Archive for January, 2008

Windows SharePoint Services Version 3.0 Inside Out

Tuesday, January 29, 2008

server.jpgBy Errin O’Connor

Dig in-and learn how the experts use Windows SharePoint Services 3.0-from the inside out! This book packs hundreds of time-saving solutions, troubleshooting tips, and workarounds-all in concise, fast-answer format. You will learn how to simplify information sharing, make team collaboration more efficient, and improve your personal productivity. You’ll discover how to design workflows and projects for SharePoint sites, manage design teams and source control, and use cascading style sheets to control site appearance. You’ll get to explore new features for using Windows SharePoint Services with blogs, RSS, and wikis. You’ll even learn how to use Windows SharePoint Services with other products, including Excelr Services, Microsoft Office Project Server 2007, and Microsoft Visual Studior Team System. Plus, the companion CD comes packed with the complete eBook, the Windows VistaT Product Guide eReference, and plenty of custom resources. With INSIDE OUT, you get all muscle and no fluff!

Key Book Benefits:
• Makes hundreds of tips, tricks, and workarounds easy to find and apply with the award-winning INSIDE OUT format
• Drills into the features and functions in SharePoint Services 3.0, delivering comprehensive details-but no fluff-in a single volume
(Description from barnesandnoble.com)

Advertisements

Linux Firewalls: Attack Detection and Responce with iptables, psad, and fwsnort

Tuesday, January 29, 2008

linux1.jpgBy Michael Rash

Use iptables to detect and prevent network-based attacks

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection system (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You’ll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.

Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of:

• Application layer attack detection with the iptables string match extension and fwsnort
• Building an iptables ruleset that emulates a Snort ruleset
• Port knocking vs. Single Packet Authorization (SPA)
• Tools for visualizing iptables logs
• Passive OS fingerprinting with iptables

Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls.

If you’re responsible for keeping a network secure, you’ll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables-along with psad andfwsnort-to detect and even prevent compromises. (Description from barnesandnoble.com)

Inside Microsoft Exchange Server 2007 Web Services

Tuesday, January 29, 2008

exchange.jpgBy David Sterling

Dive deep into the architecture of Exchange Web Services-and master the intricacies for accessing data with the new, unifying API. Exchange Web Services offers new functionality, replacing old, disparate APIs. Written by members of the Microsoft Exchange Server 2007 and Exchange Web Services product teams at Microsoft, this practical guide introduces developers to Exchange Web Services. It includes comprehensive, in-depth coverage of the architecture and key features, including messaging, folders, calendaring, tasks, notifications, searching, availability, and autodiscovery. Developers who are moving applications using previous APIs to Exchange Web Services will learn how to determine the correct Web services constructs-and the implications of those decisions. In addition, developers writing new software will develop a well-grounded understanding of the methods available and how to structure interaction with Exchange Server 2007 for maximum benefit and performance. This book assumes only knowledge of how to write HTTP requests, but it provides proxy examples in Microsoft Visual C#r. (Description from barnesandnoble.com)

The Great Transformation: The Beginning of our Religious Traditions

Monday, January 28, 2008

transform.jpgBy Karen Armstrong

From one of the world’s leading writers on religion and the highly acclaimed author of the bestselling A History of God, The Battle for God and The Spiral Staircase, comes a major new work: a chronicle of one of the most important intellectual revolutions in world history and its relevance to our own time.
In one astonishing, short period – the ninth century BCE – the peoples of four distinct regions of the civilized world created the religious and philosophical traditions that have continued to nourish humanity into the present day: Confucianism and Daoism in China; Hinduism and Buddhism in India; monotheism in Israel; and philosophical rationalism in Greece. Historians call this the Axial Age because of its central importance to humanity’s spiritual development. Now, Karen Armstrong traces the rise and development of this
transformative moment in history, examining the brilliant contributions to these traditions made by such figures as the Buddha, Socrates, Confucius and Ezekiel.
Armstrong makes clear that despite some differences of emphasis, there was remarkable consensus among these religions and philosophies: each insisted on the primacy of compassion over hatred and violence. She illuminates what this “family” resemblance reveals about the religious impulse and quest of humankind. And she goes beyond spiritual archaeology, delving into the ways in which these Axial Age beliefs can present an instructive and thought-provoking challenge to the ways we think about and practice religion today.
A revelation of humankind’s early shared imperatives, yearnings and inspired solutions – as salutary as it is fascinating.
Excerpt from The Great Transformation:
In ourglobal world, we can no longer afford a parochial or exclusive vision. We must learn to live and behave as though people in remote parts of the globe were as important as ourselves. The sages of the Axial Age did not create their compassionate ethic in idyllic circumstances. Each tradition developed in societies like our own that were torn apart by violence and warfare as never before; indeed, the first catalyst of religious change was usually a visceral rejection of the aggression that the sages witnessed all around them. . . .
All the great traditions that were created at this time are in agreement about the supreme importance of charity and benevolence, and this tells us something important about our humanity. (Description from barnesandnoble.com) Call number: BL430 .A76 2007

