns, and exploring how loose coupling helps build stronger applications, SOA in Practice presents a framework to help you determine when to take advantage of SOA. In this book you will: Focus squarely on real deployment and technology, not just standards maps. Examine business problems to determine which ones fit a SOA approach before plastering a SOA solution on top of them. Find clear paths for building solutions without getting trapped in the mire of changing web services details. Gain the experience of a systems analyst intimately involved with SOA "The principles and experiences described in this book played an important role in making SOA at T-Mobile a success story, with more than 10 million service calls per day." --Dr. Steffen Roehn, Member of the Executive Committee T-Mobile International (CIO) "Nicolai Josuttis has produced something that is rare in the over-hyped world of SOA; a thoughtful work with deep insights based on hands-on experiences. This bookis a significant milestone in promoting practical disciplines for all SOA practitioners." --John Schmidt, Chairman, Integration Consortium "The book belongs in the hands of every CIO, IT Director and IT planning manager." --Dr. Richard Mark Soley, Chairman and CEO, Object Management Group; Executive Director, SOA Consortium.


Publisher:
O'Reilly (August 24, 2007)
Pages: 342
Language: English
ISBN-10: 0596529554
ISBN-13: 978-0596529550
Format:
PDF


Descarga/Download

miércoles, 28 de mayo de 2008

Liferay Portal Enterprise Intranets

Liferay Portal is the world's leading open-source portal platform built on Java and Web 2.0 technologies. Corporations use it to provide a unified web interface to data and tools scattered across many sources.
Liferay Portal uses the latest in Java, J2EE, and Web 2.0 technologies to deliver solutions for enterprises across both public and private sectors. Liferay Portal's flexibility allows it to be deployed in a number of different scenarios to meet key business needs.

This book is a complete guide to building an intranet with Liferay (version 4.4)—assess your needs, install the software, start using it, deploy portlets, customize it per your requirements, and train users. The book focuses on leveraging the Liferay framework by configuring the XML files, without changing the underlying Java code. Each chapter gives practical guidance on how to install, use, and customize Liferay. There are many step-by-step examples for better understanding.


Publisher:
PACKT (April 30, 2008)
Pages: 408
Language: English
ISBN-10: 1847192726
ISBN-13: 978-1847192721
Format:
PDF


Descarga/Download

Performance Tuning for Linux Servers

An indispensable guide to maximizing Linux system and application performance

From Wall Street to Hollywood, Linux runs many of the world's most businesscritical systems. Linux performance now impacts the entire enterprise. In Performance Tuning for Linux Servers, a team of IBM's most-experienced Linux performance specialists shows you how to find bottlenecks, measure performance, and identify effective optimizations.

This book doesn't just cover kernel tuning: it shows how to maximize the end-to-end performance of real-world applications and databases running on Linux. Throughout, the authors present realistic examples based on today's most popular enterprise Linux platforms, Intel-based Red Hat Enterprise Linux, and Novell SUSE Linux Enterprise Server. These examples are designed for simplicity, clarity, and easy adaptation to any contemporary Linux environment.


Publisher:
IBM Press (June 6, 2005)
Pages: 576
Language: English
ISBN-10: 013144753X
ISBN-13: 978-0131447530
Format:
CHM


Descarga/Download

Microsoft Windows Security Fundamentals

This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks.

Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves identity and access management across security-related boundaries. R2 also improves branch office server management and increases the efficiency of storage setup and management. The second update, SP2 minimizes spam, pop-ups and unwanted downloads. These two updated have added an enormous amount of programming security to the server software.


Publisher:
Digital Press (October 30, 2006)
Pages: 832
Language: English
ISBN-10: 1555583407
ISBN-13: 978-1555583408
Format:
PDF


Descarga/Download

Implementing SugarCRM

Written by a veteran SugarCRM expert and experienced documentation author (not to mention official SugarCRM Rock Star!), this book is the definitive guide to implementing SugarCRM. SugarCRM is the leading open source web based customer relationship management system. It is available in both free open source and commercial versions, making it an ideal way for small-medium business to try out a CRM system without committing large sums of money. Although SugarCRM is carefully designed for ease of use, attaining measurable business gains requires careful planning and research. This book distils hard won SugarCRM experienced into an easy to follow guide to implementing the full power of SugarCRM. Using a unique checklist approach the book works from the SugarCRM basics right up to advanced features in a clear, friendly way. It is carefully designed to distil hard-won SugarCRM wisdom from a recognized expert into a clear, readable, practical guide. By helping you clarify your business goals the book enables you to build a CRM system to support your business needs, and shows SugarCRM in a realistic business setting through an Extended case study. SugarCRM is an extensive PHP/MySQL based application but with its rich administration interfaces no programming is required to get the most of it. This book is ideal for small-medium business owners/managers with reasonable IT skills, who want to implement SugarCRM for themselves as either a first CRM or as a replacement for existing solutions. It will also be a valuable resource for IT staff tasked with implementing, maintaining, or upgrading a SugarCRM installation.


Publisher:
PACKT (January 20, 2006)
Pages: 328
Language: English
ISBN-10: 190481168X
ISBN-13: 978-1904811688
Format:
PDF


Descarga/Download

lunes, 26 de mayo de 2008

PacketCable Implementation

PacketCable networks use IP technology to enable a wide range of multimedia services, from IP telephony to interactive gaming and beyond. Because PacketCable-based business and residential services are central to the cable industry's strategy for growth, the industry's need for PacketCable expertise is expected to increase dramatically.

PacketCable Implementation is the first complete primer on PacketCable network design, provisioning, configuration, management, and security. Drawing on consulting experience with every leading cable operator, Jeff Riddel presents real-world case studies, sample network designs, configurations, and practical tips for all facets of PacketCable planning and deployment.

This book's end-to-end coverage has been designed for cable engineers and networking professionals with widely diverse backgrounds and experience. Topics covered include PacketCable specifications and functional components, multimedia terminal adapters (MTA) provisioning, call signaling, media streaming, quality of service (QoS), event messaging, security, and much more. Every chapter contains tables and charts that serve as quick, easy references to key points. Each chapter closes with a summary and chapter review questions designed to help you assess and deepen your understanding.


Publisher:
Cisco Press (Feb 9, 2007)
Pages: 1104
Language: English
ISBN-10: 1-58705-181-8
ISBN-13: 978-1-58705-181-4
Format:
CHM


Descarga/Download