Skip to main content

Books in Internet and web technology

111-120 of 169 results in All results

Advances in Computers

  • 1st Edition
  • Volume 64
  • May 11, 2005
  • Marvin Zelkowitz
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 5 9 5 8 - 5
Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computer science, with many citations and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume emphasizes the role of the internet, the world wide web and other aspects of a distributed computing environment. Open source development as well as computing for the handicapped are additional important topics. Key Features: In-depth surveys and tutorials on new computer technology Well-known authors are researchers in the field Extensive bibliographies with most chapters Important chapters on new technologies for software development: open source development and the technology needed to use the web for electronic commerce

Content Networking

  • 1st Edition
  • February 15, 2005
  • Markus Hofmann + 1 more
  • English
  • Hardback
    9 7 8 - 1 - 5 5 8 6 0 - 8 3 4 - 4
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 0 7 7 - 9
As the Internet has grown, so have the challenges associated with delivering static, streaming, and dynamic content to end-users. This book is unique in that it addresses the topic of content networking exclusively and comprehensively, tracing the evolution from traditional web caching to today's open and vastly more flexible architecture. With this evolutionary approach, the authors emphasize the field's most persistent concepts, principles, and mechanisms--the core information that will help you understand why and how content delivery works today, and apply that knowledge in the future.

Google Hacking for Penetration Testers

  • 1st Edition
  • December 17, 2004
  • Johnny Long
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 0 5 - 0
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don’t realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker’s search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.

Network Algorithmics

  • 1st Edition
  • December 15, 2004
  • George Varghese
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 0 8 8 4 7 7 - 3
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 9 6 4 - 4
In designing a network device, you make dozens of decisions that affect the speed with which it will perform—sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals. Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles—ranging from the commonly recognized to the groundbreaking—that are key to breaking these bottlenecks. The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who have made this work their goal. FOR INSTRUCTORS: To obtain access to the solutions manual for this title simply register on our textbook website (textbooks.elsevier.com)and request access to the Computer Science subject area. Once approved (usually within one business day) you will be able to access all of the instructor-only materials through the "Instructor Manual" link on this book's academic web page at textbooks.elsevier.com.

Student's Essential Guide to .NET

  • 1st Edition
  • December 8, 2004
  • Tony Grimer
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 5 5 1 4 - 3
The Student's Essential Guide to .NET provides a clear and simple overview of Microsoft's .NET technologies. It is aimed at second and third year undergraduate students and postgraduate students on Computing or Computer Science courses who are required to look at a modern operating system, (Microsoft Windows 9x, Nt 2000 or XP) and to design and code simple or even not so simple examples. The approach is based upon the student's learning the technology of .NET through examples using the supported languages C#, VB and C++. The examples are based on fun, familiar games, and students are encouraged to review reference material to refine their skills on key aspects of the architecture. Review questions and worked examples enhance the learning process and the material is supported by the author's website, which contains extensive ancillary material.

Voice over Internet Protocol (VoIP) Security

  • 1st Edition
  • November 19, 2004
  • James F. Ransome PhD CISM CISSP + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 0 4 6 - 7
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today’s complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.

Microsoft SharePoint Technologies

  • 1st Edition
  • November 17, 2004
  • Kevin Laahs + 2 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 9 4 4 - 6
Microsoft SharePoint Technologies: Planning, Design and Implementation provides an in-depth examination of the tasks involved in planning, designing and deploying SharePoint in your enterprise. The book examines SharePoint from the user's perspective, the administrator's perspective, and the application developer's perspective and looks at how you can maximize your investment by integrating SharePoint features with Office 2003 and other enterprise applications in your environment. The authors are experienced consultants that have helped many large corporations deploy Microsoft technologies within their enterprise. This book is filled with practical experience and knowledge gained from working with customers in the field.

Why Intranets Fail (and How to Fix Them)

  • 1st Edition
  • October 31, 2004
  • Luke Tredinnick
  • English
  • eBook
    9 7 8 - 1 - 7 8 0 6 3 - 0 7 1 - 7
Why Intranets Fail (and How to Fix Them) is a practical guide to some of the common problems associated with Intranets, and solutions to those problems. The book takes a unique end-user perspective on the role of intranets within organisations. It explores how the needs of the end-user very often conflict with the needs of the organisation, creating a confusion of purpose that impedes the success of intranet. It sets out clearly why intranets cannot be thought of as merely internal Internets, and require their own management strategies and approaches. The book draws on a wide range of examples and analogies from a variety of contexts to set-out in a clear and concise way the issues at the heart of failing intranets. It presents step-by-step solutions with universal application. Each issue discussed is accompanied by short practical suggestions for improved intranet design and architecture.

Dr. Tom Shinder's Configuring ISA Server 2004

  • 1st Edition
  • October 15, 2004
  • Debra Littlejohn Shinder + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 9 3 1 8 3 6 - 1 9 - 7
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 7 4 0 - 4
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market.

Weblogs and Libraries

  • 1st Edition
  • September 30, 2004
  • Laurel Clyde
  • English
  • eBook
    9 7 8 - 1 - 7 8 0 6 3 - 1 8 2 - 0
This book discusses the topic of ‘weblogs and libraries’ from two main perspectives: weblogs as sources of information for libraries and librarians; and weblogs as tools that libraries can use to promote their services and to provide a means of communication with their clients. It begins with an overview of the whole weblog and blogging phenomenon. The many different kinds of weblogs are outlined (including personal weblogs, community weblogs, multimedia weblogs). The problem of locating weblogs is addressed through a discussion of weblog directories, search engines and other finding tools. Chapters include using weblogs as sources of information in the library or information service, the options for creating a weblog, and managing the library’s own weblog.

Related subjects