Skip to main content

Books in Multimedia

31-40 of 63 results in All results

Hardware Hacking

  • 1st Edition
  • January 29, 2004
  • Joe Grand + 2 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 2 5 - 8
"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help"* An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case* Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players* Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development* Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC* Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point* Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader* Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB

The Best Damn Firewall Book Period

  • 1st Edition
  • October 16, 2003
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 0 6 - 3
This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth.The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ, and why do I want one? And What are some common attacks, and how can I protect my system against them?The Internet's explosive growth over the last decade has forced IT professionals to work even harder to secure the private networks connected to it—from erecting firewalls that keep out malicious intruders to building virtual private networks (VPNs) that permit protected, fully encrypted communications over the Internet's vulnerable public infrastructure.The Best Damn Firewalls Book Period covers the most popular Firewall products, from Cisco's PIX Firewall to Microsoft's ISA Server to CheckPoint NG, and all the components of an effective firewall set up. Anything needed to protect the perimeter of a network can be found in this book.

QuickTime for the Web

  • 3rd Edition
  • July 7, 2003
  • Steven Gulie
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 9 5 8 - 2
QuickTime is the industry standard for developing and distributing multimedia content on the Web and CD-ROM, for both Windows and Macintosh computers. This book includes QuickTime Pro 6 and a full set of content development tools for both Windows and Macintosh developers. This third edition of the best-selling and award-winning QuickTime for the Web is a hands-on guide showing how to integrate animation, video, recorded sound, MIDI, text, still images, VR, live streams, games, and user interactivity into a Web site. It now also covers how to benefit from QuickTime support for the MPEG-4 global multimedia standard.Written for Web masters, site designers, HTML and multimedia authors, and anyone else who wants to incorporate sound or video into their Web site, this book offers clear and detailed instruction in an engaging style. Written by an expert at Apple Computer, this is the most complete and authoritative source for creating QuickTime content for the Web.The first edition of this book won the Touchstone 2000 Merit Award for Books awarded annually by STC (Society for Technical Communications).

Interactive QuickTime

  • 1st Edition
  • August 8, 2003
  • Matthew R. Peterson
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 5 4 6 - 0
Interactivity is one of the most captivating topics for today's online community. It is a fast-growing field pushed by the rapid development and dispersion of Java, Shockwave, Flash, and QuickTime. While several good books are available about the interactive capabilities of Java, Shockwave, and Flash, until now there hasn't been a book about QuickTime interactivity. A logical follow-up to QuickTime for the Web, this eagerly awaited book by Matthew Peterson details the power of QuickTime's wired media technology and provides a resource for professionals developing and deploying interactive QuickTime content. This content can extend far beyond simple movies—it can act as application user interfaces, educational multimedia, scientific display panels, musical instruments, games and puzzles, etc., and can interact with you, your browser, a server, or with other movies.

Building DMZs For Enterprise Networks

  • 1st Edition
  • July 1, 2003
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 2 6 - 1
This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter.

Snort Intrusion Detection 2.0

  • 1st Edition
  • May 11, 2003
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 1 0 0 - 5
The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is written by a member of Snort.org. The book provides a valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds.

SSCP Systems Security Certified Practitioner Study Guide and DVD Training System

  • 1st Edition
  • March 25, 2003
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 1 0 7 - 4
The SSCP Study Guide and DVD Training System is a unique and comprehensive combination of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation. These components will give the student 100% coverage of all (ISC)² official exam objectives and realistic exam simulation.The SSCP Study Guide and DVD Training System consists of:1. SSCP Study Guide The 1,000,000 readers who have read previous Syngress Study Guides will find many familiar features in the Study Guide along with many new enhancements including:· Exercises: There will be frequent use of step-by-step exercises with many screen captures and line drawings. Exercises will be presented in sidebar-like style, and will run 1 to 2 pages. · Anatomy of a Question: Question types will be diagrammed and analyzed to give readers access to the theory behind the questions themselves.· Teacher's Pet: These will be written from the instructor's perspective and will provide insight into the teaching methodologies applied to certain objectives that will give readers the "$2,000 worth of training in a $60 book feel." These will be presented in sidebar-like style and will run about 1 page.· Objectives Fast Track: End of chapter element containing each A-head from the chapter and succinct bullet points reviewing most important information from each section (same as current Solutions Fast Track). · FAQs: End of Chapter Frequently Asked Questions on objective content. These are not exam preparation questions (same as our current FAQ). · Test What You Learned: End of chapter exam preparation questions, which are in the format of the real exam.2. SSCP DVD: The DVD will contain 1 hour of instructor-led training covering the most difficult to comprehend topics on the exam. The instructor's presentation will also include on-screen configurations and networking schematics.SSCP from [email protected] The accompanying Web site will provide students with realistic exam-simulations software. The exam will emulate the content and the look and feel of the real-exam. Students will be able to grade their performance on the Web-based exam and automatically link to the accompanying e-book for further review of difficult concepts

MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network (Exam 70-214)

  • 1st Edition
  • February 28, 2003
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 9 3 1 - 6
This book covers Exam 200-14 in great detail, digging into some of the most important details involved in locking down Windows systems and networks and taking a systemic approach to keeping Windows networks and systems secured.Boasting a one-of-a-kind integration of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation, this study guide & DVD training system gives students 100% coverage of official Microsoft MCSA exam objectives plus realistic test prep.The System package consists of:1) MCSE Implementing and Administering Security in a Windows 2000 Network Study Guide: Syngress's 1 million study guide users will find tried-and-true features and exciting new enhancements; included are step-by-step exercises plus end-of-chapter bulleted objectives reviews, FAQs, and realistic test prep questions in the same format as those on the actual exam.2) Security DVD: A full hour of instructor-led training, complete with on-screen configurations and networking schematics, demystifying the toughest exam topics.3) Security from [email protected]. Accompanying Web site provides students with authentic interactive exam-simulation software that grades their results and automatically links to e-book study guide for instant review of answer concepts.

Dr Tom Shinder's ISA Server and Beyond

  • 1st Edition
  • December 11, 2002
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 7 3 9 - 8
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers.

Nokia Network Security Solutions Handbook

  • 1st Edition
  • December 3, 2002
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 9 7 1 - 2
The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are covered in detail, as well as installation and configuration of the Check Point firewall on the Nokia system. Readers will learn basic system administration, security, and monitoring before moving into advanced system administration concepts, as well as learning how to use Nokia's command line interface. Routing configurations and the different protocols involved are covered in detail, finishing off with a comprehensive discussion of the High-availability configuration that is Nokia's strength. The appendices include coverage of the UNIX basics which lie at the heart of the IPSO operating system and a review of the other packages available for Nokia systems (such as Perl and Bash).