Skip to main content

Syngress

    • Configuring IPv6 For Cisco IOS

      • 1st Edition
      • August 16, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 8 4 8
      • eBook
        9 7 8 0 0 8 0 4 7 6 7 6 6
      "By building IPv6 into Cisco IOS software, we are enabling continued growth of the Internet and its expansion into new applications and capabilities in a way that maintains compatibility with existing Internet services." -- Stephen Deering, Cisco Fellow and lead designer of the protocol Internetworking Protocol (IP) addresses are the unique numeric identifiers required of every device connected to the Internet. Two years ago, in response to the exponential increase in demand for new IP addresses, the Internet Engineering Task Force finalized its revision on IP addressing, called IP Version 6 and key hardware vendors such as Cisco and major Internet Service Providers like AOL announced plans to migrate to IP Version 6. That is now happening. Cisco Systems began incorporating Internet Protocol version 6 (IPv6) in its Cisco IOS Software in June, 2001. Cisco is currently the only major networking vendor to deliver IPv6 across multiple platforms. This book provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on your network.
    • Scene of the Cybercrime: Computer Forensics Handbook

      • 1st Edition
      • August 12, 2002
      • Syngress
      • English
      • eBook
        9 7 8 0 0 8 0 4 8 0 7 8 7
      "Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of EuropeCrime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime.
    • Developing .Net Web Services With XML

      • 1st Edition
      • July 24, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 8 1 7
      • eBook
        9 7 8 0 0 8 0 4 7 7 2 1 3
      Prepare for the next generation of the internet with this in-depth, developer's guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability. Developing .Net Web Services with XML introduces readers to the foundation for the .Net platform. The book covers the history, applications and implementation of the Extensible Markup Language within Microsoft's .NET framework. Readers will be given a thorough introduction to .NET and its XML building blocks while acquiring a firm grasp of how those blocks can be used to build any Web site or service so that it will federate and collaborate seamlessly with others
    • Developing Web Services with Java APIs for XML Using WSDP

      • 1st Edition
      • July 7, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 8 5 5
      • eBook
        9 7 8 0 0 8 0 4 7 7 4 3 5
      The Holy War between Microsoft Corporation and Sun Microsystems is heating up as Sun unveils JAX Pack to compete with Microsoft's .NET initiativeJAX Pack is an all-in-one development kit that utilizes XML to build cross platform Web services. For companies that are developing Web services to collaborate with business partners, JAX Pack offers a faster way to develop applications while maintaining independence from any particular vendor's XML technologies. Developing Web Services with Java APIs for XML (JAX Pack) provides exhaustive coverage of Sun's recently released JAX Pack. The book assumes that readers are experienced Java developers with a solid understanding of XML. As such, the book contains five parts covering each component of JAX Pack.
    • Hack Proofing Your Identity In The Information Age

      • 1st Edition
      • July 7, 2002
      • Syngress
      • English
      • eBook
        9 7 8 0 0 8 0 4 7 8 0 8 1
      Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.
    • C# For Java Programmers

      • 1st Edition
      • June 26, 2002
      • Harold Cabrera
      • English
      • Paperback
        9 7 8 1 9 3 1 8 3 6 5 4 8
      • eBook
        9 7 8 0 0 8 0 4 7 6 3 5 3
      Java Programmers, Preprare for Microsoft's .NET initiative while enhancing your repertoire and marketability with C# for Java Progammers! C# for Java Programmers will prepare readers for the .NET framework by building on what they already know about object-oriented languages and give them the means to maintain their flexibility and effectiveness in an un-certain marketplace. This book will compare and contrast the advantages and disadvantages of both Java and C# to allow programmers to make their own decisions regarding what each language is best used for. Whatever your feelings are about Microsoft and its .NET initiative, there can be no denying that C# is here to stay. The C# language, a close cousin to Java, is a new object-oriented programming language (OOPL) designed to work within the .NET framework. It improves upon many of the vague or ill-defined areas of C++ that frequently lead programmers into trouble. C# is a strongly-typed, object-oriented language designed to give the optimum blend of simplicity, expressiveness, and performance.
    • Managing Cisco Network Security

      • 2nd Edition
      • May 29, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 3 1 8 3 6 5 6 2
      • eBook
        9 7 8 0 0 8 0 4 7 9 0 5 7
      An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world "There's no question that attacks on enterprise networks are increasing in frequency and sophistication..." -Mike Fuhrman, Cisco Systems Manager, Security Consulting Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.
    • Building a Cisco Wireless Lan

      • 1st Edition
      • May 29, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 5 8 9
      • eBook
        9 7 8 0 0 8 0 4 7 6 2 4 7
      Enable enterprise-wide information access using Cisco wireless networksWireless networks are rapidly becoming a viable alternative to traditional wired LANs (Local Area Networks), mainly because of the convenience they provide. By implementing a wireless network, companies eliminate the need and expense of installing fixed cables, outlet ports or patch panels. Building a Cisco Wireless LAN is for individuals designing and supporting a Cisco wireless LAN. The book contains detailed information on the process for the thorough and accurate network design for the Cisco 340, 350, and UBR 7200 series. The contains detailed information on the configuration and troubleshooting of a Cisco WLAN installation. The book offers an introduction to wireless technology from the fundamental principles to the actual implementation.
    • Configuring Citrix MetaFrame XP for Windows

      • 1st Edition
      • May 10, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 3 1 8 3 6 5 3 1
      • eBook
        9 7 8 0 0 8 0 4 7 6 7 0 4
      Syngress's best-selling Citrix MetaFrame author to deliver world class support for this new product As the newest member of the Citrix MetaFrame product family, Citrix MetaFrame XP and recent add-on Feature Release 1 is making a slash in the IT community. Configuring Citrix MetaFrame XP for Windows offers system administrators and network engineers an in-depth look at configuring, optimizing, implemnting and troubleshooting their Windows applications deployed using Citrix MetaFrame XP. Real-world examples and step-by-step exercises will help system administrators maxinise the capabilities of this revolutionary product from Citrix.
    • Hack Proofing ColdFusion

      • 1st Edition
      • April 25, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 7 7 0
      • eBook
        9 7 8 0 0 8 0 4 7 8 0 9 8
      The only way to stop a hacker is to think like one! ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance.Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications.