Arriba

OReilly Media

Mostrar del 121 al 144 (de 219 productos)
Páginas de Resultados: [<< Anterior]  ... 6  7  8  9  10  [Siguiente >>] 
  • Book : Linq Pocket Reference Learn And Implement Linq For...
    Precio:  $33,029.00

    Book : Linq Pocket Reference Learn And Implement Linq For...

    -Titulo Original : Linq Pocket Reference Learn And Implement Linq For .net Applications (pocket Reference (oreilly))-Fabricante : OReilly Media-Descripcion Original: Ready to take advantage of LINQ with C# 3.0? This guide has the detail you need to grasp Microsofts new querying technology, and concise explanations to help you learn it quickly. And once you begin to apply LINQ, the book serves as an on-the-job reference when you need immediate reminders.All the examples in the LINQ Pocket Reference are preloaded into LINQPad, the highly praised utility that lets you work with LINQ interactively. Created by the authors and free to download, LINQPad will not only help you learn LINQ, it will have you thinking in LINQ.This reference explains: LINQs key concepts, such as deferred execution, iterator chaining, and type inference in lambda expressions The differences between local and interpreted queries C# 3.0s query syntax in detail-including multiple generators, joining, grouping, query continuations, and more Query syntax versus lambda syntax, and mixed syntax queries Composition and projection strategies for complex queries All of LINQs 40-plus query operators How to write efficient LINQ to SQL queries How to build expression trees from scratch All of LINQ to XMLs types and their advanced use LINQ promises to be the locus of a thriving ecosystem for many years to come. This small book gives you a huge head start.The authors built a tool (LINQPad) that lets you experiment with LINQ interactively in a way that the designers of LINQ themselves dont support, and the tool has all kinds of wonderful features that LINQ, SQL and Regular Expression programmers alike will want to use regularly long after theyve read the book.-Chris Sells, Connected Systems Program Manager, Microsoft About the Author Joseph Albahari has published 7 books with OReilly, including C# 5.0 in a Nutshell, and is the inventor of LINQPad, the popular .NET utility. Joe speaks regularly at conferences and user groups and has been awarded a C# MVP five years running. Ben Albahari, a former program manager at Microsoft, is the founder of TakeOnIt, a website for comparing the opinions of experts, leaders and organizations on controversial topics...
  • Book : Natural Language Processing With Python Analyzing...
    Precio:  $200,849.00

    Book : Natural Language Processing With Python Analyzing...

    -Titulo Original : Natural Language Processing With Python Analyzing Text With The Natural Language Toolkit-Fabricante : OReilly Media-Descripcion Original: This book offers a highly accessible introduction to natural language processing, the field that supports a variety of language technologies, from predictive text and email filtering to automatic summarization and translation. With it, youll learn how to write Python programs that work with large collections of unstructured text. Youll access richly annotated datasets using a comprehensive range of linguistic data structures, and youll understand the main algorithms for analyzing the content and structure of written communication.Packed with examples and exercises, Natural Language Processing with Python will help you: Extract information from unstructured text, either to guess the topic or identify named entities Analyze linguistic structure in text, including parsing and semantic analysis Access popular linguistic databases, including WordNet and treebanks Integrate techniques drawn from fields as diverse as linguistics and artificial intelligence This book will help you gain practical skills in natural language processing using the Python programming language and the Natural Language Toolkit (NLTK) open source library. If youre interested in developing web applications, analyzing multilingual news sources, or documenting endangered languages -- or if youre simply curious to have a programmers perspective on how human language works -- youll find Natural Language Processing with Python both fascinating and immensely useful. About the Author Steven Bird is Associate Professor in the Department of Computer Science and Software Engineering at the University of Melbourne, and Senior Research Associate in the Linguistic Data Consortium at the University of Pennsylvania. He completed a PhD on computational phonology at the University of Edinburgh in 1990, supervised by Ewan Klein. He later moved to Cameroon to conduct linguistic fieldwork on the Grassfields Bantu languages under the auspices of the Summer Institute of Linguistics. More recently, he spent several years as Associate Director of the Linguistic Data Consortium where he led an R&D team to create models and tools for large databases of annotated text. At Melbourne University, he established a language technology research group and has taught at all levels of the undergraduate computer science curriculum. In 2009, Steven is President of the Association for Computational Linguistics. Ewan Klein is Professor of Language Technology in the School of Informatics at the University of Edinburgh. He completed a PhD on formal semantics at the University of Cambridge in 1978. After some years working at the Universities of Sussex and Newcastle upon Tyne, Ewan took up a teaching position at Edinburgh. He was involved in the establishment of Edinburghs Language Technology Group in 1993, and has been closely associated with it ever since. From 2000-2002, he took leave from the University to act as Research Manager for the Edinburgh-based Natural Language Research Group of Edify Corporation, Santa Clara, and was responsible for spoken dialogue processing. Ewan is a past President of the European Chapter of the Association for Computational Linguistics and was a founding member and Coordinator of the European Network of Excellence in Human Language Technologies (ELSNET). Edward Loper has recently completed a PhD on machine learning for natural language processing at the the University of Pennsylvania. Edward was a student in Stevens graduate course on computational linguistics in the fall of 2000, and went on to be a TA and share in the development of NLTK. In addition to NLTK, he has helped develop two packages for documenting and testing Python software, epydoc, and doctest...
  • Book : Regular Expression Pocket Reference Regular...
    Precio:  $64,599.00
    Expira: 06/04/2024

    Book : Regular Expression Pocket Reference Regular...

    -Titulo Original : Regular Expression Pocket Reference Regular Expressions For Perl, Ruby, Php, Python, C, Java And .net (pocket Reference (oreilly))-Fabricante : OReilly Media-Descripcion Original: This handy little book offers programmers a complete overview of the syntax and semantics of regular expressions that are at the heart of every text-processing application. Ideal as a quick reference, Regular Expression Pocket Reference covers the regular expression APIs for Perl 5.8, Ruby (including some upcoming 1.9 features), Java, PHP, .NET and C#, Python, vi, JavaScript, and the PCRE regular expression libraries.This concise and easy-to-use reference puts a very powerful tool for manipulating text and data right at your fingertips. Composed of a mixture of symbols and text, regular expressions can be an outlet for creativity, for brilliant programming, and for the elegant solution. Regular Expression Pocket Reference offers an introduction to regular expressions, pattern matching, metacharacters, modes and constructs, and then provides separate sections for each of the language APIs, with complete regex listings including: Supported metacharacters for each language API Regular expression classes and interfaces for Ruby, Java, .NET, and C# Regular expression operators for Perl 5.8 Regular expression module objects and functions for Python Pattern-matching functions for PHP and the vi editor Pattern-matching methods and objects for JavaScript Unicode Support for each of the languages With plenty of examples and other resources, Regular Expression Pocket Reference summarizes the complex rules for performing this critical text-processing function, and presents this often-confusing topic in a friendly and well-organized format. This guide makes an ideal on-the-job companion. About the Author Tony Stubblebine is an Internet consultant, entrepreneur, and blogger. Hes also the author of Regular Expression Pocket Reference, former Engineering Director for Odeo and former Engineering Lead for OReilly Media. He posts regular updates to his blog, StubbleBlog and regularly releases small websites such as Gem Jack, a repository of documentation for Ruby gems, Rate My Dance Moves, a YouTube mashup, and I Heart Quotes, the Unix fortune program re-imagined for the web...
  • Book : Mysql Pocket Reference Sql Statements, Functions And.
    Precio:  $44,899.00

    Book : Mysql Pocket Reference Sql Statements, Functions And.

