Wednesday, June 11, 2008

Developing Java Web Services: Architecting and Developing Secure Web Services Using Java










Developing Java Web Services: Architecting and Developing Secure Web Services Using Java

One of the first books to cover Sun Microsystem's new Java Web Services Developer Pack
Written by top Sun consultants with hands-on experience in creating Web services, with a foreword from Simon Phipps, Chief Evangelist at Sun
Case studies demonstrate how to create Web services with the tools most used by Java developers, including BEA WebLogic, Apache Axis, Systinet WASP, and Verisign

Enterprise Java Development on a Budget: Leveraging Java Open Source Technologies











Enterprise Java Development on a Budget: Leveraging Java Open Source Technologies

Open Source has had a profound effect on the Java Community. Many Java Open Source projects have even become de-facto standards. The principal purpose of Enterprise Java Development on a Budget is to guide you through the development of a real enterprise Java application using nothing but Open Source Java Tools, Projects, and Frameworks.
Each chapter will deal with an aspect of the design and development of the application as they relate to a specific tool or framework being used. In areas of the application where there may be implementation choices in terms of which Open Source project to use, we will show one more possible paths and explain why, in the context of the application we chose one project/tool versus competing/similar ones.
Enterprise Java Development on a Budget is intended to define the role of Open Source on the Java Community. It will provide information on how, when and why to use Open Source. It will also contain as a useful appendix— a catalog of Open Source Projects/Products making an impact. The catalog provides information and examples necessary for managers, developers and architects to make decisions on whether to use or evaluate specific projects.







VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)











VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.






Windows Server 2008 For Dummies (For Dummies (Computer/Tech))












Windows Server 2008 For Dummies (For Dummies (Computer/Tech))
If you’re curious, but hesitant, about finding your way around Microsoft’s new Windows Server 2008, Windows Server 2008 For Dummies is the book for you. This friendly reference shows you everything you need to know — from installation and deployment to building and running a Windows Server 2008 network.
Server-based networking really is a big deal, and this 1000lain-English guide helps you make the most of it. You’ll find out about Windows Server 2008’s important functions, capabilities and requirements; develop a network implementation plan; take a step-by-step walkthrough of the installation process; and get valuable tips on how to boost your bandwidth beyond belief! Before you know it, you’ll be configuring connections to the Universe, working with active directory, and treating domains and controllers like old pals. Discover how to:
Build and connect your network
Install and configure Windows Server 2008
Set up and manage directory services
Manage users and groups
Install and manage print servers
Secure your network
Troubleshoot active networks
Plan for installing Active Directory
Proclaim and manage your own domain
Resolve names between TCP/IP and NetBIOS
Manage shares, permissions, and more
Develop and implement a regular backup protocol
Windows Server 2008 For Dummies may be easy-going, but it’s simply packed with need-to-know stuff that will send you diving into Windows Server 2008 experience just for the fun of it. So start now!

Mastering SQL Server 2000 Security (Gearhead Press--In the Trenches)








Mastering SQL Server 2000 Security (Gearhead Press--In the Trenches)

Learn how to protect corporate information by properly designing, managing, and maintaining security at the database level


Security is a primary concern in all aspects of development and IT administration. While locking down networks and erecting firewalls will always be necessary, so much more can be done to protect a corporation's most valuable intangible assets: accounting records, customer lists, and inventories. Microsoft SQL Server 2000 has proven itself to be the fastest and most reliable product available for protecting corporate data. No other book covers as thoroughly the subject of security design and implementation strategies; Mastering SQL Server 2000 Security fills that gap in literature with practical, hands-on advice.
Packed with indispensable design information that can make a tightly secured database faster and easier to use, this book is essential reading for both administrators and developers of databases. The authors explain just how much more is possible in the task of protecting corporate information by properly designing, managing, and maintaining security at the database level.From this book you will:
Learn the ins and outs of SQL Server 2000 Security design
Understand the implementation differences between SQL Server Authentication and Windows Authentication
Understand the security options in SQL Server 2000 for Internet applications
Integrate the security of Windows 2000 (Kerberos) into your SQL Server deployment
Master the security requirements for distributed data environments, such as DTS, replication, linked servers, and data warehousing

