![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking > Networking packages
Apache Tomcat is the most popular open-source de-facto Java Web application server, standard for today's Web developers using JSP/Servlets. Apache Tomcat 7 covers details on installation and administration of Apache Tomcat 7. It explains key parts of the Tomcat architecture, and provides an introduction to Java Servlet and JSP APIs in the context of the Apache Tomcat server. In addition to basic concepts and administration tasks, Apache Tomcat 7 covers some of the most frequently used advanced features of Tomcat, including security, Apache web server integration, load balancing, and embedding Tomcat server in Java applications. Finally, through a practical primer, it shows how to integrate and use some of the most popular Java technologies with Apache Tomcat. In summary, Apache Tomcat 7 offers both novice and intermediate Apache Tomcat users a practical and comprehensive guide to this powerful software.What you'll learn * Install and set up Tomcat 7 on Windows and Unix platforms * Manage and deploy application deployed on Tomcat 7 using Manager Application * Secure Tomcat 7 server using security realms or HTTPS protocol * Embed Tomcat 7 server into your desktop Java application * Efficiently configure Tomcat 7 with Apache Web server * Configure data sources and mail sessions using JNDI in Tomcat * Configure logging for web applications deployed on Tomcat server Who this book is for This book is for those Web developers and/or Java programmers new to the open-source Apache Tomcat Web server. It's also for those new to the latest release, version 7. Table of Contents * Introduction to Apache Tomcat 7 * Deploying Web Applications to Tomcat * Servlets, JSPs, and ServletContext * Using Tomcat's Manager Web Application * HTTP Sessions * Configuring Security Realms * Securing Tomcat with SSL * Valves and Servlet Filters * Embedding Tomcat * Integrating Apache Web Server * Integrating Spring MVC Framework * Logging in Tomcat * Configuring JNDI in Tomcat * Server.xml File * The Web.xml File
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 8th International Middleware Conference 2007, held in Newport Beach, CA, USA, in November 2007. The 22 revised full papers presented were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on component-based middleware, mobile and ubiquitous computing, grid and cluster computing, enhancing communication, resource management, reliability and fault tolerance, as well as asynchronous communication.
Since Microsofts release of BizTalk Server 2006, there is a serious need for more documentation on this product. "Foundations of BizTalk Server 2006" fills that void. The book will take you from novice to professional, equipping you with the tools youll need to get started in the world of BizTalk server integration. From installation to deployment, you will grow increasingly more comfortable with the product as you work through a multitude of hands-on examples and demo applications. This book will demystify the product and emphasize the new 2006 BizTalk Server features. So even if youre a reluctant reader at first, youll gain full confidence in the product by books end.
"Practical .NET 2.0 Networking Projects" demonstrates some of the key networking technologies that are being made easily accessible through .NET Framework 2.0. It discusses communication between wired machines and between networks and mobile devices. The book teaches you about the technologies by walking you through sample projects in a straightforward and direct way. The book begins by discussing background theory so youll get comfortable with the layout of the .NET Framework and Compact Framework from a networking perspective. Then youll use the APIs within these frameworks to build a variety of cutting-edge networking applications that cover everything from Bluetooth and RFID communication to sockets programming and chat servers. Youll build working examples for each project, which you can also customize and use for your own purposes. The featured projects cover Basic introduction to network programming in .NET 2.0 Sockets programming Serial communication Bluetooth and GPS Infrared networking to mobile devices RFID
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 7th International Middleware Conference 2006, held in Melbourne, Australia, in November/December 2006. The 21 revised full papers are organized in topical sections on performance, composition, management, publish/subscribe technology, databases, mobile and ubiquitous computing, security, and data mining techniques.
This book explores Apache Geronimo, the open source lightweight J2EE/Java EE 5 Web application server. Geronimo's GBeans enable one to deploy sophisticated server-side enterprise Java applications and perform special enterprise-level Java development for transactional support. This title is a must-have because it is one of the first to cover Apache Geronimo in such detail.
