logo paquebote
317 libros encontrados buscando editorial: Addison Wesley

www.paquebote.com > Addison Wesley

Orden: · Ver: · Tipo:


Mapping Security: The Corporate Security Sourcebook for Today's Global Economy

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 432
Precio: 32,19
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Praise for Tom Patterson's Mapping Security

"Tom Patterson captures a compelling and practical view of security in a multinational environment. Your CSO needs to read this book!"

—Dr. Vint Cerf, senior vice president of Technology Strategy at MCI and founder of Internet Protocol (IP)

"The power of the Internet is that it's a global network, seamlessly crossing borders. But it also brings security risks that can cross borders just as easily. Patterson has more than a decade of first-hand experience in defending against such risks and it shows. He uses real-world examples and stories, many from his own career, and offers clear, action-oriented descriptions of the different threats and how to deal with them. This book avoids security jargon and speaks directly to businesspeople around the globe."

—Chris Anderson, Editor in Chief, Wired Magazine

Whether consumers or global giants, we all need to be spending a greater share of our budgets on security. The threats are greater than ever and increasing daily, and yet there is a challenge as to how to justify the expenditure. Mapping Security offers business-oriented and in-depth thinking on how and why to build security into the fabric of the organization. After reading Tom Patterson's book, you will want to make changes with a sense of urgency.

—John R Patrick, president of Attitude LLC and former vice president of Internet Technology at IBM Corporation

As companies of all sizes go global in their search for profit and growth, they will need to understand how to use security as a tool for success in different markets, and Mapping Security shows them how.

—Dr. Craig Fields, former director of Advanced Research Projects Agency (ARPA) for the U.S. Government

The Definitive Guide to Effective Security in Complex Global Markets

Companies are global today and have complex security supply chains, out-sourced operations, and customer relationships that span the world. Today, more than ever, companies must protect themselves against unprecedented threats, understand and adhere to a global mosaic of regulations, and leverage security to enable today's business realities. In Mapping Security, global security expert Tom Patterson shows how to meet these challenges by presenting security best practices, rules, and customs for virtually every country where you do business.

Writing for executives, business managers, security professionals, and consultants, Patterson offers an exceptionally thorough and authoritative briefing on today's global security realities. Using real-world examples, he shows how to change your approach to security as you move more deeply into global markets: how to resolve contradictions among the complex rules and customs you'll have to follow and how to customize security solutions for every market. Along the way, he introduces the Mapping Security Index (MSI), a powerful new metric for rapidly quantifying security risk associated with 30 key markets. Coverage includes

  • How technology, mass globalization, and stricter accountability are forcing security to the core of the enterprise

  • Six proven keys to defining and implementing global security strategies that work within today's budget realities

  • Detailed country-by-country drill downs on security in Europe, the Middle East and Africa, the Americas, and the Asia-Pacific region

  • Practical advice on what to do when laws collide

  • Quantifying the security posture and associated risks of potential cross-border partners

  • On-the-ground" help: Indispensable local security resources

Visit www.MappingSecurity.com for Tom Patterson's latest updates and analysis, including the latest changes to the MSI country scores, and to participate in the Mapping Security Reader Forum.

© Copyright Pearson Education. All rights reserved.



Imperfect XML: Rants, Raves, Tips, and Tricks ... from an Insider

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 256
Precio: 37,39
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"XML projects succeed or fail for many reasons other than XML. David's book goes beyond the angle brackets, giving a lot of information people need to know when planning and implementing an XML project, when choosing XML technologies, and when betting on XML standards."
--Dr. Ron Daniel, Principal, Taxonomy Strategies, former acting chair of the XML Linking working group and member of the RDF working groups

"Most books in this area are either beginners' guides, in-depth reference works to the foundational standards, or guides to using XML in particular environments or application areas. This book takes a broader approach for non-beginners and describes where XML can be used profitably in the real world. Highly recommended."
--Dr. Marc J. Hadley, Senior Staff Engineer, Web Technologies andStandards division, Sun Microsystems

"Imperfect XML is a thorough and engaging exploration of the issues XML practitioners are likely to face, with considered advice from one of the trailblazing authorities in the field"
--Neil Bradley, XML and Publishing Consultant and author of The XML Companion, The XSL Companion, and the XML Schema Companion

XML projects can fail for all kinds of reasons, from unrealistic overall goals to mishandled low-level technical decisions. Fortunately, one of the world's leading XML consultants is ready to show you how to avoid XML pitfalls on your next project.

