Human Readable Messages

Human Readable Messages
Author :
Publisher :
Total Pages : 328
Release :
ISBN-10 : 3950291091
ISBN-13 : 9783950291094
Rating : 4/5 (91 Downloads)

Synopsis Human Readable Messages by : Mez Breeze

Mez does for code poetry as jodi and Vuk Cosic have done for ASCII Art: Turning a great, but naively executed concept into something brilliant, paving the ground for a whole generation of digital artists." (Florian Cramer).

Netprov

Netprov
Author :
Publisher : Amherst College Press
Total Pages : 253
Release :
ISBN-10 : 9781943208296
ISBN-13 : 1943208298
Rating : 4/5 (96 Downloads)

Synopsis Netprov by : Rob Wittig

Netprov is an emerging interdisciplinary digital art form that offers a literature-based “show” of insightful, healing satire that is as deep as the novels of the past. This accessible history of Netprov emerges out of an ongoing conversation about the changing roles and power dynamics of author and reader in an age of real-time interactivity. Rob Wittig describes a literary genre in which all the world is a platform and all participants are players. Beyond serving as a history of the genre, this book includes tips and examples to help those new to the genre teach and create netprovs. “Jargon-free and ambitious in scope, Netprov meets the needs of several types of readers. Casual readers will be met with straightforward and easy-to-follow definitions and examples. Scholars will find deep wells of in- formation about networked roleplay games. Teachers and students will find instructions for how-to play, and a ready-made academic context to make their play meaningful and memorable.” —Kathi Inman Berens, Portland State University

JXTA

JXTA
Author :
Publisher : Sams Publishing
Total Pages : 436
Release :
ISBN-10 : 0672323664
ISBN-13 : 9780672323669
Rating : 4/5 (64 Downloads)

Synopsis JXTA by : Daniel Brookshier

JXTA: Java P2P Programming provides an invaluable introduction to this new technology, filled with useful information and practical examples. It was created by members of the JXTA community, sharing their real-world experience to introduce developers to JXTA. It starts with the fundamentals of P2P and demonstrates how JXTA fulfills the P2P promise, then covers the essentials of JXTA including the protocols, the JXTA Shell, and groups. Later chapters include case studies demonstrating JXTA to synchronize data and to create distributed applications. Includes a foreward by Juan Carlos Soto, Group Marketing Manager for Project JXTA at Sun Microsystems and the jxta.org Open Source Community Manager.

Schematron

Schematron
Author :
Publisher : XML Press
Total Pages : 253
Release :
ISBN-10 : 9781937434816
ISBN-13 : 1937434818
Rating : 4/5 (16 Downloads)

Synopsis Schematron by : Erik Siegel

Schematron is a validation language that checks XML documents against business rules. It extends the validation provided by languages such as Document Type Definitions (DTD), W3C XML Schema, and RELAX NG, giving you the ability to check your XML documents for compliance with rules that can be difficult, if not impossible, to check with the other validation languages. Schematron: A language for validating XML is aimed at programmers and others who process XML. It explains the language in detail along with many examples. Anyone who uses Schematron or who would like to begin using it will find a wealth of information in this book.

Snort For Dummies

Snort For Dummies
Author :
Publisher : John Wiley & Sons
Total Pages : 386
Release :
ISBN-10 : 9780764576898
ISBN-13 : 0764576895
Rating : 4/5 (98 Downloads)

Synopsis Snort For Dummies by : Charlie Scott

Snort is the world's most widely deployed open source intrusion-detection system, with more than 500,000 downloads-a package that can perform protocol analysis, handle content searching and matching, and detect a variety of attacks and probes Drawing on years of security experience and multiple Snort implementations, the authors guide readers through installation, configuration, and management of Snort in a busy operations environment No experience with intrusion detection systems (IDS) required Shows network administrators how to plan an IDS implementation, identify how Snort fits into a security management environment, deploy Snort on Linux and Windows systems, understand and create Snort detection rules, generate reports with ACID and other tools, and discover the nature and source of attacks in real time CD-ROM includes Snort, ACID, and a variety of management tools

Web Security, Privacy & Commerce

Web Security, Privacy & Commerce
Author :
Publisher : "O'Reilly Media, Inc."
Total Pages : 786
Release :
ISBN-10 : 9780596000455
ISBN-13 : 0596000456
Rating : 4/5 (55 Downloads)

Synopsis Web Security, Privacy & Commerce by : Simson Garfinkel

"Web Security, Privacy & Commerce" cuts through the hype and the front page stories. It tells readers what the real risks are and explains how to minimize them. Whether a casual (but concerned) Web surfer or a system administrator responsible for the security of a critical Web server, this book will tells users what they need to know.

Object Design

Object Design
Author :
Publisher : Addison-Wesley Professional
Total Pages : 420
Release :
ISBN-10 : 0201379430
ISBN-13 : 9780201379433
Rating : 4/5 (30 Downloads)

Synopsis Object Design by : Rebecca Wirfs-Brock

Object technology pioneer Wirfs-Brock teams with expert McKean to present a thoroughly updated, modern, and proven method for the design of software. The book is packed with practical design techniques that enable the practitioner to get the job done.

Evaluation and Decision Models with Multiple Criteria

Evaluation and Decision Models with Multiple Criteria
Author :
Publisher : Springer
Total Pages : 648
Release :
ISBN-10 : 9783662468166
ISBN-13 : 3662468166
Rating : 4/5 (66 Downloads)

Synopsis Evaluation and Decision Models with Multiple Criteria by : Raymond Bisdorff

This book showcases a large variety of multiple criteria decision applications (MCDAs), presenting them in a coherent framework provided by the methodology chapters and the comments accompanying each case study. The chapters describing MCDAs invite the reader to experiment with MCDA methods and perhaps develop new variants using data from these case studies or other cases they encounter, equipping them with a broader perception of real-world problems and how to overcome them with the help of MCDAs.

Practical UNIX and Internet Security

Practical UNIX and Internet Security
Author :
Publisher : "O'Reilly Media, Inc."
Total Pages : 989
Release :
ISBN-10 : 9781449310127
ISBN-13 : 1449310125
Rating : 4/5 (27 Downloads)

Synopsis Practical UNIX and Internet Security by : Simson Garfinkel

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.

XMPP: The Definitive Guide

XMPP: The Definitive Guide
Author :
Publisher : "O'Reilly Media, Inc."
Total Pages : 308
Release :
ISBN-10 : 9780596555597
ISBN-13 : 0596555598
Rating : 4/5 (97 Downloads)

Synopsis XMPP: The Definitive Guide by : Peter Saint-Andre

This practical book provides everything you need to know about the Extensible Messaging and Presence Protocol (XMPP). This open technology for real-time communication is used in many diverse applications such as instant messaging, Voice over IP, real-time collaboration, social networking, microblogging, lightweight middleware, cloud computing, and more. XMPP: The Definitive Guide walks you through the thought processes and design decisions involved in building a complete XMPP-enabled application, and adding real-time interfaces to existing applications. You'll not only learn simple yet powerful XMPP tools, but you'll also discover, through real-world developer stories, how common XMPP "building blocks" can help solve particular classes of problems. With this book, you will: Learn the basics of XMPP technologies, including architectural issues, addressing, and communication primitives Understand the terminology of XMPP and learn about the wealth of XMPP servers, clients, and code libraries Become familiar with the XMPP concepts and services you need to solve common problems Construct a complete business application or real-time service with XMPP Every day, more software developers and service providers are using XMPP for real-time applications, and with the help of XMPP: The Definitive Guide, you can, too.