Today, middleware is a key part of almost any application. Gone are the days when middleware was only used in the IT industry for high-end applications. Rather than middleware being part of the IT world, today IT applications r- resent only one aspect of middleware. With the increase in distribution, network capacity, and widespread deployment of computing devices (in homes, auto- biles, mobile phones, etc.), middleware has surpassed the importance of oper- ing systemsastheplatformwhereapplicationdevelopmentanddeploymenttake place. This makes middleware very exciting as a research area but also a very challenging one since it encompasses many di?erent concepts and techniques from a wide varietyof ?elds: networking,distributed systems, softwareengine- ing, performance analysis, computer architecture, and data management. Middleware 2005 in Grenoble, France, was the 6th edition of an increasingly successfulconference.Thescopeofthe conferencehasbeenslowlywideningwith every edition to accommodate new ?elds and applications. This year we made a considerable e?ort to reach out to other communities who are also active in the general area of middleware - sensor networks, networks in general, databases, software engineering- a fact that is re? ected in the variety of submissions.
* The Definitive Guide to Apache, Third Edition is a new revision of Peter Wainwright's best-selling (actually, the highest-selling) book on Apache configuration and administration. * Provides multiple methods and examples of how to solve a particular problem; compares and contrasts the methods rather than recommending a single, "best" solution. * Demonstrates how to use many of the most-popular scripting languages such as PHP, Perl, and Python to create dynamic web sites.
Maximizing Performance Scalability with IBM WebSphere teaches the reader real world performance management methodologies and best practices with a bent toward an IBM WebSphere J2EE environment. It will enable the reader to match the benefits of WebSphere optimization and tuning to business benefits and describes best practice J2EE development topics that have direct impact on IBM WebSphere capacity and performance management. Neat also describes how to proactively manage the performance of an IBM WebSphere v4 or v5 platform, and explains how to tune WebSphere with performance and robustness in mind. Additionally, the reader will learn how to develop custom IBM WebSphere performance monitoring and management tools to track and plot potential bottlenecks and pending performance issues before they cause impact.
Middleware systems compriseprogrammingmodels, abstractions, protocols, and services to facilitate the design, the development, the integration, and the - ployment of distributed applications in heterogeneous computing environments. Conceptually, the term middleware refers to a layer of software above the networking substrate and the operating system and below the (distributed) application. In practice these boundaries are not clear cut, with middleware functionality moving into and out of these layers. Remote communication, p- lish/subscribe, messaging, and (distributed) transaction constitute examples of common middleware abstractions and services. Middleware researchencompasses, builds on and extends a wide spectrum of concepts, techniques and ideas from a broad range of ?elds, including progr- ming languages, distributed systems, operating systems, networking, and data management. Following the success of the past conferences in this series in the Lake D- trict, UK (1998), in Palisades, NY (2000), in Heidelberg, Germany (2001), and in Rio de Janeiro, Brazil (2003), the 5th International Middleware Conference in Toronto, Canada aimed to be the premier conference for middleware research and technology in 2004. The broad scope of the conference included the design, the implementation, the deployment, and the evaluation of distributed systems platforms and architectures for emerging computing environments. The conf- ence gave an overview of research on middleware for peer-to-peer computing, middleware for mobility, middleware for replication and transactions, on p- lish/subscribesystems, onroutingprotocolsandoverlaynetworks, onapplication servers, resource management, and software engineering, and on Web services. This year, the technical program of Middleware drew from 194 submitted papers, among which 13 were explicitly submitted as work-in-progress papers."
JBoss 3.2 Deployment and Administration is a guide to the variety of configurative, administrative, and deployment tasks that associated with setting up and running J2EE components on the JBoss application server. Deploying J2EE applications and configuring the application server is one of the most tricky and non-standard elements of J2EE development. Each server interprets and implements the specifications differently, adding its own proprietary features and functionality.JBoss is the leading open source J2EE application server. It was the JavaWorld 2002 Editor's choice for Best Application Server. Its downloads are an order of magnitude greater than any other server (200,000). TogetherSoft poll places JBoss as the leading choice for development (43 per cent). The basic runtime and source is free, however you can pay for documentation and support services.
The transition from learning a language to building an enterprise application is the business and one where the need for guidebooks is the largest. When you go from short teaching application to piecing together all the pieces such as interacting with multi-tiers, various back end databases, legacy the problems and techniques needed grow exponentially. Kanalakis' book is designed to make the transition possible.