Since its invention, David Megginson has been helping to drive XML to new levels. He led the team that developed the SAX streaming API now used worldwide, has been a key contributor to the World Wide Web Consortium, and has served as a consultant to many of the world's leading companies, including Boeing, Reuters, and McGraw-Hill. Drawing on this vast experience, Megginson offers in this book expert solutions and problem-solving guidance for virtually any XML project challenge. You'll discover best practices for planning, budgeting, scheduling, and managing any XML project: content management, data interchange, legacy integration, or Web services. And you'll find technical insights that only an expert like Megginson can offer.

Coverage includes

  • Setting expectations and planning for extensibility: key success factors in XML projects
  • Choosing standards, technical approaches, and architecture
  • Overcoming hidden pitfalls in single-source publishing from XML source
  • Intelligent searching with XML: essential design and implementation strategies
  • Using XML in enterprise integration: practical realities and workarounds
  • Scaling smoothly from demo to production system
  • Making XML fast: real help for overcoming XML performance problems
  • Managing the security risks associated with sending XML data across the Internet
  • Recognizing when XML technology is wrong for your project

From start to finish, Imperfect XML presents a clear-eyed view of XML's advantages and limitations--and technical and management solutions proven to make it work.



Protect Your Windows Network: From Perimeter to Data

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 608
Precio: 51,95
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Praise for Protect Your Windows Network

"Jesper and Steve have done an outstanding job of covering the myriad of issues you must deal with to implement an effective network security policy. If you care about security this book is a must have."
—Mark Russinovich, Chief Software Architect, Winternals Software

"Johansson and Riley's new book presents complex issues in straightforward language, examining both the technical and business aspects of network security. As a result, this book is an important tutorial for those responsible for network security; and even non-technical business leaders would learn a lot about how to manage the business risk inherent in their dependence on information technology.
—Scott Charney, Vice President of Trustworthy Computing, Microsoft

"These guys have a profound understanding of what it takes to implement secure solutions in the real world! Jesper and Steve have been doing security related work (pen testing, consulting, program management, etc.) internally at Microsoft and for Microsoft's customers for many years. As a result of their real-world experience, they understand that security threats don't confine themselves to "the network" or "the operating system" and that to deliver secure solutions, these issues must be tackled at all levels after all of the threats to the environment have been identified. This book distinguishes itself from others in this field in that it does a great job of explaining the threats at many levels (network, operating system, data, and application) and how to counter these threats. A must read for security practitioners!"
—Robert Hensing, CISSP, Security Software Engineer—Security Business and Technology Unit, Microsoft Corporation, rhensing@microsoft.com

"A good book should make you think. A good computer book should make you change how you are doing things in your network. I was fortunate enough to be setting up a new server as I read the book and incorporated many of the items discussed. The lessons in these chapters have relevance to networks large and small and blow through many of the myths surrounding computer security and guide you in making smarter security decisions. Too many times people focus in on just one aspect or part of a network's security and don't look at the bigger picture. These days I'm doing my very best to keep in mind the bigger picture of the forest (active directory notwithstanding), and not just looking at those trees."
—Susan Bradley, CPA, GSEC, MCP, Small Business Server MVP, http://www.msmvps.com/Bradley, sbradcpa@pacbell.net

"Jesper Johansson and Steve Riley's Protect Your Windows Network is a must read for all organizations to gain practical insight and best practices to improve their overall security posture."
—Jon R. Wall, CISSP

"Jesper and Steve are two excellent communicators who really know their stuff! If you want to learn more about how to protect yourself and your network, read this book and learn from these two guys!"
—Richard Waymire

