Author(s) : Paul Nielsen
Publisher : Wiley
Year : Nov 2006
ISBN 10 : 0764542567
ISBN 13 : 9780764542565
Language : English
Pages : 1293
File type : PDF
Size : 14.9 MB (book + source code)
Like all books in the Bible series, you can expect to find both hands-on tutorials and real-world practical applications, as well as reference and background information that provides a context for what you are learning. However, to cover every minute detail of every command of this very complex product would consume thousands of pages, so it is the second goal of this book to provide a concise yet comprehensive guide to SQL Server 2005 based on the information I have found most useful in my experience as a database developer, consultant, and instructor. By the time you have completed the SQL Server 2005 Bible, you will be well prepared to develop and manage your SQL Server 2005 database.
Whether you are a database developer or a database administrator, whether you are just starting out, have one year of experience or five, this book contains material that will be useful to you. This book is written so that you can learn from my experience and the experience of the co-authors. Each chapter begins with the assumption that you’ve never seen the topic before, and then progresses through the subject, presenting the information that makes a difference.
TABLE OF CONTENT:
PART 1 - Laying The Foundation
PART 2 - Manipulating Data With Select
PART 3 - Developing With SQL Server
PART 4 - Enterprise Data Management
PART 5 - Business Intelligence
PART 6 - Optimization Strategies
PART 7 - Appendixes
http://rapidshare.com/files/80544337/sqls25bib.rar
or
http://mihd.net/0db2yx
Mastering OpenLDAP: Configuring, Securing and Integrating Directory, Services (Paperback) Aug.2007.eBook-BBL
TITLE : Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services (Paperback)
AUTHOR : by Matt Butcher (Author)
PUBLISHER : Packt Publishing publisher
ISBN : 1847191029
EDITION : 1st
PUB DATE : August 31, 2007
LANGUAGE : English
RLS DATE : 01/20/2008
MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 02 x 2.88 MB
[ R e l e a s e N o t e s ]
This practical introduction to OpenLDAP for Application Developers
emphasizes how to get things done, going into Lightweight Directory
Access Protocol (LDAP) theory only to answer practical questions. It
demystifies OpenLDAP, providing a solid understanding of how to use its
directory and covering building directory services, integrating
directory services, and developing directory-enabled PHP or Python
applications. Readers need only basic Linux system administration
experience, not LDAP experience. Open-source OpenLDAP directory server
is included in all major Linux distributions; many open-source and
proprietary applications can use OpenLDAP's services. Client
applications use LDAP to connect to OpenLDAP, search the directory, and
(if authorized) modify and manipulate records. Most often used to
provide network-based authentication services for users, LDAP servers
have many other uses: address book, DNS database, organizational tool,
even network object store for applications.
PHP Oracle Web Development: Data processing, Security, Caching, XML, Web Services, and Ajax (Paperback) Aug.2007.eBook-BBL
TITLE : PHP Oracle Web Development: Data processing, Security, Caching, XML, Web Services, and Ajax (Paperback)
AUTHOR : by Yuli Vasiliev (Author)
PUBLISHER : Packt Publishing publisher
ISBN : 1847193633
EDITION : 1st
PUB DATE : August 03, 2007
LANGUAGE : English
RLS DATE : 01/20/2008
MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 02 x 2.88 MB
[ R e l e a s e N o t e s ]
This practical book for PHP/Oracle developers is built around well
explained, easy-to-follow example code to build robust, efficient,
secure solutions covering popular current topics on using PHP with
Oracle. Assuming no special skill level, experienced author Yuli
Vasiliev shows how to install and configure PHP and Oracle; connect PHP
to Oracle; move application business logic to Oracle; build
transactional applications; use security features; improve performance
with caching; employ XML features; implement SOAP web services; build
Ajax-driven PHP/Oracle solutions. Building and deploying PHP
applications on Oracle Database combines the power and robustness of
Oracle with the easy, rapid development of open-source PHP to achieve
high-performance, scalable, reliable data-driven web applications with
minimal effort. Unlike some other databases, Oracle allows building the
key business logic of PHP applications inside the database, moving data
processing from web server to database server.
