Skip to main content

Books in Applications general

31-40 of 48 results in All results

Securing Citrix XenApp Server in the Enterprise

  • 1st Edition
  • June 24, 2008
  • Tariq Azad
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 2 8 1 - 2
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 9 9 8 - 7
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains.

The Best Damn Windows Server 2008 Book Period

  • 2nd Edition
  • June 3, 2008
  • Anthony Piltzecker
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 2 7 3 - 7
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 0 0 7 - 6
Best Damn Windows Server 2008 Book Period, Second Edition is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller.

Integrating ISA Server 2006 with Microsoft Exchange 2007

  • 1st Edition
  • May 30, 2008
  • Fergus Strachan
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 2 7 5 - 1
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 0 2 0 - 5
This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange for raw beginners. Instead, its pragmatic purpose is to smooth the path of the busy administrator who is under pressure to get the integration done quickly, and done right, the first time. It features "break-out sessions" for issues that require in-depth discussion, "tips and tricks" sections that hone in on and demystify trouble spots, and "FAQs" alphabetized by topic that act as a quick-reference for readers who just want a quick answer to a specific question.Readers will learn how to:*Create the protocol definitions and firewall policy to allow only authorized users to connect to your Exchange Server*Configure SMTP Filtering and SMTP Message Screener*Troubleshoot the SSL connection to your Exchange Server*Take advantage of ISA 2006's integrated Exchange 2007 support*Enable forms-based authentication for Outlook Web Access*Leverage unified SSL, VPN, application-layer filtering and endpoint securityto optimize access for mobile devices*Configure user-based settings to provide pre-authenticated access to specific Web applications...and much more!

Securing Windows Server 2008

  • 1st Edition
  • May 23, 2008
  • Aaron Tiensivu
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 2 8 0 - 5
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 9 9 7 - 0
Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including: 1. Network Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.2. Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.3. Protection of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.4. Protection against malicious software with User Account Control with a new authentication architecture.5. Increased control over your user settings with Expanded Group Policy....to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.

Point-Based Graphics

  • 1st Edition
  • June 15, 2007
  • Markus Gross + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 0 6 0 4 - 1
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 4 8 8 2 - 1
The polygon-mesh approach to 3D modeling was a huge advance, but today its limitations are clear. Longer render times for increasingly complex images effectively cap image complexity, or else stretch budgets and schedules to the breaking point. Comprised of contributions from leaders in the development and application of this technology, Point-Based Graphics examines it from all angles, beginning with the way in which the latest photographic and scanning devices have enabled modeling based on true geometry, rather than appearance. From there, it’s on to the methods themselves. Even though point-based graphics is in its infancy, practitioners have already established many effective, economical techniques for achieving all the major effects associated with traditional 3D Modeling and rendering. You’ll learn to apply these techniques, and you’ll also learn how to create your own. The final chapter demonstrates how to do this using Pointshop3D, an open-source tool for developing new point-based algorithms.

Essential MATLAB for Engineers and Scientists

  • 3rd Edition
  • January 29, 2007
  • Daniel T. Valentine + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 1 5 0 - 1
Essential MATLAB for Engineers and Scientists, Third Edition, is an essential guide to MATLAB as a problem-solving tool. It presents MATLAB both as a mathematical tool and a programming language, giving a concise and easy-to-master introduction to its potential and power. Stressing the importance of a structured approach to problem solving, the text provides a step-by-step method for program design and algorithm development. It includes numerous simple exercises for hands-on learning, a chapter on algorithm development and program design, and a concise introduction to useful topics for solving problems in later engineering and science courses: vectors as arrays, arrays of characters, GUIs, advanced graphics, and simulation and numerical methods. The text is ideal for undergraduates in engineering and science taking a course on Matlab.

