Browse Results

Showing 82,876 through 82,900 of 83,312 results

Windows to Linux Migration Toolkit: Your Windows to Linux Extreme Makeover

by David Allen

This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals who wish to maximize the value of their Windows to Linux migration services will find this book valuable. The book will help them fine-tune their migration services to make them more efficient, thorough, feature-enhanced, and cost-effective by utilizing migration scripts and best practices gleaned from the author's many years of real-world migrations in large and small companies.* The book and fully functioning scripts on the CD-ROM work for migrations from Windows NT or Windows 2000 to any Linux distribution. * David Allen has done over 25,000 user migrations from Windows to Linux. * Microsoft will stop supporting Windows NT in December 2004 forcing over 2 million enterprise customers to migrate from Windows NT to a new sever operating system. Both IBM and Dell are offering enterprise servers running Linux which will allow customers to realize a 50% reduction in TCO. In 2003 Linux servers represented the largest growth segment in the Server market, and all the major research groups indicate this trend will continue through t least 2007.

Windows 2000 Server System Administration Handbook

by Syngress

Many organizations and network administrators are looking for information on Windows 2000 and its new features. IT professionals responsible for installing, configuring, and managing Microsoft products will be highly motivated to migrate to this new technology, based on its promise of reducing administrative overhead.Windows 2000 Server System Administration Handbook will help NT4 professionals to administer and support the Windows 2000 Server operating system. NT administrators will be able to differentiate the features and technology changes from Windows NT 4.0 to Windows 2000. In the handbook, readers will find a complete overview of the product, catered to their needs. * This book coincides with the launch of Windows 2000 Server, the host system for the product.* Includes the following:* Detailed coverage of Active Directory, Microsoft Management Console, and new Windows 2000 hardware support * Implementing new Windows 2000 security options* Upgrading a network to Windows 2000

Windows 2000 Active Directory

by Syngress

Updated coverage of the most confusing Windows 2000 component in this new edition of a Syngress bestseller.Active Directory Services dramatically changes the way IT professionals design, plan, configure and administer their Windows NT networks. The primary benefits of Active Directory Services are its extensibility, scalability, and ease of management as compared to prior generations of Windows NT. Systems Engineers will probably spend much of their time over the next several years planning for and deploying Active Directory Services in many different environments. Windows 2000 Active Directory, Second Edition gives IT professionals a head start; it provides updated coverage of everything they will need to succeed.Many Windows 2000 administrators are struggling with Active Directory and need a comprehensive book on the subjectThe first completely updated book on Active Directory to hit the market

Why Programs Fail: A Guide to Systematic Debugging

by Andreas Zeller

Why Programs Fail is about bugs in computer programs, how to find them, how to reproduce them, and how to fix them in such a way that they do not occur anymore. This is the first comprehensive book on systematic debugging and covers a wide range of tools and techniques ranging from hands-on observation to fully automated diagnoses, and includes instructions for building automated debuggers. This discussion is built upon a solid theory of how failures occur, rather than relying on seat-of-the-pants techniques, which are of little help with large software systems or to those learning to program. The author, Andreas Zeller, is well known in the programming community for creating the GNU Data Display Debugger (DDD), a tool that visualizes the data structures of a program while it is running.Winner of a 2006 Jolt Productivity Award for Technical BooksShows how to reproduce software failures faithfully, how to isolate what is important about the failure, and to discover what caused itDescribes how to fix the program in the best possible way, and shows how to create your own automated debugging toolsIncludes exercises and extensive references for further study

Webmasters Guide To The Wireless Internet

by Syngress

The wireless Web is a reality - don't get left behind!The wireless Web is not a future dream. It is here today. Already, more than 20 million people have access the Internet through PDAs, mobile phones, pagers and other wireless devices. What will people find on the Wireless Internet? This is the question that every Webmaster and Web developer is being challenged to answer. The Webmaster's Guide to the Wireless Internet provides the Wireless Webmaster with all of the tools necessary to build the next generation Internet. Packed with the essential information they need to design, develop, and secure robust, e-commerce enabled wireless Web sites. This book is written for advanced Webmasters who are experienced with conventional Web site design and are now faced with the challenge of creating sites that fit on the display of a Web enabled phone or PDA.The rapid expansion of wireless devices presents a huge challenge for Webmasters - this book addresses that need for reliable informationThere are lots of books for wireless developers - this is the first designed specifically for Webmasters Looks at security issues in a Wireless environment