TITLE : CCNA Exam Prep (Exam 640-802) (2nd Edition) (Exam Prep) (Paperback)
AUTHOR : by Jeremy Cioara (Author), David Minutella (Author), Heather Stevenson (Author)
PUBLISHER : Que publisher
ISBN : 0789737132
EDITION : 2nd
PUB DATE : December 28, 2007
LANGUAGE : English
RLS DATE : 01/20/2008
MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 05 x 2.88 MB
[ R e l e a s e N o t e s ]
The CCNA Exam Prep, Second Edition, is an in-depth training guide for
the new CCNA (Cisco Certified Network Associate) certification from
Cisco. Published in the popular Exam Prep series, the book incorporates
all the topics tested in this newly-revised exam, including new
security, VPN, wireless, IPv6, and troubleshooting coverage. The authors
emphasize sub-netting concepts because this is historically a difficult
roadblock for Cisco certification candidates. This Exam Prep covers all
the exam objectives and will give you a thorough understanding of each
testable concept in addition to real-world configuration examples for
configuring a wide range of Cisco devices. The Prep begins with an
objectives quick reference and includes chapter summaries with a list of
key terms, exercises, review questions, and an exam on chapter content
with detailed answers. Exam Preps include notes, tips, cautions, and
exam alerts to help you focus on important issues. If you are preparing
for this exam you will find the Exam Prep series to be the complete
certification solution for the CCNA exam.
Networking with Microsoft Windows Vista: Your Guide to Easy and, Secure Windows Vista Networking (Paperback) Dec.2007.eBook-BBL
TITLE : Networking with Microsoft Windows Vista: Your Guide to Easy and Secure Windows Vista Networking (Paperback)
AUTHOR : by Paul McFedries (Author)
PUBLISHER : Que publisher
ISBN : 0789737779
EDITION : 1st
PUB DATE : December 29, 2007
LANGUAGE : English
RLS DATE : 01/20/2008
MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 06 x 2.88 MB
[ R e l e a s e N o t e s ]
Your Guide to Easy and Secure Windows Vista Networking is a complete
beginner's guide to creating, configuring, administering, and using a
small network using Windows Vista computers. Inside you'll find
comprehensive coverage of networking hardware, including Ethernet
(wired) hardware (from NICs to cables to switches to routers) and
wireless Hardware--from wireless NICs to access points to range
extenders.
We include handy “buyer's guides” that tell you how to make smart
choices when purchasing network hardware. With hardware in hand, we then
show you how to roll up your shirtsleeves and put everything together,
including configuring a router, laying cable, and connecting the
devices. Next, we then show you how to wrangle with Windows Vista's
networking features. These techniques include using the Network and
Sharing Center, managing wired and wireless connections, accessing
shared network resources, sharing local resources on the network, and
working with network files offline. And if you are a music and video
aficionado, we've got you covered with a special chapter that shows you
just how to set up a networked Vista PC as your digital media hub!
No networking book would be complete without extensive coverage of
security issues that affect anyone connected to the Internet. We show
you how to secure each computer, secure your global networking settings,
and batten down your wireless connections. The last part of the book
includes intermediate networking tasks such as
making remote connections, monitoring the network, troubleshooting
network problems, and setting up Vista's built-in web server and FTP
server.
- No longer is networking a topic that only geeks need to understand.
If you have even one computer on the Internet or if you use wireless
in your home or office, you need this book!
- Extensive hardware coverage that shows you what equipment to
buy and how to set it up!
- Easy to follow buyer's guides that enable anyone to make smart
and informed choices when purchasing networking hardware.
- Complete and comprehensive coverage of Windows Vista's
networking features.
- Thwart hackers, crackers, thieves and other Internet malefactors
by following our easy to understand chapters on security!
- Loaded with tips, tricks, and shortcuts to make networking easier
and more secure.
- Chock full of real-world examples and network configurations that
you can put to work today!
Oracle Application Server Portal Handbook (Osborne Oracle Press), (Paperback) Jul.2007.eBook-BBL
TITLE : Oracle Application Server Portal Handbook (Osborne Oracle Press) (Paperback)
AUTHOR : by Chris Ostrowski (Author)
PUBLISHER : McGraw-Hill publisher
ISBN : 0072264608
EDITION : 1st
PUB DATE : July 23, 2007
LANGUAGE : English
RLS DATE : 01/21/2008
MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 06 x 2.88 MB
[ R e l e a s e N o t e s ]
The Ultimate Oracle Application Server Portal Resource
Build dynamic, feature-rich enterprise portals using Oracle Application
Server Portal and the expert information in this exclusive Oracle Press
guide. You'll learn how to maximize the capabilities of Oracle
Application Server Portal, customize your portals, integrate Oracle
Forms and Oracle Reports, and add Java functionality. Oracle Application
Server Portal Handbook covers all of the design, management, and
security features available in Oracle Application Server Portal 10.1.4
alongside real-world solutions.
