|
|
Books > Computing & IT > Computer hardware & operating systems
As the volume of global Internet traffic increases, the Internet is
beginning to suffer from a broad spectrum of performance-degrading
infrastructural limitations that threaten to jeopardize the
continued growth of new, innovative services. In answer to this
challenge, computer scientists seek to maintain the original design
principles of the Internet while allowing for a more dynamic
approach to the manner in which networks are designed and operated.
The Handbook of Research on Redesigning the Future of Internet
Architectures covers some of the hottest topics currently being
debated by the Internet community at large, including Internet
governance, privacy issues, service delivery automation, advanced
networking schemes, and new approaches to Internet
traffic-forwarding and path-computation mechanics. Targeting
students, network-engineers, and technical strategists, this book
seeks to provide a broad and comprehensive look at the next wave of
revolutionary ideas poised to reshape the very foundation of the
Internet as we know it.
Society's growing dependence on information technology for survival
has elevated the importance of controlling and evaluating
information systems. A sound plan for auditing information systems
and the technology that supports them is a necessity for
organizations to improve the IS benefits and allow the organization
to manage the risks associated with technology. Auditing
Information Systems gives a global vision of auditing and control,
exposing the major techniques and methods. It provides guidelines
for auditing the crucial areas of IT--databases, security,
maintenance, quality, and communications.
Microsoft Forefront is a comprehensive suite of security products
that will provide companies with multiple layers of defense against
threats. Computer and Network Security is a paramount issue for
companies in the global marketplace. Businesses can no longer
afford for their systems to go down because of viruses, malware,
bugs, trojans, or other attacks. Running a Microsoft Forefront
Suite within your environment brings many different benefits.
Forefront allows you to achieve comprehensive, integrated, and
simplified infrastructure security. This comprehensive suite of
tools provides end-to-end security stretching from Web servers back
to the desktop. This book will provide system administrators
familiar with Syngress' existing Microsoft networking and security
titles with a complete reference to Microsoft's flagship security
products.
* First book to address securing an entire Microsoft network from
Web servers all the way back to the desktop.
* Companion Web site provides best practices checklists for
securing Microsoft operating systems, applications, servers, and
databases.
* Companion Web site provides special chapter on designing and
implementing a disaster recover plan for a Microsoft network.
As technology expands and evolves, one-dimensional, graphical user
interface (GUI) design becomes increasingly limiting and
simplistic. Designers must meet the challenge of developing new and
creative interfaces that adapt to meet human needs and
technological trends. HCI Beyond the GUI provides designers with
this know how by exploring new ways to reach users that involve all
of the human senses. Dr. Kortum gathers contributions from leading
human factors designers to present a single reference for
professionals, researchers, and students.
Explores the human factors involved in the design and
implementation of the nontraditional interfaces, detailing design
strategies, testing methodologies, and implementation techniques
Provides an invaluable resource for practitioners who design
interfaces for children, gamers and users with accessibility needs
Offers extensive case studies, examples and design guidelines
The Second Edition of the Best Damn Windows Server Book Period is
completely revised and updated to Windows Server 2008.
This book will show you how to increase the reliability and
flexibility of your server infrastructure with built-in Web and
virtualization technologies; have more control over your servers
and web sites using new tools like IIS7, Windows Server Manager,
and Windows PowerShell; and secure your network with Network Access
Protection and the Read-Only Domain Controller.
New to this Edition:
* Web server management with Internet Information Services
7.0
* Virtualize multiple operating systems on a single server
* Hardening Security, including Network Access Protection,
Federated Rights Management, and Read-Only Domain Controller
Efficient design of embedded processors plays a critical role in
embedded systems design. Processor description languages and their
associated specification, exploration and rapid prototyping
methodologies are used to find the best possible design for a given
set of applications under various design constraints, such as area,
power and performance.
This book is the first, comprehensive survey of modern architecture
description languages and will be an invaluable reference for
embedded system architects, designers, developers, and validation
engineers. Readers will see that the use of particular architecture
description languages will lead to productivity gains in designing
particular (application-specific) types of embedded processors.
* Comprehensive coverage of all modern architecture description
languages... use the right ADL to design your processor to fit your
application;
* Most up-to-date information available about each architecture
description language from the developers...save time chasing down
reliable documentation;
* Describes how each architecture desccription language enables key
design automation tasks, such as simulation, synthesis and
testing...fit the ADL to your design cycle;
Contrary to popular belief, there has never been any shortage of
Macintosh-related security issues. OS9 had issues that warranted
attention. However, due to both ignorance and a lack of research,
many of these issues never saw the light of day. No solid
techniques were published for executing arbitrary code on OS9, and
there are no notable legacy Macintosh exploits. Due to the combined
lack of obvious vulnerabilities and accompanying exploits,
Macintosh appeared to be a solid platform. Threats to Macintosh's
OS X operating system are increasing in sophistication and number.