Building WebLogic Portals shows the beginning portal developer how to develop a portal application from start-to-finish and supplies the intermediate developer with proven strategies and development tactics for creating an enterprise portal. It also provides the advanced Java application server developer with a full range of reference material. Building WebLogic Portals also goes beyond portal development. The Web services chapter shows how to use Web services that allow companies to integrate business processes and data with their suppliers and customers. The authors describe the architecture of a well-planned user interface and include everything from data binding strategies to document-view architecture with MDI. They also show how to create elegant custom controls tailored to specific data and application logic and how to create dynamic user interfaces, dockable windows, and a vector-based drawing program. The book also teaches the GDI+ essentials needed for good user interfaces such as hit testing, irregularly shaped forms, owner-drawn menus, and animated controls, and shows how to integrate intelligence into user interfaces with embedded help and user agents.
"J2EE FrontEnd Technologies: A Programmer's Guide to Servlets, JavaServer Pages, and Enterprise JavaBeans" concisely and accurately describes what you need to know about effective enterprise development based on servlets, JSPs, and EJBs. Servlets, JSPs, and EJBs are the most important aspects of Java as it is used in the production of enterprise Web applications today. Lennart Jorelid 's book concentrates on teaching programmers how to fit the various technologies together while spending as little time as possible on "plumbing." Jorelid discusses servlet development and architecture, and he teaches developers how to integrate servlets into distributed enterprise systems with illustrated examples. He explains the architecture and implementation of JSPsincluding introductory concepts such as using all built-in facilities of the JSP library and advanced topics such as creating your own custom actions using the JSP Tag Library API. Jorelid also addresses the open-source Struts framework from the Apache Software Foundation, which provides a powerful framework for J2EE Web application development by combining servlets and JSPs. And, finally, Jorelid explores the EJB programming paradigm, covering development and architecture of EJBs and J2EE integration and deployment. "J2EE FrontEnd Technologies: A Programmer's Guide to Servlets, JavaServer Pages, and Enterprise JavaBeans" provides developers with a unique approach to understanding the profound relationship between servlets, JSPs, and EJBs. Developers will gain a clear understanding of all three and will be able to harness this knowledge for their own real-world applications.
This volume contains the proceedings of the international HPCN Europe 2000 event which was held in the Science and Technology Centre Watergraafsmeer, Amsterdam, the Netherlands, May 8-10, 2000. HPCN (High Performance Computing and Networking)Europeeventwas organized for the r st time in 1993 in Amsterdam as the result of several i- tiatives in Europe, the United States of America, and Japan. Succeeding HPCN events were held in Munich (1994), Milan (1995), Brussels (1996), and Vienna (1997), returning to Amsterdam in 1998 to stay. The HPCN event keeps growing and advancing every year, and this year the event consisted of the scientic conference, focused workshops, and several associated events. Theplenary lectures werepresented bysix renowned speakers: { Henk van der Vorst, University of Utrecht, The Netherlands: Giant Eig- problems within Reach, { WolfgangGentzsch, CTO, GridwareInc., Germany: The Information Power Grid is Changing our World, { Bernard Lecussan, SupAero and ONERA/CERT/DTIM, France: Irregular Application Computations on a Cluster of Workstations, { Miguel Albrecht, European Southern Observatory, Garching, Germany: Technologies for Mining Terabytes of Data, { HansMeinhardt, Max-Planck-Institut,Germany: The Algorithmic Beauty of Sea Shells,and { IngoAugustin,CERN,Geneva,Switzerland: Towards Multi-petabyte Storage Facilities. Theconference consisted ofparalleltrackspresenting 52selected papers, andone track presenting 25 posters. The areas covered in the conference include: Ind- trial and General End-User Applications of HPCN, Computational and C- puter Sciences, and this year the scope of the conference was further expanded by an additional area to emphasize the information management aspects, and the importance of the web-based cooperative application infrastructures.
Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet is the archetype of a large-scale open distributed system; standards such as HTTP, HTML, and XML, together with the widespread adoption of the Java language, are the cornerstones of many distributed systems. This book surveys security in large-scale open distributed systems by presenting several classic papers and a variety of carefully reviewed contributions giving the results of new research and development. Part I provides background requirements and deals with fundamental issues in trust, programming, and mobile computations in large-scale open distributed systems. Part II contains descriptions of general concepts, and Part III presents papers detailing implementations of security concepts.
