|
|
Showing 1 - 11 of
11 matches in All Departments
LEGO MINDSTORMS lets you design and program robots that can do just
about anything
The LEGO MINDSTORMS RIS 2.0 is the core set for all MINDSTORMS
users, that lets users design and program working robots - limited
only by their imagination. Initially designed for users 12 and up,
LEGO MINDSTORMS has taken off with LEGO enthusiasts of all ages.
10 Cool LEGO MINDSTORMS RIS 2.0 Projects: Amazing Projects You Can
Build in Under an Hour provides step-by-step instructions and
detailed illustrations for users of all skill levels and
proficiencies.
From out of the box to up and running in less than an hour.
8-page color insert. A color insert illustrates the complete
projects in full-detail.
Specifically targeted at new users of the LEGO MINDSTORMS RIS 2.0.
A firewall is as good as its policies and the security of its VPN
connections. The latest generation of firewalls offers a dizzying
array of powerful options; they key to success is to write concise
policies that provide the appropriate level of access while
maximizing security.
This book covers the leading firewall products: Cisco PIX, Check
Point NGX, Microsoft ISA Server, Juniper s NetScreen Firewall, and
SonicWall. It describes in plain English what features can be
controlled by a policy, and walks the reader through the steps for
writing the policy to fit the objective. Because of their
vulnerability and their complexity, VPN policies are covered in
more depth with numerous tips for troubleshooting remote
connections.
. The only book that focuses on creating policies that apply to
multiple products.
. Included is a bonus chapter on using Ethereal, the most popular
protocol analyzer, to monitor and analyze network traffic.
. Shows what features can be controlled by a policy, and walks you
through the steps for writing the policy to fit the objective at
hand"
This book introduces readers to mpls concepts, installation,
migration, operation, inspection, and troubleshooting.
It discusses specific router and switch platforms and includes such
topics as frame-mode mpls, cell-mode mpls, label distribution
protocol, tag distribution protocol, label distribution protocol
migration, mpls configuration, traffic engineering, mpls vpns, mpls
vpn deployment models, mpls vpn routing protocol support,
multi-protocol bgp, mpls vpn configurations, mpls vpn integration,
and mpls vpn management.
Readers will find complete ready-to-use configurations for
routers
Shows how to implement MPLS traffic engineering on a core network
and optimize traffic
Great for users studying for Cisco's Implementing Cisco MPLS exam,
640-910 and written by a Cisco internetworking expert who knows
everything about MPLS.
Includes coverage of Cisco Systems' newly released (October 7,
2002) Multiprotocol Label Switching (MPLS) Bandwidth Protection
software package. The new architecture uses MPLS Traffic
Engineering Fast Reroute and an offline application called Tunnel
Builder Pro to increase resiliency at a network-wide level.
Includes updated coverage of MPLS and GMPLS
This is the only book that will teach system administrators how to
configure, deploy, and troubleshoot Symantec Enterprise Edition in
an enterprise network. The book will reflect Symantec's philosophy
of "Centralized Antivirus Management." For the same reasons that
Symantec bundled together these previously separate products, the
book will provide system administrators with a holistic approach to
defending their networks from malicious viruses. This book will
also serve as a Study Guide for those pursuing Symantec Product
Specialist Certifications.
Configuring Symantec AntiVirus Enterprise Edition contains
step-by-step instructions on how to Design, implement and leverage
the Symantec Suite of products in the enterprise.
OFirst book published on market leading product and fast-growing
certification. Despite the popularity of Symantec's products and
Symantec Product Specialist certifications, there are no other
books published or announced.
OLess expensive substitute for costly on-sight training. Symantec
offers week-long courses on this same product for approximately
$2,500. This book covers essentially the same content at a fraction
of the price, and will be an attractive alternative for network
engineers and administrators.
OFree practice exam from [email protected]. Syngress will
offer a free Symantec Product Specialist Certification practice
exam from syngress.com. Comparable exams are priced from $39.95 to
$59.95.
Cisco Security Specialist's Guide to PIX Firewall immerses the
reader in the highly complicated subject of firewall
implementation, deployment, configuration, and administration. This
guide will instruct the reader on the necessary information to pass
the CSPFA exam including protocols, hardware, software,
troubleshooting and more.
Cisco Security Specialist's Guide to PIX Firewall introduces the
basic concepts of attack, explains the networking principals
necessary to effectively implement and deploy a PIX firewall,
covers the hardware and software components of the device, provides
multiple configurations and administration examples, and fully
describes the unique line syntax native to PIX firewall
configuration and administration.
OCoverage of the Latest Versions of PIX Firewalls. This book
includes coverage of the latest additions to the PIX Firewall
family including the CiscoSecure PIX Firewall (PIX) Software
Release 6.0.
OMust-have desk reference for the serious security professional. In
addition to the foundation information and dedicated text focused
on the exam objectives for the CSPFA, this book offers real-world
administration and configuration support. This book will not only
help readers pass the exam; it will continue to assist them with
their duties on a daily basis.
OFirewall administration guides? Syngress wrote the book. Syngress
has demonstrated a proficiency to answer the market need for
quality information pertaining to firewall administration guides.
Configuring ISA Server 2000: Building Firewalls for Windows 2000
(ISBN: 1-928994-29-6) and Checkpoint Next Generation Security
Administration (ISBN: 1-928994-74-1) are currently best sellers in
the security market."
Prepare for the next generation of the internet with this in-depth,
developer's guide to the .Net framework that utilizes XML to
achieve greater flexibility of information and increased
interoperability.
