Skip to main content

Books in Computing milieux

31-40 of 45 results in All results

Hack Proofing Sun Solaris 8

  • 1st Edition
  • October 31, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 1 2 - 8
The only way to stop a hacker is to think like one! Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers.

Microsoft Exchange 2000 Infrastructure Design

  • 1st Edition
  • September 28, 2001
  • Kieran McCorry + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 5 5 5 8 - 2 4 5 - 6
Microsoft Exchange 2000 Infrastructure Design explains from a system designer's and administrator's perspective Microsoft's Active Directory and its interaction with Exchange 2000, details issues concerned with migration to Exchange 2000, and outlines the specific technology and design issues relating to connectivity with Exchange 2000. Readers will learn to use these technologies to seamlessly co-exist with their current environment, migrate to a native Exchange 2000 environment, and connect to the Internet as well as to other messaging systems. The book's blend of expert instruction and best practices will help any organization create optimal system designs and configurations to support different technical and business scenarios. McCorry and Livengood are experts in Microsoft technologies from Compaq, the world's leading integrator of Exchange systems. In Microsoft Exchange 2000 Infrastructure Design, they spell out the key technologies, features, and techniques IT professionals must master to build a unified and robust Exchange 2000 messaging service. This book details the framework organizations must put in place to most effectively move to Exchange 2000.

Windows 2000 Active Directory

  • 2nd Edition
  • September 24, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 1 7 4 - 6
Updated coverage of the most confusing Windows 2000 component in this new edition of a Syngress bestseller.Active Directory Services dramatically changes the way IT professionals design, plan, configure and administer their Windows NT networks. The primary benefits of Active Directory Services are its extensibility, scalability, and ease of management as compared to prior generations of Windows NT. Systems Engineers will probably spend much of their time over the next several years planning for and deploying Active Directory Services in many different environments. Windows 2000 Active Directory, Second Edition gives IT professionals a head start; it provides updated coverage of everything they will need to succeed.

Intelligent Environments

  • 1st Edition
  • March 20, 1997
  • P. Droege
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 3 4 8 4 - 8
The environment, as modified and created by people, is largely about the use of information, its generation and exchange. How do recent innovations in the technologies of information management and communication affect our use of space and place, and the way we perceive and think about our surroundings?This volume provides an international, exploratory forum for the complex phenomenon of new information and communication technology as it permeates and transforms our physical world, and our relation to it: the architectural definition of our surrounding, geographical space, urban form and immediate habitats. This book is a reader, an attempt at registering disciplinary changes in context, at tracing subtexts for which most mainstream disciplines have no established language. The project is to give voice to an emerging meta-discipline that has its logic across the specializations.A wide range of professionals and academics report findings, views and ideas. Together, they describe the architecture of a postmodern paradigm: how swiftly mutating the proliferating technology applications have begun to interact with the construction and reading of physical space in architecture, economics, geography, history, planning, social sciences, transport, visual art - but also in the newer domains that have joined this spectrum through the very nature of their impacts: information technology and telecommunications.The space navigated in this volume is vast, both in physical terms and in its virtual and analogous form. It ranges from the space that immediately encompasses, or is simulated to encompass, the human body - as in buildings and virtual tectonics - to that of towns and regions. We stay clear of molecular-scale space, and of dimensions that are larger than earth.

Information Technology Standards

  • 1st Edition
  • September 21, 1995
  • Martin Libicki
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 2 4 8 - 9
This book examines information technology standards and discusses what they are, what they do, how they originate, and how they evolve.While standards are important in improving system interoperability and thereby increasing economic productivity, they are unlikely to achieve their full potential due to a variety of factors, chief of which is the politics of the standard process itself.Libicki points out that the government is not likely the best source for designing and promoting standards. He does an excellent job of breaking down many complex technical issues and presenting them in a fashion that technical people can enjoy and policy makers can understand.

Computing Perspectives

  • 1st Edition
  • January 1, 1995
  • Maurice V. Wilkes
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 0 2 6 8 - 7
In this insightful collection of essays, Maurice Wilkes shares his unique perspective on the development of computers and the current state of the art. These enlightening essays discuss the foundational ideas behind modern computing and provide a solid grounding for the appreciation of emerging computer technologies.Wilkes, one of the founders of computing, has provided enormous contributions to the development of computers, including the design and construction of the EDSAC computer and early development of programming for a stored program computer. He was responsible for the concept of microprogramming. Wilkes also wrote the first paper to appear on cache memories and was an early worker in the field of wide bandwidth local area networks. In 1992 he was awarded the prestigious Kyoto Prize for Advanced Technology.These essays will be of interest to everyone involved with computers and how they arrived at their present state. Wilkes presents his perspectives with keen historical sensibility and engineering practicality. Readers are invited to consider these observations and form their own perspectives on the present state of the computer art.

Computer Risk Manager

  • 1st Edition
  • October 31, 1992
  • K.R. Pursall
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 6 7 8 - 4
Please note this is a Short Discount publication.A comprehensive guide to EDP contingency planning and disaster recovery.Thoroughly revised and updated from the last edition [published 1989], this best selling management guide has been re–written to reflect the latest thinking on contingency planning.The new third edition follows the same step–by–step practical guidance as the last edition – presenting an immediate source of reference for anyone wanting to develop their own contingency plan BEFORE a systems disaster. As well as a useful check for those assessing the security of their present systems.Who should read it:★ IT Managers★ Operations Managers★ Computer Security Managers★ MIS Managers★ Technical Support Managers★ Computer Manufacturers and Suppliers★ Computer Auditors★ General Managers

Data Protection and Security for Personal Computers

  • 1st Edition
  • October 30, 1992
  • R. Schifreen
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 4 7 4 - 2
Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively.Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security conscious manager in an organization.Practical, comprehensive and easy to read, this guide will ensure that the reader is aware of everything concerned with maintaining the confidentiality, availability and integrity of data on personal computers and local area networks.UNIQUE FEATURES INCLUDE:– Totally PC and LAN specific– Practical tips and guidance– Comprehensive coverage of the topic– Unique action sheets for immediate implementation– Step–by– step coverage, easy to read, with limited technical jargonWHO SHOULD READ THIS GUIDE:– PC support managers, security managers, IT managers, sales and marketing managers, personnel officers, financial directors and all those responsible for corporate data.– Senior managers who wish to ensure that data on their employees PC's is safe at all times.– Managers with little computing or security experience who wish to implement a security policy throughout an organization.Please note this is a Short Discount publication.

Computer Security in Financial Organizations

  • 1st Edition
  • September 21, 1990
  • J. Essinger
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 4 6 2 - 9
This book provides a unique in–depth focus on how financial organizations and suppliers of computer security are currently addressing – in strategic terms – the problem of computer security.Written in an easy to read, non technical style the book is essential reading for all those involved in the management of this sensitive area, from computer security managers, financial directors and managers to analysts and designers in financial software houses.The report analyses the computer security requirements of a wide variety of organizations in the financial services sector, ranging from retail, commercial and investment banks to financial trading and investment management organizations.

Safety of Computer Control Systems 1990 (SAFECOMP'90)

  • 1st Edition
  • April 12, 1990
  • B.K. Daniels
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 8 3 5 - 1
The market for safe, secure and reliable computer systems is expanding continuously and these Proceedings provide an opportunity to review the growth during the last decade and identify skills and technologies required for continued development in the area. The papers cover the experiences gained from specifying, creating, operating, and licensing computers in safety, security and reliability related applications. There are reviews of guidelines and industrial applications, with a section covering methods and tools used in designing, documenting, analysing, testing and assessing systems dependent on the SAFECOMP factors.