Whether it is the exploitation of an increasing number of holes,
use of rootkits for post-compromise concealment or disturbed denial
of service, knowing why the system is vulnerable and understanding
how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power,
all the tools, and all the geekery of Linux is present in Mac OS X.
Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX
platform....Now, you can master the boot process, and Macintosh
forensic software.
* Look Back Before the Flood and Forward Through the 21st Century
Threatscape Back in the day, a misunderstanding of Macintosh
security was more or less industry-wide. Neither the administrators
nor the attackers knew much about the platform. Learn from Kevin
Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from
desktops, laptops, and servers into the world of consumer
technology (iPhones, iPods, and so on), what are the implications
for the further spread of malware and other security breaches? Find
out from David Harley.
* Malware Detection and the Mac Understand why the continuing
insistence of vociferous Mac zealots that it "can't happen here" is
likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick
graphical interface, and near-bulletproof reliability, Apple's Mac
OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure
and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use
the information obtained during a WarDrive, to successfully
penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through
exploitation techniques, tricks, and features of both OS X Tiger
and Leopard, using real-world scenarios for explaining and
demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from
the bleak days of OS9. THere is now a wide array of encryption
choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the
security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends
Interactive products designed for children-whether toys, games,
educational products, or websites-are increasingly embedded in
children's lives and school experiences. Making these products
safe, effective, and entertaining requires new methodologies for
carrying out sound and unbiased evaluations for these users with
unique requirements, environments, and ethical considerations.
This book directly addresses this need by thoroughly covering the
evaluation of all types of interactive technology for children.
Based on the authors' workshops, conference courses, and own design
experience and research, this highly practical book reads like a
handbook, while being thoroughly grounded in the latest research.
Throughout, the authors illustrate techniques and principles with
numerous mini case studies and highlight practical information in
tips and exercises and conclude with three in-depth case studies.
Essential reading for usability experts, product developers, and
researchers in the field.
* Presents an essential background in child development and child
psychology, particularly as they relate to technology.
* Captures best practices for observing and surveying children,
training evaluators, and capturing the child user experience using
audio and visual technology.
* Examines ethical and legal issues involved in working with
children and offers guidelines for effective risk management.
Understand Gang of Four, architectural, functional, and reactive
design patterns and how to implement them on modern Java platforms,
such as Java 12 and beyond Key Features Learn OOP, functional, and
reactive patterns for creating readable and maintainable code
Explore architectural patterns and practices for building scalable
and reliable applications Tackle all kinds of performance-related
issues and streamline development using design patterns Book
DescriptionJava design patterns are reusable and proven solutions
to software design problems. This book covers over 60 battle-tested
design patterns used by developers to create functional, reusable,
and flexible software. Hands-On Design Patterns with Java starts
with an introduction to the Unified Modeling Language (UML), and
delves into class and object diagrams with the help of detailed
examples. You'll study concepts and approaches to object-oriented
programming (OOP) and OOP design patterns to build robust
applications. As you advance, you'll explore the categories of GOF
design patterns, such as behavioral, creational, and structural,
that help you improve code readability and enable large-scale reuse
of software. You'll also discover how to work effectively with
microservices and serverless architectures by using cloud design
patterns, each of which is thoroughly explained and accompanied by
real-world programming solutions. By the end of the book, you'll be
able to speed up your software development process using the right
design patterns, and you'll be comfortable working on scalable and
maintainable projects of any size. What you will learn Understand
the significance of design patterns for software engineering
Visualize software design with UML diagrams Strengthen your
understanding of OOP to create reusable software systems Discover
GOF design patterns to develop scalable applications Examine
programming challenges and the design patterns that solve them
Explore architectural patterns for microservices and cloud
development Who this book is forIf you are a developer who wants to
learn how to write clear, concise, and effective code for building
production-ready applications, this book is for you. Familiarity
with the fundamentals of Java is assumed.
Since its birth in the late 1970s, the business recovery industry
has continued to broaden, moving from original batch application
processing on mainframes to include recovery for telecommunications
connectivity, distributed processing on mid-range systems, and most
recently, network and work area recovery. Whenever accidents,
disasters and natural events interrupt business activities, one
thing is certain: businesses lose money. How much money often
depends on how prepared companies are for dealing with business
interruptions. A Primer for Disaster Recovery Planning in an IT
Environment is intended to help businesses plan for an occurrence
that could mean a business stoppage. It helps you evaluate your
business in terms of vulnerability to disaster and guides you
through the process of creating a disaster recovery plan.
