Monday, February 01, 2010

Building Internet Firewalls, Second Edition

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks.
What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.
Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.
Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:
    • Firewall technologies: packet filtering, proxying, network address translation, virtual private networks
    • Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls
    • Issues involved in a variety of new Internet services and protocols through a firewall
    • Email and News
    • Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)
    • File transfer and sharing services such as NFS, Samba
    • Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000
    • Real-time conferencing services such as ICQ and talk
    • Naming and directory services (e.g., DNS, NetBT, the Windows Browser)
    • Authentication and auditing services (e.g., PAM, Kerberos, RADIUS);
    • Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics)
    • Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)
    • Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)
    The book's complete list of resources includes the location of many publicly available firewall construction tools.


Developing Java Beans


Java Beans is the most important new development in Java this year. Beans is the next generation of Java technology that not only adds features the language lacked, but also lets Java programs interoperate with a number of development environments. The initial release includes a bridge for Microsoft's ActiveX/COM; future releases will include bridges for Netscape's LiveConnect and IBM's OpenDoc.
Since it's a "component architecture" for Java, Beans can be used in graphical programming environments, like Borland's JBuilder, or IBM's VisualAge for Java. This means that someone can use a graphical tool to connect a lot of Beans together and make an application, without actually writing any Java code -- in fact, without doing any programming at all. Graphical development environments let you configure components by specifying aspects of their visual appearance (like the color or label of a button) in addition to the interactions between components (what happens when you click on a button or select a menu item).
One important aspect of Java Beans is that components don't have to be visible. This sounds like a minor distinction, but it's very important: the invisible parts of an application are the parts that do the work. So, for example, in addition to manipulating graphical widgets, like checkboxes and menus, Beans allows you to develop and manipulate components that do database access, perform computations, and so on. You can build entire applications by connecting pre-built components, without writing any code.
Developing Java Beans is for people who need to stay up-to-date with the latest developments in programming technology. Minimally, developing Beans means adopting several simple design patterns in your code. However, that's only the beginning. To take full advantage of the Java Beans architecture, you should understand how to write classes that are serializable, use events for communication between classes, know when and how to provide BeanInfo classes that give graphical environments more information about your components, and provide property editors and customizers that let graphical tools work with more complex Beans.
The book covers:
  • Events, event listeners, and adapters
  • Properties, indexed properties, bound properties, constrained properties, and vetoable property changes
  • Persistence, serialization, versioning, and object validation
  • Packaging Beans using JAR files
  • The BeanBox, a prototypical development tool
  • Reflection and introspection
  • Property editors and customizers
  • The ActiveX bridge; using Java Beans in Visual Basic programs


Building Oracle XML Applications

This rich and detailed look at the many Oracle tools that support XML development shows Java and PL/SQL developers how to combine the power of XML and XSLT with the speed, functionality, and reliability of the Oracle database. The nearly 800 pages of entertaining text, helpful and time-saving hints, and extensive examples can be put to use immediately to build custom XML applications. Includes a CD-ROM with JDeveloper 3.1, an integrated development environment for Java developers.



DHCP for Windows 2000


DHCP for Windows 2000

Managing the Dynamic Host Configuration Protocol



Dynamic Host Configuration Protocol (DHCP) is an open standard Internet protocol used to allocate and manage IP addresses dynamically. Before DHCP came along, administrators had to manually configure each host on a network with an IP address, subnet mask, and default gateway. Maintaining the changes and the associated logs took a tremendous amount of time and was prone to error. DHCP uses a client/server model in which the system updates and maintains the network information dynamically. Windows 2000 provides enhanced DHCP client-server support.
DHCP for Windows 2000 is custom-designed for system administrators who are responsible for configuring and maintaining networks with Windows 2000 servers. It explains the DHCP protocol and how to install and manage DHCP on both servers and clients--including client platforms other than Windows 2000.
Readers get detailed and explicit instructions for using Windows 2000 DHCP to manage their network IP configurations much more efficiently and effectively.They get background information for using DHCP in general, plus complete information about the Windows 2000 use of DHCP. For those interested in what's on the horizon, the author steps up to the plate with an analysis of the future direction of DHCP and Windows support for IPv6.

Photoshop CS4 One-on-One: Mastery(full)



Course Summary

Description


Course name:
Photoshop CS4 One-on-One: Mastery

Author(s):

Duration (hr:min):
13:07

Released on:
5/29/2009

Exercise files:

Software works on:
Mac and Windows

Photoshop mastery can be elusive, but in Photoshop CS4 One-on-One: Mastery, best-selling author and video trainer Deke McClelland teaches the most powerful, unconventional, and flexible features of the program. In this third and final installment of the popular and comprehensive series, Deke delves into the strongest features that Photoshop has to offer, including scalable vector graphics, Smart Objects, and Photomerge. Exercise files accompany the course.

Recommended prerequisites: Photoshop CS4 One-on-One: Fundamentals and Photoshop CS4 One-on-One: Advanced, both part of the lynda.com Online Training Library®.

Download Deke's customized keyboard layouts and color settings for Photoshop from the Exercise Files tab.

Topics include:
  • Defining the essentials of masking
  • Resizing images with content-aware scaling
  • Adjusting perspective with Vanishing Point
  • Applying Smart Filters to create complex effects
  • Using the Auto-Align tool to build composite images


Download Photoshop CS4 One-on-One: Mastery including Exercise Files