Oracle Performance Tuning for 10gR2

  • 2nd Edition
  • September 15, 2006
  • Gavin JT Powell
  • English
  • Paperback
    9 7 8 - 1 - 5 5 5 5 8 - 3 4 5 - 3
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 2 0 2 - 5
Tuning of SQL code is generally cheaper than changing the data model. Physical and configuration tuning involves a search for bottlenecks that often points to SQL code or data model issues. Building an appropriate data model and writing properly performing SQL code can give 100%+ performance improvement. Physical and configuration tuning often gives at most a 25% performance increase. Gavin Powell shows that the central theme of Oracle10gR2 Performance Tuning is four-fold: denormalize data models to fit applications; tune SQL code according to both the data model and the application in relation to scalability; create a well-proportioned physical architecture at the time of initial Oracle installation; and most important, mix skill sets to obtain the best results.

Oracle 10g RAC Grid, Services and Clustering

  • 1st Edition
  • May 25, 2006
  • Murali Vallath
  • English
  • Paperback
    9 7 8 - 1 - 5 5 5 5 8 - 3 2 1 - 7
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 2 0 3 - 2
Grid architecture is Oracle’s strategy for high-end computing and RAC is the stepping stone into this arena. This book focuses on current technology including all valid RAC features up through Oracle Database 10g Release 2, with a primary focus on deploying it in a high-end grid environment. The book discusses this technology at length which users will find beneficial when researching, implementing or monitoring a RAC environment. The author covers workshop implementation of services and the distribution of workload across instances, with threshold definitions and the new load balancing algorithms. In addition it includes detailed discussions on ASM that complements the implementation of RAC in Oracle Grid strategy. The book also includes discussions on new Oracle Clusterware, its components and its integration with RAC. Oracle 10g RAC focuses on RAC-specific topics including ASM, operating system configuration, installation and configuration of RAC and much more. Coverage includes network configuration for high availability, FAN, TAF, ONS, implementation of maximum availability architecture (MAA), EM Grid Control, AWR, ADDM and other performance-related tools. The author includes several scripts for performance tuning and implementation that the reader can use to configure a RAC environment either on a 2, 4, 8, 60 or 99 node configuration.

Guide to Microsoft Excel 2002 for Business and Management

  • 2nd Edition
  • April 11, 2002
  • Bernard Liengme
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 0 7 - 4
The essential guide for managers and business students who wish to use Microsoft Excel to its full potential As the industry standard spreadsheet for the analysis and presentation of results, Microsoft Excel is indispensable in the business world. This text provides a practical and straightforward guide to fully utilising the functions of Microsoft Excel, guiding the reader from basic principles through to the more complicated areas such as modelling, the analysis of charts, reporting, and automatic importing of data from the web directly into an Excel workbook. Bernard Liengme has written this book specifically to meet the requirements of business students and professionals working with Microsoft Excel. The text is illustrated throughout with screen-shots, as well as a wide variety of examples and case studies based in real-world business contexts, introduced with a minimum of maths, and readily adaptable to workplace situations. The new edition has been brought fully up to date with the new Microsoft Office XP release of Excel 2002 but can be used alongside any previous version of Excel, with new Excel 2002 features clearly indicated throughout.

Parallel Computational Fluid Dynamics '98

  • 1st Edition
  • May 1, 1999
  • Chiao-ling Lin + 4 more
  • English
  • Hardback
    9 7 8 - 0 - 4 4 4 - 8 2 8 5 0 - 7
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 3 8 3 9 - 6
This book contains the papers presented at the Parallel Computational Fluid Dynamics 1998 Conference. The book is focused on new developments and applications of parallel technology. Key topics are introduced through contributed papers and invited lectures. These include typical algorithmic developments, such as: distributed computing, domain decomposition and parallel algorithm. Some of the papers address the evaluations of software and machine performance and software tool environments. The application of parallel computers to complex fluid dynamics problems are also conveyed through sessions such as DNS/LES, combustion and reacting flows, industrial applications, water resources and environmental flows.The editors believe this book will provide many researchers, much beyond those contributing to this volume, with fresh information and reference.