    -Titulo Original : Mysql Pocket Reference Sql Statements, Functions And Utilities And More (pocket Reference (oreilly))-Fabricante : OReilly Media-Descripcion Original: To help you be more efficient in your work, this handy pocket reference gives you instant reminders on how to use important MySQL functions, especially in conjunction with key parts of the LAMP open source infrastructure. This powerful database system is so rich in features that no administrator or programmer can stay familiar with all of them. MySQL Pocket Reference is an ideal on-the-job companion, well organized to help you find and adapt the statements you need -- quickly.Updated for the latest versions of this popular database, this edition covers many complex features that have been added to MySQL 5.0 and 5.1, including a section dedicated to stored procedures and triggers. After a brief introduction on installation and initial setup, the book explains: How to configure MySQL, such as setting the root password MySQL data types, including numerics, strings, dates, and complex types SQL syntax, commands, data types, operators, and functions Arithmetic, comparison and logical operators Aggregate and general functions Stored procedures and triggers, including procedure definition, procedure calls, procedure management, cursors, and triggers You dont have time to stop and thumb through an exhaustive reference when youre hard at work. This portable and affordable guide is small enough to fit into your pocket, and gives you a convenient reference that you can consult anywhere. When you reach a sticking point and need to get to a solution quickly, the MySQL Pocket Reference is the book you want to have. About the Author George Reese is the founder and President of Valtira LLC inMinneapolis, MN and author of technology books such as the MySQL Pocket Reference, Database Programming with JDBC and Java, and Java Database Best Practices. Throughout the Internet era, he has spent his career applying enterprise and web technologies to the marketing domain. He is the creator of the Simplicis Marketing Dashboard, the core product from Valtira.George holds a BA in Philosophy from Bates College in Lewiston, Maine and an MBA from the Kellogg School of Management in Evanston, Illinois. He currently lives in Minnesota with his wife and two daughters...
  • Book : Unicode Explained Internationalize Documents,...
    Precio:  $205,069.00

    Book : Unicode Explained Internationalize Documents,...

    -Titulo Original : Unicode Explained Internationalize Documents, Programs, And Web Sites-Fabricante : OReilly Media-Descripcion Original: Fundamentally, computers just deal with numbers. They store letters and other characters by assigning a number for each one. There are hundreds of different encoding systems for mapping characters to numbers, but Unicode promises a single mapping. Unicode enables a single software product or website to be targeted across multiple platforms, languages and countries without re-engineering. Its no wonder that industry giants like Apple, Hewlett-Packard, IBM andMicrosoft have all adopted Unicode. Containing everything you need to understand Unicode, this comprehensive reference from OReilly takes you on a detailed guide through the complex character world. For starters, it explains how to identify and classify characters - whether theyre common, uncommon, or exotic. It then shows you how to type them, utilize their properties, and process character data in a robust manner. The book is broken up into three distinct parts. The first few chapters provide you with a tutorial presentation of Unicode and character data. It gives you a firm grasp of the terminology you need to reference various components, including character sets, fonts and encodings, glyphs and character repertoires. The middle section offers more detailed information about using Unicode and other character codes. It explains the principles and methods of defining character codes, describes some of the widely used codes, and presents code conversion techniques. It also discusses properties of characters, collation and sorting, line breaking rules and Unicode encodings. The final four chapters cover more advanced material, suchas programming to support Unicode. You simply cant afford to be without the nuggets of valuable information detailed in Unicode Explained. About the Author Jukka Korpela is a consultant who specializes in character codes, localization, orthography, usability, and accessibility. After graduating from Helsinki University of Technology, he taught these subjects in the universitys Computer Science department and worked on localization and accessibility issues at TIEKE before becoming a full-time author and consultant. His previous books on CSS and XHTML were published in Finland by Docendo press...
  • Book : Dns And Bind (5th Edition) - Liu, Cricket
    Precio:  $156,449.00

    Book : Dns And Bind (5th Edition) - Liu, Cricket

    -Titulo Original : Dns And Bind (5th Edition)-Fabricante : OReilly Media-Descripcion Original: DNS and BIND tells you everything you need to work with one of the Internets fundamental building blocks: the distributed host information database thats responsible for translating names into addresses, routing mail to its proper destination, and even listing phone numbers with the new ENUM standard. This book brings you up-to-date with the latest changes in this crucial service. The fifth edition covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. BIND 9.3.2 contains further improvements in security and IPv6 support, and important new features such as internationalized domain names, ENUM (electronic numbering), and SPF (the Sender Policy Framework). Whether youre an administrator involved with DNS on a daily basis or a user who wants to be more informed about the Internet and how it works, youll find that this book is essential reading. Topics include: What DNS does, how it works, and when you need to use it How to find your own place in the Internets namespace Setting up name servers Using MX records to route mail Configuring hosts to use DNS name servers Subdividing domains (parenting) Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus servers, etc. The DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG) Mapping one name to several servers for load sharing Dynamic updates, asynchronous notification of change to a zone, and incremental zone transfers Troubleshooting: using nslookup and dig, reading debugging output, common problems DNS programming using the resolver library and Perls Net::DNS module About the Author Cricket Liu graduated from the University of California, Berkeley, that great bastion of free speech, unencumbered Unix, and cheap pizza. He joined Hewlett-Packard after graduation and worked for HP for nine years.Cricket began managing the hp zone after the Loma Prieta earthquake forcibly transferred the zones management from HP Labs to HPs Corporate Offices (by cracking a sprinkler main and flooding a Labs computer room). Cricket was hostmaster@hp for over three years, and then joined HPs Professional Services Organization to co-found HPs Internet Consulting Program.Cricket left HP in 1997 to form Acme Byte & Wire, a DNS consulting and training company, with his friend Matt Larson. Network Solutions acquired Acme in June 2000, and later the same day merged with VeriSign. Cricket worked for a year as Director of DNS Product Management for VeriSign Global Registry Services.Cricket joined Infoblox, a company that develops DNS and DHCP appliances, in March, 2003. He is currently their Vice President of Architecture.Cricket, his wife, Paige, their son, Walt, and daughter, Greta, live in California with their two Siberian Huskies, Annie and Dakota.^ Paul Albitz is a software engineer at Hewlett-Packard. Paul earned a Bachelor of Science degree from the University of Wisconsin, LaCrosse, and a Master of Science degree from Purdue University.Paul worked on BIND for the HP-UX 7.0 and 8.0 releases. During this time he developed the tools used to run the hp domain. Since then Paul has worked on various HP products during his 19 year career: HP JetDirect software, HP OfficeJet fax firmware, HPPhoto web site, and HP Photosmart Premier software.Paul and his wife Katherine live in San Diego California with their two cats, Gracie and Tiffany...
  • Book : Unix In A Nutshell, Fourth Edition - Robbins, Arnold
    Precio:  $131,499.00
    Expira: 30/10/2022

