Friday, August 29, 2008

1

CWNA Certified Wireless Network Administrator Official Study Guide


Who This Book Is For

This book focuses on the objectives for the CWNA exam, but it’s also a useful learning tool for anyone wanting to master the many domains of wireless. You’ll learn about wireless technology basics such as radio frequency–based communications, and you’ll learn about specific standards and protocols that make it all work. In addition, using step-by-step procedures, you will learn how to install, secure, and troubleshoot Wi-Fi or 802.11-based networks effectively. You’ll even learn to use wireless LAN analysis tools that reveal the way your wireless network works and help you troubleshoot network problems. The glossary provides you with a quick reference for definitions and basic knowledge of the many topics covered in this book.

As you prepare for the CWNA certification, as with most other certifications, you need some hands-on experience with the technology to seal the information in your mind. In particular, be sure you have experience configuring access points and client devices. Linksys access points will provide all the features with which you should be familiar, and you can connect to them with most any client device. However, you’ll get the best experience if you have access to small and medium business–class wireless LAN switches as well. Make sure you learn to use a wireless LAN protocol analyzer as Chapter 11 teaches. This makes for good testing and experience, but any vendor’s access point should suffice as long as it provides most of the common features provided by autonomous access points. The main goal is to get your hands on some equipment and work through the configuration steps.

The CWNP web site (www.cwnp.com) lists official CWNA training courses available in your area. These courses provide you with access to a certified instructor who can help answer any questions you may have related to the certification. Yo u will also see demonstrations of equipment that may be more difficult to acquire on your own. I always recommend attending the official courses when time and the budget allow.

Wireless Experts

Though the Wireless CWNA exam is not as advanced as the CWNE exam, many wireless experts might decide to gain this valuable certification because of the essential wireless topics that it covers. You will also earn a valuable credential in the CWNA certification. In addition to the enhanced credentials, the process of studying these wireless LAN technologies makes you think differently about wireless technology and may bring greater value to your employer or customers. I work as an independent consultant and have been enriched greatly by going through the process of understanding these standard uses of radio frequency–based technologies. My clients have benefited as well.

Wireless Beginners

If you’re new to the world of wireless networking or have just acquired your Wireless# certification, the CWNA certification is for you too.
There is no other vendor-neutral certification that does a better job of proving you understand how wireless really works.

Download
http://rapidshare.com/files/139689081/McGraw.Hill.CWNA.Certified.Wireless.Network.Administrator.Official.Study.Guide.4th.Edition.Aug.2007.

or
http://tinyurl.com/4aovnz

Thursday, August 28, 2008

0

Microsoft Office Project Server 2007 The Complete Reference

Book Structure

Part I: Consider This Before You Commit to Project Server 2007
In this section, we lay the groundwork for the deployment of Project Server 2007. First we address the things that you should consider before embarking on the journey of implementing Project Server 2007 and its associated tools. This chapter helps to set the expectation that implementing Project Server will not deliver instant results, but rather will take some time to plan and test through an iterative methodology. This section also covers the new architecture of Project Server 2007, as well as its new features.

Part II: Plan for Your Project Server 2007 Implementation
In this section, we will discuss the implementation approaches you may take and the foundations that must be in place for your implementation to have the greatest chance for success. We include some examples of specific processes that may be useful for organizations that do not already have their own methods for performing similar activities (such as requirements gathering and prioritization).

Part III: Details on the Installation and Configuration of Project Server 2007
This section covers the installation of Project Server in various environments, the configuration of your newly installed system, and some of the administrative functions, including desktop deployment. This is the largest part of the book and includes fairly deep information about critical areas such as the security of Project Server in addition to data structure and flow.

Part IV: Project Server 2007 Maintenance
In this section, we discuss migration approaches that you may encounter as well as the fine-tuning of your EPM environment, and we briefly discuss options available for integrating Project Server 2007 with other systems related to your line of business.

Part V: Project Server in Action
This section consists of numerous chapters for reference on how to complete specific tasks in the EPM system based on your role in the system. Because we cover the way that each Project Server role interacts, we had no choice but to make assumptions on the way that the system’s options were configured. We based our assumptions on what we have seen in the field with Project Server 2007, as well as what we had learned from implementations of previous versions. There is also an overview chapter on resource management in Project Server.

As a bonus, an extensive chapter describes how to extend your Windows SharePoint Services (WSS) environment, which may have implications that reach beyond EPM and into the team and departmental workspaces of your organization. The section that follows our discussion of roles focuses on how to extend the collaborative area using WSS 2007 technologies. This chapter also has a section that discusses how to leverage the advanced features that are available in Microsoft Office SharePoint Server (MOSS) 2007. In our opinion, SharePoint collaborative features are too often underused in the Microsoft EPM toolset, so this chapter is pretty deep.

Part VI: Program and Portfolio Management
In this section, we discuss the different techniques used at the managerial level (and up) to understand how your organization is performing at the program level (a group of related projects). It also includes a look at using Project Server in an environment where Project Portfolio Management (PPM) is important.

Because we designed this book as described above, there will be overlap in some of the content. For example, it would be impossible to discuss the role of the resource manager without having overlap with the chapter on resource management. Likewise, Data Analysis views (reports), for example, have to come up in the chapters describing how to configure online analytical processing (OLAP) cube configuration (which data will be gathered for analysis), and when discussing the display side of that data (Manage views). The context of each chapter was used as the basis for determining how to approach this overlap, so here and there you will read very similar information. Remember that we want to support the “reference” concept––that is, to make it easy for you to go back to find information after the initial implementation.

One certainty is that every reader will have a unique experience deploying Project Server 2007, just as each one of our clients chose different paths. You must keep in mind that the success of any Project Server implementation will probably require a marriage of improvements from people, process, and technology perspectives. Organizations need to understand that a full-scale EPM implementation can touch every corner of their business. The benefits of such integration can be enormous, but the cultural change required to facilitate this integration is equally as great.

Gone are the days when your users could “prairie dog” over their cube wall to ask a coworker to complete a task. That task assignment and the communication surrounding it must now be facilitated through the EPM tools. Users must participate in the EPM system with consistency and in a standardized manner. An organizational entity should in most cases exist to create, evangelize, and enforce these organizational project management methodologies and standards. This entity is called many names––program management office, project management office, or Center of Excellence.

Typically, the success of an EPM initiative is judged by the quality of the organizational insight delivered by the reports in the EPM toolset. What is often forgotten is that the granularity and accuracy of the reports that EPM delivers is built by the granularity and accuracy of data that are fed into the EPM system. If your Project Center views (where each project is displayed at a summary level) are based on project manager estimations, you will have many fewer touch points into the EPM system, reducing culture change and overall complexity, but providing much less clarity and accuracy into your organization’s portfolio. If, on the other hand, your Project Center views are based on direct participation by the resources doing the work, required training increases, the number of touch points into EPM increases greatly, and the culture change is significantly greater. The payoff is invaluable, providing accurate and detailed insight into your organization’s capacity, load, cost, and overall health is invaluable.

Download
http://rapidshare.com/files/139684236/McGraw.Hill.Microsoft.Office.Project.Server.2007.The.Complete.Reference.Feb.2008.pdf

or
http://tinyurl.com/428jyc

0

Microsoft Office Access 2007 Forms Reports and Queries


What’s in the Book

This book isn’t meant to be read from cover to cover, although you’re certainly free to do just that if the mood strikes you. Instead, most of the chapters are set up as self-contained units that you can dip into at will to extract whatever nuggets of information you need. However, if you’re a relatively new Access user, I suggest starting the first one or two chapters in each of the book’s three main sections to ensure you have a thorough grounding in the fundamentals of Access queries, forms, and reports.

