|
Showing 1 - 25 of
30 matches in All Departments
"Stealing the Network: How to Own the Box" is NOT intended to be a
"install, configure, update, troubleshoot, and defend book." It is
also NOT another one of the countless Hacker books out there. So,
what IS it? It is an edgy, provocative, attack-oriented series of
chapters written in a first hand, conversational style.
World-renowned network security personalities present a series of
25 to 30 page chapters written from the point of an attacker who is
gaining access to a particular system. This book portrays the
"street fighting" tactics used to attack networks and systems.
Not just another "hacker" book, it plays on "edgy" market success
of Steal this Computer Book with first hand, eyewitness
accounts
A highly provocative expose of advanced security exploits
Written by some of the most high profile "White Hats," "Black Hats"
and "Gray Hats"
Gives readers a "first ever" look inside some of the most notorious
network intrusions
The National Security Agency's INFOSEC Assessment Methodology (IAM)
provides guidelines for performing an analysis of how information
is handled within an organization: looking at the systems that
store, transfer, and process information. It also analyzes the
impact to an organization if there is a loss of integrity,
confidentiality, or availability. This book shows how to do a
complete security assessment based on the NSA's guidelines.
This book also focuses on providing a detailed organizational
information technology security assessment using case studies. The
Methodology used for the assessment is based on the National
Security Agency's (NSA) INFOSEC Assessment Methodology (IAM).
Examples will be given dealing with issues related to military
organizations, medical issues, critical infrastructure (power
generation etc).
The book is intended to provide an educational and entertaining
analysis of an organization, showing the steps of the assessment
and the challenges faced during an assessment. It will also provide
examples, sample templates, and sample deliverables that readers
can take with them to help them be better prepared and make the
methodology easier to implement.
- Everything You Need to Know to Conduct a Security Audit of Your
Organization
- Step-by-Step Instructions for Implementing the National Security
Agency's Guidelines
- Special Case Studies Provide Examples in Healthcare, Education,
Infrastructure, and more
A firewall is as good as its policies and the security of its VPN
connections. The latest generation of firewalls offers a dizzying
array of powerful options; they key to success is to write concise
policies that provide the appropriate level of access while
maximizing security.
This book covers the leading firewall products: Cisco PIX, Check
Point NGX, Microsoft ISA Server, Juniper s NetScreen Firewall, and
SonicWall. It describes in plain English what features can be
controlled by a policy, and walks the reader through the steps for
writing the policy to fit the objective. Because of their
vulnerability and their complexity, VPN policies are covered in
more depth with numerous tips for troubleshooting remote
connections.
. The only book that focuses on creating policies that apply to
multiple products.
. Included is a bonus chapter on using Ethereal, the most popular
protocol analyzer, to monitor and analyze network traffic.
. Shows what features can be controlled by a policy, and walks you
through the steps for writing the policy to fit the objective at
hand"
This book focuses on Check Point NG FP 4. FP 4, offers security
professionals an astounding array of products that upgrade and
enhance the security and communication features of Check Point NG.
Like Check Point NG Security Administration, this book provides
readers with the perfect balance of the theories and concepts
behind internet security, and the practical applications of Check
Point NG FP 4. Readers can learn how to use all of these products
to create a secure network with virtual private networking
features. Security professionals will buy, read, and keep this book
because it will cover all features of Check Point NG FP 4 like no
other book will.
- Covers all products, upgrades, and enhancements contained in FP 4
including: SMART, SecurePlatform, SecureXL, ClusterXL, and
Performance Pack
- Covers all objectives on Check Point's CCSA exam, and readers
will be able to download a free exam simulator from syngress.com.
- Check Point continues to dominate the Firewall space owning over
65% of the worldwide Firewall market. Syngress' book on the first
version of Check Point NG continues to be the market leading Check
Point book.