    Book : Unix In A Nutshell, Fourth Edition - Robbins, Arnold

    -Titulo Original : Unix In A Nutshell, Fourth Edition-Fabricante : OReilly Media-Descripcion Original: As an open operating system, Unix can be improved on by anyone and everyone: individuals, companies, universities, and more. As a result, the very nature of Unix has been altered over the years by numerous extensions formulated in an assortment of versions. Today, Unix encompasses everything from Suns Solaris to Apples Mac OS X and more varieties of Linux than you can easily name. The latest edition of this bestselling reference brings Unix into the 21st century. Its been reworked to keep current with the broader state of Unix in todays world and highlight the strengths of this operating system in all its various flavors. Detailing all Unix commands and options, the informative guide provides generous descriptions and examples that put those commands in context. Here are some of the new features youll find in Unix in a Nutshell, Fourth Edition: Solaris 10, the latest version of the SVR4-based operating system, GNU/Linux, and Mac OS X Bash shell (along with the 1988 and 1993 versions of ksh) tsch shell (instead of the original Berkeley csh) Package management programs, used for program installation on popular GNU/Linux systems, Solaris and Mac OS X GNU Emacs Version 21 Introduction to source code management systems Concurrent versions system Subversion version control system GDB debugger As Unix has progressed, certain commands that were once critical have fallen into disuse. To that end, the book has also dropped material that is no longer relevant, keeping it taut and current. If youre a Unix user or programmer, youll recognize the value of this complete, up-to-date Unix reference. With chapter overviews, specific examples, and detailed command. About the Author Arnold Robbins, an Atlanta native, is a professional programmer and technical author. He has worked with Unix systems since 1980, when he was introduced to a PDP-11 running a version of Sixth Edition Unix. He has been a heavy AWK user since 1987, when he became involved with gawk, the GNU projects version of AWK. As a member of the POSIX 1003.2 balloting group, he helped shape the POSIX standard for AWK. He is currently the maintainer of gawk and its documentation. He is also coauthor of the sixth edition of Learning the vi Editor from OReilly...
  • Book : Ssh, The Secure Shell The Definitive Guide The...
    Precio:  $129,509.00

    Book : Ssh, The Secure Shell The Definitive Guide The...

    -Titulo Original : Ssh, The Secure Shell The Definitive Guide The Definitive Guide-Fabricante : OReilly Media-Descripcion Original: Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. Its reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesnt solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is transparent encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique tunneling capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether youre an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how youre shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely. About the Author Daniel J. Barrett has been immersed in Internet technology since 1985. Currently working as a software engineer, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist. He is the author of OReillys Linux Pocket Guide, and is the coauthor of Linux Security Cookbook, and the first edition of SSH, The Secure Shell: The Definitive Guide. He also writes monthly columns for Compute! and Keyboard Magazine, and articles for the OReilly Network. Richard E. Silverman has a B.A. in computer science and an M.A. in pure mathematics. Richard has worked in the fields of networking, formal methods in software development, public-key infrastructure, routing security, and Unix systems administration. He co-authored the first edition of SSH, The Secure Shell: The Definitive Guide. Robert G. Byrnes, Ph.D., has been hacking on Unix systems for twenty years, and has been involved with security issues since the original Internet worm was launched from Cornell University, while he was a graduate student and system administrator. Currently, hes a software engineer at Curl Corporation, and has worked in the fields of networking, telecommunications, distributed computing, financial technology, and condensed matter physics...
  • Book : The Art Of Sql - Faroult, Stephane
    Precio:  $135,829.00

    Book : The Art Of Sql - Faroult, Stephane

    -Titulo Original : The Art Of Sql-Fabricante : OReilly Media-Descripcion Original: For all the buzz about trendy IT techniques, data processing is still at the core of our systems, especially now that enterprises all over the world are confronted with exploding volumes of data. Database performance has become a major headache, and most IT departments believe that developers should provide simple SQL code to solve immediate problems and let DBAs tune any bad SQL later. In The Art of SQL, author and SQL expert Stephane Faroult argues that this safe approach only leads to disaster. His insightful book, named after Art of War by Sun Tzu, contends that writing quick inefficient code is sweeping the dirt under the rug. SQL code may run for 5 to 10 years, surviving several major releases of the database management system and on several generations of hardware. The code must be fast and sound from the start, and that requires a firm understanding of SQL and relational theory. The Art of SQL offers best practices that teach experienced SQL users to focus on strategy rather than specifics. Faroults approach takes a page from Sun Tzus classic treatise by viewing database design as a military campaign. You need knowledge, skills, and talent. Talent cant be taught, but every strategist from Sun Tzu to modern-day generals believed that it can be nurtured through the experience of others. They passed on their experience acquired in the field through basic principles that served as guiding stars amid the sound and fury of battle. This is what Faroult does with SQL. Like a successful battle plan, good architectural choices are based on contingencies. What if the volume of this or that table increases unexpectedly? What if, following a merger, the number of users doubles? What if you want to keep several years of data online? Faroults way of looking at SQL performance may be unconventional and unique, but hes deadly serious about writing good SQL and using SQL well. The Art of SQL is not a cookbook, listing problems and giving recipes. The aim is to get you-and your manager-to raise good questions. About the Author Stephane Faroult first discovered relational databases and the SQL language back in 1983. He joined Oracle France in their early days (after a brief spell with IBM and a bout of teaching at the University of Ottawa) and soon developed an interest in performance and tuning topics. After leaving Oracle in 1988, he briefly tried to reform and did a bit of operational research, but after one year, he succumbed again to relational databases. He has been continuously performing database consultancy since then, and founded RoughSea Ltd in 1998. Graduated in geology from Durham University (1968), then taught at Edinburgh University, obtaining an M.Phil in geology 1975. Worked in Greece as a geologist (1973,74), and then in University of Newcastle specialising in geological databases.Joined the British Geological Survey 1980, and has steered the organisations use of database ever since, as data architect and database administrator. Has worked with databases since 1977, relational databases since 1981, and Oracle since 1985. He has lectured widely in the UK on geological aspects of database and has specialised on aspects of the SQL system as well as data modelling from the corporate architecture down to the departmental level. He has presented at various Oracle database conferences both in the UK, Europe and North America. Currently a director on the board of the UK Oracle Users Group...
  • Book : Cisco Ios In A Nutshell A Desktop Quick Reference For
    Precio:  $117,489.00
    Expira: 15/12/2023