This book provides a single-source reference to routing algorithms
for Networks-on-Chip (NoCs), as well as in-depth discussions of
advanced solutions applied to current and next generation, many
core NoC-based Systems-on-Chip (SoCs). After a basic introduction
to the NoC design paradigm and architectures, routing algorithms
for NoC architectures are presented and discussed at all
abstraction levels, from the algorithmic level to actual
implementation. Coverage emphasizes the role played by the routing
algorithm and is organized around key problems affecting current
and next generation, many-core SoCs. A selection of routing
algorithms is included, specifically designed to address key issues
faced by designers in the ultra-deep sub-micron (UDSM) era,
including performance improvement, power, energy, and thermal
issues, fault tolerance and reliability.
Portable Biosensors and Point-of-Care Systems describes the
principles, design and applications of a new generation of
analytical and diagnostic biomedical devices, characterized by
their very small size, ease of use, multi-analytical capabilities
and speed to provide handheld and mobile point-of-care (POC)
diagnostics. The book is divided in four Parts. Part I is an
in-depth analysis of the various technologies upon which portable
diagnostic devices and biosensors are built. In Part II, advances
in the design and optimization of special components of biosensor
systems and handheld devices are presented. In Part III, a wide
scope of applications of portable biosensors and handheld POC
devices is described, ranging from the support of primary
healthcare to food and environmental safety screening. Diverse
topics are covered, including counterterrorism, travel medicine and
drug development. Finally, Part IV of the book is dedicated to the
presentation of commercially available products including a review
of the products of point-of-care in-vitro-diagnostics companies, a
review of technologies which have achieved a high Technology
Readiness Level, and a special market case study of POC infusion
systems combined with intelligent patient monitoring. This book is
essential reading for researchers and experts in the healthcare
diagnostic and analytical sector, and for electronics and material
engineers working on portable sensors.
A virtual evolution in IT shops large and small has begun. VMware s
ESX Server is the enterprise tool to free your infrastructure from
its physical limitations providing the great transformation into a
virtual environment--this book shows you how. Use Syngress proven
How to Cheat methodology to configure and build VMware s ESX Server
version 3. This clear, concise guide provides all the information
you need to become a virtual whiz
This book will detail the default and custom installation of VMware
s ESX server as well as basic and advanced virtual machine
configurations. It will then walk the reader through post
installation configurations including installation and
configuration of VirtualCenter. From here, readers will learn to
efficiently create and deploy virtual machine templates. Best
practices for securing and backing up your virtual environment are
also provided. The book concludes with a series of handy,
time-saving command and configuration for: bash shell keystrokes,
Linux commands, configuration files, common/proc files, VMware ESX
commands, and troubleshooting.
Reap the Benefits of Server Virtualization
Realize improved ROI, ensure efficient mergers and acquisitions,
and reduce compliance risk exposure through server virtualization
and consolidation.
Build a Virtual Machine
Create a Gold Master and use your VMlibrary to leverage the power
and flexibility of VMware.
Manage Your Virtual Infrastructure
Use VMware tools to partition physical servers and manage virtual
machines.
Set Up Scripted Installation
See how a scripted installation method can be a fast and efficient
way to provision ESX hosts.
Master ESX Native Tools
Use tools like Esxtop to diagnose performance issues and vmkfstools
to import and export
Install and Use VMware Scripting APIs
Develop programs to help automate and ease administration even with
a limited background in scripting or programming.
Learn the Fundamentals of a VM Backup
VMware ESX ships with three scripts that work together to create a
backup and restore system: vmsnap.pl, vmsnap_all.pl, and
vmres.pl.
Extend a Cloned Windows VM s Root Partition
Use Microsoft s Sysprep utility to extend a newly deployed virtual
machine s root partition from the original clone size to a larger
size."
Exchange, SQL and IIS are at the core of most Microsoft enterprise
servers. The 2007 releases of these products, along with the
release of Windows Vista and Windows 2008 Server, represents the
biggest overhaul of Windows enterprise products since Windows 2000.
The dramatic changes to security tools and the addition of features
that support "anywhere access" present IT professionals with a
steep learning curve. Making certain that these products are
configured to meet regulatory compliance requirements adds
addtionaly complexity to day-to-day management network management.
The Best Damn Exchange, SQL and IIS Book Period delivers an
all-in-one reference for Windows System Administrators deploying
the 2007 releases of these core Microsoft servers. The coverage is
comprehensive, and provides users with just about everything they
need to manage a Windows enterprise server. Special Bonus coverage
includes how to gather and analyze the many log files generated by
these servers.