"By building IPv6 into Cisco IOS software, we are enabling
continued growth of the Internet and its expansion into new
applications and capabilities in a way that maintains compatibility
with existing Internet services." -- Stephen Deering, Cisco Fellow
and lead designer of the protocol
Internetworking Protocol (IP) addresses are the unique numeric
identifiers required of every device connected to the Internet. Two
years ago, in response to the exponential increase in demand for
new IP addresses, the Internet Engineering Task Force finalized its
revision on IP addressing, called IP Version 6 and key hardware
vendors such as Cisco and major Internet Service Providers like AOL
announced plans to migrate to IP Version 6. That is now happening.
Cisco Systems began incorporating Internet Protocol version 6
(IPv6) in its Cisco IOS Software in June, 2001. Cisco is currently
the only major networking vendor to deliver IPv6 across multiple
platforms.
This book provides complete coverage of IPv6 strategies,
configuration scenarios, and techniques to successfully deploy an
IPv6 addressing and subnetting scheme on your network. It also
covers:
Increasing the IP address size from 32 bits to 128 bits
Supporting more levels of addressing hierarchy
Supporting an increased number of addressable nodes
Supporting simpler auto-configuration of addresses
Improving the scalability of multicast routing by adding a "scope"
field to multicast addresses
Use a new "anycast address" to send a packet to any one of a group
of nodes
This is the only book that will teach system administrators how to
configure, deploy, and troubleshoot Symantec Enterprise Edition in
an enterprise network. The book will reflect Symantec's philosophy
of "Centralized Antivirus Management." For the same reasons that
Symantec bundled together these previously separate products, the
book will provide system administrators with a holistic approach to
defending their networks from malicious viruses. This book will
also serve as a Study Guide for those pursuing Symantec Product
Specialist Certifications.
Configuring Symantec AntiVirus Enterprise Edition contains
step-by-step instructions on how to Design, implement and leverage
the Symantec Suite of products in the enterprise.
OFirst book published on market leading product and fast-growing
certification. Despite the popularity of Symantec's products and
Symantec Product Specialist certifications, there are no other
books published or announced.
OLess expensive substitute for costly on-sight training. Symantec
offers week-long courses on this same product for approximately
$2,500. This book covers essentially the same content at a fraction
of the price, and will be an attractive alternative for network
engineers and administrators.
OFree practice exam from [email protected]. Syngress will
offer a free Symantec Product Specialist Certification practice
exam from syngress.com. Comparable exams are priced from $39.95 to
$59.95.
Prepare for the next generation of the internet with this in-depth,
developer's guide to the .Net framework that utilizes XML to
achieve greater flexibility of information and increased
interoperability.
Developing .Net Web Services with XML introduces readers to the
foundation for the .Net platform. The book covers the history,
applications and implementation of the Extensible Markup Language
within Microsoft's .NET framework. Readers will be given a thorough
introduction to .NET and its XML building blocks while acquiring a
firm grasp of how those blocks can be used to build any Web site or
service so that it will federate and collaborate seamlessly with
others
.Equips developers with the tool necessary to take advantage of the
next generation of the internet
.This book will provide web developers with a firm understanding of
XML, the building block of the .Net framework
.Includes practical, real-life applications using XML
.Unrivalled web based support: Readers can receive up-to-the minute
links, white papers and analysis for two years at
[email protected]."
The only way to stop a hacker is to think like one
ColdFusion is a Web application development tool that allows
programmers to quickly build robust applications using server-side
markup language. It is incredibly popular and has both an
established user base and a quickly growing number of new
adoptions. It has become the development environment of choice for
e-commerce sites and content sites where databases and transactions
are the most vulnerable and where security is of the utmost
importance.
Several security concerns exist for ColdFusion due to its unique
approach of designing pages using dynamic-page templates rather
than static HTML documents. Because ColdFusion does not require
that developers have expertise in Visual Basic, Java and C++; Web
applications created using ColdFusion Markup language are
vulnerable to a variety of security breaches.