    Book : Cisco Ios In A Nutshell A Desktop Quick Reference For

    -Titulo Original : Cisco Ios In A Nutshell A Desktop Quick Reference For Ios On Ip Networks (in A Nutshell (oreilly))-Fabricante : OReilly Media-Descripcion Original: Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in todays networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Ciscos products run the Internetwork Operating System, or IOS. If you work with Cisco routers, its likely that you deal with Ciscos IOS software--an extremely powerful and complex operating system, with an equally complex configuration language. With a cryptic command-line interface and thousands of commands--some of which mean different things in different situations--it doesnt have a reputation for being user-friendly. Fortunately, theres help. This second edition of Cisco IOS in a Nutshell consolidates the most important commands and features of IOS into a single, well-organized volume that youll find refreshingly user-friendly. This handy, two-part reference covers IOS configuration for the TCP/IP protocol family. The first section includes chapters on the user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. A brief, example-filled tutorial shows you how to accomplish common tasks. The second part is a classic OReilly quick reference to all the commands for working with TCP/IP and the lower-level protocols on which it relies. Brief descriptions and lists of options help you zero in on the commands you for the task at hand. Updated to cover Cisco IOS Software Major Release 12.3, this second edition includes lots of examples of the most common configuration steps for the routers themselves. Its a timely guide that any network administrator will come to rely on. About the Author Jim Boney has worked for the last eight years as a consultant specializing in a wide variety of subjects: network design, network management, Unix administration, and programming in various languages (Perl, Java, Tcl/Tk, and C/C). For the last three years, he has been working on the vLab project, which allows complete access to Cisco routers over the Internet...
  • Book : Learning Mysql Get A Handle On Your Data - Seyed M.M.
    Precio:  $167,849.00

    Book : Learning Mysql Get A Handle On Your Data - Seyed M.M.

    -Titulo Original : Learning MySQL: Get A Handle On Your Data-Fabricante : OReilly Media-Descripcion Original: Whether youre running a business, keeping track of members andmeetings for a club, or just trying to organize a large and diversecollection of information, youll find the MySQL database engineuseful for answering questions such as: Which are my top ten fastest-selling products? How frequently does this person come to our facility? What was the highest, lowest, and average score of the team last season? MySQL, the most popular open-source database, offers the power ofa relational database in a package thats easy to set up andadminister, and Learning MySQL provides all the tools you need toget started. This densely packed tutorial includes detailedinstructions to help you set up and design an effective database,create powerful queries using SQL, configure MySQL for improvedsecurity, and squeeze information out of your data. After covering the basics, the book travels far into MySQLssubtleties, including complex queries and joins, how to interact withthe database over the Web using PHP or Perl, and importanthouse-keeping such as backups and security. Topic include: Installation on Linux, Windows, and Mac OS X Basic and advanced querying using SQL User management and security Backups and recovery Tuning for improved efficiency Developing command-line and web database applications using thePHP and Perl programming languages The authors, Saied Tahaghoghi and Hugh E. Williams, have careers inacademia and business, and share a keen interest in research intosearch technologies. Whether youve never touched a database or have already completedsome MySQL projects, youll find insights in Learning MySQLthat will last a career. About the Author Saied Tahaghoghi is a senior lecturer at the RMIT University School ofComputer Science and Information Technology. He has a bachelorsdegree in electronics engineering, a masters degree in computerengineering, and a PhD in computer science, and loves tinkering withboth hardware and software. Saied is a member of the RMIT SearchEngine Group, and supervises research on text, image, video, and coderetrieval. He teaches courses on web technologies and security, andis frequently asked to consult on projects by industry. Saied wasborn in Iran, but has spent almost equal parts of his life in Iran,England, Pakistan, and Australia, and is a fervent advocate of dialogbetween civilizations. His home page is. Hugh E. Williams is a software design engineer at Microsofts WindowsLive Search in Redmond, WA. Previously, he was the AssociateProfessor in Information Retrieval at RMIT University in Melbourne,Australia. Hes published over 70 research papers and holds around 10patents, mostly in the search engine area. When not at work Hughlikes to hang out with his family, exercise, watch Richmond playfooty, and learn about baseball. Hugh has a PhD from RMIT University.His home page is ...
  • Book : Essential Snmp, Second Edition - Mauro, Douglas
    Precio:  $129,249.00
    Expira: 18/06/2022

    Book : Essential Snmp, Second Edition - Mauro, Douglas

    -Titulo Original : Essential Snmp, Second Edition-Fabricante : OReilly Media-Descripcion Original: Simple Network Management Protocol (SNMP) provides a simple set of operations that allows you to more easily monitor and manage network devices like routers, switches, servers, printers, and more. The information you can monitor with SNMP is wide-ranging--from standard items, like the amount of traffic flowing into an interface, to far more esoteric items, like the air temperature inside a router. In spite of its name, though, SNMP is not especially simple to learn. OReilly has answered the call for help with a practical introduction that shows how to install, configure, and manage SNMP. Written for network and system administrators, the book introduces the basics of SNMP and then offers a technical background on how to use it effectively. Essential SNMP explores both commercial and open source packages, and elements like OIDs, MIBs, community strings, and traps are covered in depth. The book contains five new chapters and various updates throughout. Other new topics include: Expanded coverage of SNMPv1, SNMPv2, and SNMPv3 Expanded coverage of SNMPc The concepts behind network management and change management RRDTool and Cricket The use of scripts for a variety of tasks How Java can be used to create SNMP applications Net-SNMPs Perl module The bulk of the book is devoted to discussing, with real examples, how to use SNMP for system and network administration tasks. Administrators will come away with ideas for writing scripts to help them manage their networks, create managed objects, and extend the operation of SNMP agents. Once demystified, SNMP is much more accessible. If youre looking for a way to more easily manage your network, look no further than Essential SNMP, 2nd Edition. About the Author Douglas Mauro received a bachelors degree at the University of Albany, New York, and worked as a system administrator for several years before becoming a project engineer with Sun Microsystems, Inc. In addition to his consulting duties with Sun, he authors their internal OneStop Sun Management Center page and has published several InfoDocs with them. Kevin J. Schmidt currently lives in Lilburn, Georgia. He is a senior software developer at SecureWorks, Inc. (), where he is lead developer for the comapnys SIM platform. He also leading the development of the companys log analysis service line. Prior to SecureWorks, Kevin was a senior Java/C developer at Reflex Security (). And prior to Reflex, Kevin spent four years at GuardedNet, Inc. ()as a senior software developer and team lead.Kevins experience with network management began in 1995 while working at a regional ISP in Pensacola, Florida. In 1996 he moved to Atlanta, Georgia to work for MindSpring Enterprises (now known as Earthlink), a national ISP. He spent four years in network management and was the senior network management architect for Earthlink. He left Earthlink to work at Netrail, a tier-1 Internet backbone provider. While at Netrail, Kevin was in charge of the companys network management architecture...
  • Book : Designing Embedded Hardware Create New Computers And.
    Precio:  $169,879.00

