logo paquebote
318 libros encontrados buscando editorial: Addison Wesley

www.paquebote.com > Addison Wesley

Orden: · Ver: · Tipo:


C++ Coding Standards: 101 Rules, Guidelines, and Best Practices

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 240
Precio: 39,47
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Consistent, high-quality coding standards improve software quality, reduce time-to-market, promote teamwork, eliminate time wasted on inconsequential matters, and simplify maintenance. Now, two of the world's most respected C++ experts distill the rich collective experience of the global C++ community into a set of coding standards that every developer and development team can understand and use as a basis for their own coding standards.

The authors cover virtually every facet of C++ programming: design and coding style, functions, operators, class design, inheritance, construction/destruction, copying, assignment, namespaces, modules, templates, genericity, exceptions, STL containers and algorithms, and more. Each standard is described concisely, with practical examples. From type definition to error handling, this book presents C++ best practices, including some that have only recently been identified and standardized-techniques you may not know even if you've used C++ for years. Along the way, you'll find answers to questions like

  • What's worth standardizing--and what isn't?
  • What are the best ways to code for scalability?
  • What are the elements of a rational error handling policy?
  • How (and why) do you avoid unnecessary initialization, cyclic, and definitional dependencies?
  • When (and how) should you use static and dynamic polymorphism together?
  • How do you practice "safe" overriding?
  • When should you provide a no-fail swap?
  • Why and how should you prevent exceptions from propagating across module boundaries?
  • Why shouldn't you write namespace declarations or directives in a header file?
  • Why should you use STL vector and string instead of arrays?
  • How do you choose the right STL search or sort algorithm?
  • What rules should you follow to ensure type-safe code?

Whether you're working alone or with others, C++ Coding Standards will help you write cleaner code--and write it faster, with fewer hassles and less frustration.



Learning Exchange Server 2003

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 840
Precio: 55,07
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Learning Exchange Server 2003


Bill Boswell


·      Exchange Server 2003 for working administrators

·      Maximizing performance, reliability, and business value

·      Integrating Exchange into your overall IT infrastructure

·      Contains detailed process analyses and dozens of how-to diagrams

·      Migrating from legacy versions of Exchange

·      Reviewed by Exchange MVPs and approved for technical accuracy by Microsoft


Windows Server System Series


Real-world Exchange 2003 deployment and management for working administrators


This is your start-to-finish guide to getting Microsoft Exchange Server 2003 into production, then maximizing its reliability, performance, and business value. Bill Boswell writes for working administrators whose responsibilities now include Exchange Server 2003. He addresses every facet of Exchange from architecture to address lists, answering three key questions: How does it work? How do I get the most out of it? How do I fix it if it breaks?


Unlike some books, this one recognizes that you’re deploying Exchange in the context of a complex IT infrastructure. Boswell thoroughly discusses Exchange’s key dependencies and connections, and offers detailed process analyses¿complete with diagrams and step-by-step integration guidance. You’ll learn exactly what you need to know to make Exchange work seamlessly with Outlook--and with other email clients. Boswell even introduces third-party administration tools that work when Microsoft’s don’t.


Best of all, you can rely on this book. It was written by one of the world’s leading Exchange and Windows Server consultants, then reviewed by Microsoft Exchange MVPs, and approved by Microsoft itself for technical accuracy.


·      Getting up-to-speed on an Exchange system you’ve inherited

·      Migrating from legacy versions of Exchange

·      Ensuring service continuity in any environment--from small business to Fortune®-class enterprise

·      Designing Exchange Server 2003 for maximum performance

·      Deploying distributed Exchange architectures

·      Implementing security best practices to prevent system compromise

·      Managing storage, mailboxes, message routing, public folders, distribution lists, and more

·      Troubleshooting Exchange: isolating and correcting a wide range of Exchange problems

·      Includes step-by-step procedures and lab exercises for testing and production deployment




Patterns for Parallel Programming

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 384
Precio: 55,07
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

The Parallel Programming Guide for Every Software Developer

From grids and clusters to next-generation game consoles, parallel computing is going mainstream. Innovations such as Hyper-Threading Technology, HyperTransport Technology, and multicore microprocessors from IBM, Intel, and Sun are accelerating the movement's growth. Only one thing is missing: programmers with the skills to meet the soaring demand for parallel software.