Hack Proofing ColdFusion 5.0 is the seventh edition in the popular
Hack Proofing series and provides developers with step-by-step
instructions for developing secure web applications.
.Teaches strategy and techniques: Using forensics-based analysis
this book gives the reader insight to the mind of a hacker
.Interest in topic continues to grow: Network architects, engineers
and administrators are scrambling for security books to help them
protect their new networks and applications powered by
ColdFusion
.Unrivalled Web-based support: Up-to-the minute links, white papers
and analysis for two years at [email protected]"
Unparalleled security management that IT professionals have been
waiting for.
Check Point Software Technologies is the worldwide leader in
securing the Internet. The company's Secure Virtual Network (SVN)
architecture provides the infrastructure that enables secure and
reliable Internet communications. CheckPoint recently announced a
ground-breaking user interface that meets the computer industry's
Internet security requirements. The Next Generation User Interface
is easy to use and offers unparalleled security management
capabilities by creating a visual picture of security
operations.
CheckPoint Next Generation Security Administration will be a
comprehensive reference to CheckPoint's newest suite of products
and will contain coverage of: Next Generation User Interface, Next
Generation Management, Next Generation Performance, Next Generation
VPN Clients, and Next Generation Systems.
CheckPoint are a company to watch, they have captured over 50% of
the VPN market and over 40% of the firewall market according to IDC
Research
Over 29,000 IT professionals are CheckPont Certified
This is the first book to covers all components of CheckPoint's new
suite of market-leading security products - it will be in demand
Understand NGX R65 Operational Changes:
SVN Architecture, New VPN-1 Features, Additional Features, VPN-1
Power VSX
Deploy SmartClients and SmartManagement:
SmartDashboard, SmartMap, SmartView Tracker, SmartView Monitor,
SmartUpdate, SmartLSM, Secure Client Packaging Tool, Management
Plug-Ins, Check Point Configuration/cpconfig
Drive the Management Portal:
A Tour of the Dashboard, What s New in SmartDashboard NGX, Your
First Security Policy, Other Useful Controls on the Dashboard,
Managing Connectra and Interspect Gateways, Smart Portal
Master Advanced Authentication:
Authentication Overview, Users and Administrators, SmartDirectory,
User Authentication, Session Authentication, Client
Authentication
Use Advanced VPN Concepts for Tunnel Monitoring:
Encryption Overview, VPN Communities, Policy-Based VPN, Route-Based
VPN
Configure Advanced VPN Client Installations:
SecuRemote, Secure Client, Office Mode, Visitor Mode, Windows L2TP
Integration, SSL Network Extender, Backup Gateways, Multiple Entry
Point VPNs
Deploy and Configure SmartDefense:
Network Security, Application Intelligence, Web Intelligence
Get Inside Secure Platform:
Installation, Configuration, Secure Platform Shell, Secure
Shell
Learn Advanced Troubleshooting Techniques:
NGX Debugging, Packet Analysis, Log Troubleshooting, VPN Analysis,
VPN Client Analysis, ClusterXL Troubleshooting"
Cisco Systems, Inc. is the worldwide leader in networking for the
Internet, and its Intrusion Detection Systems line of products is
making in roads in the IDS market segment, with major upgrades
having happened in February of 2003. Cisco Security Professional's
Guide to Secure Intrusion Detection Systems is a comprehensive,
up-to-date guide to the hardware and software that comprise the
Cisco IDS. Cisco Security Professional's Guide to Secure Intrusion
Detection Systems does more than show network engineers how to set
up and manage this line of best selling products ... it walks them
step by step through all the objectives of the Cisco Secure
Intrusion Detection System course (and corresponding exam) that
network engineers must pass on their way to achieving sought-after
CCSP certification.