    Book : Designing Embedded Hardware Create New Computers And.

    -Titulo Original : Designing Embedded Hardware Create New Computers And Devices-Fabricante : OReilly Media-Descripcion Original: Embedded computer systems literally surround us: theyre in our cell phones, PDAs, cars, TVs, refrigerators, heating systems, and more. In fact, embedded systems are one of the most rapidly growing segments of the computer industry today.Along with the growing list of devices for which embedded computer systems are appropriate, interest is growing among programmers, hobbyists, and engineers of all types in how to design and build devices of their own. Furthermore, the knowledge offered by this book into the fundamentals of these computer systems can benefit anyone who has to evaluate and apply the systems.The second edition of Designing Embedded Hardware has been updated to include information on the latest generation of processors and microcontrollers, including the new MAXQ processor. If youre new to this and dont know what a MAXQ is, dont worry--the book spells out the basics of embedded design for beginners while providing material useful for advanced systems designers.Designing Embedded Hardware steers a course between those books dedicated to writing code for particular microprocessors, and those that stress the philosophy of embedded system design without providing any practical information. Having designed 40 embedded computer systems of his own, author John Catsoulis brings a wealth of real-world experience to show readers how to design and create entirely new embedded devices and computerized gadgets, as well as how to customize and extend off-the-shelf systems.Loaded with real examples, this book also provides a roadmap to the pitfalls and traps to avoid. Designing Embedded Hardware includes: The theory and practice of embedded systems Understanding schematics and data sheets Powering an embedded system Producing and debugging an embedded system Processors such as the PIC, Atmel AVR, and Motorola 68000-series Digital Signal Processing (DSP) architectures Protocols (SPI and I2C) used to add peripherals RS-232C, RS-422, infrared communication, and USB CAN and Ethernet networking Pulse Width Monitoring and motor control If you want to build your own embedded system, or tweak an existing one, this invaluable book gives you the understanding and practical skills you need. About the Author John Catsoulis lives under the tropical sun in Brisbane, Australia. He has a Bachelor of Science with Honors (Griffith University) with a triple major in quantum physics, electronics and mathematics, and a Master of Engineering (La Trobe University) in specialized computer architectures. He has been responsible for the design of more computer systems than he can remember, from tiny finger-sized machines to multi-processor compute engines. Corporations and government bodies around the world have used his designs and software. John has also taught the dark arts of computer architecture and design at several Universities. He is currently conducting research at the University of Queensland into fault-tolerant reconfigurable computers for spacecraft avionics.When not slaving over a hot microprocessor, John enjoys hiking and camping, wildlife and landscape photography, fishing, dabbling in permaculture, cooking Indian and Mediterranean food, and playing model trains with his nephews, Andrew and James...
  • Book : Mastering Oracle Sql, 2nd Edition - Sanjay Mishra
    Precio:  $131,059.00
    Expira: 27/12/2023

    Book : Mastering Oracle Sql, 2nd Edition - Sanjay Mishra

    -Titulo Original : Mastering Oracle Sql, 2nd Edition-Fabricante : OReilly Media-Descripcion Original: The vast majority of Oracle SQL books discuss some syntax, provide the barest rudiments of using Oracle SQL, and perhaps include a few simple examples. It might be enough to pass a survey course, or give you some buzz words to drop in conversation with real Oracle DBAs. But if you use Oracle SQL on a regular basis, you want much more. You want to access the full power of SQL to write queries in an Oracle environment. You want a solid understanding of whats possible with Oracle SQL, creative techniques for writing effective and accurate queries, and the practical, hands-on information that leads to true mastery of the language. Simply put, you want useful, expert best practices that can be put to work immediately, not just non-vendor specific overview or theory.Updated to cover the latest version of Oracle, Oracle 10g, this edition of the highly regarded Mastering Oracle SQL has a stronger focus on technique and on Oracles implementation of SQL than any other book on the market. It covers Oracle s vast library of built-in functions, the full range of Oracle SQL query-writing features, regular expression support, new aggregate and analytic functions, subqueries in the SELECT and WITH clauses, multiset union operators, enhanced support for hierarchical queries: leaf and loop detection, and the CONNECT_BY_ROOT operator, new partitioning methods (some introduced in Oracle9i Release 2), and the native XML datatype, XMLType.Mastering Oracle SQL, 2nd Edition fills the gap between the sometimes spotty vendor documentation, and other books on SQL that just dont explore the full depth of what is possible with Oracle-specific SQL. For those who want to harness the untapped (and often overlooked) power of Oracle SQL, this essential guide for putting Oracle SQL to work will prove invaluable. About the Author Sanjay Mishra is a certified Oracle database administrator with more than ten years of IT experience. He has been involved in the design, architecture, and implementation of many mission-critical and decision support databases. He has worked extensively in the areas of database architecture, database management, backup / recovery, performance tuning, Oracle Parallel Server, and parallel execution. He has a Bachelor of Science degree in Electrical Engineering, and a Master of Engineering degree in Systems Science and Automation. He is the coauthor of Oracle Parallel Processing and Oracle SQL Loader: The Definitive Guide (both published by OReilly & Associates). Presently, he works as a database architect at Dallas Based i2 Technologies, and can be reached at sanjay_mishra@i2 . Alan Beaulieu has been designing, building, and implementing custom database applications for over 13 years. He currently runs his own consulting company that specializes in designing Oracle databases and supporting services in the fields of Financial Services and Telecommunications. In building large databases for both OLTP and OLAP environments, Alan utilizes such Oracle features as Parallel Query, Partitioning, and Parallel Server. Alan has a Bachelor of Science degree in Operations Research from the Cornell University School of Engineering. He lives in Massachusetts with his wife and two daughters and can be reached at albeau_mosql@yahoo ...
  • Book : Linux Device Drivers, 3rd Edition - Jonathan Corbet
    Precio:  $147,719.00