That's where Patterns for Parallel Programming comes in. It's the first parallel programming guide written specifically to serve working software developers, not just computer scientists. The authors introduce a complete, highly accessible pattern language that will help any experienced developer "think parallel"-and start writing effective parallel code almost immediately. Instead of formal theory, they deliver proven solutions to the challenges faced by parallel programmers, and pragmatic guidance for using today's parallel APIs in the real world. Coverage includes:

  • Understanding the parallel computing landscape and the challenges faced by parallel developers
  • Finding the concurrency in a software design problem and decomposing it into concurrent tasks
  • Managing the use of data across tasks
  • Creating an algorithm structure that effectively exploits the concurrency you've identified
  • Connecting your algorithmic structures to the APIs needed to implement them
  • Specific software constructs for implementing parallel programs
  • Working with today's leading parallel programming environments: OpenMP, MPI, and Java

Patterns have helped thousands of programmers master object-oriented development and other complex programming technologies. With this book, you will learn that they're the best way to master parallel programming too.




Privacy: What Developers and IT Professionals Should Know

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 384
Precio: 55,07
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.


Praise for J.C. Cannon's Privacy

"A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between."

—Peter Wayner, author of Translucent Databases

"Cannon provides an invaluable map to guide developers through the dark forest created by the collision of cutting-edge software development and personal privacy."

—Eric Fredericksen, Sr. Software Engineer, PhD., Foundstone, Inc.

"Cannon's book is the most comprehensive work today on privacy for managers and developers. I cannot name any technical areas not covered. No practitioners should miss it."

—Ray Lai, Principal Engineer, Sun Microsystems, Inc., co-author of Core Security Patterns and author of J2EE Platform Web Services

"Every developer should care deeply about privacy and this is the best book I've read on the subject. Get it, read it, and live it."

—Keith Ballinger, Program Manager, Advanced Web Services, Microsoft

"J.C. Cannon's book demonstrates that information and communication technology can contribute in a significant way to restoring individual privacy and raises more awareness of the complexity and importance of this societal problem."

—Dr. John J. Borking, Former Commissioner and Vice-President of the Dutch Data Protection Authority

"If you are planning, implementing, coding, or managing a Privacy campaign in your company or your personal computing, there is no more relevant reference. J.C. Cannon nails the issues."

—Rick Kingslan, CISSP, Microsoft MVP-Windows Server: Directory Services and Right Management, West Corporation

"It's often been said that security is a process, not a product. Privacy is no different! Unlike other privacy books, J.C. Cannon's book has something valuable to convey to everyone involved in the privacy process, from executives to designers and developers, many of whom aren't thinking about privacy but should be."

—Keith Brown, Co-founder of Pluralsight and author of The .NET Developer's Guide to Windows Security and Programming Windows Security

"J.C. Cannon's new book on electronic privacy is an important addition to the available works in this emerging field of study and practice. Through many humorous (and occasionally frightening) examples of privacy gone wrong, J.C. helps you better understand how to protect your privacy and how to build privacy awareness into your organization and its development process. Keenly illustrating both the pros and cons of various privacy-enhancing and potentially privacy-invading technologies, J.C.'s analysis is thorough and well-balanced. J.C. also explains many of the legal implications of electronic privacy policies and technologies, providing an invaluable domestic and international view."

—Steve Riley, Product Manager, Security Business and Technology Unit, Windows Division, Microsoft

"Privacy concerns are pervasive in today's high-tech existence. The issues covered by this book should be among the foremost concerns of developers and technology management alike."

—Len Sassaman, Security Architect, Anonymizer, Inc.

You're responsible for your customers' private information. If you betray their trust, it can destroy your business. Privacy policies are no longer enough. You must make sure your systems truly protect privacy—and it isn't easy. That's where this book comes in.