Web Application Design Handbook: Best Practices for Web-Based Software (Interactive Technologies)

by Susan Fowler Victor Stanwick

The standards for usability and interaction design for Web sites and software are well known. While not everyone uses those standards, or uses them correctly, there is a large body of knowledge, best practice, and proven results in those fields, and a good education system for teaching professionals "how to." For the newer field of Web application design, however, designers are forced to reuse the old rules on a new platform. This book provides a roadmap that will allow readers to put complete working applications on the Web, display the results of a process that is running elsewhere, and update a database on a remote server using an Internet rather than a network connection. Web Application Design Handbook describes the essential widgets and development tools that will the lead to the right design solutions for your Web application. Written by designers who have made significant contributions to Web-based application design, it delivers a thorough treatment of the subject for many different kinds of applications, and provides quick reference for designers looking for some fast design solutions and opportunities to enhance the Web application experience. This book adds flavor to the standard Web design genre by juxtaposing Web design with programming for the Web and covers design solutions and concepts, such as intelligent generalization, to help software teams successfully switch from one interface to another.* The first interaction design book that focuses exclusively on Web applications.* Full-color figures throughout the book.* Serves as a "cheat sheet" or "fake book" for designers: a handy reference for standards, rules of thumb, and tricks of the trade.* Applicable to new Web-based applications and for porting existing desktop applications to Web browsers.

WarDriving: A Guide to Wireless Security

by Chris Hurley

The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers.* Provides the essential information needed to protect and secure wireless networks* Written from the inside perspective of those who have created the tools for WarDriving and those who gather, maintain and analyse data on wireless networks* This is the first book to deal with the hot topic of WarDriving

VB.Net Web Developer's Guide

by Syngress

Visual Basic has long been the language of choice when designing Windows-based applications and the Web. Touted as both the most popular and productive computing language, Visual Basic has amassed quite a following of devoted programmers, and is a sought after programming skill. With the introduction of .NET Enterprise, Microsoft launch VB.NET, offering a streamlined, simplified version of Visual Basic language. With increased power, scalability, functionality and reliability, VB.NET is positioned to be the most productive tool in a programmer's toolbox. VB.NET Developer's Guide is written for previous Visual Basic Programmers looking to harness the power of the new features and functionality incorporated in Visual Basic.NET.Timely coverage of newly released product which Visual Basic users will be eager to learnVB.NET Developer's Guide is one of the first comprehensive reference for programmers and developers anxious to learn about the new technology

Value Creation from E-Business Models

by Wendy L. Currie

Value Creation from E-Business Models provides a thorough analysis of what constitutes an e-business model. Unlike many e-business books available, this text draws together theoretical and empirical contributions from leading academic scholars in the field of management information systems. Divided into four parts, E-Business Models and Taxonomies; E-Business Markets; E-Business Customer Performance Measurement; and E-Business Vendor Applications and Services, this book is the critical dissection of E-Business that today's academic community needs.* World class academic contributors brought together in one volume * Demonstrates that there are e-business models which create value for customers and vendors alike* Learn from the lessons of the past five years in developing and implementing e-business models

User-Centered Design Stories: Real-World UCD Case Studies (Interactive Technologies)

by Carol Righi Janice James

User-Centered Design Stories is the first user-centered design casebook with cases covering the key tasks and issues facing UCD practitioners today. Intended for both students and practitioners, this book follows the Harvard Case study method, where the reader is placed in the role of the decision-maker in a real-life professional situation. In this book, the reader is asked to analyze dozens of UCD work situations and propose solutions for the problem set. The problems posed in the cases cover a wide variety of key tasks and issues faced by practitioners, including those related to organizational/managerial topics, UCD methods and processes, and technical/ project issues. The benefit of the casebook and its organization is that it offers new practitioners (as well as experienced practitioners working in new settings) valuable practice in decision-making that cannot be obtained by simply reading a book or attending a seminar.The first User-Centered Design Casebook, with cases covering the key tasks and issues facing UCD practitioners today.Each chapter based on real world cases with complex problems, giving readers as close to a real-world experience as possible.Offers "the things you don't learn in school," such as innovative and hybrid solutions that were actually used on the problems discussed.