    Book : Linux Device Drivers, 3rd Edition - Jonathan Corbet

    -Titulo Original : Linux Device Drivers, 3rd Edition-Fabricante : OReilly Media-Descripcion Original: Device drivers literally drive everything youre interested in--disks, monitors, keyboards, modems--everything outside the computer chip and memory. And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic Linux Device Drivers from OReilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information youll need to write drivers for a wide range of devices.Over the years the book has helped countless programmers learn: how to support computer peripherals under the Linux operating system how to develop and write software for new hardware under Linux the basics of Linux operation even if they are not expecting to write a driver The new edition of Linux Device Drivers is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.Best of all, you dont have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If youre writing device drivers, youll want this book. In fact, youll wonder how drivers are ever written without it. About the Author Jonathan Corbet got his first look at the BSD Unix source back in 1981, when an instructor at the University of Colorado let him fix the paging algorithm. He has been digging around inside every system he could get his hands on ever since, working on drivers for VAX, Sun, Ardent, and x86 systems on the way. He got his first Linux system in 1993, and has never looked back. Mr. Corbet is currently the co-founder and executive editor of Linux Weekly News (); he lives in Boulder, Colorado with his wife and two children. Alessandro installed Linux 0.99.14 soon after getting his degree as electronic engineer. He then received a Ph.D. in computer science at the University of Pavia despite his aversion toward modern technology. He left the University after getting his Ph.D. because he didnt want to write articles. He now works as a free lancer writing device drivers and, um...articles. He used to be a young hacker before his babies were born; hes now an old advocate of Free Software who developed a bias for non-PC computer platforms. Greg Kroah-Hartman has been writing Linux kernel drivers since 1999, and is currently the maintainer for the USB, PCI, I2C, driver core, and sysfs kernel subsystems. He is also the maintainer of the udev and hotplug userspace programs, as well as being a Gentoo kernel maintainer, ensuring that his email inbox is never empty. He is a contributing editor to Linux Journal Magazine, and works for IBMs Linux Technology Center, doing various Linux kernel related tasks...
  • Book : Extreme Programming Pocket Guide - chromatic
    Precio:  $54,129.00

    Book : Extreme Programming Pocket Guide - chromatic

    -Titulo Original : Extreme Programming Pocket Guide-Fabricante : OReilly Media-Descripcion Original: Extreme Programming (XP) is a radical new approach to software development that has been accepted quickly because its core practices--the need for constant testing, programming in pairs, inviting customer input, and the communal ownership of code--resonate with developers everywhere. Although many developers feel that XP is rooted in commonsense, its vastly different approach can bring challenges, frustrations, and constant demands on your patience.Unless youve got unlimited time (and who does these days?), you cant always stop to thumb through hundreds of pages to find the piece of information you need. The Extreme Programming Pocket Guide is the answer. Concise and easy to use, this handy pocket guide to XP is a must-have quick reference for anyone implementing a test-driven development environment.The Extreme Programming Pocket Guide covers XP assumptions, principles, events, artifacts, roles, and resources, and more. It concisely explains the relationships between the XP practices. If you want to adopt XP in stages, the Extreme Programming Pocket Guide will help you choose what to apply and when. Youll be surprised at how much practical information is crammed into this slim volume.OReillys Pocket Guides have become a favorite among developers everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When youve reached a sticking point in your work and need to get to a solution quickly, the new Extreme Programming Pocket Guide is the book youll want to have beside your keyboard...
  • Book : Kerberos The Definitive Guide The Definitive Guide -.
    Precio:  $123,369.00

    Book : Kerberos The Definitive Guide The Definitive Guide -.

    -Titulo Original : Kerberos The Definitive Guide The Definitive Guide-Fabricante : OReilly Media-Descripcion Original: Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. Its a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need.Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting.In addition to covering Microsofts Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations.If youve been avoiding Kerberos because its confusing and poorly documented, its time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems. About the Author Jason Garman is currently working with computer forensics for the national defense and intelligence communities at Aegis Research Corporation. Previously, he worked at several biotech firms in the Washington, DC area where he helped clients design and implement secure yet easy to use research networks. Jason enjoys working with the practical application of tools and techniques to solve computer and network security problems...
  • Book : Sed And Awk Pocket Reference, 2nd Edition  - Arnold..
    Precio:  $52,889.00

    Book : Sed And Awk Pocket Reference, 2nd Edition - Arnold..

    -Titulo Original : Sed And Awk Pocket Reference, 2nd Edition -Fabricante : OReilly Media-Descripcion Original: For people who create and modify text files, sed and awk are power tools for editing. sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of performing the same edits on multiple files, and to write conversion programs.The sed & awk Pocket Reference is a companion volume to sed & awk, Second Edition, Unix in a Nutshell, Third Edition, and Effective awk Programming, Third Edition. This new edition has expanded coverage of gawk (GNU awk), and includes sections on: An overview of sed and awk?s command line syntax Alphabetical summaries of commands, including nawk and gawk Profiling with pgawk Coprocesses and sockets with gawk Internationalization with gawk A listing of resources for sed and awk users This small book is a handy reference guide to the information presented in the larger volumes. It presents a concise summary of regular expressions and pattern matching, and summaries of sed and awk. Arnold Robbins, an Atlanta native now happily living in Israel, is a professional programmer and technical author and coauthor of various OReilly Unix titles. He has been working with Unix systems since 1980, and currently maintains gawk and its documentation. About the Author Arnold Robbins, an Atlanta native, is a professional programmer and technical author. He has worked with Unix systems since 1980, when he was introduced to a PDP-11 running a version of Sixth Edition Unix. He has been a heavy AWK user since 1987, when he became involved with gawk, the GNU projects version of AWK. As a member of the POSIX 1003.2 balloting group, he helped shape the POSIX standard for AWK. He is currently the maintainer of gawk and its documentation. He is also coauthor of the sixth edition of OReillys Learning the vi Editor. Since late 1997, he and his family have been living happily in Israel...
  • Book : Essential System Administration Tools And Techniques.
    Precio:  $178,009.00
    Expira: 26/02/2024

    Book : Essential System Administration Tools And Techniques.