J.C. Cannon, Microsoft's top privacy technology strategist, covers every facet of protecting customer privacy, both technical and organizational. You'll learn how to systematically build privacy safeguards into any application, Web site, or enterprise system, in any environment, on any platform. You'll discover the best practices for building business infrastructure and processes that protect customer privacy. You'll even learn how to help your customers work with you in protecting their own privacy. Coverage includes

  • How privacy and security relate—and why security isn't enough
  • Understanding your legal obligations to protect privacy
  • Contemporary privacy policies, privacy-invasive technologies, and privacy-enhancing solutions
  • Auditing existing systems to identify privacy problem areas
  • Protecting your organization against privacy intrusions
  • Integrating privacy throughout the development process
  • Developing privacy-aware applications: a complete sample application
  • Building a team to promote customer privacy: staffing, training, evangelization, and quick-response
  • Protecting data and databases via role-based access control
  • Using Digital Rights Management to restrict customer information
  • Privacy from the customer's standpoint: spam avoidance, P3P, and other tools and resources

Whether you're a manager, IT professional, developer, or security specialist, this book delivers all the information you need to protect your customers—and your organization.

The accompanying CD-ROM provides sample privacy-enabling source code and additional privacy resources for developers and managers.

J. C. CANNON, privacy strategist at Microsoft's Corporate Privacy Group, specializes in implementing application technologies that maximize consumer control over privacy and enable developers to create privacy-aware applications. He works closely with Microsoft product groups and external developers to help them build privacy into applications. He also contributed the chapter on privacy to Michael Howard's Writing Secure Code (Microsoft Press 2003). Cannon has spent nearly twenty-five years in software development.



Inside Active Directory: A System Administrator's Guide

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 1248
Precio: 60,27
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Praise for the First Edition

“Trust me on this one...if you’re an Active Directory engineer or architect, this is the book you need. It’s the companion that’s going to help you keep your job if you’re up in the middle of the night trying to understand how something works or why it’s not working. It’s truly an amazing book.”
—Scott Rachui, MCSE and Senior Active Directory Engineer, author of MCSE Exchange Server 5.5 for Dummies
“This is the best book on Windows 2000 that I have read and one of the best computer books I have ever read. The most unique quality is the excellent explanation of how to use scripting to maximize your results and minimize your effort. This book is especially well suited to the enterprise audience that has to deploy many servers (100+) and not just 1-10. If you have even a small bit of programming experience, you will really appreciate the in-depth explanations of Windows 2000 under the covers.”
—Eric Chipko
“Wow!! I love this book. I’d trade all my books covering Active Directory for this book in a second. The material is covered at a depth that I haven’t seen in any other book—and I’ve looked at most of them. The material is presented in a straightforward manner that doesn’t put you to sleep. An NT4 administrator could easily read this book and become an expert at Active Directory. I especially appreciated the chapter on Active Directory security.”
—Brian Arkills, author of LDAP Directories Explained

Praise for the Second Edition

“If you are committed and really desire to know what makes Active Directory tick—and with it the backbone of the latest, and greatest, generation of Windows Network Operating Systems—then there is no better guide to get you there than this book. Inside Active Directory has no equal in the breadth, depth, and scope of its value to a technical practitioner.”
—Rick Kingslan, Microsoft MVP, Directory Services
“Kouti and Seitsonen provide excellent coverage of topics a lot of people have difficulty understanding and setting up properly. This book supplies you with sound background theory so you can understand these concepts and at the same time gives just the right amount of detail to actually accomplish what you are trying to do.”
—Harold McFarland, Editor, Readers Preference Reviews
“The style of this book is very appealing. It gives sufficient detail for the experienced administrator and explains what is happening ’behind the scenes’ at each step, which is extremely helpful when problems arise. An excellent read and an essential component for any skilled administrator!”
—Jeff Dunkelberger, Solutions Architect
“An outstanding refresh of an already great book, Inside Active Directory, Second Edition, should be in the toolbox of any serious Active Directory administrator, architect, or developer. Inside Active Directory is one of the five books I refer to on a weekly basis. Thanks to the authors for all their hard work and dedication.”
—Joe Richards, Microsoft MVP, Windows Server/Active Directory

The most practical, comprehensive, and highly praised guide to Active Directory has now been fully updated for Windows Server 2003. The second edition of Inside Active Directory: A System Administrator’s Guide offers a definitive reference to the design, architecture, installation, and management of Active Directory, the cornerstone technology within Windows 2000 and Windows Server 2003 distributed networks. This new edition—based on the final release software of Windows Server 2003—emphasizes security and covers all the new features, including enhancements in replication and Group Policy, forest trusts, functional levels, and working with dynamic objects.