- Take full advantage of the built-in tools and wizards
- Create rich end-user experiences quickly and easily
- Customize pages and maintain site-wide consistency using HTML
templates
- Incorporate data from disparate formats using Oracle Application
Server Portal's content management features
- Build pages using OmniPortlet and the Web clipping studio
- Write portlets with Java and Oracle JDeveloper
- Implement SOA-based applications to connect business processes
- Administer, tune, and secure Oracle Application Server Portal
- Integrate Oracle Forms, Oracle Reports, and Oracle Discoverer
workbooks
TITLE : PHP Programming Solutions (Paperback)
AUTHOR : by Vikram Vaswani (Author)
PUBLISHER : McGraw-Hill publisher
ISBN : 007148745X
EDITION : 1st
PUB DATE : June 08, 2007
LANGUAGE : English
RLS DATE : 01/21/2008
MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 02 x 1.44 MB
[ R e l e a s e N o t e s ]
Find real-world solutions to PHP programming problems
Simplify and shorten the PHP application development cycle using the
in-depth information contained in this hands-on guide. PHP Programming
Solutions clearly lays out more than 250 programming challenges
alongside practical solutions, functioning code, detailed explanations,
and usage tips. Inside, you'll learn to manipulate strings and arrays,
work with HTML and Web pages, accept and validate user input, parse XML
code, and resolve programming problems using PEAR and PECL widgets and
extensions. Plus, you'll get detailed coverage of PHP security issues,
SQL database interaction, debugging techniques, and error processing.
- Work with numbers, strings, dates, times, files, and directories
- Build complex data structures using PHP's array manipulation API
- Use functions and classes to build modular, reusable code
- Create, update, and cache HTML documents and Web content
- Obtain and process user input submitted via online forms
- Protect, log, and debug PHP script actions
- Authenticate and track users with sessions and cookies
- Traverse, validate, and transform XML documents
- Store and retrieve data from MySQL, PostgreSQL, and Oracle databases
- Interface with different server types, network protocols, and file
formats
- Perform efficient exception handling and error processing
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition [ILLUSTRATED] (Paperback) Nov.2007.eBook-BBL
TITLE : Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition [ILLUSTRATED] (Paperback)
AUTHOR : by Michael W. Lucas (Author)
PUBLISHER : No Starch Press publisher
ISBN : 1593271514
EDITION : 2nd
PUB DATE : November 14, 2007
LANGUAGE : English
RLS DATE : 01/20/2008
MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 02 x 2.88 MB
[ R e l e a s e N o t e s ]
FreeBSD—the powerful, flexible, and free Unix-like operating system—is
the preferred server for many enterprises. But it can be even trickier
to use than either Unix or Linux, and harder still to master.
Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written
by FreeBSD committer Michael W. Lucas. Lucas considers this completely
revised and rewritten second edition of his landmark work to be his best
work ever; a true product of his love for FreeBSD and the support of the
FreeBSD community. Absolute FreeBSD, 2nd Edition covers installation,
networking, security, network services, system performance, kernel
tweaking, filesystems, SMP, upgrading, crash debugging, and much more,
including coverage of how to:
- Use advanced security features like packet filtering, virtual
machines, and host-based intrusion detection
- Build custom live FreeBSD CDs and bootable flash
- Manage network services and filesystems
- Use DNS and set up email, IMAP, web, and FTP services for both
servers and clients
- Monitor your system with performance-testing and troubleshooting
tools
- Run diskless systems
- Manage schedulers, remap shared libraries, and optimize your system
for your hardware and your workload
- Build custom network appliances with embedded FreeBSD
- Implement redundant disks, even without special hardware
- Integrate FreeBSD-specific SNMP into your network management system.
Whether you're just getting started with FreeBSD or you've been using it
for years, you'll find this book to be the definitive guide to FreeBSD
that you've been waiting for.
C# was designed from the ground up for development on Microsoft's .NET framework. As such, it's a high-performance language that's simple, safe, object-oriented, and Internet-centric. Programming C#, 2nd Edition teaches this new language in a way that experienced programmers will appreciate--by grounding its applications firmly in the context of Microsoft's .NET platform and the development of desktop and Internet applications.
