Web Site Measurement Hacks
In order to establish and then maintain a successful presence on the Web, designing a creative site is only half the battle. What good is an intricate Web infrastructure if you're unable to measure its effectiveness? That's why every business is desperate for feedback on their site's visitors: Who are they? Why do they visit? What information or service is most valuable to them? Unfortunately, most common Web analytics software applications are long on functionality and short on documentation. Without clear guidance on how these applications should be integrated into the greater Web strategy, these often expensive investments go underused and underappreciated. Enter Web Site Measurement Hacks, a guidebook that helps you understand your Web site visitors and how they contribute to your business's success. It helps organizations and individual operators alike make the most of their Web investment by providing tools, techniques, and strategies for measuring--and then improving--their site's usability, performance, and design. Among the many topics covered, you'll learn: definitions of commonly used terms, such as "key performance indicators" (KPIs) how to drive potential customers to action how to gather crucial marketing and customer data which features are useful and which are superfluous advanced techniques that senior Web site analysts use on a daily basis By examining how real-world companies use analytics to their success, Web Site Measurement Hacks demonstrates how you, too, can accurately measure your Web site's overall effectiveness. Just as importantly, it bridges the gulf between the technical teams charged with maintaining your Web's infrastructure and the business teams charged with making management decisions. It's the technology companion that every site administrator needs.
Voip For Dummies
Put your phone system on your computer network and see the savings See how to get started with VoIP, how it works, and why it saves you money VoIP is techspeak for "voice over Internet protocol," but it could spell "saving big bucks" for your business! Here's where to get the scoop in plain English. Find out how VoIP can save you money, how voice communication travels online, and how to choose the best way to integrate your phone system with your network at home or at the office. Discover how to: Use VoIP for your business or home phone service Choose the best network type Set up VoIP on a wireless network Understand transports and services Demonstrate VoIP's advantages to management
Switching to VoIP
More and more businesses today have their receive phone service through Internet instead of local phone company lines. Many businesses are also using their internal local and wide-area network infrastructure to replace legacy enterprise telephone networks. This migration to a single network carrying voice and data is called convergence, and it's revolutionizing the world of telecommunications by slashing costs and empowering users. The technology of families driving this convergence is called VoIP, or Voice over IP. VoIP has advanced Internet-based telephony to a viable solution, piquing the interest of companies small and large. The primary reason for migrating to VoIP is cost, as it equalizes the costs of long distance calls, local calls, and e-mails to fractions of a penny per use. But the real enterprise turn-on is how VoIP empowers businesses to mold and customize telecom and datacom solutions using a single, cohesive networking platform. These business drivers are so compelling that legacy telephony is going the way of the dinosaur, yielding to Voice over IP as the dominant enterprise communications paradigm. Developed from real-world experience by a senior developer, O'Reilly's Switching to VoIP provides solutions for the most common VoIP migration challenges. So if you're a network professional who is migrating from a traditional telephony system to a modern, feature-rich network, this book is a must-have. You'll discover the strengths and weaknesses of circuit-switched and packet-switched networks, how VoIP systems impact network infrastructure, as well as solutions for common challenges involved with IP voice migrations. Among the challenges discussed and projects presented: building a softPBX configuring IP phones ensuring quality of service scalability standards-compliance topological considerations coordinating a complete system ?switchover? migrating applications like voicemail and directory services retro-interfacing to traditional telephony supporting mobile users security and survivability dealing with the challenges of NAT To help you grasp the core principles at work, Switching to VoIP uses a combination of strategy and hands-on "how-to" that introduce VoIP routers and media gateways, various makes of IP telephone equipment, legacy analog phones, IPTables and Linux firewalls, and the Asterisk open source PBX software by Digium. You'll learn how to build an IP-based or legacy-compatible phone system and voicemail system complete with e-mail integration while becoming familiar with VoIP protocols and devices. Switching to VoIP remains vendor-neutral and advocates standards, not brands. Some of the standards explored include: SIP H.323, SCCP, and IAX Voice codecs 802.3af Type of Service, IP precedence, DiffServ, and RSVP 802.1a/b/g WLAN If VoIP has your attention, like so many others, then Switching to VoIP will help you build your own system, install it, and begin making calls. It's the only thing left between you and a modern telecom network.
Active Directory Field Guide
The Active Directory Field Guide contains descriptions of higher-level skills, tasks and tools--such as migration, large-scale deployment, security, and disaster recovery--that will help administrators save time and increase the efficiency of their network. Written by a Microsoft MVP, this book will serve as the indispensable reference guide for anyone working with Active Directory.