Inside this core reference, you’ll find practical strategies for managing Active Directory, along with detailed instructions for efficiently administering your entire network operating environment. You will find detailed coverage of the following:

  • Site basics and replication topologies, processes, and diagnostics
  • Group Policy architecture, planning, management, and diagnostics
  • Security and permission architecture and management scenarios
  • Administration scripts, from basic concepts to advanced topics, including more than 50 sample scripts
  • New cross-forest security features, including Selective Authentication, SID Filtering, and Name Suffix Routing
  • A detailed drill-down to the schema, and practical strategies and examples for extending it
  • Using Active Directory hierarchies to implement an effective structure for your network

This is an indispensable reference for anyone working with Active Directory. Network operating system novices will gain a solid understanding of Active Directory, while administrators experienced in NT, NetWare, or UNIX will learn how to utilize their current skills in Active Directory. Experienced Windows 2000/Windows Server 2003 professionals will pick up advanced techniques, and developers will benefit strongly from the architecture topics.



Moving to the Linux Business Desktop

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 696
Precio: 48,83
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Moving to the Linux Business Desktop

Switch your business to Linux: proven techniques for working IT Professionals

This is the complete technical resource for migrating your business desktops to Linux, administering them efficiently, and using them to drive cost savings throughout your organization. Respected Linux Journal columnist Marcel Gagné walks you step-by-step through planning and managing the transition, getting users up and running, and keeping them happy. Gagné covers hardware, productivity applications, messaging, coexistence with Windows environments, support, and much more. This is also the first book with in-depth coverage of using Linux Terminal Server Project (LTSP) thin clients to dramatically reduce the cost and complexity of computing.

  • Deploy Linux with your existing PCs, printers, and IT/network infrastructure
  • Centrally manage users and security through Webmin's convenient Web interface
  • Deliver reliable email services with Postfix, or integrate Linux mail clients with Microsoft Exchange servers
  • Configure Windows file sharing with Samba, and Linux file sharing with NFS
  • Secure network communications with Linux firewalls and OpenSSH
  • Plan and deploy LTSP thin clients and diskless workstations and the server support for them
  • Provide LDAP directory services to all your clients
  • Support users by "remote control"—without leaving your desk

From network security to spam reduction, automated backup/restore to collaboration groupware, Gagné offers specific solutions and proven techniques for leveraging the full power of Linux in your business.

Say goodbye to the expense, hassle, and insecurity of Windows desktops! Say hello to business computing the way it's supposed to be—with Linux!

About the Author

Marcel Gagné is best known as the author of the Linux Journal's "Cooking with Linux" series, winner of the Readers' Choice award for favorite column for three straight years. He has written two highly acclaimed Addison-Wesley books: Moving to Linux and Linux System Administration: A User's Guide.



Effective Enterprise Java

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 496
Precio: 48,83
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"With this book, Ted Neward helps you make the leap from being a good Java enterprise developer to a great developer!"
—John Crupi, Sun Distinguished Engineer coauthor, Core J2EE Patterns

If you want to build better Java enterprise applications and work more efficiently, look no further. Inside, you will find an accessible guide to the nuances of Java 2 Platform, Enterprise Edition (J2EE) development. Learn how to:

  • Use in-process or local storage to avoid the network, see item 44
  • Set lower isolation levels for better transactional throughput, see item 35
  • Use Web services for open integration, see item 22
  • Consider your lookup carefully, see item 16
  • Pre-generate content to minimize processing, see item 55
  • Utilize role-based authorization, see item 63
  • Be robust in the face of failure, see item 7
  • Employ independent JREs for side-by-side versioning, see item 69

Ted Neward provides you with 75 easily digestible tips that will help you master J2EE development on a systemic and architectural level. His panoramic look at the good, the bad, and the ugly aspects of J2EE development will address your most pressing concerns. Learn how to design your enterprise systems so they adapt to future demands. Improve the efficiency of your code without compromising its correctness. Discover how to implement sophisticated functionality that is not directly supported by the language or platform. After reading Effective Enterprise Java, you will know how to design and implement better, more scalable enterprise-scope Java software systems.