"In order to protect your particular Windows network you need to understand how Windows security mechanisms really work. Protect Your Windows Network gives you an in-depth understanding of Windows security so that you use the security techniques that best map to your needs."
—Chris Wysopal, Director, Development, Symantec Corporation, http://www.symantec.com

"Nowadays, a computer that is not connected to a network is fairly limited in its usefulness. At the same time, however, a networked computer is a prime target for criminals looking to take advantage of you and your systems. In this book, Jesper and Steve masterfully demonstrate the whys and hows of protecting and defending your network and its resources, providing invaluable insight and guidance that will help you to ensure your assets are more secure."
—Stephen Toub, Technical Editor, MSDN Magazine, stoub@microsoft.com

"Security is more than knobs and switches. It is a mind set. Jesper Johansson and Steve Riley clearly understand this. Protect Your Windows Network is a great book on how you can apply this mind set to people, process, and technology to build and maintain more secure networks. This book is a must read for anyone responsible for protecting their organization's network."
—Ben Smith, Senior Security Strategist, Microsoft Corporation, Author of Microsoft Windows Security Resource Kit 2 and Assessing Network Security

"Security is finally getting the mainstream exposure that it has always deserved; Johansson and Riley's book is a fine guide that can complement Microsoft's recent focus on security in the Windows-family operating systems."
—Kenneth Wehr, President, ColumbusFreenet.org

"If you have not been able to attend one of the many security conferences around the world that Jesper and Steve presented, this book is the next best thing. They are two of the most popular speakers at Microsoft on Windows security. This is an informative book on how to make your Windows network more secure. Understanding the trade-offs between high security and functionality is a key concept that all Windows users should understand. If you're responsible for network security or an application developer, this book is a must."
—Kevin McDonnell, Microsoft

In this book, two senior members of Microsoft's Security Business and Technology Unit present a complete "Defense in Depth" model for protecting any Windows network—no matter how large or complex. Drawing on their work with hundreds of enterprise customers, they systematically address all three elements of a successful security program: people, processes, and technology.

Unlike security books that focus on individual attacks and countermeasures, this book shows how to address the problem holistically and in its entirety. Through hands-on examples and practical case studies, you will learn how to integrate multiple defenses—deterring attacks, delaying them, and increasing the cost to the attacker. Coverage includes

  • Improving security from the top of the network stack to the bottom

  • Understanding what you need to do right away and what can wait

  • Avoiding "pseudo-solutions" that offer a false sense of security

  • Developing effective security policies—and educating those pesky users

  • Beefing up your first line of defense: physical and perimeter security

  • Modeling threats and identifying security dependencies

  • Preventing rogue access from inside the network

  • Systematically hardening Windows servers and clients

  • Protecting client applications, server applications, and Web services

  • Addressing the unique challenges of small business network security

Authoritative and thorough, Protect Your Windows Network will be the standard Microsoft security guide for sysadmins, netadmins, security professionals, architects, and technical decision-makers alike.

© Copyright Pearson Education. All rights reserved.



Software Development Edge, The: Essays on Managing Successful Projects

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 336
Precio: 41,55
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"This set of articles captures decades of in-the trenches experience across a broad spectrum of software topics. Joe Marasco has the scars and the smarts to articulate patterns of success that can satisfy a broad audience. He uses mathematics, physics, common sense, and storytelling along with a no-candy-coating style to provide unique perspectives on significant problems in delivering software results as a business. Whether you are a computer science theoretician, a frustrated software project manager, a successful businessman, or a skeptical programmer, you will learn a lot from this compilation."
Walker Royce, Vice President, IBM Software Services-Rational, and author of Software Project Management (Addison-Wesley)

"Joe Marasco's readable essays on managing successful projects show that software development managers—no different from all managers—must embrace the fundamentals of management if they are to succeed: working through people and process to be decisive, dealing with politics, keeping on schedule, and, yes, shipping a well-developed product. Marasco uses plain English to explain many integrated skills, ranging from estimating the time it will take to really do things, to negotiating effectively, even to eloquently describing three distinct phases of our personal development. He frequently uses a 'can we talk?' conversation with a fictional colleague, Roscoe Leroy, in a Socratic dialogue to illustrate the two sides to a point in many areas (reminiscent of Galileo's writings to explain his then-heretical views); in this case, Marasco's advice will help technology professionals escape the clutches of pervasive Dilbertian incompetence, and enable readers to be more effective in our ever-changing world."
Carl Selinger, author of Stuff You Don't Learn in Engineering School: Skills for Success in the Real World (Wiley-IEEE Press), and contributing editor of IEEE Spectrum magazine

