Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.
"Youll be amazed when you first see a Web server running on a computer thats little bigger than a stick of chewing gum." --From the Foreword by Tom Cargill
TINI™ (Tiny InterNet Interface) technology is the compact and powerful solution for connecting a wide variety of hardware devices directly to corporate and home...
The amount of built-in functionality included in the .NET Framework is amazing. One could create complex applications with lots of functionality by simply assembling the pieces you're offered for free. Among those pieces you'll find lots of powerful, flexible, and configurable controls. Who would ever need to build their own controls, right? ...
Fuzzy Databases: Modeling, Design and Implementation focuses on some semantic aspects which have not been studied in previous works and extends the EER model with fuzzy capabilities. The exposed model is called FuzzyEER model, and some of the studied extensions are: fuzzy attributes, fuzzy aggregations and different aspects on specializations, such...
J2EE has become required knowledge for any serious Java developer, but learning this large and complex specification requires a substantial investment of time and energy. Sams Teach Yourself J2EE in 21 Days presents the enterprise Java architecture in accessible, easy-to-comprehend lessons, describing how each J2EE tool solves the challenges of...
The Multimedia Messaging Service (MMS) is regarded as the best-of-the breed of proven messaging technologies, surpassing SMS and electronic mail to offer a truly multimedia experience to mobile users. The first commercial solutions appeared on the market in 2002 and the penetration rate of MMS is now quickly approaching the required level for...
Pro SQL Server 2005 Database Design and Optimization will teach you effective strategies for designing proper databases. It covers everything from how to gather business requirements to logical data modeling and normalization. It then shows you how to implement your design on SQL Server 2005.
See how you can use C# to write Windows applications and much more!
Interested in the exciting possibilities of programming with C#? Well, look sharp! Even if you've never programmed before, you'll see how C# allows you to write code using the Visual Studio® 2005 interface. From...
Hit the ground running with the street-smart training you'll find in this practical book. Using a "year in the life" approach, it gives you an inside look at network administration, with key information organized around the actual day-to-day tasks, scenarios, and challenges...
A practical, programming-centered approach to component-based software development
Component-oriented programming (COP) is rapidly becoming a mainstream programming paradigm, offering higher reusability and better modular structure with greater flexibility than object-oriented or library-based programming approaches. Component-Oriented...