Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Microsoft Forefront is a comprehensive suite of security products
that will provide companies with multiple layers of defense against
threats. Computer and Network Security is a paramount issue for
companies in the global marketplace. Businesses can no longer
afford for their systems to go down because of viruses, malware,
bugs, trojans, or other attacks. Running a Microsoft Forefront
Suite within your environment brings many different benefits.
Forefront allows you to achieve comprehensive, integrated, and
simplified infrastructure security. This comprehensive suite of
tools provides end-to-end security stretching from Web servers back
to the desktop. This book will provide system administrators
familiar with Syngress' existing Microsoft networking and security
titles with a complete reference to Microsoft's flagship security
products.
If you're searching for a practical and comprehensive guide to installing, configuring, and troubleshooting Microsofts Windows Home Server, look no further. Inside "Windows Home Server User's Guide," you'll learn how to install, configure, and use Windows Home Server and understand how to connect to and manage different clients such as Windows XP, Windows Vista, Windows Media Center, and more. It's straightforward and easy-to-understand style will help you maximize all the benefits that Windows Home Server can bring. This guide includes the following: Step-by-step instructions for configurations Lots of troubleshooting tips Comprehensive coverage of different clients that can connect to, manage and be managed by Windows Home Server Many useful illustrations for a quick-to-learn approach Packed with handy hints, tips, and extensive walkthroughs to get you up and running as quickly and painlessly as possible, author Andrew Edney is your expert guide to help you get the most out of Windows Home Server. What you'll learn Discover the benefits of Windows Home ServerCentrally back up all of your home machinesManage the configuration and operation of all computers in your householdConfigure centralized storage so all computers can store files in one locationBring many of the benefits of a Windows Serverbased domain to your house without the overhead and expense of a traditional server productUnderstand how to monitor and maintain the health of all of your machines Who this book is for This book is for IT administrators, or anyone with some professional IT experience, who wants to learn about the Windows Home Server and how it can be used in their homes. Experience with Windows Server will be beneficial, but even with only some general computing experience, you will find this book a valuable companion to Windows Home Server.
This book constitutes the refereed proceedings of the Fourth VLDB 2007 International Workshop on Secure Data Management, SDM 2007, held in Vienna, Austria, September 23-24, 2007 in conjunction with VLDB 2007. The 11 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Access Control, Database Security, Privacy Protection and Positon Papers.
It's the little things that turn a good digital product into a great one. With this full color practical book, you'll learn how to design effective microinteractions: the small details that exist inside and around features. How can users change a setting? How do they turn on mute, or know they have a new email message? Through vivid, real-world examples from today's devices and applications, author Dan Saffer walks you through a microinteraction's essential parts, then shows you how to use them in a mobile app, a web widget, and an appliance. You'll quickly discover how microinteractions can change a product from one that's tolerated into one that's treasured. Explore a microinteraction's structure: triggers, rules, feedback, modes, and loops Learn the types of triggers that initiate a microinteraction Create simple rules that define how your microinteraction can be used Help users understand the rules with feedback, using graphics, sounds, and vibrations Use modes to let users set preferences or modify a microinteraction Extend a microinteraction's life with loops, such as "Get data every 30 seconds"
This book constitutes the thoroughly refereed post-proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust, FAST 2006, held in Hamilton, Ontario, Canada, August 26-27, 2006. The 18 revised papers presented were carefully reviewed and selected from 47 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.
A virtual evolution in IT shops large and small has begun. VMware s
ESX Server is the enterprise tool to free your infrastructure from
its physical limitations providing the great transformation into a
virtual environment--this book shows you how. Use Syngress proven
How to Cheat methodology to configure and build VMware s ESX Server
version 3. This clear, concise guide provides all the information
you need to become a virtual whiz
As the standard for KDE desktop environment, Trolltech's Qt is a necessary basis for all programmers who want to develop cross-platform applications on Windows, Mac OS, Linux, and FreeBSD. A multitude of popular applications have been written in Qt, including Adobe Photoshop Elements, Google Earth, Perforce Visual Client, and Skype. "Foundations of Qt Development" is based on Qt 4.2, and is aimed at C++ programmers who want to become proficient using this excellent toolkit to create graphical applications that can be ported to all major platforms. The book is focused on teaching you to write your own code in addition to using existing code. Common areas of confusion are identified, addressed, and answered.