The new software management classic: in-the-trenches wisdom from legendary project leader Joe Marasco

Over the course of a distinguished career, Joe Marasco earned a reputation as the go-to software project manager: the one to call when you were facing a brutally tough, make-or-break project. Marasco reflected on his experiences in a remarkable series of "Franklin's Kite" essays for The Rational Edge, Rational and IBM's online software development magazine. Now, Marasco collects and updates those essays, bringing his unique insights (and humor) to everything from modeling to scheduling, team dynamics to compensation. The result: a new classic that deserves a place alongside Frederick Brooks' The Mythical Man-Month in the library of every developer and software manager. If you want to ship products you're proud of... ship on time and on budget... deliver real customer value... you simply must read The Software Development Edge.

Highlights include

  • How software projects resemble other projects—and how they're different

  • The iterative problem-solving clock: ending the day with real solutions

  • The realities of scheduling: How late are you going to be?

  • Trade-offs, estimating, project rhythm, and getting products out the door

  • Understanding what you're seeing, hearing, and feeling as a software manager

  • The human element: politics, negotiation, compensation, culture, and growth

  • Avoiding crises before they happen... and mitigating them when they do

  • Thinking laterally: original ideas in software project management

© Copyright Pearson Education. All rights reserved.



Developing Scalable Series 40 Applications: A Guide for Java Developers

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 624
Precio: 46,75
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"I have had the good fortune to be involved with mobile Java from the very beginning, and I know what it takes to be successful in this marketplace. This book will help you be successful with mobile Java application design and development. If you take the information inside and sprinkle it with some imaginative application ideas, you will have a winning combination."

— Jon Bostrom, Senior Director, CTO Java Technology Platforms, Nokia

The First Official End-To-End Solutions Guide for Every Nokia Series 40 Developer

Nokia's Series 40 Developer Platform gives Java developers access to the world's highest-volume, fastest-growing, and most exciting mobile markets. Nokia sells close to 100 million units within their Developer Platform families every year, and the Series 40 Developer Platform is the highest-volume platform in the family. Success on this platform is crucial for the commercial success of any mobile application. Knowledge of the Series 40 Developer Platform can be applied to the Java environment on all Nokia Developer Platform devices, including Series 60 devices.

Fully reviewed by Nokia's subject matter experts, this book covers the entire development process—from design and coding through testing and deployment. The authors walk you through eleven complete example applications, presenting downloadable client and server source code that you can use to jump-start virtually any project. Along the way, the authors illuminate the technical underpinnings of Series 40, review crucial architectural issues, introduce key mobile design patterns, discuss scalability and device optimization strategies, and offer dozens of best practices and tips—many of which have never before been published.

Coverage includes

  • Identifying your best opportunities and killer applications for mobile development

  • Building effective MIDP 2.0 user interfaces for devices built on the Series 40 Developer Platform

  • Building animated mobile games

  • Handling persistent and networking data

  • Proven techniques for scaling and optimizing applications across devices

© Copyright Pearson Education. All rights reserved.



Understanding SOA with Web Services

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 480
Precio: 39,47
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Praise for Understanding SOA with Web Services

"This book does the best job of describing not only "where we are" in the timeline of enterprise integration efforts, but also providing strategic guidance for where we need to be. The authors have worked diligently to break down the integration problem into functional areas, and send you down the path of strategic integration utilizing XML Web Services and Service-Oriented Architecture as the vehicle of choice. You will love this book!"

Daniel Edgar, Architect, Portland General Electric

"E-Government needs a comprehensive guide to SOA with Web Services standards and best practices for implementation to get from the current "as is" to the future "to be" architecture. This book meets that need superbly."