The book is divided into three main parts. To give you the big picture before diving in, here’s a summary of what you’ll find in each part:

Part I, Creating Forms: The five chapters in Part I show you how to build efficient and useful forms for inputting and editing data. Chapter 1, “Creating and Using a Form,” and Chapter 2, “Working with Form Controls,” give you the basic form know-how you need. From there, you learn about using data validation to ensure data entry accuracy, learn how to design forms for the business environment, and learn how to create specialized forms such as switchboards, dialog boxes, and startup screens.

Part II, Designing and Customizing Reports: The four chapters in Part II tell you everything you need to know to create attractive and practical reports. Chapter 6, “Creating and Publishing a Report,” gives you the basics, and the subsequent chapters add to your knowledge by showing you the fundamentals of good report design and how to build advanced reports.

Part III, Creating Powerful Queries: The six chapters in Part III give you a thorough grounding in the features and uses of Access queries. After learning some query fundamentals in Chapter 10, “Creating a Basic Query,” you move on to understanding criteria expressions; multiple-table queries; totals, parameter, and action queries; PivotTable queries; and SQL statements.

Download
http://rapidshare.com/files/139668168/Microsoft_Office_Access_2007_Forms_Reports_and_Queries_May_2007.pdf

or
http://tinyurl.com/4yf4e8

0

Microsoft Office Project 2007 All in One Desk Reference


What You Should Read

Of course, I hope you’re going to sit down and read this entire book from cover to cover. But then again, this book isn’t The Great American Novel. And, come to think of it, the whole reason why you bought this book in the first place is to get organized as quickly as possible because you’re probably finding yourself with too much to do and too little time in which to do it.

For the time being, I’m going to let you get away with reading just the parts that interest you most. I’ll let you read the last chapter first and the first chapter last if you like because this book is designed to allow you to read each chapter independently.


How This Book Is Organized

I organized this book in five parts. Here’s a brief description of each part, with chapter references directing you where to go for particular information:

Part I: Discovering This Thing Called Office Live
In Part I, you get an introduction to the concept SaaS (Software as a Service) and why Office Live is such a popular choice for computer users (Chapter 1). In this part, you also read about the three flavors of Office Live (Chapter 2) and how to sign up and start using the service (Chapter 3).

Part II: Getting Down to Basics with Office Live Basics
As its name implies, Part II focuses on the basics — including using e-mail (Chapter 4) and creating a Web site (Chapters 5). I even show you how to gauge the success of your site by using Site Reports (Chapter 6).
You also find out how to organize your day through the use of the Office Live calendar (Chapter 7).

Part III: Adding a Few Essentials
When you add Essentials into the mix, you get an online version of Business Contact Manager (Chapter 8) to help you keep track of your contacts. You also add the ability to set up Shared Sites that can be accessed by your employees and/or your customers (Chapter 9). If you travel a lot, check this out: You can synch Office Live to Outlook or your PDA (Chapter 10).

If you have a new business — or have been trying to conduct your business without the assistance of accounting software — you discover how to use Office Accounting Express 2007 with Office Live (Chapter 11).

Part IV: Getting Premium Service
A product name like “Premium” leads you to expect a lot — and Office Live doesn’t disappoint. Chapter 12 shows you how to work with the different business applications that come with Office Live. You can keep a company calendar and schedule resources with Time Manager (Chapter 13). You can manage major projects and share the data with both your employees and customers (Chapter 14). You find out how Office Live takes you through every step of the sales process — from designing a marketing campaign and distributing collateral to creating estimates and taking orders (Chapter 15). You have a whole arsenal of human-resources tools at your disposal (Chapter 16) and have a bird’s eye view of the state of your entire business (Chapter 17).

Part V: The Part of Tens
With apologies to David Letterman, Part V gives you three of my Top Ten Office Live lists. If you have a business — or are considering starting one — I list some ways that using Office Live can help grow your business (Chapter 18). I move on to a list of the types of people I think can most benefit from Office Live (Chapter 19). Finally, I give you a closer look at the whole idea behind Office Live: Software as a Service (Chapter 20).

Download
http://rapidshare.com/files/139626369/For.Dummies.Microsoft.Office.Live.For.Dummies.Jul.2007.pdf

or
http://tinyurl.com/4tyydu

Bonus - MS Office Tutorial - First Look 2007 Microsoft Office System
http://rapidshare.com/files/139627373/First_Look_2007_Microsoft_Office_System.pdf
or
http://tinyurl.com/4suft4

Tuesday, August 26, 2008

0

Microsoft Excel and Access Integration With Microsoft.Office.2007


What to Expect from This Book

In this book, you will find a comprehensive review of the wide range of integration techniques that can be performed using Excel and Access. Through step-by-step instruction, you will explore the benefits of integrating Excel and Access, the differences and similarities between Excel and Access, and some of the common pitfalls of moving and analyzing data across applications. After reading this book, you will be able to:

■ Easily move data between Excel and Access
■ Store Excel data in a structured, relational database
■ Use Excel pivot tables with Access data
■ Report Access data using the Excel presentation layer
■ Move data between Excel and Access using VBA, ADO and SQL
■ Automate redundant processes using VBA to save time and increase productivity
■ Simplify integration tasks using XML
■ Integrate Excel data into other Office applications
Skills Required for This Book
In order to get the most out of this book, you have the following skills:
■ Some experience working with data and familiarity with the basic concepts of data analysis such as working with tables, aggregating data, and performing calculations.
■ Experience using Excel with a strong grasp of concepts such as table structures, filtering, sorting and using formulas.
■ Some basic knowledge of Access, enough to know it exists and to have opened a database once or twice

How This Book Is Organized

This book is organized into two parts: Basic Integration Techniques and Advanced Integration Techniques.

Part I: Basic Integration Techniques
Part I of this book is dedicated to those integration techniques that can be accomplished via the Excel and Access user interfaces. This part includes Chapters 1 through 6. Chapters 1 through 4 will teach you how to get your Excel data into Access as well as how to leverage the many Access utilities to go beyond the functionality found in Excel. Chapter 5 demonstrates the best ways to use Access data in Excel. Chapter 6 introduces you to the world of macros, demonstrating automation techniques from both an Excel and Access point of view.

Part II: Advanced Integration Techniques
Part II of this book is dedicated to automating your integration processes via VBA (Visual Basic for Applications) code. Chapter 7 provides a high level introduction to VBA. Chapter 8 covers the various methods of moving data between Excel and Access using VBA. In Chapter 9, you will learn how to control and manipulate Excel from Access and vice versa. Chapter 10 introduces you to the world of XML; discussing several ways XML can help you simplify your integration tasks. Finally, Chapter 11 rounds out this book with a look into the various ways you can integrate Excel with Word, PowerPoint and Outlook.

Download
http://rapidshare.com/files/139624820/Wiley.Microsoft.Excel.and.Access.Integration.With.Microsoft.Office.2007.Apr.2007.eBook-DDU.pdf

or
http://tinyurl.com/6y4tzk

0

Wiley Office 2007 Bible Jun 2007


Who Should Read This Book

Office 2007 brings some sweeping changes to the user interface in Word, Excel, PowerPoint, Access, and parts of Outlook. As a result, even experienced Office users can use this book to get up to speed with using the new interface quickly. Because this book presents information using the friendly, accessible Bible format that combines straightforward steps and concise reference information, beginners with Office can use it to learn Office quickly and expand their skills beyond the basics.

How This Book Is Organized

Office 2007 Bible organizes information into several parts. In most cases, a part focuses on a particular application in the suite, so you can jump right to the part for the application you’re currently using.

Part I: Common Office Features
The chapters in this part provide the first introduction to the new user interface in the major Office applications, as well as show how to perform fundamental operations such as working with files.