Troubleshooting Windows 2000 TCP/IP

by Syngress

TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are built on the TPC/IP protocol suite. Understanding how TCP/IP is "supposed" to work is not enough for today's network managers. In this book, readers will learn to prevent, detect, troubleshoot and correct TCP/IP network problems. By using products such as distributed sniffers, field metering tools and protocol analyses, network managers can learn a lot about what is going on in (or wrong in) an internetwork and be able to troubleshoot a live TPC/IP network. This book focuses specifically on identifying problem areas, including identifying and correcting protocol errors, DNS route problems, application faults and slow response times.Syngress have sold over 700,000 Microsoft and Cisco certification guides in the last two years. Most of the administrators buying these will be interested in this book.* TPC/IP is a very popular topic; readers will welcome a guide to troubleshooting and repairing problems* Tackles monitoring the network using protocol analyses* Teaches effective methods of baselining and trend analysis

Strategies for Growth in SMEs: The Role of Information and Information Sytems

by Philip Powell Margi Levy

Strategies for Growth in SMEs explores for the first time the role of information and information systems (IS) concepts in small and medium-sized enterprises (SMEs). Most IS research focuses on large firms, yet the majority of firms in most economies are SMEs. The book considers the applicability of IS theory and practice to SMEs and develops new theories that are relevant to these firms.Composed of 6 sections, it covers, amongst other things; the nature of SMEs, the background to IS, and SMEs' use of IS, issues of IS strategy and planning in SMEs, the way that firms can transform through use of IS, evaluation, IS flexibility, business process re-engineering, resource-based strategy and knowledge management, the appropriateness of existing theories and the development of new models to address SME-specific issues. The final section of the book reviews the learning in the previous chapters and poses future agendas for research.Written by two of the leading figures in the field, this book will be essential reading for researchers in IS and SMEs, students on entrepreneurship or IS courses, and others that focus on SMEs.* A unique text relating IS theory to SMEs* Benefit from the authors' years of experience in the field* Familiarise yourself with this growth area for research and courses

Stealing The Network: How to Own the Box (Cyber-Fiction)

by Syngress

Stealing the Network: How to Own the Box is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accountsA highly provocative expose of advanced security exploitsWritten by some of the most high profile "White Hats", "Black Hats" and "Gray Hats"Gives readers a "first ever" look inside some of the most notorious network intrusions

Stealing the Network: How to Own a Continent (Cyber-Fiction)

by Ryan Russell Joe Grand Tom Craig

This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box"* A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring* An informative and scary insight into the boundries of hacking and cyber-terrorism* Written by a team of the most accomplished cyber-security specialists in the world

SSCP Systems Security Certified Practitioner Study Guide and DVD Training System

by Syngress

The SSCP Study Guide and DVD Training System is a unique and comprehensive combination of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation. These components will give the student 100% coverage of all (ISC)² official exam objectives and realistic exam simulation.The SSCP Study Guide and DVD Training System consists of:1. SSCP Study Guide The 1,000,000 readers who have read previous Syngress Study Guides will find many familiar features in the Study Guide along with many new enhancements including:· Exercises: There will be frequent use of step-by-step exercises with many screen captures and line drawings. Exercises will be presented in sidebar-like style, and will run 1 to 2 pages. · Anatomy of a Question: Question types will be diagrammed and analyzed to give readers access to the theory behind the questions themselves.· Teacher's Pet: These will be written from the instructor's perspective and will provide insight into the teaching methodologies applied to certain objectives that will give readers the "$2,000 worth of training in a $60 book feel." These will be presented in sidebar-like style and will run about 1 page.· Objectives Fast Track: End of chapter element containing each A-head from the chapter and succinct bullet points reviewing most important information from each section (same as current Solutions Fast Track). · FAQs: End of Chapter Frequently Asked Questions on objective content. These are not exam preparation questions (same as our current FAQ). · Test What You Learned: End of chapter exam preparation questions, which are in the format of the real exam.2. SSCP DVD: The DVD will contain 1 hour of instructor-led training covering the most difficult to comprehend topics on the exam. The instructor's presentation will also include on-screen configurations and networking schematics.SSCP from solutions@syngress.com The accompanying Web site will provide students with realistic exam-simulations software. The exam will emulate the content and the look and feel of the real-exam. Students will be able to grade their performance on the Web-based exam and automatically link to the accompanying e-book for further review of difficult conceptsØ $2,000 worth of training in a $60 book, DVD, and Web-enhanced training system. Consumers of this product will receive an unprecedented value. Instructor-led training for similar certifications averages $2,000 per class, and retail DVD training products are priced from $69 to $129. Consumers are accustomed to paying 20% to 100% more than the cost of this training system for only the DVD!Ø Changes to the CISSP Certification pre-requisites will result in an increase in the popularity of the SSCP certification. Recently the (ISC)² increased the work experience requirement of the CISSP certification to four years from three years. This increase will result into current candidates for the CISSP to shift to the SSCP certification, as the verifiable field requirement is only one year.Ø Syngress well-positioned in wide open playing field. The landscape of certification publishing has changed dramatically over the past month with Coriolis ceasing operations, Hungry Minds facing an uncertain future after their acquisition by John Wiley & Sons, and Syngress ending its long-term relationship with Osborne McGraw Hill in pursuit of publishing Study Guides independently. We are confident that Syngress' long history of best-selling Study Guides will continue in this new era.