Mapping Hacks
Since the dawn of creation, man has designed maps to help identify the space that we occupy. From Lewis and Clark's pencil-sketched maps of mountain trails to Jacques Cousteau's sophisticated charts of the ocean floor, creating maps of the utmost precision has been a constant pursuit. So why should things change now? Well, they shouldn't. The reality is that map creation, or "cartography," has only improved in its ease-of-use over time. In fact, with the recent explosion of inexpensive computing and the growing availability of public mapping data, mapmaking today extends all the way to the ordinary PC user. Mapping Hacks, the latest page-turner from O'Reilly Press, tackles this notion head on. It's a collection of one hundred simple--and mostly free--techniques available to developers and power users who want draw digital maps or otherwise visualize geographic data. Authors Schuyler Erle, Rich Gibson, and Jo Walsh do more than just illuminate the basic concepts of location and cartography, they walk you through the process one step at a time. Mapping Hacks shows you where to find the best sources of geographic data, and then how to integrate that data into your own map. But that's just an appetizer. This comprehensive resource also shows you how to interpret and manipulate unwieldy cartography data, as well as how to incorporate personal photo galleries into your maps. It even provides practical uses for GPS (Global Positioning System) devices--those touch-of-a-button street maps integrated into cars and mobile phones. Just imagine: If Captain Kidd had this technology, we'd all know where to find his buried treasure! With all of these industrial-strength tips and tools, Mapping Hacks effectively takes the sting out of the digital mapmaking and navigational process. Now you can create your own maps for business, pleasure, or entertainment--without ever having to sharpen a single pencil.
The Anarchist In The Library
From Napster to Total Information Awareness to flash mobs, the debate over information technology in our lives has revolved around a single question: How closely do we want cyberspace to resemble the real world? Siva Vaidhyanathan enters this debate with a seminal insight: While we've been busy debating how to make cyberspace imitate the world, the world has been busy imitating cyberspace. More and more of our social, political, and religious activities are modeling themselves after the World Wide Web.Vaidhyanathan tells us the key information structure of our time, and the key import from cyberspace into the world, is the "peer-to-peer network." Peer-to-peer networks have always existed -- but with the rise of electronic communication, they are suddenly coming into their own. And they are drawing the outlines of a battle for information that will determine much of the culture and politics of our century, affecting everything from society to terrorism, from religion to the latest social fads. The Anarchist in the Library is a radically original look at how this battle defines one of the major fault lines of twenty-first-century civilization.
Web Designer’s Reference
Web Designer's Reference provides an intriguing, comprehensive reference for Web design, using XHTML, CSS, and presentation-oriented JavaScript. This book is divided primarily in two sections: the Tutorial section, which includes Modular discussion and tutorial-based chapters; and the Reference section, which features essential reference guides to XHTML and CSS.
The Art of Deception
Beim Schutz von Unternehmenswerten geht die gr繹?te Gefahr von den Mitarbeitern des Unternehmens selbst aus. Obwohl die meisten Unternehmen die neuesten Sicherheitssysteme installieren, ignorieren sie doch meist die Gefahr aus den eigenen Reihen. "The Art of Deception" ist das erste Buch, das sich ausschlie?lich auf "Social Engineering", d.h., den menschlichen Faktor im Rahmen der Sicherheit konzentriert. Hierbei geht es darum, durch Ausnutzen menschlicher Schw瓣chen, jene Informationen (z.B. Passw繹rter) zu erhalten, die Unbefugten den Zugang zu (sensiblen) Systemen und Daten erleichtern. Autor Kevin Mitnick vermittelt hier seine Insidererfahrungen und erl瓣utert die Techniken, mit deren Hilfe sich auch die st瓣rksten Sicherheitsbarrieren 羹berwinden lassen. Mitnick ist einer der angesehensten Experten auf dem Gebiet des Sicherheitsbetrugs. Er ist bei Hackern ebenso bekannt wie bei Sicherheitsprofis. Coautor William Simon ist ein Bestsellerautor, der bereits 羹ber 20 B羹cher ver繹ffentlicht hat; er wurde u.a. mit dem Global Business Book Award ausgezeichnet. "The Art of Deception" - die ultimative Lekt羹re im Zeitalter des Cyberterrorismus.