Part II: Creating Documents with Word
This part covers using the Microsoft Office Word 2007 word processing program to create and format text-based documents. In addition to learning how to format words, paragraphs, and pages, you get a shot at working with more sophisticated features such as tables and mail merge, and even the new SmartArt diagrams. You also see how document security settings can help protect information.

Part III: Making the Numbers Work with Excel
The chapters here show you how to use the spreadsheet program Microsoft Office Excel 2007 to organize and calculate data. After getting a preview of the new features in the program, you learn how to enter, format, and calculate information. You also see how to create powerful charts that tell a story about your data, and how to manage lists of information.

Part IV: Persuading and Informing with PowerPoint
In this part, you learn how to get the word out with the Microsoft Office PowerPoint 2007 presentation graphics program. This part explains how to add information, charts, SmartArt diagrams, and graphics to slides. You also see how to animate and automate a slide show and get expert tips about going live with your presentation.

Part V: Organizing Messages, Contacts, and Time with Outlook
The basics for using Microsoft Office Outlook 2007 appear in this part. Learn to set up an e-mail account; compose, send, and respond to messages; organize messages and deal with junk mail and security issues; manage your contacts, appointments, and to-do list; and get new online content by setting up and using an RSS feed.

Part VI: Designing Publications with Publisher
This part introduces you to the Microsoft Office Publisher 2007 page layout and design program. Learn how to not only create great-looking publications with Publisher’s flexible tools but also prep your publications for professional printing.

Part VII: Tracking Detailed Data with Access
If you manage detailed lists—with customer or product data, for example—Microsoft Office Access 2007 and this part’s chapters are for you. Get a roadmap here for designing a good database. Learn how to create tables, fields, and forms, and how to select and present data with queries and reports.

Part VIII: Gathering Information
Get efficient with the programs introduced in this part—Microsoft Office OneNote 2007 and Microsoft Office InfoPath 2007. Get an overview about using OneNote to track notes and project details, and then see how to use InfoPath to create fill-in forms for gathering responses from others.

Part IX: Sharing and Collaboration
This part explains not only how to share information between Office applications, but also how to use Office 2007 applications with SharePoint and Groove on a network or the Internet.

Download
http://rapidshare.com/files/139623245/Wiley.Office.2007.Bible.Jun.2007.pdf

or
http://tinyurl.com/6n7efd

Bonus Download - Microsoft Office 2007 For Dummies
http://rapidshare.com/files/139632641/For.Dummies.Office.2007.For.Dummies.Dec.2006.pdf
or

http://tinyurl.com/4jsdc2

Monday, August 25, 2008

0

Apress.Workflow.in.the.2007.Microsoft.Office.System.Feb.2007


Introducing Workflow

All bluster and pontificating aside, Workflow truly is the single most exciting new feature in Office 2007. It is, perhaps, not as immediately noticeable as the changes to the client interface, but it is going to have the most impact on business productivity.

You would think, perhaps, that Workflow is new technology Microsoft has developed to fill what had been a huge hole in the Office system. In reality, though, Workflow is as old as the hills. It existed before computers were invented and will exist after your souped-up gaming rig has been replaced with something that makes the HAL 9000 look like the ENIAC.

Before computers, workflows were handled manually, usually by a secretary or low-level manager. For example, back in the dark ages (i.e., when I was in college in the ’80s) the secretary of the MIS department for the college played the role of what we now call the workflow engine. She would take in documents and manually deliver paper copies to professors or computer operators for review or approval. She had a separate calendar on her desk where she would write herself reminders to follow up on documents and remind people to review them in a few days. To remind people, she would walk to their office and talk to them, talk to them in the hallway, or place a note (an actual physical piece of paper—gasp!) in their mailbox. For what we now call long-running workflows, she had a tickler file—a collection of file folders in a filing cabinet into which she would place copies of documents that she needed to do something with at some point in the future. Every Monday morning she would check the tickler file for the current month to see if there was anything she needed to act on. If there were, she would pull out the paper copy and route it or act on it appropriately. The system worked great—with only the occasional hiccup when she was out sick—until she and her husband moved out of state. Suddenly, the entire department fell apart for a few weeks while the new secretary got up to speed on the system. Documents didn’t get circulated, people felt out of touch, and work fell through the cracks. It was really ugly for about a month. Then the new secretary had a handle on everything; she had learned the process and caught up on everything that had fallen behind. All was right again with the world.

A computer’s role in workflow is merely to automate that manual process. Like most other computerized processes, the computer isn’t doing anything that couldn’t be done by a human being, as you saw earlier. It is just doing it more quickly, efficiently, and without cigarette breaks. You also don’t have to worry about the computer moving out of state. However, in a sense, something is missing from computerized workflows—human intelligence and adaptability.
You would think, perhaps, that Workflow is new technology Microsoft has developed to fill what had been a huge hole in the Office system. In reality, though, Workflow is as old as the hills. It existed before computers were invented and will exist after your souped-up gaming rig has been replaced with something that makes the HAL 9000 look like the ENIAC.

Before computers, workflows were handled manually, usually by a secretary or low-level manager. For example, back in the dark ages (i.e., when I was in college in the ’80s) the secretary of the MIS department for the college played the role of what we now call the workflow engine. She would take in documents and manually deliver paper copies to professors or computer operators for review or approval. She had a separate calendar on her desk where she would write herself reminders to follow up on documents and remind people to review them in a few days. To remind people, she would walk to their office and talk to them, talk to them in the hallway, or place a note (an actual physical piece of paper—gasp!) in their mailbox. For what we now call long-running workflows, she had a tickler file—a collection of file folders in a filing cabinet into which she would place copies of documents that she needed to do something with at some point in the future. Every Monday morning she would check the tickler file for the current month to see if there was anything she needed to act on. If there were, she would pull out the paper copy and route it or act on it appropriately. The system worked great—with only the occasional hiccup when she was out sick—until she and her husband moved out of state. Suddenly, the entire department fell apart for a few weeks while the new secretary got up to speed on the system. Documents didn’t get circulated, people felt out of touch, and work fell through the cracks. It was really ugly for about a month. Then the new secretary had a handle on everything; she had learned the process and caught up on everything that had fallen behind. All was right again with the world.

A computer’s role in workflow is merely to automate that manual process. Like most other computerized processes, the computer isn’t doing anything that couldn’t be done by a human being, as you saw earlier. It is just doing it more quickly, efficiently, and without cigarette breaks. You also don’t have to worry about the computer moving out of state. However, in a sense, something is missing from computerized workflows—human intelligence and adaptability.
Download This Book To Continue

Download
http://tinyurl.com/64j683
or
http://rapidshare.com/files/137894880/Apress.Workflow.in.the.2007.Microsoft.Office.System.Feb.2007.pdf

0

Apress Microsoft SharePoint.Building Office 2007 Solutions in VB.2005


SharePoint now in its third release, many developers and users are well familiar with its core functionality. However, this version of SharePoint is truly astonishing in its scope. Not only does this version have the familiar sites, documents, and lists, but it also supports vast new capabilities in content management, document management, records management, and business intelligence. Along with these capabilities, this version of SharePoint has many new ways to integrate data and create customized solutions. For me, the combination of business-oriented capabilities and advanced solution-development techniques has always been the basis of my enthusiasm for SharePoint. In fact, this is the perspective that I have tried to bring to this book; I want to combine business needs and technical skills to create solutions that truly impact business. You can be the judge of how well that vision has been reached.