Special Ops: Host and Network Security for Microsoft Unix and Oracle

by Syngress

Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the "bad guys," but what has been done on the inside? This book attacks the problem of the soft, chewy center in internal networks. We use a two-pronged approach-Tactical and Strategic-to give readers a complete guide to internal penetration testing. Content includes the newest vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies to bring it all together. We have scoured the Internet and assembled some of the best to function as Technical Specialists and Strategic Specialists. This creates a diversified project removing restrictive corporate boundaries. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will be written using the same concepts behind software development. Chapters will be treated like functions within programming code, allowing the authors to call on each other's data. These functions will supplement the methodology when specific technologies are examined thus reducing the common redundancies found in other security books.This book is designed to be the "one-stop shop" for security engineers who want all their information in one place. The technical nature of this may be too much for middle management; however technical managers can use the book to help them understand the challenges faced by the engineers who support their businesses.Ø Unprecedented Team of Security Luminaries. Led by Foundstone Principal Consultant, Erik Pace Birkholz, each of the contributing authors on this book is a recognized superstar in their respective fields. All are highly visible speakers and consultants and their frequent presentations at major industry events such as the Black Hat Briefings and the 29th Annual Computer Security Institute Show in November, 2002 will provide this book with a high-profile launch.Ø The only all-encompassing book on internal network security. Windows 2000, Windows XP, Solaris, Linux and Cisco IOS and their applications are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Special Ops. This book's unique style will give the reader the value of 10 books in 1.

Snort Intrusion Detection 2.0

by Syngress

The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is written by a member of Snort.org. The book provides a valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds.The most up-to-date and comprehensive coverage for Snort 2.0!Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System.

Snort 2.1 Intrusion Detection, Second Edition

by Brian Caswell Jay Beale

Called "the leader in the Snort IDS book arms race" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities.Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0). Readers will be given invaluable insight into the code base of Snort, and in depth tutorials of complex installation, configuration, and troubleshooting scenarios. Snort has three primary uses: as a straight packet sniffer, a packet logger, or as a full-blown network intrusion detection system. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes. Snort uses a flexible rules language to describe traffic that it should collect or pass, a detection engine that utilizes a modular plug-in architecture, and a real-time alerting capability. A CD containing the latest version of Snort as well as other up-to-date Open Source security utilities will accompany the book.Snort is a powerful Network Intrusion Detection System that can provide enterprise wide sensors to protect your computer assets from both internal and external attack.* Completly updated and comprehensive coverage of snort 2.1* Includes free CD with all the latest popular plug-ins* Provides step-by-step instruction for installing, configuring and troubleshooting

Sniffer Pro Network Optimization & Troubleshooting Handbook

by Syngress

Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely used Sniffer Product - Sniffer Pro LAN Network Analyzer. This book begins with the basic features of Sniffer Pro LAN and then moves the reader through the impressive tips and tools available for gathering data, analyzing, troubleshooting, resolving and securing problems on their network. Sniffer from Network Associates is a suite of tools including Sniffer Portable Analysis Suite, Sniffer Distributed Analysis Suite, Sniffer Reporting, Sniffer Optical, and Sniffer Wireless. With a clear market leadership, Sniffer Solutions are employed in over 80% of the enterprise networks of the Fortune 100. Sniffer has also received wide industry acclaim from the experts and its everyday users. In 2000 Sniffer was named one of the 10 most computer products of the decade by Network Computing Magazine. It also received the "Editor's Choice" award from PC Magazine during the second quarter of 2001. Over 60,000 individuals have taken advantage of the educational services offered by Sniffer Technologies - aptly named Sniffer University. Coupled with the introduction of the Sniffer Certified Professional Program (SCPP) as a replacement for the popular CNX (Certified Network Expert) certification, an aptitude with Sniffer Solutions is a "must-have" for system administrators.Offers comprehensive coverage of Sniffer Pro LANSupplemental study materials for the SCPP certification track. As of April 2001, the CNX certifications track became inactive. Current CNXs looking to update their certifications to the new SCPP track are going to need to bring themselves up to speed on the new offerings from the Sniffer family of products before desertificationUp to the Minute Web-based Support. Once the reader understands the concepts of network hardware, configuration, and implementation, they can receive up-to-the minute links, white papers, and analysis for one year at solutions@syngress.com