    -Titulo Original : Essential System Administration Tools And Techniques For Linux And Unix Administration, 3rd Edition-Fabricante : OReilly Media-Descripcion Original: Essential System Administration,3rd Edition is the definitive guide for Unix system administration, covering all the fundamental and essential tasks required to run such divergent Unix systems as AIX, FreeBSD, HP-UX, Linux, Solaris, Tru64 and more. Essential System Administration provides a clear, concise, practical guide to the real-world issues that anyone responsible for a Unix system faces daily.The new edition of this indispensable reference has been fully updated for all the latest operating systems. Even more importantly, it has been extensively revised and expanded to consider the current system administrative topics that administrators need most. Essential System Administration,3rd Edition covers: DHCP, USB devices, the latest automation tools, SNMP and network management, LDAP, PAM, and recent security tools and techniques.Essential System Administration is comprehensive. But what has made this book the guide system administrators turn to over and over again is not just the sheer volume of valuable information it provides, but the clear, useful way the information is presented. It discusses the underlying higher-level concepts, but it also provides the details of the procedures needed to carry them out. It is not organized around the features of the Unix operating system, but around the various facets of a system administrators job. It describes all the usual administrative tools that Unix provides, but it also shows how to use them intelligently and efficiently.Whether you use a standalone Unix system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, Essential System Administration is for you. This comprehensive and invaluable book combines the authors years of practical experience with technical expertise to help you manage Unix systems as productively and painlessly as possible. About the Author Æleen Frisch has been a system administrator for over 20 years, tending a plethora of VMS, Unix, and Windows systems over the years. Her current system administration responsibilities center on looking after a very heterogeneous network of Unix and Windows NT/2000/XP systems. She is also a writer, lecturer, teacher, marketing consultant and occasional database programmer. She has written eight books, including Essential System Administration (now in its third edition), Essential Windows NT System Administration and the Windows 2000 Desktop Reference (all from OReilly Media, Inc.) and Exploring Chemistry with Electronic Structure Methods (Gaussian, Inc.). Currently, she writes the Guru Guidance column for Linux Magazine. She also writes poetry and is currently working on her first novel...
  • Book : Perl Cookbook, Second Edition - Christiansen, Tom
    Precio:  $150,069.00
    Expira: 16/01/2024

    Book : Perl Cookbook, Second Edition - Christiansen, Tom

    -Titulo Original : Perl Cookbook, Second Edition-Fabricante : OReilly Media-Descripcion Original: Find a Perl programmer, and youll find a copy of Perl Cookbook nearby. Perl Cookbook is a comprehensive collection of problems, solutions, and practical examples for anyone programming in Perl. The book contains hundreds of rigorously reviewed Perl recipes and thousands of examples ranging from brief one-liners to complete applications.The second edition of Perl Cookbook has been fully updated for Perl 5.8, with extensive changes for Unicode support, I/O layers, mod_perl, and new technologies that have emerged since the previous edition of the book. Recipes have been updated to include the latest modules. New recipes have been added to every chapter of the book, and some chapters have almost doubled in size.Covered topic areas include: Manipulating strings, numbers, dates, arrays, and hashes Pattern matching and text substitutions References, data structures, objects, and classes Signals and exceptions Screen addressing, menus, and graphical applications Managing other processes Writing secure scripts Client-server programming Internet applications programming with mail, news, ftp, and telnet CGI and mod_perl programming Web programming Since its first release in 1998, Perl Cookbook has earned its place in the libraries of serious Perl users of all levels of expertise by providing practical answers, code examples, and mini-tutorials addressing the challenges that programmers face. Now the second edition of this bestselling book is ready to earn its place among the ranks of favorite Perl books as well.Whether youre a novice or veteran Perl programmer, youll find Perl Cookbook, 2nd Edition to be one of the most useful books on Perl available. Its comfortable discussion style and accurate attention to detail cover just about any topic youd want to know about. You can get by without having this book in your library, but once youve tried a few of the recipes, you wont want to. About the Author Tom Christiansen is a freelance consultant specializing in Perl training and writing. After working for several years for TSR Hobbies (of Dungeons and Dragons fame), he set off for college where he spent a year in Spain and five in America, dabbling in music, linguistics, programming, and some half-dozen different spoken languages. Tom finally escaped UW-Madison with B.A.s in Spanish and computer science and an M.S. in computer science. He then spent five years at Convex as a jack-of-all-trades working on everything from system administration to utility and kernel development, with customer support and training thrown in for good measure. Tom also served two terms on the USENIX Association Board of directors. With over fifteen years experience in UNIX system administration and programming, Tom presents seminars internationally. Living in the foothills above Boulder, Colorado, surrounded by mule deer, skunks, and the occasional mountain lion and black bear, Tom takes summers off for hiking, hacking, birding, music making, and gaming. Nathan Torkington is a banjo player, father, and husband. His crimes in the computing community include: coauthor of the Perl Cookbook, editor for OReilly and Associates, content coordinator for the Open Source Convention and Perl Conference, and project manager for perl6...
  • Book : Network Security With Openssl - Viega, John
    Precio:  $106,589.00
    Expira: 11/09/2023

    Book : Network Security With Openssl - Viega, John

    -Titulo Original : Network Security With Openssl-Fabricante : OReilly Media-Descripcion Original: Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C, and it can be used programmatically or from the command line to secure most TCP-based network protocols.Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included.OpenSSL may well answer your need to protect sensitive data. If that?s the case, Network Security with OpenSSL is the only guide available on the subject. About the Author John Viega, Founder and Chief Scientist of Secure Software ( securesoftware ), is a well-known security expert, and coauthor of Building Secure Software (Addison-Wesley) and Network Security with OpenSSL (OReilly). John is responsible for numerous software security tools, and is the original author of Mailman, the GNU mailing list manager. He holds a B.A. and M.S. in Computer Science from the University of Virginia. Mr. Viega is also an Adjunct Professor of Computer Science at Virginia Tech (Blacksburg, VA) and a Senior Policy Researcher at the Cyberspace Policy Institute, and he serves on the Technical Advisory Board for the Open Web Applications Security Project. He also founded a Washington, D.C. area security interest group that conducts monthly lectures presented by leading experts in the field. He is the author or coauthor of nearly 80 technical publications, including numerous refereed research papers and trade articles. Matt Messier, Director of Engineering at Secure Software, is a security authority who has been programming for nearly two decades. Besides coauthoring Network Security with OpenSSL, Matt coauthored the Safe C String Library, RATS, and EGADS, an Entropy Gathering and Distribution System used for securely seeding pseudo-random number generators. Prior to joining Secure Software, Matt worked for IBM and Lotus, on source and assembly level debugging techniques, and operating system concepts. Pravir Chandra, Research Scientist at Secure Software Solutions, is an expert in language-level security. Most recently, he co-authored the DARPA-funded catscan tool for static security analysis of C source code. Pravir holds a B.S. in Computer Science from Case Western Reserve University, and wants you to know that Cleveland rocks...
  • Book : Learning The Unix Operating System, Fifth Edition -..
    Precio:  $77,789.00
    Expira: 04/05/2022

    Book : Learning The Unix Operating System, Fifth Edition -..