Who This Book Is For

Many years ago, I asked a colleague what professional developers wanted in a book. He responded simply “Code they can steal.” I have never forgotten this advice and it has been the foundation of every book I have written since. This book is therefore targeted squarely at the intermediate to advanced developer in a corporate environment with a pending SharePoint project. Readers do not have to have any prior experience with SharePoint to be successful with this book. However, readers should be well-versed in .NET development with VB.NET to get the most out of the book. Furthermore, readers should be ready to make a commitment to this book. I have constructed the book with the intent that it be read cover to cover. I have also defined a development environment in Chapter 2 that I use throughout the book. The bottom line is that this book should be thought of as a technical training course as opposed to a reference manual. If you approach it that way, you will get the maximum benefit.

How This Book Is Organized

I began my technical career training professional developers in Visual Basic 3.0. As a result, my writing style and chapter organization reflect a training class. Each chapter in the book begins with an explanation of the appropriate foundational concepts followed by practical exercises to reinforce the explanation. A brief description of each chapter follows.

Chapter 1: SharePoint Business Solutions

This chapter is an overview of SharePoint solutions from a business perspective. Although this is a technical book, this chapter will help you understand and consider the environment into which your solutions will be deployed. This is some light reading before you get started.

Chapter 2: SharePoint Overview, Planning, and Installation

This chapter is the foundation for the entire book. In this chapter you will learn the planning and installation considerations for SharePoint. Additionally, you will set up a development environment that can be used throughout the book. You should not skip this chapter because its information is assumed throughout the rest of the book. Plan on spending a few days with this material to properly set up your SharePoint environment.

Chapter 3: SharePoint Fundamentals

This chapter provides an overview of the fundamental capabilities of SharePoint. You’ll use this information to get a fully functional SharePoint farm and create your first sites. You’ll also learn about new capabilities in this version that specifically target weaknesses from previous versions of SharePoint.

Chapter 4: SharePoint Shared Services

This chapter completes the configuration of critical services within your SharePoint farm. You’ll configure and use search, profiles, audiences, Excel Services, and the Business Data Catalog. This chapter is mandatory for anyone working with the Microsoft Office SharePoint Server (MOSS).

Chapter 5: SharePoint Content Development and Management

This chapter covers the new content management capabilities of SharePoint. You’ll learn how to add new pages to sites and manage the deployment process. This chapter also shows you how to create and apply themes, master pages, and style sheets. If you want to customize the look of SharePoint, this chapter will show you how.

Chapter 6: SharePoint Document, Form, and Records Management

This chapter covers all of the integration points between SharePoint and documents, forms, and records. You’ll learn the basics of metadata and how to interact with it. You’ll also learn how to deploy forms in libraries and through the new InfoPath Forms Services technology. Finally, you’ll set up a records library and apply retention policies to archived documents.

Chapter 7: SharePoint Custom Features and Workflows

Customization of SharePoint begins in earnest with this chapter. Here, you’ll learn how to create your own custom features for adding items to menus, adding new administrative pages, making changes to the infrastructure, and receiving event notifications. This chapter also covers how to create workflow solutions with both the SharePoint Designer and Visual Studio.

Chapter 8: SharePoint Business Intelligence Solutions

This chapter focuses on creating dashboards within the new Report Center. You’ll learn how to create scorecards with stoplights to represent key performance indicators (KPI) and how to integrate Excel spreadsheets to show data. This chapter also shows how to integrate SQL Analysis Services and SQL Reporting Services with SharePoint.

Chapter 9: SharePoint and Microsoft Office

This chapter covers all of the different ways to create solutions with Office 2007 products. You’ll learn how to create add-ins for Office and make them part of a SharePoint solution. You’ll also learn about the new open XML file formats and how they can be integrated with SharePoint.

Chapter 10: SharePoint Web Parts

This chapter provides complete coverage of creating and deploying web parts in SharePoint. You’ll learn about the web part life cycle and how to code the new ASP NET 2.0 web parts that are used by SharePoint. You’ll also learn how to create web parts that can be connected together to act as filters. Finally, you’ll learn to create solution files for deploying web parts to the SharePoint farm.

Chapter 11: Programming SharePoint Services

This chapter provides the fundamentals you’ll need to get started programming against the SharePoint object model and web services. You’ll learn the basics of accessing SharePoint pro-grammatically and manipulating site information, user information, lists, and libraries. This chapter also covers the Microsoft Single Sign-On service.

Chapter 12: SharePoint Operations and Administration

This chapter provides all of the foundational information you will need to properly administer a SharePoint farm. You’ll learn how to back up and restore a farm, get reports, and monitor the infrastructure. You’ll also learn how to improve SharePoint performance with caching mechanisms.

Download
http://rapidshare.com/files/137893480/Apress.Microsoft.SharePoint.Building.Office.2007.Solutions.in.VB.2005.Apr.2007.pdf

or
http://tinyurl.com/5jph84

Sunday, August 24, 2008

0

Apress Microsoft.SharePoint Building Office 2007 Solutions.in C.Sharp 2005


SharePoint now in its third release, many developers and users are well familiar with its core functionality. However, this version of SharePoint is truly astonishing in its scope. Not only does this version have the familiar sites, documents, and lists, but it also supports vast new capabilities in content management, document management, records management, and business intelligence. Along with these capabilities, this version of SharePoint has many new ways to integrate data and create customized solutions. For me, the combination of business-oriented capabilities and advanced solution-development techniques has always been the basis of my enthusiasm for SharePoint. In fact, this is the perspective that I have tried to bring to this book; I want to combine business needs and technical skills to create solutions that truly impact business. You can be the judge of how well that vision has been reached.


Who This Book Is For

Many years ago, I asked a colleague what professional developers wanted in a book. He responded simply “Code they can steal.” I have never forgotten this advice and it has been the foundation of every book I have written since. This book is therefore targeted squarely at the intermediate to advanced developer in a corporate environment with a pending SharePoint project. Readers do not have to have any prior experience with SharePoint to be successful with this book. However, readers should be well-versed in .NET development with C# to get the most out of the book. Furthermore, readers should be ready to make a commitment to this book. I have constructed the book with the intent that it be read cover to cover. I have also defined a development environment in Chapter 2 that I use throughout the book. The bottom line is that this book should be thought of as a technical training course as opposed to a reference manual. If you approach it that way, you will get the maximum benefit.
How This Book Is Organized

I began my technical career training professional developers in Visual Basic 3.0. As a result, my writing style and chapter organization reflect a training class. Each chapter in the book begins with an explanation of the appropriate foundational concepts followed by practical exercises to reinforce the explanation. A brief description of each chapter follows.

Chapter 1: SharePoint Business Solutions
This chapter is an overview of SharePoint solutions from a business perspective. Although this is a technical book, this chapter will help you understand and consider the environment into which your solutions will be deployed. This is some light reading before you get started.

SharePoint now in its third release, many developers and users are well familiar with its core functionality. However, this version of SharePoint is truly astonishing in its scope. Not only does this version have the familiar sites, documents, and lists, but it also supports vast new capabilities in content management, document management, records management, and business intelligence. Along with these capabilities, this version of SharePoint has many new ways to integrate data and create customized solutions. For me, the combination of business-oriented capabilities and advanced solution-development techniques has always been the basis of my enthusiasm for SharePoint. In fact, this is the perspective that I have tried to bring to this book; I want to combine business needs and technical skills to create solutions that truly impact business. You can be the judge of how well that vision has been reached.

Chapter 2: SharePoint Overview, Planning, and Installation

This chapter is the foundation for the entire book. In this chapter you will learn the planning and installation considerations for SharePoint. Additionally, you will set up a development environment that can be used throughout the book. You should not skip this chapter because its information is assumed throughout the rest of the book. Plan on spending a few days with this material to properly set up your SharePoint environment.

Chapter 3: SharePoint Fundamentals

This chapter provides an overview of the fundamental capabilities of SharePoint You’ll use this information to get a fully functional SharePoint farm and create your first sites. You’ll also learn about new capabilities in this version that specifically target weaknesses from previous versions of SharePoint.

