UNIX The Complete Reference Second Edition

Author: Kenneth Rosen
Publisher: McGraw Hill Professional
ISBN: 0072263369
Format: PDF, ePub, Docs
Download Now
The Definitive UNIX Resource--Fully Updated Get cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second Edition provides step-by-step instructions on how to use UNIX and take advantage of its powerful tools and utilities. Get up-and-running on UNIX quickly, use the command shell and desktop, and access the Internet and e-mail. You'll also learn to administer systems and networks, develop applications, and secure your UNIX environment. Up-to-date chapters on UNIX desktops, Samba, Python, Java Apache, and UNIX Web development are included. Install, configure, and maintain UNIX on your PC or workstation Work with files, directories, commands, and the UNIX shell Create and modify text files using powerful text editors Use UNIX desktops, including GNOME, CDE, and KDE, as an end user or system administrator Use and manage e-mail, TCP/IP networking, and Internet services Protect and maintain the security of your UNIX system and network Share devices, printers, and files between Windows and UNIX systems Use powerful UNIX tools, including awk, sed, and grep Develop your own shell, Python, and Perl scripts, and Java, C, and C++ programs under UNIX Set up Apache Web servers and develop browser-independent Web sites and applications

UNIX The Complete Reference Second Edition

Author: Kenneth Rosen
Publisher: McGraw Hill Professional
ISBN: 9780071706988
Format: PDF, ePub, Docs
Download Now
The Definitive UNIX Resource--Fully Updated Get cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second Edition provides step-by-step instructions on how to use UNIX and take advantage of its powerful tools and utilities. Get up-and-running on UNIX quickly, use the command shell and desktop, and access the Internet and e-mail. You'll also learn to administer systems and networks, develop applications, and secure your UNIX environment. Up-to-date chapters on UNIX desktops, Samba, Python, Java Apache, and UNIX Web development are included. Install, configure, and maintain UNIX on your PC or workstation Work with files, directories, commands, and the UNIX shell Create and modify text files using powerful text editors Use UNIX desktops, including GNOME, CDE, and KDE, as an end user or system administrator Use and manage e-mail, TCP/IP networking, and Internet services Protect and maintain the security of your UNIX system and network Share devices, printers, and files between Windows and UNIX systems Use powerful UNIX tools, including awk, sed, and grep Develop your own shell, Python, and Perl scripts, and Java, C, and C++ programs under UNIX Set up Apache Web servers and develop browser-independent Web sites and applications

SQL The Complete Reference Second Edition

Author: James R Groff
Publisher: Mcgraw-hill
ISBN: 9780072225594
Format: PDF, ePub, Docs
Download Now
Learn all you need to know about SQL with this one-stop resource. Updated to include information on Web services and XML, this complete guide also comes with a Windows 2000- and XP- compatible CD containing 4 databases (SQL Server 2000, IBM DB2 Version 7.2, Sybase, and mySQL).

Hack Attacks Revealed

Author: John Chirillo
Publisher: Wiley
ISBN: 9780471232827
Format: PDF, ePub, Docs
Download Now
The much-anticipated second edition of the bestselling book that details network security through the hacker's eye Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material. In this fascinating new edition, you'll discover: * The hacker's perspective on security holes in UNIX, Linux, and Windows networks * Over 170 new vulnerabilities and exploits * Advanced discovery techniques * A crash course in C for compiling hacker tools and vulnerability scanners * The top seventy-five hack attacks for UNIX and Windows * Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more * TigerSuite Professional 3.5 (full suite single license)

Information Security The Complete Reference Second Edition

Author: Mark Rhodes-Ousley
Publisher: McGraw Hill Professional
ISBN: 0071784357
Format: PDF, Docs
Download Now
Develop and implement an effective end-to-end security program Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security—from concepts to details—this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional. Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You’ll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike. Understand security concepts and building blocks Identify vulnerabilities and mitigate risk Optimize authentication and authorization Use IRM and encryption to protect unstructured data Defend storage devices, databases, and software Protect network routers, switches, and firewalls Secure VPN, wireless, VoIP, and PBX infrastructure Design intrusion detection and prevention systems Develop secure Windows, Java, and mobile applications Perform incident response and forensic analysis

Data Compression

Author: David Salomon
Publisher: Springer Science & Business Media
ISBN: 1846286034
Format: PDF
Download Now
This book provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions on the use and comparative benefits of methods and description of "how to" use them. Detailed descriptions and explanations of the most well-known and frequently used compression methods are covered in a self-contained fashion, with an accessible style and technical level for specialists and nonspecialists. Comments and suggestions of many readers have been included as a benefit to future readers, and a website is maintained and updated by the author.

Developing Java Beans

Author: Robert Englander
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565922891
Format: PDF
Download Now
Explains how to implement and maintain JavaBeans, covering event listeners and adapters, object validation, property editors and customizers, and using JavaBeans in Visual Basic programs