Return on Software: Maximizing the Return on Your Software Investment

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 656
Precio: 55,07
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"This pioneering book highlights critical, overlooked skills needed by true software professionals."

Steve McConnell
CEO and Chief Software Engineering
Construx Software

"It's about time someone took this stuff seriously."

Steven Mellor
Chief Scientist
Embedded Systems Division
Mentor Graphics Corporation
Co-Author of Exploring the Role of Executable UML in Model-Driven Architecture and six other books

"Despite the fact that engineering economics is considered a core area of any engineering field, virtually no books have been written in the area of software engineering economics. Steve Tockey's Return on Software nicely fills this gaps by providing a comprehensive introduction to software engineering economics accessible both to students and to new software professionals."

Donald J. Bagert, Ph.D., P.E. Director of Software Engineering and Professor of Computer Science & Software Engineering Rose-Hulman Institute of Technology

"The elements of this book are useful not only in making decisions but also in understanding why and how other people and organizations make decisions"

Shari Lawrence Pfleeger
Senior Researcher, RAND
Co-author of Security in Computing and eight other software engineering titles

"This just what the doctor ordered to help software programs solve the problem of how to introduce engineering economics and business decision-making into their curricula. The economics of software development should not only be part of any computing curriculum they are an essential element of recent accreditation and certification recommendations.

This book is an accessible and relevant text for any student of software engineering. The style is clear and straightforward and the software examples will be appealing to students and faculty alike. I can't wait to use it in class!"

Thomas B. Hilburn, Professor
Department of Computer and Software Engineering
Embry-Riddle Aeronautical University

Is your organization maximizing the return on its investments of money, time, and personnel? Probably not, because most software professionals don't know how to consider the business aspects of their software decisions. Most don't even know that it's important to do so. Business consequences should play a critical role in all software technical choices—from choosing which projects to do, selecting software development processes, choosing algorithms and data structures, all the way to determining how much testing is enough.

Return on Software: Maximizing the Return on Your Software Investment is about making choices: software technical choices in a business context. It helps software professionals appreciate the business consequences of the decisions they make. This primer will prove a valuable reference for making the important decisions the typical software organization faces both today and down the road. Inside, you'll learn how to:

  • Estimate how much each proposed software technical decision will cost, and how much it will return.

  • Weigh the time frames for a software decision's costs and benefits against each other to reveal when there might be a more important factor than schedule.

  • Attach a value to quality and produce a rational answer to the question, "How much testing is enough?"

  • Account for risk and uncertainty in software technical decisions, such as when considering a new technology.

  • Communicate your decisions in a way that speaks to the all-important bottom line.

Each chapter contains a set of self-study questions designed to help you apply the featured concepts and techniques. An enhanced online index allows you to quickly and easily search the entire text for specific topics.



Tao of Network Security Monitoring, The: Beyond Intrusion Detection

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 832
Precio: 55,07
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Former Air Force intelligence officer Richard Bejtlich is founder of TaoSecurity, a company that helps clients detect, contain, and remediate intrusions using network security monitoring principles. He specializes in network-centric incident response and forensics.



Windows Forensics and Incident Recovery

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 480
Precio: 55,07
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Back Cover Copy: Windows Forensica and Incident Recovery

Praise for Windows Forensics and Incident Recovery

"Windows Forensics and Incident Recovery doesn't just discuss forensics, it also includes tools for analysis and shows readers how to use them. I look forward to putting these tools through their paces, and I recommend Carvey's book as a terrific addition to the security professional's bookshelf."
—Warren G. Kruse II, Partner

Computer Forensic Services, LLC

"This book is a good reference for the tools needed to prepare for, respond to, and confirm a Windows-based computer incident."
—Brian Carrier
Digital forensics researcher

"This book provides a unique 'command-line centric' view of Microsoft and non-Microsoft tools that can be very helpful to folks responsible for security and system administration on the Windows platform."
—Vishwas Lele, principal architect
Applied Information Sciences, Inc.