Microsoft Exchange Server 2007 Unleashed












Microsoft Exchange Server 2007 Unleashed


This is the ultimate guide to the design, migration, implementation, administration, management, and support of an Exchange Server 2007 environment. The recommendations, tips, and tricks covered are based on more than two years of early adopter implementations of Exchange 2007. The authors highlight the features and functions that organizations both large and small have found to be the important components in Exchange 2007, including the new Outlook Web Access mail, functions that better support mobile devices, server-to-server mailbox replication for better data recovery, and integrated voicemail unified messaging.

Rand H. Morimoto, Ph.D., MCSE has been in the computer industry for more than 25 years and is the president of Convergent Computing, an IT-consulting firm in the San Francisco Bay area that was one of the key early adopter program partners with Microsoft on Exchange 2007. Dr. Morimoto has written a best-selling book on Microsoft Exchange for every version over the past 12 years.

Michael Noel, MCSE, MVP has authored or coauthored more than a dozen Sams Publishing “Unleashed” books, and is currently a principal consultant with Convergent Computing.

Andrew Abbate, MCSE is a fourteen-year veteran of consulting and is a senior consultant at Convergent Computing, where he continues to consult with both large and small clients to help improve their IT practices.

Chris Amaris, MCSE, CISSP is the Chief Technology Officer and cofounder of Convergent Computing. He has more than twenty years experience consulting for Fortune 500 companies, leading companies in the selection, design, planning, and implementation of complex IT projects.

Mark Weinhardt, MCSE has worked in various aspects of the computing industry for more than 20 years, has been a consultant with Convergent Computing for more than eleven years, and has performed enterprise class Windows and Exchange implementations and migrations.

Detailed information on how to…

  • Plan your implementation and migration to Exchange 2007
  • Confirm that your architecture of Exchange 2007 meets best practices
  • Build a lab environment to test that your migration, implementation, and support processes are valid
  • Implement Cluster Continuous Replication for effective disaster recovery of a failed Exchange server or site
  • Integrate Exchange 2007 Unified Messaging into an existing telephony environment
  • Optimize Exchange 2007 for a scalable enterprise environment
  • Administer and support Exchange on an ongoing basis

Red Hat Fedora Core 6 Unleashed












Red Hat Fedora Core 6 Unleashed


Red Hat® Fedora™ Core 6 Unleashed presents comprehensive coverage of Fedora Core 6, the popular Linux distribution developed by the Red Hat-sponsored Fedora Project.

This book provides detailed information on installing, using, and administering Fedora. You’ll learn how to set up a desktop workstation or a high-powered server, and you’ll find complete details on Yum, Fedora’s easy-to-use desktop and productivity software.

Red Hat® Fedora™ Core 6 Unleashed covers a wide range of topics from using the software you need every day for work, such as the OpenOffice.org productivity suite and the Firefox web browser, to configuring your Linux desktop to run smoothly using multiple printers, shell scripts, and more.

For the hardcore Linux enthusiast, there is complete coverage of the X Window system, Linux programming (including Mono), web server administration, and network administration.

  • Install and configure Red Hat’s Fedora Core 6 Linux distribution
  • Manage Linux services and users
  • Run a printer server with CUPS
  • Connect to a local network and the Internet
  • Set up and administer a web server with Apache
  • Secure your machine and your network from intruders
  • Rebuild and install a new Linux kernel
  • Learn shell scripting
  • Run other operating systems on Fedora with Xen
  • Share files with Windows users using Samba
  • Get productive with OpenOffice.org
  • Play games on Linux
  • Use Linux multimedia programs
  • Use a database with Fedora
  • Set up a firewall
  • Watch television on your computer
  • Set up a DNS server

Chitika

Chitika list ads

Mobile Ads