11/11/2010

Developing with Google App Engine - pdf

Developing with Google App EngineBook Description
Developing with Google App Engine introduces development with Google App Engine, a platform that provides developers and users with infrastructure Google itself uses to develop and deploy massively scalable applications.

  • Introduction to concepts
  • Development with App Engine
  • Deployment into App Engine

What you'll learn

  • Create processes that are ideal for cloud platforms.
  • Design data for the cloud.
  • Learn what types of applications are ideal for the cloud.
  • Deploy web applications into the cloud.
  • Measure the success and health of the cloud.

Who is this book for?
Python developers, developers interested in massive scaling, and developers interested in Google or cloud computing

About the Author
Eugene Ciurana is an open–source evangelist who specializes in the design and implementation of mission–critical, high–availability large scale systems. As Director of Systems Infrastructure for LeapFrog Enterprises, he and his team designed and built a 100% SOA–based system that enables millions of Internet–ready educational handheld products and services. In 2006, he led the official adoption of Linux and other open–source technologies at Walmart Stores Information Systems Division as chief liaison between Walmart.com Global and the ISD Technology Council. He is known as pr3d4t0r in the ##java, #awk, and #appengine channels of the Freenode IRC network.

Eugene has contributed to several Java, Linux, and OS X open–source projects and has architected main line of business applications and real–time systems for the largest companies in the world, including Walmart, Bank One/Chase, National Oilwell Varco, Bank of America, Credit Suisse, Nortel Networks, Sun Microsystems, IBM, Univex/Celanese, and Nexis/Lexis. He's the author of over 50 feature articles and editorials for major publications in the United States, Mexico, and Europe, while his work has been featured in such publications as eWeek, CIO Magazine, InfoWorld, DZone, EE Times, Nikkei IT, Software Guru, and TheServerSide.com. Eugene is the best–selling technology and fiction author of such books as Developing with the Google App Engine; Best Of Breed: Building High Quality Systems, Within Budget, On Time, and Without Nonsense; and The Tesla Testament: A Thriller.

Book Details

  • Paperback: 164 pages
  • Publisher: Apress; 1 edition (February 2, 2009)
  • Language: English
  • ISBN-10: 1430218312
  • ISBN-13: 978-1430218319
  • File Size: 6.2 MiB
  • Hits: 1,109 times

Google Sites and Chrome For Dummies - pdf

Google Sites and Chrome For DummiesBook Description
Curious about Google Sites and how team collaboration Web sites can help you share documents online from various locations? Curious about Google's new Chrome browser? Google Sites & Chrome For Dummies has what you want to know!Today, Google is so much more than another word for "search." Google Sites & Chrome For Dummies shows you how to create great collaborative Web sites with Google Sites and surf the Web with the super-fast Google Chrome browser. Find out how they work with other Google Apps, too. You'll learn to:

  • Take advantage of free hosting, free tools, and a simple, straightforward interface with Google Sites
  • Set up a Google account or Google Apps account
  • Create wiki sites that let coworkers collaborate on projects or keep family members up to date
  • Use Google gadgets to keep track of projects, manage calendars and documents, or display photos
  • Integrate documents, spreadsheets, presentations, and other Google Apps into your site
  • Work with Contact List, Google Talk, and Google Chat, and handle e-mail with Gmail
  • Download and install the speedy Google Chrome browser
  • Install browser plug-ins, enable offline access to Google Docs, and manage misbehaving tabs

You'll even find instructions and examples to help you plan sites for personal and business use, plus a sample college course site. With advice from Google Sites & Chrome For Dummies, you can make collaboration easy and have the high-speed Web at your fingertips.

From the Back Cover
When you hear “Google”, do you think “search”? Most people do. But Google is much more, and you won’t have to search far to get the scoop. This book shows you how to create great collaborative Web sites with Google Sites and surf the Web with the super-fast Google Chrome browser. You can even boost your business with Google AdWords — look inside for more!

  • Simple and free — take advantage of free hosting, free tools, and a simple, straightforward interface with Google Sites
  • Wonderful wikis — create wiki sites that let coworkers collaborate on projects and keep family members up to date
  • A gaggle of gadgets — use Google gadgets to keep track of projects, manage calendars and documents, or display photos
  • Take a shine to Chrome — create a highly efficient, personalized browser using tabs and shortcuts
  • Sample a scheme — explore sample schemes for a personal site, business intranet, or college course site
  • Tinker — install browser plug-ins, enable offline access to Google Docs, and manage misbehaving tabs
  • Applicable applications — integrate documents, spreadsheets, presentations, and other Google Apps into your site

Open the book and find:

  • Where Google Sites beats other team site packages
  • How to create a Google account or Google Apps account
  • Advice on setting up sites that work
  • Tips for managing collaborators
  • Chrome’s better way of fixing unruly tabs
  • Steps to take when designing a scheme
  • Why you should consider Gmail

About the Author
Ryan Teeter was an external trainer for Google, where he developed a comprehensive training program for corporate customers and Google Apps users.

Karl Barksdale has written more than 50 business and technology books, and has consulted for both Microsoft and Google.