Origins Of The Crash
With his singular gift for turning complex financial events into eminently readable stories, Roger Lowenstein lays bare the labyrinthine events of the manic and tumultuous 1990s. In an enthralling narrative, he ties together all of the characters of the dot-com bubble and offers a unique portrait of the culture of the era. Just as John Kenneth Galbraith's The Great Crash was a defining text of the Great Depression, Lowenstein's Origins of the Crash is destined to be the book that will frame our understanding of the 1990s.
Mind Hacks
The brain is a fearsomely complex information-processing environment--one that often eludes our ability to understand it. At any given time, the brain is collecting, filtering, and analyzing information and, in response, performing countless intricate processes, some of which are automatic, some voluntary, some conscious, and some unconscious. Cognitive neuroscience is one of the ways we have to understand the workings of our minds. It's the study of the brain biology behind our mental functions: a collection of methods--like brain scanning and computational modeling--combined with a way of looking at psychological phenomena and discovering where, why, and how the brain makes them happen. Want to know more? Mind Hacks is a collection of probes into the moment-by-moment works of the brain. Using cognitive neuroscience, these experiments, tricks, and tips related to vision, motor skills, attention, cognition, subliminal perception, and more throw light on how the human brain works. Each hack examines specific operations of the brain. By seeing how the brain responds, we pick up clues about the architecture and design of the brain, learning a little bit more about how the brain is put together. Mind Hacks begins your exploration of the mind with a look inside the brain itself, using hacks such as "Transcranial Magnetic Stimulation: Turn On and Off Bits of the Brain" and "Tour the Cortex and the Four Lobes." Also among the 100 hacks in this book, you'll find: Release Eye Fixations for Faster Reactions See Movement When All is Still Feel the Presence and Loss of Attention Detect Sounds on the Margins of Certainty Mold Your Body Schema Test Your Handedness See a Person in Moving Lights Make Events Understandable as Cause-and-Effect Boost Memory by Using Context Understand Detail and the Limits of Attention Steven Johnson, author of "Mind Wide Open" writes in his foreword to the book, "These hacks amaze because they reveal the brain's hidden logic; they shed light on the cheats and shortcuts and latent assumptions our brains make about the world." If you want to know more about what's going on in your head, then Mind Hacks is the key--let yourself play with the interface between you and the world.
Communication of Complex Information
Offers analysis and design considerations for the presentation of complex and technical information on Web sites, using a theory that deals with highly complex issues and user goals. For scholars, researchers, and students in technical communication, inf
Real World Web Services
The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing with web services? Standard bodies may wrangle and platform vendors may preach, but at the end of the day what are the technologies that are actually in use, and how can developers incorporate them into their own applications? Those are the answers Real World Web Services delivers. It's a field guide to the wild and wooly world of non-trivial deployed web services. The heart of the book is a series of projects, demonstrating the use and integration of Google, Amazon, eBay, PayPal, FedEx, and many more web services. Some of these vendors have been extremely successful with their web service deployments: for example, eBay processes over a billion web service requests a month! The author focuses on building 8 fully worked out example web applications that incorporate the best web services available today. The book thoroughly documents how to add functionality like automating listings for auctions, dynamically calculating shipping fees, automatically sending faxes to your suppliers, using an aggregator to pull data from multiple news and web service feeds into a single format or monitoring the latest weblog discussions and Google searches to keep web site visitors on top of topics of interest-by integrating APIs from popular websites most people are already familiar with. For each example application, the author provides a thorough overview, architecture, and full working code examples. This book doesn't engage in an intellectual debate as to the correctness of web services on a theological level. Instead, it focuses on the practical, real world usage of web services as the latest evolution in distributed computing, allowing for structured communication via Internet protocols. As you ll see, this includes everything from sending HTTP GET commands to retrieving an XML document through the use of SOAP and various vendor SDKs.
Pro.Net 1.1 Network Programming
Networking is one of the core tasks of enterprise-level programming, and for the programmer familiar with the C# language this book should provide the information to put network programming at the heart of their .NET applications. Prior knowledge of network programming is not assumed, but the reader already familiar with networking from another environment will find the pace quick enough for the book to still prove valuable. This book should give the reader: an understanding of the general concepts of networking; information about network programming in .NET with C#; skills to build network-based applications in .NET; and the confidence to use the classes shipped with .NET to implement your own application-level protocols.