Brand Niemann, Ph.D., Co-Chair, Semantic (Web Services) Interoperability Community of Practice, U.S. Federal CIO Council.

"There are many books on SOA available today, but Understanding SOA with Web Services stands out from the pack because of its thorough, outstanding coverage of transactions, reliability, and process. Where most SOA books focus on integration and architecture basics, Lomow and Newcomer fearlessly dive into these more advanced, yet critical, topics, and provide a depth of treatment unavailable anywhere else."

Jason Bloomberg, Senior Analyst, ZapThink LLC

"This book provides a wealth of content on Web Services and SOA not found elsewhere. Although the book is technical in nature, it is surprisingly easy to read and digest. Managers who would like to keep up with the most effective technical strategies will find this book required reading."

Hari Mailvaganam, University of British Columbia, Vancouver

"I have been teaching companies and lecturing on SOA and XML Web Services for years and sort of felt at home with these technologies. I didn't think anyone else could teach me anything more significant about either of them. This book surprised me. If a person teaching SOA and Web Services can learn something from this book, you can too. This book is a must-read for all architects, senior developers, and concerned CTOs."

Sayed Y. Hashimi, SOA Consultant

"Newcomer and Lomow are no doubt the industry luminaries on the topics of Web Services, Service-Oriented Architecture, and integration. This book is sure to be a must-have for developers and architects looking to take advantage of the coming wave of standards-based, loosely coupled integration."

Ronald Schmelzer, Senior Analyst, ZapThink, LLC
Author of XML and Web Services Unleashed (Sams, 2002)

"The author makes it quite clear: SOA is an organizational principle and Web Service technology is a means to realize enterprise solutions according to this. SOA is the federative concept of nature and efficient societies. The book is an excellent starting-point to discover the new world of an IT-infrastructure adjusted to efficient business strategies and processes in a global value-add network."

Johann Wagner, Senior Architect, Siemens Business Services Author of Föderative Unternehmensprozesse

"Finally, here's a third-generation Web services book that delivers pragmatic solutions using SOAs. Newcomer and Lomow draw from their years of real-world experience ranging from developing Web services standards to hands-on applications. Listen to them."

DOUG KAYE, author of Loosely Coupled: The Missing Pieces of Web Services
Host and producer, IT Conversations (www.itconversations.com)

The definitive guide to using Service-Oriented Architecture (SOA) and Web services technologies to simplify IT infrastructure and improve business agility. Renowned experts Eric Newcomer and Greg Lomow offer practical strategies and proven best practices for every facet of SOA planning and implementation. Newcomer and Lomow pick up where Newcomer's widely read Understanding Web Services left off, showing how to fully leverage today's latest Web services standards for metadata management, security, reliable messaging, transactions, and orchestration.

Along the way, they present specific approaches and solutions for a wide range of enterprise integration and development challenges, including the largest and most complex.

Coverage includes

  • Why SOA has emerged as the dominant approach to enterprise integration

  • How and why Web services provide the ideal foundation for SOA

  • Underlying concepts shared by all SOAs: governance, service contracts, Web services platforms, service-oriented development, and more

  • Implementing service-level communications, discovery, security, data handling, transaction management, and system management

  • Using SOA to deliver application interoperability, multichannel client access, and business process management

  • Practical tutorials on WS-Security, WS-Reliable Messaging, WS-AtomicTransactions, WS-Composite Application Framework, WS-Addressing, WS-Policy, and WS-BPEL

Whether you're an architect, developer, or IT manager, Understanding SOA with Web Services will help you get SOA right—and achieve both the business and technical goals you've set for it.

© Copyright Pearson Education. All rights reserved.



Eclipse AspectJ: Aspect-Oriented Programming with AspectJ and the Eclipse AspectJ Development Tools

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 504
Precio: 46,75
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Eclipse AspectJ: Aspect-Oriented Programming with AspectJ and the Eclipse AspectJ Development Tools

AspectJ: Now every Java developer can leverage the immense power of AOP

With AspectJ, Java developers can leverage the breakthrough power of Aspect-Oriented Programming (AOP) using a language they already know, within the comfortable, highly productive Eclipse development environment. In this book, AspectJ's lead developers help you master AOP's essential principles and techniques, as you use them to address your toughest software quality, productivity, and maintenance challenges.