A new edition the most popular Hack Proofing book around
IT professionals who want to run secure networks, or build secure
software, need to know about the methods of hackers. The second
edition of the best seller Hack Proofing Your Network, teaches
about those topics, including:
.The Politics, Laws of Security, Classes of Attack, Methodology,
Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun,
Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes,
Trojans and Viruses, Reporting Security Problems, Choosing Secure
Systems
The central idea of this book is that it's better for you to find
the holes in your network than it is for someone else to find them,
someone that would use them against you. The complete,
authoritative guide to protecting your Windows 2000 Network.
Updated coverage of an international bestseller and series
flagship
Covers more methods of attack and hacker secrets
Interest in topic continues to grow - network architects, engineers
and administrators continue to scramble for security books
Written by the former security manager for Sybase and an expert
witness in the Kevin Mitnick trials
.A great addition to the bestselling "Hack Proofing..."
series
.Windows 2000 sales have surpassed those of Windows NT
.Critical topic. The security of an organization's data and
communications is crucial to its survival and these topics are
notoriously difficult to grasp
.Unrivalled web support at [email protected]"
Cisco Security Specialist's Guide to PIX Firewall immerses the
reader in the highly complicated subject of firewall
implementation, deployment, configuration, and administration. This
guide will instruct the reader on the necessary information to pass
the CSPFA exam including protocols, hardware, software,
troubleshooting and more.
Cisco Security Specialist's Guide to PIX Firewall introduces the
basic concepts of attack, explains the networking principals
necessary to effectively implement and deploy a PIX firewall,
covers the hardware and software components of the device, provides
multiple configurations and administration examples, and fully
describes the unique line syntax native to PIX firewall
configuration and administration.
OCoverage of the Latest Versions of PIX Firewalls. This book
includes coverage of the latest additions to the PIX Firewall
family including the CiscoSecure PIX Firewall (PIX) Software
Release 6.0.
OMust-have desk reference for the serious security professional. In
addition to the foundation information and dedicated text focused
on the exam objectives for the CSPFA, this book offers real-world
administration and configuration support. This book will not only
help readers pass the exam; it will continue to assist them with
their duties on a daily basis.
OFirewall administration guides? Syngress wrote the book. Syngress
has demonstrated a proficiency to answer the market need for
quality information pertaining to firewall administration guides.
Configuring ISA Server 2000: Building Firewalls for Windows 2000
(ISBN: 1-928994-29-6) and Checkpoint Next Generation Security
Administration (ISBN: 1-928994-74-1) are currently best sellers in
the security market."
An expert guide to Ruby, a popular new Object-Oriented Programming
Language
Ruby is quickly becoming a favourite among developers who need a
simple, straight forward, portable programming language. Ruby is
ideal for quick and easy object-oriented programming such as
processing text files or performing system management. Having been
compared with other programming languages such as Perl, Python,
PCL, Java, Eiffel, and C++; Ruby is popular because of its straight
forward syntax and transparent semantics.
Using step-by-step examples and real world applications, the Ruby
Developer's Guide is designed for programmers and developer's
looking to embrace the object-oriented features and functionality
of this robust programming language. Readers will learn how to
develop, implement, organize and deploy applications using Ruby.
Ruby is currently experiencing a rapid rise in popularity in the
object-oriented programming community
Readers receive up-to-the minute links, white papers, and analysis
for two years at [email protected]
Comes with a wallet-sized CD containing a printable HTML version of
the book, all of the source code examples and demos of popular Ruby
third-party programming tools and applications
The only way to stop a hacker is to think like one
Wireless technology is a new and rapidly growing field of
concentration for network engineers and administrators. Innovative
technology is now making the communication between computers a
cordless affair. Wireless devices and networks are vulnerable to
additional security risks because of their presence in the mobile
environment.
Hack Proofing Your Wireless Network is the only book written
specifically for architects, engineers, and administrators
responsible for securing their wireless networks. From making sense
of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC)
to the implementation of security policies, plans, and recovery
protocols, this book will help users secure their wireless network
before its security is compromised. The only way to stop a hacker
is to think like one...this book details the multiple ways a hacker
can attack a wireless network - and then provides users with the
knowledge they need to prevent said attacks.