Managing Security With Snort and IDS Tools
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you? Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools. This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices. Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
Mono
The Mono Project is the much talked-about open source initiative to create a Unix implementation of Microsoft's .NET Development Framework. Its purpose is to allow Unix developers to build and deploy cross-platform .NET applications. The project has also sparked interest in developing components, libraries and frameworks with C#, the programming language of .NET. The controversy? Some say Mono will become the preferred platform for Linux development, empowering Linux/Unix developers. Others say it will allow Microsoft to embrace, extend, and extinguish Linux. The controversy rages on, but--like many developers--maybe you've had enough talk and want to see what Mono is really all about. There's one way to find out: roll up your sleeves, get to work, and see what you Mono can do. How do you start? You can research Mono at length. You can play around with it, hoping to figure things out for yourself. Or, you can get straight to work with Mono: A Developer's Notebook--a hands-on guide and your trusty lab partner as you explore Mono 1.0. Light on theory and long on practical application, Mono: A Developer's Notebook bypasses the talk and theory, and jumps right into Mono 1.0. Diving quickly into a rapid tour of Mono, you'll work through nearly fifty mini-projects that will introduce you to the most important and compelling aspects of the 1.0 release. Using the task-oriented format of this new series, you'll learn how to acquire, install, and run Mono on Linux, Windows, or Mac OS X. You'll work with the various Mono components: Gtk#, the Common Language Runtime, the class libraries (both .NET and Mono-provided class libraries), IKVM and the Mono C# compiler. No other resource will take you so deeply into Mono so quickly or show you as effectively what Mono is capable of. The new Developer's Notebooks series from O'Reilly covers important new tools for software developers. Emphasizing example over explanation and practice over theory, they focus on learning by doing--you'll get the goods straight from the masters, in an informal and code-intensive style that suits developers. If you've been curious about Mono, but haven't known where to start, this no-fluff, lab-style guide is the solution.
IRC Hacks
IRC (Internet Relay Chat) may very well turn out to be the world's most successful hack. In 1988, Jarkko Oikarinen wrote the original IRC program at the University of Oulu, Finland. As he says in his foreword, "IRC started as one summer trainee's programming exercise. A hack grew into a software development project that hundreds of people participated in, and then became a worldwide environment where tens of thousands of people now spend time with each other. I have found many of my friends through IRC and learnt a significant part of my present software engineering knowledge while using and working with IRC. That would not have been possible without learning from code examples and hacks from others". IRC has continued to grow in popularity since its inception. Millions of people from all over the world now use IRC to chat with friends, discuss projects and collaborate on research. With a simple, clearly defined protocol, IRC has become one of the most accessible chat environments, with clients written for a multitude of operating systems. And IRC is more than just a simple chat system it is a network of intercommunicating servers, allowing thousands of clients to connect from anywhere in the world using the IRC protocol. While IRC is easy to get into and many people are happy to use it without being aware of what's happening under the hood, there are those who hunger for more knowledge, and this book is for them. IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net). Like all of our Hacks books, there are many different ways to use IRC Hacks. You can read the book from cover to cover, but you might be better served by picking an interesting item from the table of contents and just diving in. If you're relatively new to IRC, you should considering starting with a few hacks from each progressive chapter. Chapter 1 starts you off by showing you how to connect to IRC, while Chapter 2 acquaints you with the everyday concepts you'll need to use IRC effectively. Chapter 3 is all about users and channels, and introduces the first pieces of code. Chapter 4 shows you how to make useful enhancements to IRC clients. Chapter 5 is where you will learn the basics about creating IRC bots, with Chapters 6-12 introducing more complex bots that can be used for logging, servicing communities, searching, announcing, networking, managing channels or simply for having fun. Chapter 13 delves into the IRC protocol in more detail, and Chapter 14 demonstrates some interesting alternative methods for connecting to IRC. Finally, Chapter 15 will move you on to new pastures by showing you how to set up your own IRC server. This book presents an opportunity to learn how IRC works and how to make best use of some of the features that have made it the most successful, most scalable, and most mature chat system on this planet. IRC Hacks delves deep into the possibilities.
Foundation Mac OS X Web Development
Mac OS X 10.2, known as Panther, is the latest release to the Macintosh UNIX-based operation system. The upgrade from OS 9 to OS X was an immense shift to a far more stable and feature-rich development environment. The initial product rollout has been met with a very positive user reaction. This book aims to teach all the essentials of developing dynamic websites in OS X in a linear style. This book is not for hardcore developers, but rather for those new to the OS or the Mac, and looking for a primer on website development.