Developing .Net Web Services with XML introduces readers to the
foundation for the .Net platform. The book covers the history,
applications and implementation of the Extensible Markup Language
within Microsoft's .NET framework. Readers will be given a thorough
introduction to .NET and its XML building blocks while acquiring a
firm grasp of how those blocks can be used to build any Web site or
service so that it will federate and collaborate seamlessly with
others
.Equips developers with the tool necessary to take advantage of the
next generation of the internet
.This book will provide web developers with a firm understanding of
XML, the building block of the .Net framework
.Includes practical, real-life applications using XML
.Unrivalled web based support: Readers can receive up-to-the minute
links, white papers and analysis for two years at
[email protected]."
The only way to stop a hacker is to think like one
ColdFusion is a Web application development tool that allows
programmers to quickly build robust applications using server-side
markup language. It is incredibly popular and has both an
established user base and a quickly growing number of new
adoptions. It has become the development environment of choice for
e-commerce sites and content sites where databases and transactions
are the most vulnerable and where security is of the utmost
importance.
Several security concerns exist for ColdFusion due to its unique
approach of designing pages using dynamic-page templates rather
than static HTML documents. Because ColdFusion does not require
that developers have expertise in Visual Basic, Java and C++; Web
applications created using ColdFusion Markup language are
vulnerable to a variety of security breaches.
Hack Proofing ColdFusion 5.0 is the seventh edition in the popular
Hack Proofing series and provides developers with step-by-step
instructions for developing secure web applications.
.Teaches strategy and techniques: Using forensics-based analysis
this book gives the reader insight to the mind of a hacker
.Interest in topic continues to grow: Network architects, engineers
and administrators are scrambling for security books to help them
protect their new networks and applications powered by
ColdFusion
.Unrivalled Web-based support: Up-to-the minute links, white papers
and analysis for two years at [email protected]"
An expert guide to Ruby, a popular new Object-Oriented Programming
Language
Ruby is quickly becoming a favourite among developers who need a
simple, straight forward, portable programming language. Ruby is
ideal for quick and easy object-oriented programming such as
processing text files or performing system management. Having been
compared with other programming languages such as Perl, Python,
PCL, Java, Eiffel, and C++; Ruby is popular because of its straight
forward syntax and transparent semantics.
Using step-by-step examples and real world applications, the Ruby
Developer's Guide is designed for programmers and developer's
looking to embrace the object-oriented features and functionality
of this robust programming language. Readers will learn how to
develop, implement, organize and deploy applications using Ruby.
Ruby is currently experiencing a rapid rise in popularity in the
object-oriented programming community
Readers receive up-to-the minute links, white papers, and analysis
for two years at [email protected]
Comes with a wallet-sized CD containing a printable HTML version of
the book, all of the source code examples and demos of popular Ruby
third-party programming tools and applications
Introducing Microsoft's flagship wireless development tool
The .NET Mobile Web Developer's Guide will provide readers with a
solid guide to developing mobile applications using Microsoft
technologies. The focus of this book is on using ASP.NET and the
.NET mobile SDK. It provides an introduction to the .NET platform
and goes into moderate details on ASP.NET to allow readers to start
developing ASP.NET applications. In addition, this book will give
the readers the insight to use the various Microsoft technologies
for developing mobile applications.
This book assumes the readers have experience in developing web
applications and are familiar with any one of the server-side
technologies like ASP, JSP or PHP.
The first book available on Microsoft's cornerstone wireless
development tool
Best selling, high profile authors. Wei Meng Lee and Shelley Powers
are frequent speakers at all of the major developer conferences
have previously authored best selling books for O'Reilly &
Associates, Wrox Press, SAMS and Que
Comes with wallet-sized CD containing a printable HTML version of
the book, all of the source code examples and demos of popular ASP
.NET and .NET Mobile programming tools
Comprehensive Coverage of the .NET Mobile SDK and ASP.NET for
Mobile Web developers
TCP/IP is a set of proposals developed to allow cooperating
computers to share resources across a network. Some of the largest
networks today are built on the TPC/IP protocol suite.
Understanding how TCP/IP is "supposed" to work is not enough for
today's network managers. In this book, readers will learn to
prevent, detect, troubleshoot and correct TCP/IP network problems.
By using products such as distributed sniffers, field metering
tools and protocol analyses, network managers can learn a lot about
what is going on in (or wrong in) an internetwork and be able to
troubleshoot a live TPC/IP network. This book focuses specifically
on identifying problem areas, including identifying and correcting
protocol errors, DNS route problems, application faults and slow
response times.
Syngress have sold over 700,000 Microsoft and Cisco certification
guides in the last two years. Most of the administrators buying
these will be interested in this book.
* TPC/IP is a very popular topic; readers will welcome a guide to
troubleshooting and repairing problems
* Tackles monitoring the network using protocol analyses
* Teaches effective methods of baselining and trend analysis
Cisco Systems, Inc. is the worldwide leader in networking for the
Internet, and its Intrusion Detection Systems line of products is
making in roads in the IDS market segment, with major upgrades
having happened in February of 2003. Cisco Security Professional's
Guide to Secure Intrusion Detection Systems is a comprehensive,
up-to-date guide to the hardware and software that comprise the
Cisco IDS. Cisco Security Professional's Guide to Secure Intrusion
Detection Systems does more than show network engineers how to set
up and manage this line of best selling products ... it walks them
step by step through all the objectives of the Cisco Secure
Intrusion Detection System course (and corresponding exam) that
network engineers must pass on their way to achieving sought-after
CCSP certification.
|
|