Uses forensic-based analysis to give the reader an insight into the
mind of a hacker
With the growth of wireless networks architects, engineers and
administrators will need this book
Up to the minute Web based support at [email protected]
Updated coverage of the most confusing Windows 2000 component in
this new edition of a Syngress bestseller.
Active Directory Services dramatically changes the way IT
professionals design, plan, configure and administer their Windows
NT networks. The primary benefits of Active Directory Services are
its extensibility, scalability, and ease of management as compared
to prior generations of Windows NT. Systems Engineers will probably
spend much of their time over the next several years planning for
and deploying Active Directory Services in many different
environments. Windows 2000 Active Directory, Second Edition gives
IT professionals a head start; it provides updated coverage of
everything they will need to succeed.
Many Windows 2000 administrators are struggling with Active
Directory and need a comprehensive book on the subject
The first completely updated book on Active Directory to hit the
market
An in-depth knowledge of how to configure Cisco IP network security
is a MUST for anyone working in today's internetworked world
"There's no question that attacks on enterprise networks are
increasing in frequency and sophistication..."-Mike Fuhrman, Cisco
Systems Manager, Security Consulting
Managing Cisco Network Security, Second Edition offers updated and
revised information covering many of Cisco's security products that
provide protection from threats, detection of network security
incidents, measurement of vulnerability and policy compliance and
management of security policy across an extended organization.
These are the tools that network administrators have to mount
defenses against threats. Chapters also cover the improved
functionality and ease of the Cisco Secure Policy Manger software
used by thousands of small-to-midsized businesses and a special
section on the Cisco Aironet Wireless Security Solutions.
Security from a real-world perspective
Key coverage of the new technologies offered by the Cisco
including: 500 series of Cisco PIX Firewall, Cisco Intrusion
Detection System, and the Cisco Secure Scanner
Revised edition of a text popular with CCIP (Cisco Certified
Internetwork Professional) students
Expanded to include separate chapters on each of the security
products offered by Cisco Systems
Introducing Microsoft's flagship wireless development tool
The .NET Mobile Web Developer's Guide will provide readers with a
solid guide to developing mobile applications using Microsoft
technologies. The focus of this book is on using ASP.NET and the
.NET mobile SDK. It provides an introduction to the .NET platform
and goes into moderate details on ASP.NET to allow readers to start
developing ASP.NET applications. In addition, this book will give
the readers the insight to use the various Microsoft technologies
for developing mobile applications.
This book assumes the readers have experience in developing web
applications and are familiar with any one of the server-side
technologies like ASP, JSP or PHP.
The first book available on Microsoft's cornerstone wireless
development tool
Best selling, high profile authors. Wei Meng Lee and Shelley Powers
are frequent speakers at all of the major developer conferences
have previously authored best selling books for O'Reilly &
Associates, Wrox Press, SAMS and Que
Comes with wallet-sized CD containing a printable HTML version of
the book, all of the source code examples and demos of popular ASP
.NET and .NET Mobile programming tools
Comprehensive Coverage of the .NET Mobile SDK and ASP.NET for
Mobile Web developers
Eliminate the hassles of Active Directory - install Windows 2000
without it
Windows 2000 is undoubtedly a great product. In one year after its
release, Microsoft have sold have sold 10 million licenses. System
administrators are praising its impressive abilities to coordinate
Internet, intranet, extranets, and management applications creating
a complete technical infrastructure. However, there has been a
noticeable amount of organizations that are avoiding one of the
most talked about features of Windows 2000 - Active Directory. The
industry buzz is that Active Directory (although a great product)
is a burden to implement and install and is not compatible with non
Windows products like Solaris, NetWare and Linux.