Chapter 4: SharePoint Shared Services

This chapter completes the configuration of critical services within your SharePoint farm. You’ll configure and use search, profiles, audiences, Excel Services, and the Business Data Catalog. This chapter is mandatory for anyone working with the Microsoft Office SharePoint Server (MOSS).

Chapter 5: SharePoint Content Development and Management

This chapter covers the new content management capabilities of SharePoint. You’ll learn how to add new pages to sites and manage the deployment process. This chapter also shows you how to create and apply themes, master pages, and style sheets. If you want to customize the look of SharePoint, this chapter will show you how.

Chapter 6: SharePoint Document, Form, and Records Management

This chapter covers all of the integration points between SharePoint and documents, forms, and records. You’ll learn the basics of metadata and how to interact with it. You’ll also learn how to deploy forms in libraries and through the new InfoPath Forms Services technology. Finally, you’ll set up a records library and apply retention policies to archived documents.

Chapter 7: SharePoint Custom Features and Workflows

Customization of SharePoint begins in earnest with this chapter. Here, you’ll learn how to create your own custom features for adding items to menus, adding new administrative pages, making changes to the infrastructure, and receiving event notifications. This chapter also covers how to create workflow solutions with both the SharePoint Designer and Visual Studio.

Chapter 8: SharePoint Business Intelligence Solutions

This chapter focuses on creating dashboards within the new Report Center. You’ll learn how to create scorecards with stoplights to represent key performance indicators (KPI) and how to integrate Excel spreadsheets to show data. This chapter also shows how to integrate SQL Analysis Services and SQL Reporting Services with SharePoint.

Chapter 9: SharePoint and Microsoft Office

This chapter covers all of the different ways to create solutions with Office 2007 products. You’ll learn how to create add-ins for Office and make them part of a SharePoint solution. You’ll also learn about the new open XML file formats and how they can be integrated with SharePoint.

Chapter 10: SharePoint Web Parts

This chapter provides complete coverage of creating and deploying web parts in SharePoint. You’ll learn about the web part life cycle and how to code the new ASP.NET 2.0 web parts that are used by SharePoint. You’ll also learn how to create web parts that can be connected together to act as filters. Finally, you’ll learn to create solution files for deploying web parts to the SharePoint farm.

Chapter 11: Programming SharePoint Services

This chapter provides the fundamentals you’ll need to get started programming against the SharePoint object model and web services. You’ll learn the basics of accessing SharePoint pro-grammatically and manipulating site information, user information, lists, and libraries. This chapter also covers the Microsoft Single Sign-On service.

Chapter 12: SharePoint Operations and Administration

This chapter provides all of the foundational information you will need to properly administer a SharePoint farm. You’ll learn how to back up and restore a farm, get reports, and monitor the infrastructure. You’ll also learn how to improve SharePoint performance with caching mechanisms.

Download
http://tinyurl.com/5rqsea

or
http://rapidshare.com/files/137892514/Apress.Microsoft.SharePoint.Building.Office.2007.Solutions.in.C.Sharp.2005.Feb.2007.pdf

0

Microsoft Office Access 2007 Bible


This book is in its tenth revision and has been totally rewritten for Microsoft Access 2007 with new text, new pictures, and a completely new and improved set of example files.

This book examines Access 2007 with more examples than any other Access 2007 book. We strongly believe that Microsoft Access is an excellent database manager and the best desktop and workgroup database-development system available today. Our goal with this book is to share what we know about Access and, in the process, to help make your work and your life easier.

This book contains everything you need in order to learn Microsoft Access to a mid-advanced level. The book starts off with database basics and builds, chapter by chapter, on topics previously covered. In places where it is essential that you understand previously covered topics, we present the concepts again and review how to perform specific tasks before moving on. Although each chapter is an integral part of the book as a whole, each chapter can also stand on its own and has its own example files. You can read the book in any order you want, skipping from chapter to chapter and from topic to topic. (Note that this book’s index is particularly thorough; you can refer to the index to find the location of a particular topic you’re interested in.)
The examples in this book have been well thought out to simulate the types of tables, queries, forms, and reports most people need to create when performing common business activities. There are many notes, tips, and techniques (and even a few secrets) to help you better understand Microsoft Access.

This book easily substitutes for the online help included with Access. This book guides you through each task you need to perform with Access. This book follows a much more structured approach than the Microsoft Access online help, going into more depth on almost every topic and showing many different types of examples. You’re also going to find much more detail than in most other books on Microsoft Access.

Is This Book for You?

We wrote this book for beginning, intermediate, and even advanced users of Microsoft Access 2007. With any product, most users start at the beginning. If, however, you’re already familiar with Microsoft Access and you’ve worked with the sample files or other Access applications, you may want to start with the later parts of this book. Note, however, that starting at the beginning of a book is usually a good idea so you don’t miss out on the secrets and tips in the early chapters.

We think this book covers Microsoft Access 2007 in detail better than any other book currently on the market. We hope you’ll find this book helpful while working with Access, and that you enjoy the innovative style of a Wiley book.

Yes — If you have no database experience

If you’re new to the world of database management, this book has everything you need to get started with Microsoft Access 2007. It then offers advanced topics for reference and learning. Beginning developers should pay particular attention to Part I, where we cover the essential skills necessary for building successful and efficient databases. Your ability as a database designer is constantly judged by how well the applications you build perform, and how well they handle data entrusted to them by their users. The chapters in Part I won’t necessarily make you an expert database designer, but we guarantee you’ll be a better developer if you carefully read this material.

Yes — If you’ve used other database managers like Filemaker

If you’re abandoning another database (such as Filemaker, Paradox, or FoxPro) or even upgrading from an earlier version of Access, this book is for you. You’ll have a head start because you’re already familiar with database managers and how to use them. With Microsoft Access, you will be able to do all the tasks you’ve performed with other database systems — without programming or getting lost. This book will take you through each subject step by step.

Yes — If you want to learn the basics of Visual Basic for Applications (VBA) programming

We understand that a very large book is needed to properly cover VBA, but we took the time to put together many chapters that build on what you learn in the forms chapters of this book. The VBA programming chapters use the same examples you’ll be familiar with by the end of the book. Part II of this book explains the nuts and bolts — with lots of gritty technical details — of writing VBA procedures and building Access applications around the code you add to your databases. Part II provides everything you need (other than a lot of practice!) to become a bona-fide VBA programmer.

Download
http://rapidshare.com/files/139707663/Microsoft_Office_Access_2007_Bible__ENG_.pdf

or
http://tinyurl.com/6m7ydt


Bonus Download - Access Inside and Out


http://rapidshare.com/files/137891653/623255eBook.pdf
or
http://tinyurl.com/6ow7ds

0

Skinning Windows XP

With the release of Windows XP, Microsoft provided a radically different approach to the customization of the Windows graphical user interface (GUI) by providing a built-in visual style engine. A visual style controls the color scheme and the bitmap graphics that are used for such Windows interface elements as the Start menu, the taskbar, and the objects we find on a typical window (such as the title bar and control buttons). Although Windows XP shipped with only one visual stylethe XP stylethe fact that the visual style engine exists makes it possible for any user to radically alter the look and feel of the Windows interface.

Through the manipulation of Windows themes (the icons, mouse pointers, desktop background, and other GUI elements we interface with when we use Windows) and visual styles, we can actually "skin" the Windows interface (a skin being the combination of modified theme elements and visual style items). This means you can create a custom interface, and the limits on the possibilities are really up to you and your artistic inclinations.

Theme elements can be easily modified using tools built in to the Windows XP environment. For more radical interface modification, a number of third-party software packages make it easy to create any number of extremely unique "looks" for the interface.