    -Titulo Original : Learning The Unix Operating System, Fifth Edition-Fabricante : OReilly Media-Descripcion Original: If you are new to Unix, this concise book will tell you just what you need to get started and no more. Unix was one of the first operating systems written in C, a high-level programming language, and its natural portability and low price made it a popular choice among universities. Initially, two main dialects of Unix existed: one produced by AT&T known as System V, and one developed at UC Berkeley and known as BSD. In recent years, many other dialects have been created, including the highly popular Linux operating system and the new Mac OS X (a derivative of BSD).Learning the Unix Operating System is a handy book for someone just starting with Unix or Linux, and its an ideal primer for Mac and PC users of the Internet who need to know a little about Unix on the systems they visit. The fifth edition is the most effective introduction to Unix in print, covering Internet usage for email, file transfers, web browsing, and many major and minor updates to help the reader navigate the ever-expanding capabilities of the operating system: In response to the popularity of Linux, the book now focuses on the popular bash shell preferred by most Linux users. Since the release of the fourth edition, the Internet and its many functions has become part of most computer users lives. A new chapter explains how to use ftp, pine for mail, and offers useful knowledge on how to surf the web. Today everyone is concerned about security. With this in mind, the author has included tips throughout the text on security basics, especially in the Internet and networking sections. The book includes a completely updated quick reference card to make it easier for the reader to access the key functions of the command line. About the Author is a long time user of the Unix operating system. He has acted as a Unix consultant, courseware developer, and instructor. He is one of the originating authors of Unix Power Tools and the author of Learning the Unix Operating System by OReilly. John Strang now finds himself a consumer--rather than a producer of Nutshells. He is currently a diagnostic radiologist (MD) at Stanford University. He is married to a pediatrician, Susie, and they have two children, Katie and Alex. John enjoys hiking, bicycling, and dabbling in other sciences. He plans to use his experience as an author at ORA to write his own book on radiology...
  • Book : Understanding Linux Network Internals Guided Tour To.
    Precio:  $172,319.00

    Book : Understanding Linux Network Internals Guided Tour To.

    -Titulo Original : Understanding Linux Network Internals Guided Tour To Networking On Linux-Fabricante : OReilly Media-Descripcion Original: If youve ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you. Like the popular OReilly book, Understanding the Linux Kernel, this book clearly explains the underlying concepts and teaches you how to follow the actual C code that implements it. Although some background in the TCP/IP protocols is helpful, you can learn a great deal from this text about the protocols themselves and their uses. And if you already have a base knowledge of C, you can use the books code walkthroughs to figure out exactly what this sophisticated part of the Linux kernel is doing. Part of the difficulty in understanding networks -- and implementing them -- is that the tasks are broken up and performed at many different times by different pieces of code. One of the strengths of this book is to integrate the pieces and reveal the relationships between far-flung functions and data structures. Understanding Linux Network Internals is both a big-picture discussion and a no-nonsense guide to the details of Linux networking. Topics include: Key problems with networking Network interface card (NIC) device drivers System initialization Layer 2 (link-layer) tasks and implementation Layer 3 (IPv4) tasks and implementation Neighbor infrastructure and protocols (ARP) Bridging Routing ICMP Author Christian Benvenuti, an operating system designer specializing in networking, explains much more than how Linux code works. He shows the purposes of major networking features and the trade-offs involved in choosing one solution over another. A large number of flowcharts and other diagrams enhance the books understandability. About the Author Christian Benvenuti received his masters degree in Computer Science at the University of Bologna in Italy. He collaborated for a few years with the International Center for Theoretical Physics (ICTP) in Trieste, where he developed ad-hoc software based on the Linux kernel, was a scientific consultant for a project on remote collaboration, and served as an instructor for several training sessions on networking. The trainings, held mainly in Europe, Africa, and South America wereall based on Linux systems and addressed to scientists from developing countries, where the ICTP has been promoting Linux for many years. He occasionally collaborates with a non-profit organization founded by ICTP members, Collaborium.org, to continue promoting Linux on developing countries.In the past few years he worked as a software engineer for Cisco Systems in the Silicon Valley, where he focused on Layer two switching, high availability, and network security...
  • Book : Postfix The Definitive Guide A Secure And Easy-to-use
    Precio:  $136,419.00
    Expira: 18/08/2022

    Book : Postfix The Definitive Guide A Secure And Easy-to-use

    -Titulo Original : Postfix The Definitive Guide A Secure And Easy-to-use Mta For Unix-Fabricante : OReilly Media-Descripcion Original: Postfix is a Mail Transfer Agent (MTA): software that mail servers use to route email. Postfix is highly respected by experts for its secure design and tremendous reliability. And new users like it because its so simple to configure. In fact, Postfix has been adopted as the default MTA on Mac OS X. It is also compatible with sendmail, so that existing scripts and programs continue to work seamlesslyafter it is installed.Postfix was written by well-known security expert Wietse Venema, who reviewed this book intensively during its entire development. Author Kyle Dent covers a wide range of Postfix tasks, from virtual hosting to controls for unsolicited commercial email.While basic configuration of Postfix is easy, every site has unique needs that call for a certain amount of study. This book, with careful background explanations and generous examples, eases readers from the basic configuration to the full power of Postfix. It discusses the Postfix interfaces to various tools that round out a fully scalable and highly secure email system. These tools include POP, IMAP, LDAP, MySQL, Simple Authentication and Security Layer (SASL), and Transport Layer Security (TLS, an upgrade of SSL). A reference section for Postfix configuration parameters and an installation guide are included.Topics include: Basic installation and configuration DNS configuration for email Working with POP/IMAP servers Hosting multiple domains (virtual hosting) Mailing lists Handling unsolicited email (spam blocking) Security through SASL and TLS From compiling and installing Postfix to troubleshooting, Postfix: The Definitive Guide offers system administrators and anyone who deals with Postfix an all-in-one, comprehensive tutorial and reference to this MTA. About the Author Kyle D. Dent works as an independent consultant and software developer in the New York metropolitan area. He has designed and implemented various security, network, and web-based applications for technology and financial firms. He has been working with Postfix in various settings since it was released by IBM in 1998. Kyle grew up with computers in an IBM family, but originally started working in publishing and as a teacher of English as a Second Language. He is an avid supporter of public libraries serving as a trustee at his local library and on his regional library system board. He has recently started to learn the classical guitar...
Mostrar del 121 al 144 (de 219 productos)
Páginas de Resultados: [<< Anterior]  ... 6  7  8  9  10  [Siguiente >>]