My Antonia

Monday, January 28, 2008

antonia.jpgBy Willa Cather

At the age of ten, Cather moved with her family from Virginia to a Nebraska ranch where she grew up among the immigrants from Europe that were homesteading on the Great Plains. My Antonia is Cather’s portrait of a remembered American girlhood: her hardships and difficulties as well as her search for happiness are the themes of this novel. (Description from barnesandnoble.com) Call number: PS305 .A87 M8 2006

The Grapes of Wrath

Monday, January 28, 2008

grapes.jpgBy John Steinbeck

Although it follows the movement of thousands of men and women and the transformation of an entire nation, The Grapes of Wrath is also the story of one Oklahoma farm family, the Joads, who are driven off their homestead and forced to travel west to the promised land of California. Out of their trials and their repeated collisons against the hard realities of an America divided into Haves and Have-Nots, Steinbeck created a drama that is intensely human yet majestic in its scale and moral vision, elemental yet plainspoken, tragic but ultimately stirring in its insistence on human dignity.  (Description from barnesandnoble.com) Call number: PS3537 .T3234 G8 2006

Forever…

Monday, January 28, 2008

forever.jpgBy Judy Blume

Awkward, sweet, passionate, innocent, secretive . . .

Do you remember your first time?

Katherine and Michael won’t ever forget theirs. They were seniors in high school. Totally crazy for each other, they thought they had found the one. It was first love, and it was perfect: long talks on the phone, ski trips, and double dates when they simply couldn’t wait to be alone.

But was Katherine and Michael’s relationship the love of a lifetime, or merely the beginning of a lifetime of love?

Relive the memories in this new edition of Judy Blume’s classic and beloved novel. Fall in love all over again with Forever . . . . (Description from barnesandnoble.com) Call number: Browsing Blume

Windows Home Server for Dummies

Friday, January 25, 2008

home.jpgBy Brian Koerner

If you work in an office, you probably don’t lose much sleep worrying about whether your files are safe if your PC melts down. Company IT departments handle those things for business networks. But how about all those precious photos, address lists, the family genealogy, and everything else that lives on your home network? Windows Home Server can save the day if one of your personal PCs hiccups, and Windows Home Server For Dummies serves up all the stuff you need to know to put it to work.

Forget everything you’ve heard about previous versions of Windows Server; this all-new variation has been designed for people who don’t wear white lab coats or pocket protectors. Woody Leonhard has tested it and it passed with flying colors. If you have a home or small business network, this book shows you how Windows Home Server helps you

  • Share files among all the PCs in your home
  • Access your files from anywhere
  • Make regular backups automatically
  • Store files securely
  • Play music, TV shows, or movies on your Xbox
  • Share multimedia across your network
  • Keep your virus protection and system upgrades up to date
  • Get regular reports on the overall health of your network

(Description from barnesandnoble.com)

Security Data Visualization: Graphical Techniques for Network Analysis

Friday, January 25, 2008

data.jpgBy Greg Conti

Information overload. If you’re responsible for maintaining your network’s security, you’re living with it every day. Logs, alerts, packet captures, and even binary files take time and effort to analyze using text-based tools-and once your analysis is complete, the picture isn’t always clear, or timely. And time is of the essence.

Information visualization is a branch of computer science concerned with modeling complex data using interactive images. When applied to network data, these interactive graphics allow administrators to quickly analyze, understand, and respond to emerging threats and vulnerabilities.

Security Data Visualization is a well-researched and richly illustrated introduction to the field. Greg Conti, creator of the network and security visualization tool RUMINT, shows you how to graph and display network data using a variety of tools so that you can understand complex datasets at a glance. And once you’ve seen what a network attack looks like, you’ll have a better understanding of its low-level behavior-like how vulnerabilities are exploited and how worms and viruses propagate.

You’ll learn how to use visualization techniques to:

* Audit your network for vulnerabilities using free visualization tools, such as AfterGlow and RUMINT
* See the underlying structure of a text file and explore the faulty security behavior of a Microsoft Word document
* Gain insight into large amounts of low-level packet data
* Identify and dissect port scans, Nessus vulnerability assessments, and Metasploit attacks
* View the global spread of the Sony rootkit, analyze antivirus effectiveness, and monitor widespreadnetwork attacks
* View and analyze firewall and intrusion detection system (IDS) logs

Security visualization systems display data in ways that are illuminating to both professionals and amateurs. Once you’ve finished reading this book, you’ll understand how visualization can make your response to security threats faster and more effective. (Description from barnesandnoble.com)

Professional SlickEdit

Friday, January 25, 2008

slickedit.jpgBy John Hurst

Professional SlickEditis the first guide to the award-winning SlickEdit tools, and is technically reviewed by the SlickEdit development team. SlickEdit expert John Hurst shares his years of experience in developing with SlickEdit to teach readers how to maximize the tool’s features, and to write and debug code faster than they have before. Additionally, the book includes a CD ROM with an extended trial version of SlickEdit not available anywhere else.

Professional SlickEdit is heavy on examples, making this a hands-on guide that will get readers up and running with the tools quickly. Topics include:

  • Customizing the environment
  • Staying organized with Workspaces and Projects
  • Understanding Tagging
  • Quickly navigating code
  • Power editing techniques for text, code and data
  • Taking advantage of Aliases and File Templates
  • Slick-C Macro Programming
  • Custom Language Support
  • DIFFzilla and other tools

(Description from barnesandnoble.com)