Key Features:
* All-in-one coverage includes Exchange, SQL, and IIS Servers
* Integrated coverage on all key security features
* Bonus coverage includes analyzing server logs and integrating
Communicator 2007
This edited book focuses on concepts and their applications using
the theory of conceptual spaces, one of today's most central tracks
of cognitive science discourse. It features 15 papers based on
topics presented at the Conceptual Spaces @ Work 2016 conference.
The contributors interweave both theory and applications in their
papers. Among the first mentioned are studies on metatheories,
logical and systemic implications of the theory, as well as
relations between concepts and language. Examples of the latter
include explanatory models of paradigm shifts and evolution in
science as well as dilemmas and issues of health, ethics, and
education. The theory of conceptual spaces overcomes many
translational issues between academic theoretization and practical
applications. The paradigm is mainly associated with structural
explanations, such as categorization and meronomy. However, the
community has also been relating it to relations, functions, and
systems. The book presents work that provides a geometric model for
the representation of human conceptual knowledge that bridges the
symbolic and the sub-conceptual levels of representation. The model
has already proven to have a broad range of applicability beyond
cognitive science and even across a number of disciplines related
to concepts and representation.
Digital signal processing is now a growing area of study invading
all walks of organizational life, from consumer products to
database management. ""Web-Based Supply Chain Management and
Digital Signal Processing: Methods for Effective Information
Administration and Transmission"" presents trends and techniques
for successful intelligent decision-making and transfer of products
through digital signal processing. A defining collection of field
advancements, this publication provides the latest and most
complete research in supply chain management with examples and case
studies useful for those involved with various levels of
management.
System administration is about the design, running and maintenance
of human-computer systems. Examples of human-computer systems
include business enterprises, service institutions and any
extensive machinery that is operated by, or interacts with human
beings. System administration is often thought of as the
technological side of a system: the architecture, construction and
optimization of the collaborating parts, but it also occasionally
touches on softer factors such as user assistance (help desks),
ethical considerations in deploying a system, and the larger
implications of its design for others who come into contact with
it.
This book summarizes the state of research and practice in this
emerging field of network and system administration, in an
anthology of chapters written by the top academics in the field.
The authors include members of the IST-EMANICS Network of
Excellence in Network Management.
This book will be a valuable reference work for researchers and
senior system managers wanting to understand the essentials of
system administration, whether in practical application of a data
center or in the design of new systems and data centers.
- Covers data center planning and design
- Discusses configuration management
- Illustrates business modeling and system administration
- Provides the latest theoretical developments
WE ARE ADRIFT IN A SEA OF INFORMATION. We need information to make
good decisions, to get things done, to learn, and to gain better
mastery of the world around us. But we do not always have good
control of our information - not even in the "home waters" of an
office or on the hard drive of a computer. Instead, information may
be controlling us - keeping us from doing the things we need to do,
getting us to waste money and precious time. The growth of
available information, plus the technologies for its creation,
storage, retrieval, distribution and use, is astonishing and
sometimes bewildering. Can there be a similar growth in our
understanding for how best to manage information and informational
tools?
This book provides a comprehensive overview of personal information
management (PIM) as both a study and a practice of the activities
people do and need to be doing so that information can work for
them in their daily lives.
Introductory chapters of "Keeping Found Things Found: The Study and
Practice of Personal Information Management" provide an overview of
PIM and a sense for its many facets. The next chapters look more
closely at the essential challenges of PIM, including finding,
keeping, organizing, maintaining, managing privacy, and managing
information flow. The book also contains chapters on search, email,
mobile PIM, web-based support, and other technologies relevant to
PIM.
*For more information and author blog visit http:
//www.keepingthingsfound.com/.
* Focuses exclusively on one of the most interesting and
challenging problems in today's world
* Explores what good and better PIM looks like, and how to measure
improvements
* Presents key questions to consider when evaluating any new PIM
informational tools or systems
Information and communication technologies (ICT) are a vital
component of successful business models. As new technologies
emerge, organizations must adapt quickly and strategically to these
changes or risk falling behind. Evolution and Standardization of
Mobile Communications Technology examines methods of developing and
regulating compatibility standards in the ICT industry, assisting
organizations in their application of the latest communications
technologies in their business practices. Organizations maintain
competitive advantage by implementing cutting-edge technologies as
soon as they appear. This book serves as a compendium of the most
recent research and development in this arena, providing readers
with the insight necessary to take full advantage of a wide range
of ICT solutions. This book is part of the Advances in IT Standards
and Standardization Research series collection.
|
|