AOP improves the modularity of programs, making the code much closer to the design. It can dramatically reduce the time taken to implement common features and functions, improve quality, integrate plain-old Java objects with systems and services, create simpler, more reusable components, and much more besides.

Drawing on their experience as tool developers, programmers, and mentors, the authors cover every facet of AOP development with AspectJ and Eclipse, from creating new projects through extending and documenting full-fledged applications. You'll find an authoritative tutorial covering the entire AspectJ language, a complete API reference, and realistic guidance on adopting AspectJ in your organization.

  • No AOP or Eclipse experience necessary!
  • Install and configure both Eclipse and the AspectJ Development Tools (AJDT)
  • Discover how AOP can modularize and optimize everything from error checking to performance
  • Craft new AspectJ applications and incorporate AOP capabilities into existing systems
  • Build, debug, and document AspectJ applications
  • Understand crucial AOP concepts, such as join points, pointcuts, advice, and inter-type declarations
  • Master advanced techniques: Aspect libraries, linking with compiled .class files, visualization, aspect-oriented design, and more

© Copyright Pearson Education. All rights reserved.



Slamming Spam: A Guide for System Administrators

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 432
Precio: 41,55
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Real Anti-Spam Help for System Administrators

In Slamming Spam, two spam fighters show you how to fight back—and win. Unlike most spam books, this one is written specifically for in-the-trenches system administrators: professionals who need hands-on solutions for detecting, managing, and deterring spam in Unix/Linux and/or Microsoft Windows environments.

The authors offer deep, administrator-focused coverage of the most valuable open-source tools for reducing spam's impact in the enterprise—especially SpamAssassin. Drawing on their extensive experience in developing and implementing anti-spam tools, the authors present expert insights into every leading approach to fighting spam, including Bayesian filtering, distributed checksum filtering, and email client filtering.

Coverage includes

  • Step-by-step junk mail filtering with Procmail

  • Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam

  • Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking

  • Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse

  • McAfee SpamKiller for Lotus Domino

  • McAfee SpamKiller for Microsoft Exchange

  • Implementing and managing SpamAssassin

  • Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords

  • Sender verification techniques, including challenge/response, special use addresses, and sender compute

  • Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients

Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs—IT staff time, network/computing resources, and user productivity.

© Copyright Pearson Education. All rights reserved.



Windows® Server? 2003/2000 Terminal Server Solutions: Implementing Windows Terminal Services and Cit

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 1264
Precio: 50,91
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"Whether you're a Techie, Architect, or a Project Manager, this masterpiece of tricks and traps will help you plan, test, and implement your Citrix environment."

—Chris Walter, Senior Consultant, CGI

"Whether you are a terminal services veteran or entirely new to the world of remote desktop, Mathers makes it easy to understand everything from the initial Terminal Services project planning to the complete network and management implementation. This book is definitely something a Terminal Services administrator is going to want to have handy."

—Matthew Harris, Microsoft Windows Server MVP - Terminal Server

This book brings together all the insights, knowledge, and step-by-step guidance you need to deliver robust, scalable, and stable server-based computing solutions with Microsoft Windows Terminal Services and Citrix MetaFrame Presentation Server 3.0. Building on two best-selling previous editions, expert consultant Todd W. Mathers has fully updated this book to cover both Windows Server 2003 and Windows 2000 Server environments.