Php Web Development With Macromedia Dreamweaver Mx 2004
This is a concise, compact, no-nonsense book that teaches the reader how to develop accessible, standards compliant PHP-driven web sites using the latest technologies: PHP 5 and Macromedia Dreamweaver MX 2004 is the development tool. This book presents PHP Web development with Dreamweaver in real-world tutorials so you can expect fast results as you progress through the book. Full book support will be available online and via email.
Storage Networks
Rather than being based on a specific vendor offering, Storage Networks will appeal to any systems administrator, architect or manager with large data resources to manage. Applicability of the technology to non-traditional IT buyers such as video and music production studios, medical diagnostic imaging and GIS applications is stressed. With the rapid adoption of digital processing for images and sound, storage networks have a great use outside of the data center. At the same time, the benefits of recoverability, performance and manageability required by the large 'glass house' operation will benefit any storage network user. This book will appeal to both sets of readers.
Computer Networking First-Step
Your first step into the world of computer networking No experience required Includes clear and easily understood explanations Makes learning easy Your first step to computer networking begins here! Learn basic networking terminology Understand how information is routed from place to place Explore Internet connectivity secrets Protect your computer from intrusion Build local-area networks (LANs) Welcome to the world of networking! Networking and the Internet touch our lives in untold ways every day. From connecting our computers together at home and surfing the net at high speeds to editing and sharing digital music and video, computer networking has become both ubiquitous and indispensable. No experience needed! Computer Networking First-Step explains the basics of computer networking in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up network and Internet traffic. Whether you are looking to take your first step into a career in networking or are interested in just gaining a conversational knowledge of the technology, this book is for you!
Never Threaten to Eat Your Co-Workers
Never Threaten to Eat Your Co-Workers: Best of Blogs is a compendium of the best blog entries available on the Internet. Scoured from hundreds of blogs and selected from a panel of blue-ribbon judges, the book compiles the very unique perspectives of many of those that choose to record their everyday lives in public forums. From the comedic to the dramatic to the tragic, the book offers a little bit of everything. Blog assembles 100 of the best blog entries on the Internet into a short, hardback reader.
Dreamweaver MX
Macromedia's Dreamweaver MX 2004 offers a rich environment for building professional web sites, with drag-and-drop simplicity, clean HTML code, and dynamic database-driven web site creation tools. It comes with everything except perhaps the most important feature of all: a printed manual. Enter Dreamweaver MX 2004: The Missing Manual, the book that enables both first-time and experienced web designers to bring stunning, interactive web sites to life. What sets this new edition apart is the crystal-clear writing, welcome humor, and exclusive features like these: Live examples. With a step-by-step annotated tutorial, readers follow the construction of a state-of-the-art commercial web site, complete with Flash buttons, Cascading Style Sheets, and dynamic databases. Tricks of the trade. The book is bursting with undocumented workarounds and shortcuts. Design guidance. Readers can create any modern web feature, including forms, animations, pop-up windows, and more. This book lets you know which browsers, situations, and audiences are appropriate for each. With over 500 illustrations, a handcrafted index, and the clarity of thought that has made bestsellers of every Missing Manual to date, this edition is the ultimate atlas for Dreamweaver MX 2004.
Kerberos: The Definitive Guide
Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary. Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need. Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting. In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations. If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
Professional PHP4 Programming
PHP is an open source, server-side HTML-embedded web-scripting language for creating dynamic web pages. Outside of being browser-independent, it offers a simple and universal cross-platform solution for e-commerce, complex web, and database-driven applications. Professional PHP4 will show you exactly how to create state of the art web applications that scale well, utilize databases optimally, and connect to a back-end network using a multi-tiered approach. This book also aims at teaching PHP by coding - among other things - FTP clients, e-mail clients, some advanced data structures, session management, and secure programming.
Practical RDF
The Resource Description Framework (RDF) is a structure for describing and interchanging metadata on the Web--anything from library catalogs and worldwide directories to bioinformatics, Mozilla internal data structures, and knowledge bases for artificial intelligence projects. RDF provides a consistent framework and syntax for describing and querying data, making it possible to share website descriptions more easily. RDF's capabilities, however, have long been shrouded by its reputation for complexity and a difficult family of specifications. Practical RDF breaks through this reputation with immediate and solvable problems to help you understand, master, and implement RDF solutions. Practical RDF explains RDF from the ground up, providing real-world examples and descriptions of how the technology is being used in applications like Mozilla, FOAF, and Chandler, as well as infrastructure you can use to build your own applications. This book cuts to the heart of the W3C's often obscure specifications, giving you tools to apply RDF successfully in your own projects. The first part of the book focuses on the RDF specifications. After an introduction to RDF, the book covers the RDF specification documents themselves, including RDF Semantics and Concepts and Abstract Model specifications, RDF constructs, and the RDF Schema. The second section focuses on programming language support, and the tools and utilities that allow developers to review, edit, parse, store, and manipulate RDF/XML. Subsequent sections focus on RDF's data roots, programming and framework support, and practical implementation and use of RDF and RDF/XML. If you want to know how to apply RDF to information processing, Practical RDF is for you. Whether your interests lie in large-scale information aggregation and analysis or in smaller-scale projects like weblog syndication, this book will provide you with a solid foundation for working with RDF.