The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible. Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation. This guide will be indispensable for everyone responsible for delivering security services-managers and cybersecurity professionals alike. * Address core business and operational requirements, including sponsorship, management, policies, procedures, workspaces, staffing, and technology * Identify, recruit, interview, onboard, and grow an outstanding SOC team * Thoughtfully decide what to outsource and what to insource * Collect, centralize, and use both internal data and external threat intelligence * Quickly and efficiently hunt threats, respond to incidents, and investigate artifacts * Reduce future risk by improving incident recovery and vulnerability management * Apply orchestration and automation effectively, without just throwing money at them * Position yourself today for emerging SOC technologies
This book features the major research advances on integrated networking, caching, and computing. Information-centric networking-based caching is one of the promising techniques for future networks. The cloud computing paradigm has been widely adopted to enable convenient, on-demand network access to a shared pool of configurable computing resources. In addition, fog/edge computing is proposed to deploy computing resources closer to end devices. From the perspective of applications, network, cache and compute are underlying enabling resources. How to manage, control and optimize these resources can have significant impacts on application performance.
Use Cisco Intersight to streamline, unify, and secure IT operations across data centers, clouds, and the edge The Cisco Intersight cloud operations platform delivers intelligent visualization, optimization, and orchestration for applications and infrastructure across any hybrid cloud environment. Using it, you can operate and maintain traditional infrastructure with the agility of cloud-native infrastructure, as you enhance stability and governance in cloud-native environments. This unique guide shows how to use Intersight to transform heterogeneous IT environments and simplify operations throughout your organization. It has been authored by Cisco insiders with 150+ years of combined experience across every key role associated with enterprise datacenters and cloud technology. The authors cover all facets of Intersight architecture, planning, and administration--from foundational concepts and security to operating infrastructure, servers, networks, storage, virtualization, and workloads--with chapters on Kubernetes, orchestration, programmability, and Infrastructure as Code. Cisco Intersight: A Handbook for Intelligent Cloud Operations is for every IT operator, administrator, manager, and director responsible for operations, programming/automation, information gathering, or monitoring, as well as decision-makers evaluating Intersight or leading implementation. Whatever your role in operating disparate data centers, clouds, and edge environments, Intersight will radically simplify your work--and this guide will help you maximize its value. Understand the platform architecture underlying Intersight's capabilities Establish a cohesive approach to securing all your services Explore Intersight's infrastructure operations capabilities, and integrate with other ops platforms Deploy, configure, operate, and update Cisco UCS servers and network infrastructure Centralize storage management, from Cisco HyperFlex to traditional storage Control virtualized compute infrastructure, on-premises or in the cloud Simplify deployment and management of Kubernetes clusters and service meshes Use Workload Optimization to continually assure performance, minimize cost, and maximize utilization Operationalize repeatable activities across the enterprise Get started with Intersight programmability, learning from easy examples Learn how "code-ifying" infrastructure can improve compliance and reduce risk
With the release of .NET, Microsoft has once again altered the distributed programming landscape. Almost everything has changed, from data access, to remote object calls, to the deployment of software components. And of course, .NET introduces a new technology in XML Web services that may revolutionize Web development. "Distributed .NET Programming in C#" describes how to use these new .NET technologies to build fast, scalable, and robust distributed applications. Along the way, it answers common questions such as, How do I use the .NET Remoting Framework? What role does COM+ play in the .NET universe? How can I interoperate with COM components? What's the difference between .NET Remoting and Web services? How will these changes affect the architecture and design of a distributed application? Author Tom Barnaby assumes the reader is already familiar with the fundamentals of .NET. However, a .NET overview is provided to concisely explain several of the core .NET technologies that are essential for distributed programming, including building, versioning, and deploying assemblies; garbage collection; serialization; and attribute-based programming.