Configuring Windows 2000 WITHOUT Active Directory is a complete
guide to installation and configuration of Windows 2000 (without
Active Directory) for system administrators and network
consultants. This book details not only the new features and
functions of Windows 2000 but also how to integrate several
features with existing Windows NT4 domains. The book does not cover
the Active Directory function of Windows 2000.
There is nothing like this book available, yet every Windows 2000
mail list, magazine and online forum shouts for his sort of
coverage
Choosing the right mobile phone and service plan can be
overwhelming, particularly if you travel abroad - this truly
international guide is ideal for the mobile executive
Experts estimate that by 2005 there will be over 1.26 billion
wireless phone users around the world. (Source: Cellular
Telecommunications Industry Association). It's overwhelming to
think of the options available to the consumer when it comes to
buying mobile phones, phone accessories, and service plans. So many
people are confused by the myriad of wireless phone claims, the
endless advertised rates and the countless service plans with all
their options. The Consumer's Guide to Cell Phones is designed to
help consumers choose what program may best suit them. This book
helps streamline the wireless-buying process by providing a
complete listing of all wireless providers and the details of their
plans.
International listings cover USA, Africa, Asia-Pacific, Australia,
Europe, Latin America, and the Middle East. As an example, in
Ireland there is coverage of Digiphone and other plans, in
Australia of Telstra, in the UK Cellnet, Orange, etc.
The companion web site for the book includes a service provider
database
As the mobile market continues to grow more people are looking to
use their phone for fax, e-mail or mobile computing - this book has
the answers
Business is on the move - mobile computing must keep up
Innovative technology is making the communication between computers
a cordless affair. Mobile computing with laptops, hand helds and
mobile phones is increasing the demand for reliable and secure
wireless networks. Network engineers and consultants need to create
and build cutting-edge wireless networks in both the small business
and multi-million dollar corporations.
Designing Wireless Networks provides the necessary information on
how to design and implement a wireless network. Beginning with
detailed descriptions of the various implementations and
architectures of wireless technologies and moving to the
step-by-step instructions on how to install and deploy a fixed
wireless network; this book will teach users with no previous
wireless networking experience how to design and build their own
wireless network based on the best practices of the Enhanced
Services from Lucent Technologies.
* Timely coverage of new technologies: Communication without cables
is the future of netwoking
* Advocates wireless networking solutions for any user, regardless
of location, device or connection.
* Written by Experts. The authors are leading WAN authorities at
Lucent Technologies.
* No previous wireless experience is assumed, however, readers
should have a basic understanding of networking and TCP/IP
protocols
The only way to stop a hacker is to think like one
Sun Microsystem's venerable and well-respected operating system
Solaris is currently in version 8, and runs on both Intel and Sun
Hardware. Solaris is one of the most comprehensive and popular UNIX
operating systems available. Hundreds of thousands of business
enterprises, both small and large, depend on Sun Solaris to keep
their business alive - but have they protected themselves against
hackers?
Hack Proofing Sun Solaris 8 is the latest addition to the popular
Hack Proofing series from Syngress Publishing. Providing hands-on
information written by both security professionals and
self-proclaimed hackers, this book will give system administrators
the edge they need to fortify their Sun Solaris operating system
against the never-ending threat of hackers.
The fifth title in the popular series that brought us the
bestseller Hack Proofing Your Network
Teaches strategy and techniques using forensic-based analysis
Up to the minute Web-based support with [email protected]
"Bluetooth (enabled devices) will ship in the billions of units
once it gains momentum." - Martin Reynolds, Gartner Group
Bluetooth is the most exciting development in wireless computing
this decade Bluetooth enabled devices can include everything from
network servers, laptop computers and PDAs, to stereos and home
security systems. Most Bluetooth products to hit the market in 2001
will be PC cards for laptop computers and access points, which
allow up to seven Bluetooth devices to connect to a network.
