Skip to main content

Books in Internet and web technology

151-160 of 169 results in All results

Microsoft SharePoint Portal Server

  • 1st Edition
  • December 20, 2001
  • Kevin Laahs + 2 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 9 4 3 - 9
Use Microsoft SharePoint Portal Server 2001 as a foundation for building knowledge sharing applications. This book details how IT professionals can plan, design and implement web based solutions using Microsoft's Intranet Portal. Written by experts from Compaq, the world's prime integrator of Exchange systems and Microsoft's Partner of the Year, the book illustrates how easy it is to create sophisticated knowledge based applications using SharePoint Portal Server. It provides an excellent overview of the built-in features and functionality of SharePoint Portal Server, and describes how a Portal coordinator can easily customize the product to fit their business needs.The book blends expert instruction, best practices, and project blueprints, and effectively guides readers through the process of creating a knowledge sharing solution using Microsoft SharePoint Portal Server 2001.

The Wireless Internet Explained

  • 1st Edition
  • November 1, 2001
  • John Rhoton
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 2 1 1 8 - 3
The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press's successful Programmer's Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial field of wireless communications.

Microsoft Exchange 2000 Infrastructure Design

  • 1st Edition
  • September 28, 2001
  • Kieran McCorry + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 5 5 5 8 - 2 4 5 - 6
Microsoft Exchange 2000 Infrastructure Design explains from a system designer's and administrator's perspective Microsoft's Active Directory and its interaction with Exchange 2000, details issues concerned with migration to Exchange 2000, and outlines the specific technology and design issues relating to connectivity with Exchange 2000. Readers will learn to use these technologies to seamlessly co-exist with their current environment, migrate to a native Exchange 2000 environment, and connect to the Internet as well as to other messaging systems. The book's blend of expert instruction and best practices will help any organization create optimal system designs and configurations to support different technical and business scenarios. McCorry and Livengood are experts in Microsoft technologies from Compaq, the world's leading integrator of Exchange systems. In Microsoft Exchange 2000 Infrastructure Design, they spell out the key technologies, features, and techniques IT professionals must master to build a unified and robust Exchange 2000 messaging service. This book details the framework organizations must put in place to most effectively move to Exchange 2000.

Electronic Commerce

  • 1st Edition
  • August 23, 2001
  • Hossein Bidgoli
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 0 5 2 9 - 9
This four-part overview of electronic commerce offers a more thorough and technical view of the subject than many recent books on the subject. The book provides a balance of theories, applications, and hands-on material. Electronic Commerce is divided into four parts: Electronic Commerce Basics, Electronic Commerce Supporting Activities, Implementation and Management Issues in Electronic Commerce, and Appendix and Glossary. The book's chapters begin with introductions of leading companies with significant e-commerce expertise and at least two small case studies. They include 10 or more hands-on exercises, encouraging readers to explore and analyze sites, and a list of key terms and bibliographic citations. They conclude with 25-30 review questions and 6-10 projects for further investigation.

Advances in Computers

  • 1st Edition
  • Volume 55
  • July 25, 2001
  • Marvin Zelkowitz
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 0 1 2 1 5 5 - 7
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 5 1 4 4 - 7
Volume 55 covers some particularly hot topics. Linda Harasim writes about education and the Web in "The Virtual University: A State of the Art." She discusses the issues that will need to be addressed if online education is to live up to expectations. Neville Holmes covers a related subject in his chapter "The Net, the Web, and the Children." He argues that the Web is an evolutionary, rather than revolutionary, development and highlights the division between the rich and the poor within and across nations. Continuing the WWW theme, George Mihaila, Louqa Raschid, and Maria-Esther Vidal look at the problems of using the Web and finding the information you want.Naren Ramakrishnan and Anath Grama discuss another aspect of finding relevant information in large databases in their contribution. They discuss the algorithms, techniques, and methodologies for effective application of scientific data mining.Returning to the Web theme, Ross Anderson, Frank Stajano, and Jong-Hyeon Lee address the issue of security policies. Their survey of the most significant security policy models in the literature shows how security may mean different things in different contexts.John Savage, Alan Selman, and Carl Smith take a step back from the applications and address how theoretical computer science has had an impact on practical computing concepts. Finally, Yuan Taur takes a step even further back and discusses the development of the computer chip.Thus, Volume 55 takes us from the very fundamentals of computer science-the chip-right to the applications and user interface with the Web.

Hack Proofing Your E-commerce Web Site

  • 1st Edition
  • May 15, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 1 0 - 4
From the authors of the bestselling Hack Proofing Your Network!Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information.Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures. * Heightened media awareness of malicious attacks against "secure" sites guarantees a wide audience * Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks

Configuring ISA Server 2000

  • 1st Edition
  • May 11, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 7 7 - 3
Microsoft's flagship ISA Server delivers the Internet to your customers!As the demand for Internet connectivity reaches a fever pitch, system administrators are being challenged to connect more and more systems to the Internet without compromising security or network performance. ISA Server 2000 provides system administrators with a revolutionary management infrastructure that addresses the two greatest needs of Enterprise-wide Internet connectivity: Security and speed.Written by best-selling author of several MCSE 2000 study guides, this book will provide the system administrators with an in depth understanding of all the critiacl features of Microsoft's flag ship Internet Server. Configuring ISA Server 2000 shows network administrators how to connect a network to the Internet, maintain the connection, and troubleshoot remote users' hardware and software configuration problems.

Internet QoS

  • 1st Edition
  • March 5, 2001
  • Zheng Wang
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 5 4 8 - 4
Guaranteeing performance and prioritizing data across the Internet may seem nearly impossible because of an increasing number of variables that can affect and undermine service. But if you're involved in developing and implementing streaming video or voice, or other time-sensitive Internet applications, you understand exactly what's at stake in establishing Quality of Service (QoS) and recognize the benefits it will bring to your company. What you need is a reliable guide to the latest QoS techniques that addresses the Internet's special challenges. Internet QoS is it-the first book to dig deep into the issues that affect your ability to provide performance and prioritization guarantees to your customers and users! This book gives a comprehensive view of key technologies and discusses various analytical techniques to help you get the most out of network resources as you strive to make, and adhere to, meaningful QoS guarantees.

Mission-Critical Microsoft Exchange 2000

  • 1st Edition
  • December 27, 2000
  • Jerry Cochran
  • English
  • Paperback
    9 7 8 - 1 - 5 5 5 5 8 - 2 3 3 - 3
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 1 1 7 4 - 0
Mission-Critical Microsoft Exchange 2000 is the definitive book on how to design and maintain extremely reliable and adaptive Exchange Server messaging systems that rarely crash and that preserve valuable data and services in spite of technical disruptions. E-mail systems are now a primary means of communication for organizations, which can afford e-mail down-time no more than they can afford to be without phones. Further, messaging systems increasingly are supporting vital applications in addition to e-mail, such as workflow and knowledge management, making the data they store both voluminous and incredibly valuable. Mission-Critical Microsoft Exchange 2000 teaches system designers, administrators and developers the strategies, tools, and best practices they'll need to plan and implement highly-available systems on Exchange 2000 and on earlier versions of Exchange. The book explains Exchange back-up and disaster recovery techniques, Windows clustering technologies for Exchange systems, and security planning to resist messaging-based attacks. Written by Jerry Cochran, an authority on large-scale Exchange systems, Mission-Critical Microsoft Exchange 2000 helps readers create Exchange systems upon which they can build large and growing organizations.

E-Mail Virus Protection Handbook

  • 1st Edition
  • November 6, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 7 5 3 - 4
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.

Related subjects