Secure Programming Cookbook for C and C++
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult. Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code. It contains a wealth of solutions to problems faced by those who care about the security of their applications. It covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering. The rich set of code samples provided in the book's more than 200 recipes will help programmers secure the C and C++ programs they write for both Unix(R) (including Linux(R)) and Windows(R) environments. Readers will learn: How to avoid common programming errors, such as buffer overflows, race conditions, and format string problems How to properly SSL-enable applications How to create secure channels for client-server communication without SSL How to integrate Public Key Infrastructure (PKI) into applications Best practices for using cryptography properly Techniques and strategies for properly validating input to programs How to launch programs securely How to use file access mechanisms properly Techniques for protecting applications from reverse engineering The book's web site supplements the book by providing a place to post new recipes, including those written in additional languages like Perl, Java, and Python. Monthly prizes will reward the best recipes submitted by readers. Secure Programming Cookbook for C and C++ is destined to become an essential part of any developer's library, a code companion developers will turn to again and again as they seek to protect their systems from attackers and reduce the risks they face in today's dangerous world.
Building Wireless Community Community Networks
Building Wireless Community Networks is about getting people online using wireless network technology. The 802.11b standard (also known as WiFi) makes it possible to network towns, schools, neighborhoods, small business, and almost any kind of organization. All that's required is a willingness to cooperate and share resources. The first edition of this book helped thousands of people engage in community networking activities. At the time, it was impossible to predict how quickly and thoroughly WiFi would penetrate the marketplace. Today, with WiFi-enabled computers almost as common as Ethernet, it makes even more sense to take the next step and network your community using nothing but freely available radio spectrum. This book has showed many people how to make their network available, even from the park bench, how to extend high-speed Internet access into the many areas not served by DSL and cable providers, and how to build working communities and a shared though intangible network. All that's required to create an access point for high-speed Internet connection is a gateway or base station. Once that is set up, any computer with a wireless card can log onto the network and share its resources. Rob Flickenger built such a network in northern California, and continues to participate in network-building efforts. His nuts-and-bolts guide covers: Selecting the appropriate equipment Finding antenna sites, and building and installing antennas Protecting your network from inappropriate access New network monitoring tools and techniques (new) Regulations affecting wireless deployment (new) IP network administration, including DNS and IP Tunneling (new) His expertise, as well as his sense of humor and enthusiasm for the topic, makes Building Wireless Community Networks a very useful and readable book for anyone interested in wireless connectivity.
Samba Pocket Reference
Samba is a cross-platform triumph: it turns a Unix or Linux system into a file and print server for Microsoft Windows network clients.This book describes all the options for Samba's configuration file in quick-reference format. It also contains command-line options and related information on the use of the Samba daemons (smbd, nmbd, and winbindd) and the utilities in the Samba distribution. The current edition covers Samba 2.x and the most important features of 3.0, which was under development as this book went to print. New options pertain to Samba's acting as a primary domain controller and as a domain member server, its support for the use of Windows NT/2000/XP authentication and filesystem security on the host Unix system, and access to shared files and printers from Unix clients. System administrators who are familiar with Samba and want a handy reminder of how to administer it without the bulk of a full-sized book will find this pocket reference invaluable.
LDAP System Administration
Be more productive and make your life easier. That's what LDAP System Administration is all about. System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately "see" the updated information. Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux(R) distributions and Mac OS(R) X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses: Configuration and access control Distributed directories; replication and referral Using OpenLDAP to replace NIS Using OpenLDAP to manage email configurations Using LDAP for abstraction with FTP and HTTP servers, Samba, and Radius Interoperating with different LDAP servers, including Active Directory Programming using Net:: LDAP If you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.