Book Details

  • Paperback: 456 pages
  • Publisher: For Dummies (February 9, 2009)
  • Language: English
  • ISBN-10: 0470396784
  • ISBN-13: 978-0470396780
  • File Size: 13.7 MiB
  • Hits: 486 times

Google Docs for Everyone - pdf

Google Docs for EveryoneBook Description
Who needs expensive, old-fashioned office software? Now, you can do everything online, free, with Google Docs! Experts Steve and Nancy Holzner offer simple, step-by-step instructions and great insider tips for making the most of Google's powerful online word processing, spreadsheet, and presentation tools. You'll get started fast… learn how to create and format professional-quality documents of all kinds… collaborate with colleagues to build better proposals and presentations… use advanced tools like revision history, templates, and charts… discover Google Docs' latest features and shortcuts… and a whole lot more! No matter what kind of documents you create, this book can help you do the job better, faster, and more efficiently… and you'll never pay for office software again!

You'll Learn How To
• Get your free Google account and set up iGoogle for instant access to your documents
• Upload and use the documents you've already created with Microsoft Office
• Use Google Spreadsheet to create charts to display spreadsheet data
• Master Google Docs' easy, powerful document-editing and formatting tools
• Insert images into your documents and presentations
• Share documents securely with your colleagues
• Back up your documents offline and edit them when you don't have an Internet connection

Steven Holzner, former contributing editor at PC Magazine, is author of 108 computer books that have sold more than 2.5 million copies. His most recent Pearson book is Facebook Marketing.

Nancy Holzner writes and edits technology books from her home in central New York state. Her recent publications include books on Intuit QuickBase and Zoho. Nancy has also worked as a medievalist, a high school teacher, and a corporate trainer.

About the Author
Steven Holzner is the award-winning author of many books. His books have sold more than two million copies and have been translated into 18 languages around the world. He's been a contributing editor at PC Magazine and has been on the faculty of MIT and Cornell University, where he got his PhD.

Nancy Holzner writes and edits tech books from her home in central New York state on topics ranging from Google Apps to WAN optimization to Zoho. She is also a novelist (mystery and urban fantasy) and has worked as a medievalist, an English teacher, and a corporate trainer. Nancy holds a PhD from Brown University.

Book Details

  • Paperback: 264 pages
  • Publisher: Que; 1 Pap/Psc edition (February, 2009)
  • Language: English
  • ISBN-10: 0789739364
  • ISBN-13: 978-0789739360
  • File Size: 7.8 MiB
  • Hits: 610 times

Winning Results with Google AdWords, 2nd Edition - pdf

Winning Results with Google AdWords, 2nd EditionBook Description
Run a Profitable Google AdWords Campaign

Reach millions of targeted new customers at the precise moment they’re looking for the products and services you’re selling with help from this hands-on guide. Winning Results with Google AdWords, Second Edition reveals the latest strategies for writing successful ads, selecting and grouping specific keywords, increasing conversion rates, and maximizing online sales. You’ll also learn how to expand your ad distribution, test and tweak your ads, track results, and much more. Find out how boost visibility and increase profits with a Google AdWords campaign!

  • Create strategic groups of ads and keywords
  • Understand Google’s Quality Score ad ranking system and quality-based bidding
  • Use the keyword tool to your advantage
  • Develop a successful bidding strategy
  • Write, test, and refine winning ads
  • Filter out inappropriate prospects
  • Expand proven ad campaigns
  • Measure success using Google Analytics and other methods
  • Increase conversion rates

From the Back Cover
“Andrew Goodman is the world’s leading authority on Google Adwords. …This book had better be on your desk, not on your shelf, if you expect to win with Google.” –Fredrick Marckini, Founder, iProspect; Chief Global Search Officer, Isobar

“When we started our business five years ago, this book was critical to our success. It continues that focus of distilling the marketplace and offering strategies to make your Internet marketing spending work. Why learn from mistakes, when you have this book?” –Sean Neville, CEO, Simply Audiobooks

About the Author
Andrew Goodman is principal of Page Zero Media, a marketing agency which focuses on maximizing clients’ paid search marketing campaigns. He is the author of the first edition of this book.

Book Details

  • Paperback: 400 pages
  • Publisher: McGraw-Hill Osborne Media; 2 edition (December 8, 2008)
  • Language: English
  • ISBN-10: 0071496564
  • ISBN-13: 978-0071496568
  • File Size: 4.7 MiB
  • Hits: 1,123 times

Mining Google Web Services: Building Applications with the Google API - pdf

Mining Google Web Services: Building Applications with the Google APIBook Description
Google’s Web Services provide all kinds of powerful capabilities that you can leverage in your Internet programs. Here’s a book that teaches you how to develop practical Google Web Services applications. Learn how to embed the popular search engine in a web site, create applications for optimizing complex searches, automatically monitor the web for specified information, develop custom applications to avoid objectionable material, and much more. Even find out how to use Google Web Services and Amazon Web Services together. In “Mining Google Web Services”, you will discover how to develop these real-world applications using VBA, Visual Studio, PHP, Java, and Mobile Devices.