Skinning Windows XP provides both a primer and an advanced user guide to creating your own Windows themes, visual styles, and skins (whether you are using Windows XP Home or Windows XP Profesisonal). Although this book is designed for the novice as well as the more advanced Windows user, its logical step-by-step approach provides a learning environment ideal for the novice and provides the more experienced user with a breadth of details because more advanced skinning topics are discussed.

Although this book takes its subject matter very seriously, the material itself is approached in a straightforward, conversational manner that should help you digest the information without dozing off or developing a horrible migraine headache. It will also provide you with the knowledge base you need to further explore the concept of skinning Windows and enable you to advance your own creative sensibilities when you have set the book down after reading the last chapter.

How This Book is Organized

This book has been organized so that a novice user can explore basic to intermediate to advanced subject matter as each chapter is read. However, the chapters have been written to be primarily self-contained so the intermediate or advanced user can pick up the book and jump to a particular chapter and take full advantage of the topics covered in that chapter.

The book has been configured so the reader can first explore Windows themes (the simplest way to modify the Windows XP interface) and learn how to modify default themes as well as download themes available on the Web. Information is also provided on the various types of skinning software and how to acquire that software. Skins and visual styles can then be downloaded from the Web, making skinning Windows a matter of installing a simple application and then downloading any number of premade skins.

For users with a more artistic bent, you learn how to create your own skins and looks and the software options that are available. Finally, an appendix includes an introduction to software that enables a very advanced user to actually hack Windows resources and create skins without the use of additional skinning software.

Skinning Windows is fun and allows you to take the Windows environment to a whole new visual level. Whatever your current knowledge level is related to Windows, you will be able to use this book to personalize the look and feel of the XP interface. I hope you enjoy this book as much as I enjoyed writing it.

Download
http://rapidshare.com/files/136051910/Skinning_Windows_XP__2005_.chm
or
http://tinyurl.com/4chp9b

0

Shellcoder’s Programming Uncovered


We are living in a harsh and cruel world. Popular software that runs on millions of machines all over the world contains security holes, most of which are critical. Hackers, viruses and worms actively exploit these holes, attacking from all corners of the Net. The vast majority of remote attacks are carried out by exploiting buffer overflow, the particular case of which is stack overflow. Those who have mastered the techniques of exploiting buffer overflow errors rule the world. If you need a guide to navigate the world of buffers subject to overflow supplied with the detailed survival guide, then this book is for you. Just open the door and enter the wonderful world hidden behind the facade of programming in high-level programming languages. This is where the gears that set everything else in motion are working.

Why are overflow errors so fundamental? What can you do using them? How do you find a vulnerable buffer? What limitations do such buffers imply on the shellcode? How do you overcome these limitations? What tools should you use to compile shellcode? How do you send this code to remote host yet remain unnoticed? How do you bypass a firewall? How do you detect and analyze shell-code written by someone else? And how do you protect your programs against overflow errors?

That the antiviral industry is a kind of a club for a limited community is not a secret to anyone. This community is closed and is not too willing to accept new members. It owns information intended for insiders only. This is partially because of security considerations, but this is also due to the pernicious effects of competition. This book partially discloses the secrets

Download
http://rapidshare.com/files/136041642/Shellcoder_s_Programming_Uncovered__2005_.chm
or
http://tinyurl.com/6xc57g

0

Servlets and JavaServer Pages - The J2EE™ Technology Web Tier


Servlets and JavaServer Pages is the first complete guide to building dynamic Java-based Web applications using the new JavaServer Pages 2.0 and Servlets 2.4. Servlets and JavaServer Pages (JSP) provide a robust solution to developing large, complex Web applications, including multiserver projects. In addition to built-in security, portability, and a Web server, they offer developers the freedom to work with any operating system that supports Javabe it Linux, Windows, OSX, or Solaris.

This authoritative book begins by explaining how to set up a Servlet and JSP development environment, including a discussion of containers, Java support, and installing and configuring Tomcat. The authors then thoroughly explore servlets and JSP, including significant coverage of custom tag libraries, newly available filters, and popular servlet and JSP design patterns. Readers can then test-drive the knowledge gained by constructing a book-support Web site.

Among the topics covered in-depth are:

Exception handling

JavaBeans and the new JSP Expression Language (JSP EL)

The JavaServer Pages Standard Tag Library (JSTL) and coding custom tag libraries

Filters

Error handling

Session and state management

Security

Design patterns, including Struts

Internationalization

Multiclient support

Database connectivity


The actual book-support site (www.jspbook.com) features frequently asked questions, working code examples, and references.

With Servlets and JavaServer Pages as their guide, readers will learn how to fully harness the power of these flexible Java technologies.

Download
http://rapidshare.com/files/136038239/Servlets_And_JavaServer_Pages_-_The_J2EE_Technology_Web_Tier.chm

or
http://tinyurl.com/5m8kym

0

Sendmail Cookbook


sendmail is the most powerful and widely used Unix email software in the world today. Millions of Unix systems are currently running sendmail. Yet this common tool is a source of confusion for many system administrators, most of whom dread sendmail configuration. This dread has a very rational basis: complexity and lack of familiarity. sendmail configuration languages are as complex as any other programming languages, and, unlike many other languages, sendmail configuration languages are used infrequently. sendmail is configured when it is installed or upgraded; otherwise, an administrator has little interaction with the sendmail configuration. The average system administrator simply does not get enough practice to truly master the sendmail configuration languages.

For me, and a great many other techies, cooking a decent meal also falls into the category of something that I do not often practice. On my own, a Coke and a Snickers constitutes dinner, while beer and pretzels is a party. When it is my turn to cook for others, particularly to cook an elaborate meal, I need help. I don't have time to learn how to cook on my own; I need someone to tell me exactly how it is done. Luckily, cookbooks are created for exactly this situation.

A cookbook provides recipes for a wide variety of situations. The recipes are step-by-step solutions to specific problems. In the kitchen, the problems are how to properly prepare specific dishes. On a sendmail server, the problems are how to configure the system to handle specific situations; for example, how to configure sendmail to relay mail for your clients without creating an open relay that will be abused by spammers.

As the name sendmail Cookbook implies, this is a cookbook full of recipes for proper sendmail configuration. A sendmail recipe outlines a configuration problem, presents the configuration code that solves that problem, and then explains the code in detail. The discussions of the code are critical because they provide the insight you need to tweak the code enough to make it right for your server.

The key feature of this book is that it saves you time. Time is something that most system administrators have in very short supply. When you have a specific sendmail configuration problem, looking up a step-by-step solution is much quicker than researching the problem and developing your own custom solution. This book provides quick solutions for many common sendmail configuration problems.

The sendmail Cookbook uses the same Problem/Solution/Discussion format used in all O'Reilly cookbooks. As an example of this format, the following section, which explains how this book should be used, is laid out using the recipe format.

Download
http://rapidshare.com/files/136036620/sendmail_Cookbook__2003_.chm
or
http://tinyurl.com/5k679v

0

SELinux by Example: Using Security Enhanced Linux


SELinux: Bring World-Class Security to Any Linux Environment!

SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kerneland delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributionsit's easier than ever to take advantage of its benefits.

SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies including the powerful new Reference Policyshowing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5.


• Thoroughly understand SELinux's access control and security mechanisms

• Use SELinux to construct secure systems from the ground up

• Gain fine-grained control over kernel resources

• Write policy statements for type enforcement, roles, users, and constraints

• Use optional multilevel security to enforce information classification and manage users with diverse clearances

• Create conditional policies that can be changed on-the-fly

• Define, manage, and maintain SELinux security policies

• Develop and write new SELinux security policy modules

• Leverage emerging SELinux technologies to gain even greater flexibility

• Effectively administer any SELinux system

Download
http://rapidshare.com/files/136036452/SELinux_By_Example_-_Using_Security_Enhanced_Linux__2006_.chm

or
http://tinyurl.com/5r4wwa

0

SELinux


Organization of This Book

This book is divided into nine chapters and five appendixes. Here is a brief summary of each chapter's focus:

Chapter 1, Introducing SELinux, explains why SELinux is valuable and which common security flaws it addresses, including the concept of the 0-day vulnerability.