If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identitya platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find "Beginning Information Cards and CardSpace: From Novice to Professional" essential to understanding and successfully implementing CardSpace solutions. Topics range from fundamental discussion of identityincluding identity concepts, laws of identity, and the identity metasystemto comprehensive coverage of Windows CardSpace. You'll learn what CardSpace is all about, where you can and should use it, and how you would implement it. Additionally, multiple case studies showcase different scenarios where the technology is employed.Youll learn the technology from someone who's done real implementations with major customersAuthor Marc Mercurri works directly with the Windows CardSpace product groupHigh-quality demos with universal themes are applicable to your own work
This is the first of a two-volume set that constitutes the refereed proceedings of the Symposium on Human Interface 2007, held in Beijing, China in July 2007. It covers design and evaluation methods and techniques, visualizing information, retrieval, searching, browsing and navigation, development methods and techniques, as well as advanced interaction technologies and techniques.
Windows Workflow Foundation is part of a bundle of new products that update .NET 2.0 into .NET 3.0. This book is one of the first to cover this important addition to .NET, and aims to provide the reader with a solid grounding in how workflows are implemented, executed, maintained and customized. By comprehensively covering WF from setup through implementation to customization readers are given a 'one stop' grounding in the subject. Given the importance of this technology release, the fact that WF is a free add-on, and the book's broad appeal, it will be useful to almost all existing or migrating .NET 2.0 developers.
This book constitutes the refereed proceedings of the 7th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2007, held in Paphos, Cyprus in June 2007. The DAIS conference was held as a joint event in federation with the 9th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2007) and the 9th International Conference on Coordination Models and Languages (Coordination 2007). The 24 revised full papers presented were carefully reviewed and
selected from 97 submissions. The papers address current research
in context-awareness, adaptation, mobility, distributed
applications and peer-to-peer computing, all of which relate to the
sustainability of distributed applications and integrated systems.
The papers are organized in topical sections on context-awareness,
distributed applications, adaptation, peer-to-peer, and
mobility.
This is the first of a two-volume set that constitutes the refereed proceedings of the Second International Conference on Usability and Internationalization, UIHCII 2007, held in Beijing, China in July 2007. The papers of this first volume cover HCI and culture and are organized in topical sections on cross-cultural design, internationalization and intercultural usability, as well as user studies.
Have you ever spent hours coding workflow for your applications? If so, the new Microsoft Windows Workflow Foundation (WF) technology will make your life easier. "Foundations of WF: An Introduction to Windows Workflow Foundation" introduces you to using Visual Studio 2005 and the Windows Workflow Foundation (part of Windows Vista) to create workflow packages. The book begins by giving you an overview of Windows Workflow Foundation. Then it introduces and shows examples of the various types of workflow that can be created. You'll discover the power of WF. You'll learn about all the prebuild activities you can include in your workflow, along with how to create your own activities. WF is fully extensible and allows you an unlimited number of options for your workflow. You'll also learn how to use workflow activities to retrieve data, and finally, how to tie an ASP.NET application with a workflow built in WF. This book, unlike most of the Microsoft WF samples, has code in both Visual Basic .NET and C#. All the examplesand there are manyhave VB .NET code, and many have the accompanying C# code. This book will allow you to begin creating new workflow applications easily in either VB .NET or C#. Each chapter includes an introduction to one or more activities that make up WF, along with examples of how to use each activity. Many chapters include a final section providing a real world example (a purchase order system). This book will have you using WF to create workflow applications with VB .NET or C# in a short amount of time.