The first part of this book introduces C# fundamentals, then goes on to explain:
Classes and objects
Inheritance and polymorphism
Operator overloading
Structs and interfaces
Arrays, indexers, and collections
String objects and regular expressions
Exceptions and bug handling
Delegates and events
Part two of Programming C#, 2nd Edition focuses on development of desktop and Internet applications, including Windows Forms, ADO.NET and ASP.NET. ASP.NET includes Web Forms, for rapid development of web applications, and Web Services for creating objects without user interfaces, to provide services over the Internet.
Part three gets to the heart of the .NET Framework, focusing on attributes and reflection, remoting, threads and cynchronization, and streams. Part three also illustrates how to interoperate with COM objects.
In much the way that you can see the features and personality of the parents and grandparents in young children, you can easily see the influence of Java, C++, Visual Basic, and other languages in C#. The level of information in Programming C#, 2nd Edition allows you to become productive quickly with C# and to rely on it as a powerful addition to your family of mastered programming languages.
Book Description
Visual Basic .NET Black Book is a comprehensive reference and problem-solving guide for Visual Basic programmers. It covers Visual Basic .NET tips, examples, and how-to's on everything from programming to managing Visual Basic applications. It provides in-depth material on the new object-oriented features of Visual Basic .NET. Plus readers will learn the crucial Visual Basic tool set in detail including best Visual Basic programming practices, from design tools to flowcharts. Using the popular Black Book format, this book provides in-depth analyses of VB.NET technologies and hundreds of immediate programming solutions making it an invaluable desktop companion.
About the Author
Steven Holzner (Cambridge, MA) is a former contributing editor for PC Magazine and has authored more than 60 books ranging in subject from assembly language to C++. His books have sold over a million copies and have been translated into 15 languages. Steven was on the faculty of Cornell University for 10 years, where he earned his Ph.D., and has also been on the faculty of his undergraduate school, Massachusetts Institute of Technology.
M J Neale "Linux: The Complete Reference, Sixth Edition "
McGraw-Hill Osborne Media | 2007-11-19 | ISBN: 007149247X | 830 pages | PDF | 4,1 Mb
Your one-stop guide to Linux--fully revised and expanded. Get in-depth coverage of all Linux features, tools, and utilities from this thoroughly updated and comprehensive resource, designed for all Linux distributions. Written by Linux expert Richard Petersen, this book explains how to get up-and-running on Linux, use the desktops and shells, manage applications, deploy servers, implement security measures, and handle system and network administration tasks.
With full coverage of the latest platform, Linux: The Complete Reference, Sixth Edition includes details on the very different and popular Debian (Ubuntu) and Red Hat/Fedora software installation and service management tools used by most distributions. This is a must-have guide for all Linux users.
Install, configure, and administer any Linux distribution
Work with files and folders from the BASH, TCSH, and Z shells
Use the GNOME and KDE desktops, X Windows, and display managers
Set up office, database, Internet, and multimedia applications
Secure data using SELinux, netfilter, SSH, and Kerberos
Encrypt network transmissions with GPG, LUKS, and IPsec
Deploy FTP, Web, mail, proxy, print, news, and database servers
Administer system resources using HAL, udev, and virtualization (KVM and Xen)
Configure and maintain IPv6, DHCPv6, NIS, networking, and remote access
Access remote files and devices using NFSv4, GFS, PVFS, NIS, and SAMBA
Build and manage a scalable storage infrastructure with Oracle Automatic Storage Management
Streamline data management and provisioning using Oracle Automatic Storage Management (Oracle ASM) and the detailed information contained in this exclusive Oracle Press resource. Written by a team of database experts, Oracle Automatic Storage Management: Under-the-Hood & Practical Deployment Guide explains how to build and maintain a dynamic, highly available Oracle database storage environment. Inside, you'll learn how to configure storage for Oracle ASM, build disk groups, use data striping and mirroring, and optimize performance. You'll also learn how to ensure consistency across server and storage platforms, maximize data redundancy, and administer Oracle ASM from the command line.