Learn over 116 Linux commands to develop the skills you need to become a professional Linux system administrator Key Features Explore essential Linux commands and understand how to use Linux help tools Discover the power of task automation with bash scripting and Cron jobs Get to grips with various network configuration tools and disk management techniques Book DescriptionLinux is one of the most sought-after skills in the IT industry, with jobs involving Linux being increasingly in demand. Linux is by far the most popular operating system deployed in both public and private clouds; it is the processing power behind the majority of IoT and embedded devices. Do you use a mobile device that runs on Android? Even Android is a Linux distribution. This Linux book is a practical guide that lets you explore the power of the Linux command-line interface. Starting with the history of Linux, you'll quickly progress to the Linux filesystem hierarchy and learn a variety of basic Linux commands. You'll then understand how to make use of the extensive Linux documentation and help tools. The book shows you how to manage users and groups and takes you through the process of installing and managing software on Linux systems. As you advance, you'll discover how you can interact with Linux processes and troubleshoot network problems before learning the art of writing bash scripts and automating administrative tasks with Cron jobs. In addition to this, you'll get to create your own Linux commands and analyze various disk management techniques. By the end of this book, you'll have gained the Linux skills required to become an efficient Linux system administrator and be able to manage and work productively on Linux systems. What you will learn Master essential Linux commands and analyze the Linux filesystem hierarchy Find out how to manage users and groups in Linux Analyze Linux file ownership and permissions Automate monotonous administrative tasks with Cron jobs and bash scripts Use aliases to create your own Linux commands Understand how to interact with and manage Linux processes Become well-versed with using a variety of Linux networking commands Perform disk partitioning, mount filesystems, and create logical volumes Who this book is forThis book doesn't assume any prior Linux knowledge, which makes it perfect for beginners. Intermediate and advanced Linux users will also find this book very useful as it covers a wide range of topics necessary for Linux administration.
SECURING and EVOLVING ARCHITECTURES 5G initiates a period of technological evolution where the benefits transcend faster data download speeds and enable services that will change the way we all live and consume technology. Leveraging 5G's openness, a new developer ecosystem is building breakthrough services that billions of people will consume, delivering immense value to enterprises and subscribers alike. For 5G to achieve its potential, organizations must embrace multi-layered security that goes far beyond 3GPP specifications. Now, leading security architect Pramod Nair helps network professionals climb the steep learning curve associated with securing 5G, fully understand its threat surfaces, systematically mitigate its risks, and maximize the value of their security investments. This coherent, pragmatic, and vendor-agnostic guide will help you plan for security from the outset, make better choices throughout the lifecycle, and develop the mindset needed to secure new generations of networks. You'll find all you need: from high-level 5G security concepts to in-depth coverage of specific security controls, end-to-end architectural guidance, 5G security use cases, and cutting-edge "quantum proofing." Throughout, practical examples and real-life scenarios help you apply Nair's insights---whether you're a service provider, an enterprise, an industry vertical, a startup, a cybersecurity vendor, a systems integrator, or even in a defense environment. Securing 5G and Evolving Architectures is for technical and management audiences at all levels of 5G experience---from enterprise and security architects to network engineers, cloud computing and data center professionals, to CSO and CTO teams. Explore new 5G security challenges---and why you still need external controls, even with recent 3GPP improvements Implement network component security controls for RAN, Transport, 5GC, and devices Safeguard Multi-Access Edge Compute (MEC), SDNs, virtualized 5G cores, and massive IOT Protect Public and Non-Public Networks (Private 5G) deployment scenarios Secure Critical Infrastructure, Vehicle to Everything (V2X), and Smart Factory use cases Optimize end-to-end 5G security architecture across all 5G domains based on zero trust Prioritize 5G security investments in service provider or enterprise environments Preview emerging 5G use cases and ML/AI-based security enhancements
|
![]() ![]() You may like...
Pinpoint Maths Times Tables Detectives…
Steve Mills, Hilary Koll
Paperback
R182
Discovery Miles 1 820
Studies in Computer Science…
John R Rice, Richard A. DeMillo
Hardcover
R2,590
Discovery Miles 25 900
Educating Students with Autism Spectrum…
Dianne Zager, Michael L. Wehmeyer, …
Paperback
R2,131
Discovery Miles 21 310
Action on AIDS - National Policies in…
Barbara Misztal, David Moss
Hardcover
R2,981
Discovery Miles 29 810
Research Handbook on HRM in the Public…
Bram Steijn, Eva Knies
Hardcover
R6,411
Discovery Miles 64 110
|