Chapter 2, Overview of the SELinux Security Model, explains such basic concepts as roles, domains, and transitions. It prepares the reader for SELinux installation.

Chapter 3, Installing and Initially Configuring SELinux, lays out the current state of SELinux support in several GNU/Linux distributions and provides guidance for installation.

Chapter 4, Using and Administering SELinux, is a basic SELinux system guide for system administrators, covering such techniques as user administration.

Chapter 5, SELinux Policy and Policy Language Overview, prepares the reader to write or revise policies, which is necessary when new software is installed on an SELinux system or when policies need to be adjusted to current system use. This chapter discusses the build process, the layout of policy-related files, and general issues such as macros.

Chapter 6, Role-Based Access Control, introduces the syntax of policy files and describes the directives that relate to user roles.

Chapter 7, Type Enforcement, discusses the next major aspect of SELinux policies, type-enforcement files.

Chapter 8, Ancillary Policy Statements, finishes the explanation of policy statements with a description of constraints and other miscellaneous directives.

Chapter 9, Customizing SELinux Policies, pulls together all the material from the book, provides concrete examples of how to adjust SELinux systems to users' needs, and introduces tools that help monitor the system and view policies.

Download
http://rapidshare.com/files/136035363/SELinux__2004_.chm
or
http://tinyurl.com/5mpup3

Wednesday, August 20, 2008

0

Self-Defending Networks: The Next Generation of Network Security



Protect your network with self-regulating network security solutions that combat both internal and external threats.

Provides an overview of the security components used to design proactive network security

Helps network security professionals understand what the latest tools and techniques can do and how they interact

Presents detailed information on how to use integrated management to increase security

Includes a design guide with step-by-step implementation instructions

Self-Defending Networks: The Next Generation of Network Security helps networking professionals understand how to deploy an end-to-end, integrated network security solution. It presents a clear view of the various components that can be used throughout the network to not only monitor traffic but to allow the network itself to become more proactive in preventing and mitigating network attacks. This security primer provides unique insight into the entire range of Cisco security solutions, showing what each element is capable of doing and how all of the pieces work together to form an end-to-end Self-Defending Network. While other books tend to focus on individual security components, providing in-depth configuration guidelines for various devices and technologies, Self-Defending Networks instead presents a high-level overview of the entire range of technologies and techniques that comprise the latest thinking in proactive network security defenses. This book arms network security professionals with the latest information on the comprehensive suite of Cisco security tools and techniques. Network Admission Control, Network Infection Containment, Dynamic Attack Mitigation, DDoS Mitigation, Host Intrusion Prevention, and Integrated Security Management are all covered, providing the most complete overview of various security systems. It focuses on leveraging integrated management, rather than including a device-by-device manual to implement self-defending networks.


How This Book Is Organized
This book is designed to be read as a beginning-to-intermediate overview of Cisco self-defending networks. The chapters cover the following topics:

Chapter 1, "Understanding Types of Network Attacks and Defenses" Starts with an overview of network security threats and then details specific components of a self-defending network.

Chapter 2, "Mitigating Distributed Denial-of-Service Attacks" Discusses the DDoS attack threats to an IP network and the components to mitigate this DDoS thread, including the DDoS service module for the Catalyst 6500/7600 family and the DDoS Device Manager.

Chapter 3, "Cisco Adaptive Security Appliance Overview" Discusses the Cisco security appliance for firewall, IPS, VPN, antivirus, antispam, antiphishing, and URL filtering. This chapter also details how you can use the Adaptive Security Appliance Device Manager (ASDM) to help create a self-defending network.

Chapter 4, "Cisco Incident Control Service" Examines the Cisco ICS product, developed with Trend Micro, that enables IOS routers, IPS Sensors, and the IPS module (AIP-SSM) of the Adaptive Security Appliance to update virus-related IPS signatures. This chapter also details the ability of Cisco ICS to configure access-list rules on IOS routers and ASA security appliances to help to protect the network against network virus infections.

Chapter 5, "Demystifying 802.lx" Examines the underlying technology of the IEEE 802.1x standard, which enables networks to identify, authenticate, and authorize users to the desired VLANs and applications. This chapter also details how 802.1x can be a component of NAC.

Chapter 6, "Implementing Network Admission Control" Provides an overview of the component of a self-defending network that authenticates and quarantines rogue users and users with down-level versions of OS patches and virus-protecting software. This chapter is dedicated to NAC framework, or a NAC solution that uses existing routers and switches.

Chapter 7, "Network Admission Control Appliance" Covers the fundamentals of and configuration of the NAC appliance (Cisco Clean Access) product line. Specifically, this chapter covers how this NAC appliance can provide an alternative to the embedded components of NAC framework that may be attractive to several target markets, including the education market. This chapter also details how 802.1x is not required to implement NAC with the NAC appliance.

Chapter 8, "Managing the Cisco Security Agent" Covers the fundamentals and configuration of the end-point or desktop self-defending component. It also discusses the product to provide end-point or desktop protection for up to 100,000 PCs or laptops with a single management center.

Chapter 9, "Cisco Security Manager" Covers the centralized management product (Cisco Security Manager), which can configure the self-defending network for routers, switches, ASA, and IPS devices. This chapter also details how a management station can manage a self-defending network.

Chapter 10, "Cisco Security Monitoring, Analysis, and Response System" Details how Cisco Security MARS can centrally monitor and provide mitigation for a self-defending network. Cisco Security MARS received monitoring input from many components in the selfdefending network, including routers, switches, ASA devices, IPS devices, databases, hosts, and Cisco Security Agents.

Download
http://rapidshare.com/files/136035010/Self-Defending_Networks_-_The_Next_Generation_Of_Network_Sec.chm
or
http://tinyurl.com/57nf4x

1

Security Warrior


This book offers unique methods for honing your information security (infosec) technique. The typical reader is an intermediate- to advanced-level practitioner. But who among us is typical? Each of us approaches infosec with distinctive training and skill. Still, before you spend your hard-earned money on this book, we will try to describe the target reader.

As an example, you might enjoy this book if you already have experience with networking and are able to program in one or more languages. Although your interest in infosec might be new, you have already read at least a few technical books on the subject, such as Practical UNIX & Internet Security from O'Reilly. You found those books to be informative, and you would like to read more of the same, but hopefully covering newer topics and at a more advanced level. Rather than an introductory survey of security from the defensive side, you would like to see through an attacker's eyes.

You are already familiar with basic network attacks such as sniffing, spoofing, and denial-of-service. You read security articles and vulnerability mailing lists online, and you know this is the best way to broaden your education. However, you now want a single volume that can quickly ratchet your knowledge level upward by a few notches.

Instead of reading a simple catalog of software tools, you would like to delve deeper into underlying concepts such as packet fragmentation, overflow attacks, and operating system fingerprinting. You likewise want more on forensics, honeypots, and the psychological basis of social engineering. You also enjoy novel challenges such as implementing Bayesian intrusion detection and defending against wireless "airborne" viruses. Before buying into Microsoft's Trustworthy Computing initiative, you would like to delve deeper into Windows XP attacks and Windows Server weaknesses.

These are some of the topics we cover. Although some parts will necessarily be review for more advanced users, we also cover unique topics that might gratify even seasoned veterans. To give one example, we cover reverse code engineering (RCE), including the esoteric subjects of Linux and embedded RCE. RCE is indispensable for dissecting malicious code, unveiling corporate spyware, and extracting application vulnerabilities, but until this book it has received sparse coverage in the printed literature.