This book constitutes the refereed proceedings of the 20th International Conference on Architecture of Computing Systems, ARCS 2007, held in Zurich, Switzerland in March 2007. The 20 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 83 submissions. The papers cover a broad range of research topics related to basic technology, architecture, and application of computing systems with a strong focus on system aspects of pervasive computing and self organization techniques in both organic and autonomic computing.
" Biometric Technologies and Verification Systems" is organized
into nine parts composed of 30 chapters, including an extensive
glossary of biometric terms and acronyms. It discusses the current
state-of-the-art in biometric verification/authentication,
identification and system design principles. It also provides a
step-by-step discussion of how biometrics works; how biometric data
in human beings can be collected and analyzed in a number of ways;
how biometrics are currently being used as a method of personal
identification in which people are recognized by their own unique
corporal or behavioral characteristics; and how to create detailed
menus for designing a biometric verification system.
Windows Presentation Foundation is a cutting-edge presentation framework for creating high-fidelity applications for Windows Vista and Windows XP. WPF is a composite technology with a noteworthy graphics engine that gives you more control over your applications screen output than has ever been possible in Windows before. New control frameworks and a new XML-based markup language, XAML, complete the core WPF package. On top of this, WPF can be linked to the new Microsoft Expression Suite to simplify the creation of your user interfaces, and it can be linked to .NET 2.0 to handle complex business logic. "Foundations of WPF: An Introduction to Windows Presentation Foundation" teaches you everything you need to get started with the technology, and is broken into three parts. The first introduces and contextualizes the WPF technology; the second part dives deeper into the facets of the technology that are of immediate and valuable use in developing applications; the last part offers you the real-world perspective you need to be productive in the community and customer base. In summary, this book: Explains how WPF interoperates with myriad new ancillary and support technologies being released by Microsoft (XAML, WCF, WinFX, and the Expression Design Suite) Gets you up and running, building applications for the new Windows Vista as quickly as possible Separates design and implementation to make life easier from a business and development perspective
Microsoft Operations Manager (MOM) allows administrators to troubleshoot - and prevent - problems in Microsoft server networks. The text offers everything from a review of MOM 2005 architecture and internals to planning and deployment guidelines, advanced troubleshooting, and integration with popular management frameworks like Tivoli. Appendices include custom upgrade guides. The approach is strictly practical and real-world, based on the authors' own experience. The book is written for an audience familiar with MOM but not expert at administering it. The solutions and troubleshooting tips are concise, and to the point. The chapters are standalone and can be referenced in any order.
Praise for the First Edition: "This outstanding book ... gives the reader robust concepts and implementable knowledge of this environment. Graphical user interface (GUI)-based users and developers do not get short shrift, despite the command-line interface's (CLI) full-power treatment. ... Every programmer should read the introduction's Unix/Linux philosophy section. ... This authoritative and exceptionally well-constructed book has my highest recommendation. It will repay careful and recursive study." --Computing Reviews, August 2011 Mastering Modern Linux, Second Edition retains much of the good material from the previous edition, with extensive updates and new topics added. The book provides a comprehensive and up-to-date guide to Linux concepts, usage, and programming. The text helps the reader master Linux with a well-selected set of topics, and encourages hands-on practice. The first part of the textbook covers interactive use of Linux via the Graphical User Interface (GUI) and the Command-Line Interface (CLI), including comprehensive treatment of the Gnome desktop and the Bash Shell. Using different apps, commands and filters, building pipelines, and matching patterns with regular expressions are major focuses. Next comes Bash scripting, file system structure, organization, and usage. The following chapters present networking, the Internet and the Web, data encryption, basic system admin, as well as Web hosting. The Linux Apache MySQL/MariaDB PHP (LAMP) Web hosting combination is also presented in depth. In the last part of the book, attention is turned to C-level programming. Topics covered include the C compiler, preprocessor, debugger, I/O, file manipulation, process control, inter-process communication, and networking. The book includes many examples and complete programs ready to download and run. A summary and exercises of varying degrees of difficulty can be found at the end of each chapter. A companion website (http://mml.sofpower.com) provides appendices, information updates, an example code package, and other resources for instructors, as well as students.
Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your environment with a minimum of friction. Because the Apple ecosystem is not going away. You'll start by understanding where Apple, third-party software vendors, and the IT community is taking us. What is Mobile Device Management and how does it work under the hood. By understanding how MDM works, you will understand what needs to happen on your networks in order to allow for MDM, as well as the best way to give the least amount of access to the servers or services that's necessary. You'll then look at management agents that do not include MDM, as well as when you will need to use an agent as opposed to when to use other options. Once you can install a management solution, you can deploy profiles on a device or you can deploy profiles on Macs using scripts. With Apple Device Management as your guide, you'll customize and package software for deployment and lock down devices so they're completely secure. You'll also work on getting standard QA environments built out, so you can test more effectively with less effort. This thoroughly revised and expanded Second Edition provides new coverage and updates on daemons and agents, declarative management, Gatekeeper, script options, SSO tools, Azure/Apple Business Essentials integrations and much more. You will Deploy profiles across devices effectively and securely Install apps remotely both from the app store and through custom solutions Work natively with Apple environments rather than retrofitting older IT solutions Who This Book Is ForMac administrators within organizations that want to integrate with the current Apple ecosystem, including Windows administrators learning how to use/manage Macs, mobile administrators working with iPhones and iPads, and mobile developers tasked with creating custom apps for internal, corporate distribution.
This is the second edition of Hanaan Rosenthals critically-acclaimed AppleScript book. It goes the extra mile to teach you AppleScript, explaining advanced topics without leaving you behind. AppleScript is the high-level scripting language that resides on the Mac platform. It can be used to add functionality to the Mac operating system, automate tasks, add functions, and generally make things easier. AppleScript has always been very useful, and with Mac OS X, you can take AppleScript further than before. This book begins with the basics like handling variables, loops, and commands. It proceeds with more advanced concepts like debugging, AppleScripting with databases, manipulating PDFs with SMILE, and automating media workflow. In a nutshell, this book: Takes you on a journey from novice to professional AppleScripter. Is completely comprehensive; nothing is left to the imagination. Is up-to-date through AppleScript 1.10/Mac OS X Tiger. If you are a Mac user who wants to know the real meaning of having full control over your machine, get into AppleScripting. And pick up this bookit really is the only guide you'll need to master the art of AppleScripting
* Proven best-seller and award winner on the market. Insiders highly recommended this title. * More than 150 pages of new material plus a preview of changes for Whidbey (Visual Studio 2005). * Goes far beyond any documentation, white papers and specialist documents available on the subject.
This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data Security, FC 2006, held in Anguilla, British West Indies in February/March 2006. The 19 revised full papers and six revised short papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections.
This book constitutes the refereed proceedings of the 20th Annual Working Conference on Data and Applications Security held in Sophia Antipolis, France, in July/August 2006. The 22 revised full papers presented were carefully reviewed and selected from 56 submissions. The papers present theory, technique, applications, and practical experience of data and application security covering a number of diverse research topics such as access control, privacy, and identity management.
The Small-to-Medium Enterprise (SME) marketplace is the least supported of all businesses with regards to Information Technology. These are not home users (for whom there is an extremely supportive publishing industry) and they are not large enterprise customers who have a dedicated set of 'expert' publishing companies producing professional guides for every conceivable piece of IT. This is where this book comes in. It gives a no-nonsense insight into exactly what to do with Microsoft's Small Business Server, making it easy for the SME owner to set up and configure a fully operational IT infrastructure with no hassle. |
You may like...
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek
Hardcover
R1,482
Discovery Miles 14 820
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek
Hardcover
R1,498
Discovery Miles 14 980
|