Vbscript in a Nutshell
Lightweight yet powerful, VBScript from Microsoft(R) is used in four main areas: server-side web applications using Active Server Pages (ASP), client-side web scripts using Internet Explorer, code behind Outlook forms, and automating repetitive tasks using Windows Script Host (WSH). VBScript in a Nutshell, Second Edition delivers current and complete documentation for programmers and system administrators who want to develop effective scripts. Completely updated for VBScript 5.6, WSH 5.6 and ASP 3.0, VBScript In a Nutshell, Second Edition includes updated introductory chapters that will help you keep current with the significant changes since the first edition was published. New chapters introduce the Windows Script Component for creating binary COM components, and the Script Encoder. The main part of the book is a comprehensive reference focusing on VBScript essentials with an alphabetical reference to all statements, keywords and objects, and a section of notes and solutions to real-world gotchas--various undocumented behaviors and aspects of the language--to help you avoid potential problems. Each entry in the reference section details the following: The keyword's syntax, using standard code conventions A list of arguments accepted by the function or procedure, if any exist A discussion of how and where the keyword should be used within the scripting environment A discussion of the differences between the operation of the keyword in Visual Basic or VBA and in VBScript Regardless of your level of experience programming with VBScript, VBScript in a Nutshell, Second Edition is the book you'll want by your side--the most complete, up-to-date, and easy-to-use language reference available.
Network Security With Openssl
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications. The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols. Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library's advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges. As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included. OpenSSL may well answer your need to protect sensitive data. If that's the case, Network Security with OpenSSL is the only guide available on the subject.
Schaum's Outline of Computer Networking
Schaum's Outline of Computer Networking introduces the underlying concepts, principles, and terminology of computer networks. Covering the full scope of material taught in computer networking courses, this problem-solved approach presents the different components of a network and shows how these components fit together as well as explaining the varied harmonizing functions needed for the interconnection of many heterogeneous computer networks.
Using Sans and Nas
Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quickly, thereby keeping their lifeblood flowing. W. Curtis Preston's insightful book takes you through the ins and outs of building and managing large data centers using SANs and NAS. As a network administrator you're aware that multi-terabyte data stores are common and petabyte data stores are starting to appear. Given this much data, how do you ensure that it is available all the time, that access times and throughput are reasonable, and that the data can be backed up and restored in a timely manner? SANs and NAS provide solutions that help you work through these problems, with special attention to the difficulty of backing up huge data stores. This book explains the similarities and differences of SANs and NAS to help you determine which, or both, of these complementing technologies are appropriate for your network. Using SANs, for instance, is a way to share multiple devices (tape drives and disk drives) for storage, while NAS is a means for centrally storing files so they can be shared. Preston exams each technology with a vendor neutral approach, starting with the building blocks of a SAN and how they can be assembled for effective storage solutions. He covers day-to-day management and backup and recovery for both SANs and NAS in detail. Whether you're a seasoned storage administrator or a network administrator charged with taking on this role, you'll find all the information you need to make informed architecture and data management decisions. The book fans out to explore technologies such as RAID and other forms of monitoring that will help complement your data center. With an eye on the future, other technologies that might affect the architecture and management of the data center are explored. This is sure to be an essential volume in any network administrator's or storage administrator's library.