*
Manage Oracle ASM Instances and configure Oracle RDBMS instances to leverage Oracle ASM
* Define, discover, and manage disk storage under Oracle ASM
* Create external, normal-redundancy, and high-redundancy disk groups
* Add and remove Oracle ASM storage without affecting RDMS instance availability
* Learn how Oracle ASM provides even I/O distribution
* Work with Oracle ASM directories, files, templates, and aliases
* Improve storage performance and integrity using the ASMLIB API
* Simplify system administration with the Oracle ASM command line interface
*
Understand key internal Oracle ASM structures and algorithms
About the Author
Nitin Vengurlekar works at Oracle in the Real Application Cluster (RAC) engineering group, with specific emphasis on ASM. Nitin is a popular conference presenter on this topic.
Murali Vallath is an Oracle Certified Database Administrator and is president of the Oracle RAC Special Interest Group.
Rich Long is Director of Development for Automatic Storage Management at Oracle and has managed ASM development since the project’s inception.
The Oracle Hacker's Handbook: Hacking and Defending Oracle
The Oracle Hacker's Handbook (OHH) is a collection of techniques that could be used by an attacker to gain unauthorised access to an Oracle database server upto and including 10gR2. Most of these techniques are currently not public, so OHH is both new knowledge for an attacker and vital warning to those responsible for securing Oracle servers.
In a nutshell the new attacks include how to gain the version number remotely, brute force usernames, gain passwords/hashes from the OS, attack the listener, escalate privilege internally through PLSQL Packages and Triggers both directly and indirectly as well as defeating VPD. These attacks are illustrated both directly and through application server. By using these techniques and by accessing the Oracle files directly through the OS an attacker would be able to gain DBA privileges on most secured servers. Additionally using the code examples included an attacker could gain password hashes and then the actual DBA clear text password from the network using the password decryption code included. This will work even with complex quoted passwords.
This is the most effective public analysis of security vulnerabilities in Oracle products so far.
OHH is a technical book and not really an introduction to the subject though it could be picked up reasonably quickly as the text avoids unnecessary jargon.
The book could be enhanced by including more on defense strategies, such as, how to prepare and respond to an attack where the attacker has gained the clear text DBA password.
OHH has a free download site for pre-written proof of concept code which will helps avoid unnecessary typing. From a general readability point of view the book is concise and to the point. The sections are logically laid out and the examples have worked when tested. I would recommend those involved in Oracle security to read this book as soon as they can.
# 226 pages
# Publisher: Wiley (January 30, 2007)
# Sold by: Amazon Digital Services
# ASIN: B000WN0M80
HAS BOTH PDF AND CHM INCLUDED
http://rapidshare.com/files/86952707/Nlder__2_.rar
Book Description
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms. Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security. Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats.
From Booklist
Once more, Loompanics publishes something other houses wouldn't: a guide to violating computer security. Covering hacking scenarios ranging from the merely mischievous to the criminal, the super hacker known as the Knightmare gives step-by-step instructions in meaningful hacking from a personal computer. Fortunately, he also includes a section on state and federal computer laws, allowing potential hackers to be cognizant of the sanctions they risk with any particular project. Appendixes offer an array of technical explanations and tips for understanding database and system structures; tips cover password divination and searching strategies; and a glossary, besides explaining terms likely to be encountered in any particular documentation being hacked, enhances the hacker's ability to share experiences and tips. As science outstrips society's control of information, systems of secretkeeping proliferate maddeningly. Yet with this book, the keyboard jockey can enter all sorts of "secure" systems, databases, and records; and a hacker-security chapter explains both why hacking is a valuable and useful activity and--equally important because entering and altering systems without clearance is generally illegal--how to avoid getting caught. Mike Tribby
Book Description
No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Microsoft Windows Server 2003! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication, VPNs, secure email, Web SSL, EFS, and code-signing applications using Windows Server PKI and certificate services. Microsoft's principal PKI consultant, along with members of the Microsoft PKI Team, shows you how to incorporate best practices, avoid common design and implementation mistakes, help minimize risk, and optimize security administration.
About the Author
Brian Komar is a principal consultant for Microsoft Corporation, specializing in network security and public key infrastructure (PKI). Brian has authored MCSE Training Kits, Microsoft Prescriptive Architecture Guides, and PKI white papers, and he is the coauthor of the Microsoft Windows Security Resource Kit. Brian is a frequent speaker at IT conferences such as Microsoft TechEd, MCP TechMentor, and Windows and .NET Magazine Connections.
David Cross, Microsoft’s PKI program manager is a contributing author to this book.