"Harlan Carvey's book serves as a great resource for investigators and systems administrators looking to peek under the hoods of their Windows systems."
—Jason Chan, security consultant

"Regardless of what you know already, you are guaranteed to learn something new about Windows incident response from this book."
—Brian Behler, computer forensics and intrusion analyst/engineer

"Harlan Carvey's vast security and forensics experience shows through in all facets of this work. Many books have attempted to be the prescriptive guide to forensics on the Windows platform. This book not only attempts it, but it succeeds—with guidance to spare."
—Rick Kingslan, Microsoft MVP
West Corporation

"This book is the first to bring together into a single volume the topics of malicious code, incident response, and forensics on the Windows platform. Mr. Carvey's work should serve as a valuable reference for any Windows system administrator or security professional."
—Jennifer Kolde, information security consultant, author, and instructor

"Harlan Carvey's book is a one-of-a-kind approach to do-it-yourself Windows forensics. With detailed and illustrative examples coupled with Harlan's renowned Perl scripts, this book certainly is a great find."
—Mark Burnett, security consultant and author

  • The first book to focus on forensics and incident recovery in a Windows environment

  • Teaches through case studies and real world-examples

  • Companion CD contains unique tools developed by the author.

  • Covers Windows Server 2003, Windows 2000, Windows NT, and Windows XP

If you're responsible for protecting Windows systems, firewalls and anti-virus aren't enough. You also need to master incident response, recovery, and auditing. Leading Windows security expert and instructor Harlan Carvey offers a start-to-finish guide to the subject: everything administrators must know to recognize and respond to virtually any attack.

Drawing on his widely acclaimed course, Carvey uses real-world examples to cover every significant incident response, recovery, and forensics technique. He delivers a complete incident response toolset that combines today's best open source and freeware tools, his own exclusive software and scripts, and step-by-step instructions for using them. This book's tools and techniques apply to every current and professional version of Windows: NT, 2000, XP, and Windows Server 2003. Coverage includes:

  • Developing a practical methodology for responding to potential attacks

  • Preparing your systems to prevent and detect incidents

  • Recognizing the signatures of an attack—in time to act

  • Uncovering attacks that evade detection by Event Viewer, Task Manager, and other Windows GUI tools

  • Using the Forensic Server Project to automate data collection during live investigations

  • Analyzing live forensics data in order to determine what occurred


CD-ROM contains incident response and forensics toolkit code developed by the author, sample network packet captures, as well as data collected from compromised systems using the Forensic Server Project. You can also access Carvey's website at http://www.windows-ir.com for code samples, updates, and errata.


I'd like to start by thanking Larry Leibrock and Jay Heiser for getting me started down this road. Several years ago, I had developed a 2-day, hands-on incident response course for Windows 2000, and Larry provided me with my initial opportunity to teach it at the University of Texas in Austin. This book began its life as the presentation for the incident response course. I had done a technical review of Jay and Warren Kruse's computer forensics book, and Jay provided my name to his former editor as someone who may be interested in writing a book on the subject of Windows security.

Karen Gettman offered me the opportunity to write this book, and I decided to take it. I'd had articles published, but I'd never written a book. Karen and her assistant, Elizabeth Zdunich, kept me on track throughout this process.

I'd like to thank several of the reviewers as well. Of all of the reviewers who've been involved in this process, I'd like to recognize Jennifer Kolde, Mike Lyman, and Jason Chan for their efforts and input. The reviews from these three individuals provided valuable constructive criticism regarding the content and structure of the book. I can't say that I followed all the advice they provided, but I did read and consider everything they said thoroughly. With their help and insight, I didn't feel as if I were working on this book alone. Thanks, guys, for your time and effort. And Jen, thanks for indulging me all those time I'd email you with thoughts about your comments. Those exchanges gave me even more insight into to the content of the book, as well as the subject of incident response on Windows systems, in general.

Finally, and most importantly, I'd like to thank Terri Dougherty. I've written a book, and yet I can't seem to find the words to express my gratitude for your support throughout this process. Thank you. I owe you a debt that I will be repaying for a long time.

© Copyright Pearson Education. All rights reserved.

Si no ha encontrado el libro que busca, pinche en nuestro servicio de Pedido Directo y pídanoslo.

Volver a Página Principal

Otras novedades

© Paquebote 1998-2022 Todas las secciones | Ayuda | Aviso Legal