Drawing on nearly a decade of experience, Mathers addresses the entire project lifecycle, from needs assessment through planning, testing, deployment, and support. He covers the full spectrum of deployments, from Terminal Services for small businesses through enterprise-class Terminal Services/Citrix server farms. Along the way, Mathers presents proven examples and best practices for virtually every challenge, from server security to group policies, patch management to automated client deployment. Coverage includes

  • Terminal Services and Citrix MetaFrame: how they relate, and how to determine what you need

  • Common implementation traps and "gotchas"—and how to avoid them

  • Planning client hardware/software, server hardware, networking, hotfix distribution, and more

  • Step-by-step installation, including service-pack integration and answer files

  • Detailed checklists and tuning techniques for optimizing performance and stability

  • New Windows Server 2003 licensing requirements: overcoming the misinterpretations

  • Expanded coverage of security in both Terminal Services and Citrix environments

  • New and improved solutions for client drive and printer mapping

  • Interoperability between MetaFrame 1.8 and MetaFrame Presentation Server 3.0

  • User profile and account creation, configuration, and management

  • RDP and ICA client configuration, in detail

  • Application compatibility: using Terminal Services' application support features

  • Using Session Directory to track and reconnect sessions in clustered environments

  • Complete command references for Terminal Services and MetaFrame XP

If you're an administrator, architect, or developer using or evaluating Windows thin-client technologies, Windows® Server 2003/2000 Terminal Server Solutions will be your indispensable single-source reference.

© Copyright Pearson Education. All rights reserved.



Forensic Discovery

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 240
Precio: 37,39
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"Don't look now, but your fingerprints are all over the cover of this book. Simply picking it up off the shelf to read the cover has left a trail of evidence that you were here.
    "If you think book covers are bad, computers are worse. Every time you use a computer, you leave elephant-sized tracks all over it. As Dan and Wietse show, even people trying to be sneaky leave evidence all over, sometimes in surprising places.
    "This book is about computer archeology. It's about finding out what might have been based on what is left behind. So pick up a tool and dig in. There's plenty to learn from these masters of computer security."
   --Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software and Building Secure Software

"A wonderful book. Beyond its obvious uses, it also teaches a great deal about operating system internals."
   --Steve Bellovin, coauthor of Firewalls and Internet Security, Second Edition, and Columbia University professor

"A must-have reference book for anyone doing computer forensics. Dan and Wietse have done an excellent job of taking the guesswork out of a difficult topic."
   --Brad Powell, chief security architect, Sun Microsystems, Inc.

"Farmer and Venema provide the essential guide to 'fossil' data. Not only do they clearly describe what you can find during a forensic investigation, they also provide research found nowhere else about how long data remains on disk and in memory. If you ever expect to look at an exploited system, I highly recommend reading this book."
   --Rik Farrow, Consultant, author of Internet Security for Home and Office

"Farmer and Venema do for digital archaeology what Indiana Jones did for historical archaeology. Forensic Discovery unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder."
   --Richard Bejtlich, technical director, ManTech CFIA, and author of The Tao of Network Security Monitoring

"Farmer and Venema are 'hackers' of the old school: They delight in understanding computers at every level and finding new ways to apply existing information and tools to the solution of complex problems."
   --Muffy Barkocy, Senior Web Developer, Shopping.com

"This book presents digital forensics from a unique perspective because it examines the systems that create digital evidence in addition to the techniques used to find it. I would recommend this book to anyone interested in learning more about digital evidence from UNIX systems."
   --Brian Carrier, digital forensics researcher, and author of File System Forensic Analysis

The Definitive Guide to Computer Forensics: Theory and Hands-On Practice

Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject.

Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever.

The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a wide variety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins.

After reading this book you will be able to

  • Understand essential forensics concepts: volatility, layering, and trust
  • Gather the maximum amount of reliable evidence from a running system
  • Recover partially destroyed information--and make sense of it
  • Timeline your system: understand what really happened when
  • Uncover secret changes to everything from system utilities to kernel modules
  • Avoid cover-ups and evidence traps set by intruders
  • Identify the digital footprints associated with suspicious activity
  • Understand file systems from a forensic analyst's point of view
  • Analyze malware--without giving it a chance to escape
  • Capture and examine the contents of main memory on running systems
  • Walk through the unraveling of an intrusion, one step at a time

The book's companion Web site contains complete source and binary code for open source software discussed in the book, plus additional computer forensics case studies and resource links.

Si no ha encontrado el libro que busca, pinche en nuestro servicio de Pedido Directo y pídanoslo.

Volver a Página Principal

Otras novedades

© Paquebote 1998-2022 Todas las secciones | Ayuda | Aviso Legal