Reports indicate that by the end of 2003 there will be over 2
billion Bluetooth-enabled devices.
Bluetooth-enabled devices communicate with each other through
embedded software applications. Bluetooth Developer's Guide to
Embedded Applications will provide embedded applications developers
with advanced tutorials and code listings written to the latest
Bluetooth's latest specification, version 1.1. Written by Bluetooth
pioneers from market leaders in Bluetooth software development,
Extended Systems and Cambridge Silicon Radio, this is the first
advanced level Bluetooth developer title on the market.
White Hot Topic .While other books introduce readers to the
possibilities of Bluetooth, this is the first comprehensive,
advanced level programming book written specifically for embedded
application developers
Authors are responsible for SDK, the market-leading development
tool for Bluetooth
Comes with Syngress' revolutionary Credit Card CD containing a
printable HTML version of the book, all of the source code and
sample applications from Extended Systems and Cambridge Silicon
Radio
The E-mail Virus Protection Handbook is organised around specific
e-mail clients, server environments, and anti-virus software. The
first eight chapters is useful to both users and network
professionals; later chapters deal with topics relevant mostly to
professionals with an emphasis on how to use e-mail filtering
software to monitor all incoming documents for malicious behaviour.
In addition, the handbook shows how to scan content and counter
email address forgery attacks. A chapter on mobile code
applications, which use Java applets and Active X controls to
infect email and, ultimately, other applications and whole systems
is presented.
The book covers spamming and spoofing: Spam is the practice of
sending unsolicited email to users. One spam attack can bring down
an entire enterprise email system by sending thousands of bogus
messages or "mailbombing," which can overload servers. Email
spoofing means that users receive messages that appear to have
originated from one user, but in actuality were sent from another
user. Email spoofing can be used to trick users into sending
sensitive information, such as passwords or account numbers, back
to the spoofer.
* Highly topical Recent events such as the LoveBug virus means the
demand for security solutions has never been higher
* Focuses on specific safeguards and solutions that are readily
available to users
The Microsoft .NET initiative is the future of e-commerce - making
it possible for organisations to build a secure, reliable
e-commerce infrastructure. This is the first book to outline the
capabilities of SQL Server 2000, one of the key components of .NET.
SQL Server 2000 introduces powerful new data mining functionality
designed specifically to capture and process customer profiles and
to predict future buying patterns on e-commerce sites.
Designing SQL Server 2000 Databases for NET Enterprise Servers
addresses the needs of IT professionals migrating from the popular
SQL 7 databases to the new SQL 2000, as well as those who are
starting from scratch.
* Covers all key features of SQL Server 2000 including; XML
support, enhanced data-mining capabilities and integration with
Windows 2000
* While there are many books available on SQL 7 - this is the first
to be announced for SQL 2000
* Free ongoing customer support and information upgrades
TCP/IP is a set of proposals developed to allow cooperating
computers to share resources across a network. Some of the largest
networks today are built on the TPC/IP protocol suite.
Understanding how TCP/IP is "supposed" to work is not enough for
today's network managers. In this book, readers will learn to
prevent, detect, troubleshoot and correct TCP/IP network problems.
By using products such as distributed sniffers, field metering
tools and protocol analyses, network managers can learn a lot about
what is going on in (or wrong in) an internetwork and be able to
troubleshoot a live TPC/IP network. This book focuses specifically
on identifying problem areas, including identifying and correcting
protocol errors, DNS route problems, application faults and slow
response times.
Syngress have sold over 700,000 Microsoft and Cisco certification
guides in the last two years. Most of the administrators buying
these will be interested in this book.
* TPC/IP is a very popular topic; readers will welcome a guide to
troubleshooting and repairing problems
* Tackles monitoring the network using protocol analyses
* Teaches effective methods of baselining and trend analysis
|
You may like...
Braai
Reuben Riffel
Paperback
R495
R359
Discovery Miles 3 590
|