This book is not married to a particular operating system, since many of you are responsible for protecting mixed networks. We have chosen to focus on security from the attacking side, rather than from the defending side. A good way to build an effective defense is to understand and anticipate potential attacks.

Throughout the text we have tried to avoid giving our personal opinions too often. However, to some extent we must, or this would be nothing more than a dry catalog of facts. We ask your forgiveness for editorializing, and we make no claim that our opinions are authoritative, or even correct. Human opinion is diverse and inherently flawed. At the very least, we hope to provide a counterpoint to your own views on a controversial subject. We also provide many anecdotal examples to help enliven some of the heavier subjects.

We have made a special effort to provide you with helpful references at the end of each chapter. These references allow us to credit some of the classic infosec sources and allow you to further explore the areas that interest you the most. This is by no means a comprehensive introduction to network security. Rather, it is a guide for rapidly advancing your skill in several key areas. We hope you enjoy reading it as much as we enjoyed writing it.

Download
http://rapidshare.com/files/136031960/Security_Warrior__2004_.chm
or
http://tinyurl.com/5txxf5

0

Security for Microsoft Visual Basic .NET


This book is an introduction to security for Visual Basic programmers. You’ll find it useful both as a prescriptive guide for writing secure applications and as a technical reference for how to actually implement security techniques in your own code. For example, in Chapter 1, “Encryption,” we explain what encryption is and when to use the different types of encryption, and we provide examples that show you how to actually encrypt and decrypt information.

Although there is already a wealth of information available about security, very little has been written that targets the Visual Basic programmer. In writing this book, we set out to change this. We have followed three principles that make this book better for the Visual Basic programmer than any other publication you will find on security:

Make it simple Many security publications are shrouded in hard- to-understand jargon and difficult-to-work-out acronyms, and they assume you already have a background in security. This book is different: we spell out every acronym, use easy-to-understand language, and explain in clear terms each security concept.

Clear guidance Some security books explain security techniques without telling you where or where not to use them. This book is different: we offer clear guidance on how, when, and where you should use each security technique.

Complete assistance Although this is an introductory-level book, it covers everything from coding techniques to designing a secure architecture to performing a security audit. Our intention was to provide an end-to-end introductory guide for producing secure applications.

Download
http://rapidshare.com/files/136030978/Security_For_Microsoft_Visual_Basic_.NET__2003_.chm
or
http://tinyurl.com/6nr72l

0

Secrets of Videoblogging


Here's the perfect introduction to the art of the videoblog, or vlog, whatever your subject. Filled with both technical and creative tips, this fun, fast, full-color guide provides everything you need to get started vlogging. You'll learn:

• How to find and keep track of your favorite videoblogs
• How to create your own vlog under Windows or Mac OS X
• Where to find free vlog-hosting services
• Tips on lighting, shooting, sound, and video compression for vlogs
• Where to download free, legal music for your vlog
• How to build an audience with RSS feeds
• And many more insider secrets

Vlogging pioneers Michael Verdi and Ryanne Hodson are co-founders of NO DE101, an international network of videoblog classrooms, and FreeVlog.org, NO DE101's online equivalent. Verdi also vlogs at www.michaelverdi.com, while Hodson produces vlogs at http://ryanedit.blogspot.com and http://revlog.blogspot.com. Video training pioneers Diana Weynand and Shirley Craig are co-owners of Weynand Training International, an Apple Authorized Training Center that provides training services to the entertainment industry. They vlog at www.weynand.blogspot.com.

Download
http://rapidshare.com/files/136029387/Secrets_Of_Videoblogging__2006_.chm
or
http://tinyurl.com/5osqpa

0

Real World SQL Server Administration with Perl

Who This Book Is For


This book isn't an introductory Perl tutorial or a SQL Server administration tutorial. You can find the shelves already crowded with introductory books on both Perl and SQL Server administration in any computer bookstore.

You don't have to be a Perl expert to read this book. However, to get the most out of it, you should be conversant with the essentials of Perl, including its syntax, its data structure elements (scalars, arrays, hashes, and references), and its basic string operations. You also need to know the basics of file Input/Output (I/O), sub-routines, and regular expressions. For your convenience, I've included a short review of the Perl essentials in Appendix B.

In addition, you should be familiar with the basics of SQL Server administration, and you should be comfortable with T-SQL scripting.

This book is for lazy, impatient, and cheap SQL Server DBAs.[1] If you're tired of having to deal with the same boring routines repetitively and want to have the routines automated, this book is for you. In particular, if you always have an urge to streamline multiple existing tools and make them work together automatically, this book is for you.

If instead of patiently waiting for the management approval process to eventually get you the tool you want for an urgent problem and you'd rather create a tool yourself, this book is for you.

You like a feature you see in an expensive tool but don't want to spend money or don't have the money to spend. Instead, you want to quickly write your own tool to get the job done. This book is for you.

This book is also written for SQL Server DBAs who know they have better things to do than waste their time on repetitive chores and who simply can't bring themselves to perform an administrative task more than twice without asking "How do I automate this darn thing so that I don't have to do it again?"

This book is for the SQL Server DBAs who want to break free from being constrained inside SQL Server and who want to have the freedom to access and use the administrative information wherever it may be kept.

Finally, this book is for those who want to acquire the ability to fill the holes in existing tools, stop the gaps among these tools, and extend existing tools to cover new problems.

Download
http://rapidshare.com/files/136026210/Real_World_SQL_Server_Administration_With_Perl__2003_.chm

or
http://tinyurl.com/6kmrkn

0

Real World Image Sharpening with Adobe Photoshop CS2


Who Needs This Book?

If you work with images that are destined for hard copy, and you aren't totally confident about all your sharpening decisions, my hope is that you'll find this book beneficial. No matter whether you make your own prints, send them out to an online printing service, or deliver commercial work destined for offset press, the sharpening workflow can help you get the most out of your images.

This is not a book for Photoshop beginners, but neither is it a book only for Photoshop experts. Some of the techniques described herein use fairly esoteric Photoshop features with which you may or may not be familiar. Don't let that put you off. I've yet to encounter a piece of software that was smarter than its users, and Photoshop is no exception. Almost all the techniques in this book are nondestructivethey don't touch your original pixelsso you can't do any harm to your images by trying them.

Download
http://rapidshare.com/files/136025984/Real_World_Image_Sharpening_With_Adobe_Photoshop_CS2__2006_.chm
or
http://tinyurl.com/5kjusg

0

Publish and Prosper: Blogging for Your Business


While personal blogs take up much of the blogosphere, blogs are quickly gaining popularity in business as an inexpensive and amazingly effective marketing tool. It's time for a practical book about business blogging: this is the first book to demonstrate how businesses are blogging and how you can use blogging technology to converse with your customers to build your brand and sell your products.

Written from the business person/designer's perspectives, this book shows how businesses can leverage current, real-world blogging techniques, tools, and platforms to promote and enhance their ventures. The key idea is that the conversation with your market is stronger and more meaningful with a blog. Filled with practical information and a how-to approach, this book provides case studies of companies as large as Boeing or General Motors and as small as Clip-'n-seal. Readers will learn about the types of business blogs, how companies use blogs, how to sell blogs to management and IT, effective blog design, content, and conversation, pitfalls to avoid, how to develop Web presence, and more.

Download
http://rapidshare.com/files/136015696/Publish___Prosper_-_Blogging_For_Your_Business__2006_.chm
or
http://tinyurl.com/6ksp7x

Would you like to get my updates directly to your mailbox? Click below to Enter your mail address

Subscribe to Books Tube


AddThis Feed Button 
Page copy protected against web site content infringement by Copyscape