Creating a Winning Online
It's no secret that well-executed exhibits in libraries and museums can make attendance numbers skyrocket. Dynamic exhibits not only provide information and entertainment for your existing customers, but they are also opportunities to reach out to new customers and to widen your market. A great exhibit can be the hook that brings people in the door for the first time. Creating a Winning Online Exhibition will help you to do just that - conceive, design, and execute a compelling online exhibition. Different than a digital collection, an online exhibition is a selective presentation of objects organized around a thematic and narrative structure. Digital librarian Martin Kalfatovic takes you through the process of developing an exhibit that will attract users, increase your visibility, and showcase your collection and services. With case studies of successful online exhibitions, sample artwork and screen shots, up-to-date information on mark-up languages such as HTML and XML, and discussion of online databases and software programs, you will be equipped with all you need to pull off a winning exhibition. Also included are helpful samples of: * Project proposals * Exhibition scripts *
Pulsed Neural Networks
Most practical applications of artificial neural networks are based on a computational model involving the propagation of continuous variables from one processing unit to the next. In recent years, data from neurobiological experiments have made it increasingly clear that biological neural networks, which communicate through pulses, use the timing of the pulses to transmit information and perform computation. This realization has stimulated significant research on pulsed neural networks, including theoretical analyses and model development, neurobiological modeling, and hardware implementation.This book presents the complete spectrum of current research in pulsed neural networks and includes the most important work from many of the key scientists in the field. Terrence J. Sejnowski's foreword, "Neural Pulse Coding," presents an overview of the topic. The first half of the book consists of longer tutorial articles spanning neurobiology, theory, algorithms, and hardware. The second half contains a larger number of shorter research chapters that present more advanced concepts. The contributors use consistent notation and terminology throughout the book.ContributorsPeter S. Burge, Stephen R. Deiss, Rodney J. Douglas, John G. Elias, Wulfram Gerstner, Alister Hamilton, David Horn, Axel Jahnke, Richard Kempter, Wolfgang Maass, Alessandro Mortara, Alan F. Murray, David P. M. Northmore, Irit Opher, Kostas A. Papathanasiou, Michael Recce, Barry J. P. Rising, Ulrich Roth, Tim Sch繹nauer, Terrence J. Sejnowski, John Shawe-Taylor, Max R. van Daalen, J. Leo van Hemmen, Philippe Venier, Hermann Wagner, Adrian M. Whatley, Anthony M. Zador
Weaving the Web
Named one of the greatest minds of the 20th century by Time, Tim Berners-Lee is responsible for one of that century's most important advancements: the world wide web. Now, this low-profile genius-who never personally profitted from his invention -offers a compelling protrait of his invention. He reveals the Web's origins and the creation of the now ubiquitous http and www acronyms and shares his views on such critical issues as censorship, privacy, the increasing power of softeware companies, and the need to find the ideal balance between commercial and social forces. He offers insights into the true nature of the Web, showing readers how to use it to its fullest advantage. And he presents his own plan for the Web's future, calling for the active support and participation of programmers, computer manufacturers, and social organizations to manage and maintain this valuable resource so that it can remain a powerful force for social change and an outlet for individual creativity.
Asp in a Nutshell
ASP in a Nutshell provides the high-quality reference documentation that web application developers really need to create effective Active Server Pages. It focuses on how features are used in a real application and highlights little-known or undocumented features. This book also includes an overview of the interaction between the latest release of Internet Information Server (version 5) and ASP 3.0, with an introduction to the IIS object model and the objects it comprises. The examples shown in this section and throughout the book are illustrated in VBScript. The main components of this book are: Active Server Pages Introduction. Brief overview of the ASP application paradigm with examples in VBScript. Also included is an introduction to Microsoft's Internet Information Server 5.0, the IIS object model, and the objects that it comprises. Object Reference. Each object is discussed in the following manner: descriptions, properties, collections, methods, events, accessory files/required DLLs, and remarks, including real-world uses, tips and tricks, and author's experience (where applicable). The objects--Application, Response, Request, Server, Session, ObjectContext, and ASPError, as well as ASP Directives, Global.ASA, and Server-Side Includes--all follow this paradigm. Component Reference. This section follows the same paradigm found in Object Reference. The discussion covers all of the additional components included with IIS, such as ActiveX Data Objects, the Ad Rotator, the Browser capabilities component, the File System Object, and more. Appendixes. Gives examples in one or two objects and components using Perl, REXX, and Python in ASP. Like other books in the "In a Nutshell" series this book offers the facts, including critical background information, in a no-nonsense manner that users will refer to again and again. It is a detailed reference that enables even experienced web developers to advance their ASP applications to new levels.
Http Pocket Reference
The HyperText Transfer Protocol, or HTTP, is the backbone of the World Wide Web. HTTP is the language that each web browser (or other web client) uses to communicate with servers around the world. All web programmers, administrators, and application developers need to be familiar with HTTP in order to work effectively. The HTTP Pocket Reference not only provides a solid conceptual foundation of HTTP, it also serves as a quick reference to each of the headers and status codes that comprise an HTTP transaction. The book starts with a tutorial of HTTP, but then explains the client request and server responses in more detail, and gives a thorough technical explanation of more advanced features of HTTP (such as persistent connections and caching). Most people use the Web every day without knowing anything about HTTP, but for those who need to get "beyond the browser," this book is the place to start.
Where Wizards Stay Up Late
Twenty five years ago, it didn't exist. Today, twenty million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960's, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices. With Defense Department funds, he and a band of visionary computer whizzes began work on a nationwide, interlocking network of computers. Taking readers behind the scenes, Where Wizards Stay Up Late captures the hard work, genius, and happy accidents of their daring, stunningly successful venture.