Catálogo de publicaciones

Compartir en
redes sociales


Navegación

Tipo

Acceso

Plataformas

Temática

Mostrando 10 de 11.986 registro(s)

Filtros temática quitar todos

How to Attack and Defend Your Website

Más información

978-0-12-802732-5 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2014 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias  

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities.

This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols.

How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.

  • Learn the basics of penetration testing so that you can test your own website's integrity and security
  • Discover useful tools such as Burp Suite, DVWA, and SQLMap
  • Gain a deeper understanding of how your website works and how best to protect it

How to Build a Digital Library

Más información

978-1-55860-790-3 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2003 ScienceDirect

Cobertura temática: Ciencias biológicas - Ciencias agrícolas y veterinarias - Medios de comunicación  


Given modern society's need to control its ever-increasing body of information, digital libraries will be among the most important and influential institutions of this century. With their versatility, accessibility, and economy, these focused collections of everything digital are fast becoming the "banks" in which the world's wealth of information is stored.


How to Build a Digital Library is the only book that offers all the knowledge and tools needed to construct and maintain a digital library-no matter how large or small. Two internationally recognized experts provide a fully developed, step-by-step method, as well as the software that makes it all possible. How to Build a Digital Library is the perfectly self-contained resource for individuals, agencies, and institutions wishing to put this powerful tool to work in their burgeoning information treasuries.

* Sketches the history of libraries-both traditional and digital-and their impact on present practices and future directions
* Offers in-depth coverage of today's practical standards used to represent and store information digitally
* Uses Greenstone, freely accessible open-source software-available with interfaces in the world's major languages (including Spanish, Chinese, and Arabic)
* Written for both technical and non-technical audiences
* Web-enhanced with software documentation, color illustrations, full-text index, source code, and more


How to Cheat at Administering Office Communications Server 2007

Más información

978-1-59749-212-6 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias  

Microsoft Office Communications Server (OCS) 2007 is Microsoft’s latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voice over IP (VoIP), and audio conferencing and videoconferencing. It will work with your company’s existing telecommunications systems without major hardware upgrades. This means your business can deploy advanced VoIP and conferencing without tearing out its preexisting legacy telephone network.
How to Cheat at Administering Microsoft Office Communicator 2007 provides the busy system administrator with any easy-to-access reference that provides step-by-step instructions on how to install, configure, manage and troubleshoot Communicator across the network. It is the perfect tool for those who simply need to complete a task without reading through lots of theory and principles.

• Get Inside Microsoft Office Communications Server 2007
Learn what’s new in OCS 2007, compare the previous editions, understand OCS 2007 server roles, plan an OCS 2007 installation.
• Install the First OCS 2007 Front-End Server
Address the prerequisites, prepare active directory, install and configure OCS 2007 Enterprise Edition, and verify the installation summary.
• Configure the Edge Server
Install the Edge Server, work with certificates, deal with security issues, and test the Edge Server.
• Configure the Mediation Server
Install the Configuration Server, configure dialing rules, configure users for voice functionality, and test voice functionality.
• Configure Archiving
Address compliance requirements, understand archiving topology, and install the Archiving Server.
• Configure Conference Servers
Understand on-premises conferencing, use on-premises conferencing, understand Microsoft RoundTable, and install conferencing.
• Integrate OCS with PBX and IP-PBX Systems
Use a gateway, configure Cisco CallManager as a Gateway, and understand CSTA/SIP gateways.
• Integrate OCS with Exchange 2007 Unified Messaging
Master Exchange 2007 Unified Messaging and architecture, Configure Exchange 2007 UM, and Combine OCS with Exchange 2007 UM.
• Upgrade to Office Communications Server 2007
Plan your migration from LCS 2005 to OCS 2007, upgrade perimeter servers, upgrade director servers, upgrade front-end servers, perform user migration, and remove LCS 2005 from the network environment.

How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access

Más información

978-1-59749-137-2 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias  

The Perfect Reference for the Multitasked System Administrators
The new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat will help you get Exchange Server 2007 up and running as quickly and safely as possible.

• Understand Exchange 2007 Prerequisites
Review hardware and software requirements, Active Directory requirements, and more.
• Manage Recipient Filtering
Create a custom MMC that contains the Exchange 2007 Recipients work center, which can be used, for example, by the helpdesk staff in your organization.
• Manage Outlook Anywhere
Outlook Anywhere makes it possible for your end users to remotely access their mailboxes from the Internet using their full Outlook clients.
• Manage Outlook Web Access 2007
See how Outlook Web Access 2007 was completely rewritten in managed code to make it scale even better.
• Use the Exchange 2007 Queue Viewer
You can now view information about queues and examine the messages held within them.
• Master Powerful Out-of-the-Box Spam Protection
The Edge Transport server supports SMTP, provides several antispam filtering agents, and supports antivirus extensibility.
• Manage a Single-Copy Cluster-Based Setup
SCC-based cluster provides service failover and still has a single point of failure when it comes to the databases.
• Recover Mailbox Databases
Use the improved database portability feature to port and recover a Mailbox database to any server in the Exchange 2007 organization.

* Essential information for the multi-tasked System Administrator charged perform everyday tasks
* Includes the latest coverage of the major new release of Exchange Server
* Emphasizes best-practice security measures for all areas and in particular the area of remote access via Outlook

How to Cheat at Windows System Administration Using Command Line Scripts: Using Command Line Scripts

Más información

978-1-59749-105-1 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias  

How to Cheat at Windows Systems Administrators using Command line scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts.

With every new version of Windows, Microsoft is trying to ease the administration jobs by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these ‘wizards’ are interactive and make the administrator’s job easier, they are not always the most convenient and efficient way to accomplish the everyday administration tasks. These wizards are time consuming and, at times, may seem a bit confusing. The purpose of the book is to teach administrators how to use command-line scripts to complete everyday administration jobs, solve recurring network problems and at the same time improve their efficiency.

*Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently.

*No direct competition for a core tool for Windows administrators.

*Builds on success of other books in the series including How to Cheat at Managing Windows Small Business Server 2003 and How to Cheat at Managing Microsoft Operations Manager 2005.

How to Develop Robust Solid Oral Dosage Forms from Conception to Post-Approval

Más información

ISBNs: 978-0-12-804731-6 (impreso)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2017 ScienceDirect

Cobertura temática: Ciencias biológicas - Ingeniería química - Ciencias agrícolas y veterinarias  


libros Acceso Abierto
Agregar a Mi catálogo

How to improve immune reconstitution in allogeneic hematopoietic stem cell transplantation?

Más información

ISBNs: 9782889194919 (impreso)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere 2015 Directory of Open access Books acceso abierto

Cobertura temática: Ciencias biológicas - Medicina clínica - Ciencias de la salud - Otras ciencias sociales  


libros Acceso Abierto
Agregar a Mi catálogo

How to Manage Migratory Pests and Potential Food Crises: Locusts Plagues in the 2020’s

Más información

978-3-0365-5751-9 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere Directory of Open access Books acceso abierto

Cobertura temática: Ciencias naturales - Ciencias biológicas - Ingeniería y tecnología - Medios de comunicación  


How to Own a Shadow: The Chase for Knuth

Más información

978-1-59749-081-8 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias de la salud - Ciencias sociales - Economía y negocios  

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book’s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.

· The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles

· The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth

· Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries

HOX Gene Expression

Más información

ISBNs: 978-0-387-68989-0 (impreso) 978-0-387-68990-6 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Cobertura temática: Ciencias biológicas - Medicina básica