Security Sage's Guide to Hardening the Network Infrastructure

by Steven Andres Brian Kenyon Erik Pack Birkholz

This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures* It offers unique coverage of network design so administrators understand how they should design and protect their enterprises* Helps provide real practical solutions and not just background theory

Security Assessment: Case Studies for Implementing the NSA IAM

by Syngress

The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. Security Assessment shows how to do a complete security assessment based on the NSA's guidelines. Security Assessment also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc). Security Assessment is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.Everything You Need to Know to Conduct a Security Audit of Your OrganizationStep-by-Step Instructions for Implementing the National Security Agency's GuidelinesSpecial Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more

Security + Study Guide and DVD Training System

by Syngress

Why has CompTIA (the high-profile Computer Technology Industry Association behind the wildly popular A+ and Network+ certifications) targeted security for its latest credential? Thanks to soaring e-business initiatives and worldwide Internet connectivity, recent survey stats from the Computer Security Institute (CSI) show we need more network security specialists-fast! Boasting a one-of-a-kind integration of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation, Security+ Study Guide & DVD Training System gives students 100% coverage of official CompTIA Security+ exam objectives plus realistic test prep. Security+ is sure to become an instant industry standard. Leading cert industry publications and Web portals forecast the rapid rise of security certifications in 2003, and CompTIA's growth curve of A+ and Network+ technicians suggests that Security+ certified engineers could easily number 100,000 by the end of next yearThe first Security+ study resource to market, Security+ Study Guide & DVD Training System bundles all 3 of these teaching technologies to give Security+ candidates the edge they need to pass this career-boosting new exam-and achieve certification-on their very first try.Syngress has become a leader in IT certification-blending innovative teaching methodologies with such groundbreaking tools as exam simulators, instructor-led DVDs, and integrated Web-based support.

Scene of the Cybercrime: Computer Forensics Handbook

by Syngress

"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of EuropeCrime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime.62% of US companies reported computer-related security breaches resulting in damages of $124 million dollars. This data is an indication of the massive need for Cybercrime training within the IT and law enforcement communities.The only book that covers Cybercrime from forensic investigation through prosecution. Cybercrime is one of the battlefields in the war against terror.

Ruby Developers Guide

by Syngress

An expert guide to Ruby, a popular new Object-Oriented Programming LanguageRuby is quickly becoming a favourite among developers who need a simple, straight forward, portable programming language. Ruby is ideal for quick and easy object-oriented programming such as processing text files or performing system management. Having been compared with other programming languages such as Perl, Python, PCL, Java, Eiffel, and C++; Ruby is popular because of its straight forward syntax and transparent semantics.Using step-by-step examples and real world applications, the Ruby Developer's Guide is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. Readers will learn how to develop, implement, organize and deploy applications using Ruby.Ruby is currently experiencing a rapid rise in popularity in the object-oriented programming communityReaders receive up-to-the minute links, white papers, and analysis for two years at solutions@syngress.comComes with a wallet-sized CD containing a printable HTML version of the book, all of the source code examples and demos of popular Ruby third-party programming tools and applications

Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks

by Syngress

Rick Gallahers MPLS Training Guide introduces readers to mpls concepts, installation, migration, operation, inspection, and troubleshooting. It discusses specific router and switch platforms and includes such topics as frame-mode mpls, cell-mode mpls, label distribution protocol, tag distribution protocol, label distribution protocol migration, mpls configuration, traffic engineering, mpls vpns, mpls vpn deployment models, mpls vpn routing protocol support, multi-protocol bgp, mpls vpn configurations, mpls vpn integration, and mpls vpn management.Readers will find complete ready-to-use configurations for routersShows how to implement MPLS traffic engineering on a core network and optimize trafficGreat for users studying for Cisco's Implementing Cisco MPLS exam, 640-910 and written by a Cisco internetworking expert who knows everything about MPLSIncludes coverage of Cisco Systems' newly released (October 7, 2002) Multiprotocol Label Switching (MPLS)Bandwidth Protection software package. The new architecture uses MPLS Traffic Engineering Fast Reroute and an offline application called Tunnel Builder Pro to increase resiliency at a network-wide levelIncludes updated coverage of MPLS and GMPLS

Refine Search

Showing 82,876 through 82,900 of 83,312 results