From the Back Cover
Google Brings Data Mining to the People!Virtually everyone sees Google as, hands down, the best online search tool. Now you can use and improve on Google technology in your own applications.

Mining Google Web Services teaches you dozens of techniques for tapping the power of the Google API. Google already gives you fine-grained control over your search criteria, and this book shows you how to exert the same control in your own focused search and analysis applications. With just a little knowledge of JavaScript, VBA, Visual Studio 6, Visual Studio .NET, PHP, or Java, you will get better (and more relevant) search results—faster and more easily. Here’s a little of what you’ll find covered inside:

Improving the speed and accuracy of searches; Performing data mining across the Internet; Using Google Web Services to search a single website; Building search applications for mobile devices; Using caching techniques to improve application performance and reliability; Analyzing Google data; Creating searches for users with special needs; Discovering new uses for Google; Obtaining historical data using cached pages; Performing spelling checks on any text; Reducing the number of false search hits;

Whether your goal is to improve your own searches or share specialized search capabilities with others, this is the one resource that will see you through the job from start to finish.

About the Author
John Paul Mueller is a freelance writer and technical editor who has written over 300 articles and 62 books, including Mining Amazon Web Services, recently published by Sybex. He’s also contributed articles to magazines such as DevSource, asp.netPro, InformIT, SQL Server Professional, Visual C++ Developer, Hard Core Visual Basic, and Visual Basic Developer.

Book Details

  • Paperback: 384 pages
  • Publisher: Sybex; 1 edition (April 23, 2004)
  • Language: English
  • ISBN-10: 0782143334
  • ISBN-13: 978-0782143331
  • File Size: 11.6 MiB
  • Hits: 1,103 times

Marketing Guides – Unlocking Google’s Hidden Potential - pdf

Marketing Guides   Unlocking Google's Hidden PotentialBook Description
Do you search on Google every day? Did you know, if you were to master Google's powerful search refinement operators and lesser-known features, over a year's time you could save days scouring over irrelevant results. And you would strengthen your SEO expertise in the process. "Using Google as a Research Tool" will show you how to find anything quickly and with laser-like accuracy

If you're like me, you use Google every day to find things—news, technical support, events, tips, research documents and more. Were you to master Google's powerful search refinement operators and lesser-known features, over a year's time you could save days scouring over irrelevant results.

About the Author
Stephan M. Spencer, M.Sc., is the founder and president of Netconcepts, a full-service interactive agency with specialization in search engine optimization, Web redesign, ecommerce, email marketing, and Web site auditing. Clients include Verizon, REI, AOL, Gorton's, Cabela's, InfoSpace, The Sharper Image, Wella, Northern Tool, Sara Lee Direct, Midwest Airlines, Guild.com, and MP3.com.

For over ten years, Mr. Spencer has been implementing tools and techniques to create dynamic, personalized, community-building web sites. He is a frequent speaker at Internet conferences around the globe, and has made presentations at events in Berlin, London, Toronto, Santiago, Auckland, New York, Chicago, San Francisco, Los Angeles, and numerous other venues for organizations such as the DMA, the AMA, JupiterMedia, Internet World, and IIR. For several years in the mid 90's, he taught Internet mini-courses at the University of Wisconsin-Madison. In 1998, Mr. Spencer was featured on the cover of In Business magazine.

  • File Size: 3.8 MiB
  • Hits: 1,135 times
[FAST] - Unlocking Google
[DIRECT] - Unlocking Google
[NORMAL] - Unlocking Google

Geek House: 10 Hardware Hacking Projects for Around Home - pdf

Geek House: 10 Hardware Hacking Projects for Around Home

Book Description

  • From the garage to the living room, Geek House provides hackers with 10 PC-based hardware hacking projects that are not for the faint of heart!
  • Taking the DIY mentality to a whole new level, this book teaches techies how to hack, customize, and modify everything-from their sprinkler systems to the temperature of their barbecues
  • Adventurous readers will feast on such projects as installing a bar code inventory system for DVDs or CDs, converting RS232 to wireless, scheduling recording from any television in the house, and creating a remote control finder
  • Companion Web site includes the custom software and source code needed to power these geeky creations

From the Back Cover
How smart is your house?

So your home’s more like “ho-hum”? Don’t wait for the techno-dwelling of tomorrow; do a little geek remodeling today. Make your TV turn itself down when the phone rings. Let your computer water the lawn. Install a kitchen PC that will automatically pull that award-winning sushi recipe off the Internet. And when you’ve finished these projects, we’ll bet you’ll be ready to create a few of your own.

Try one, try all

Covers what you’ll need, where to find it, and how to build the project

  1. X-10 under the hood
  2. Wireless RS-232 link
  3. Home television server
  4. Security monitoring
  5. TV mute on phone ring
  6. Anything inventory
  7. In-counter kitchen PC
  8. Automated BBQ temperature control
  9. Automated sprinkler control
  10. Car PC

Book Details

  • Paperback: 304 pages
  • Publisher: Wiley (May 6, 2005)
  • Language: English
  • ISBN-10: 0764579568
  • ISBN-13: 978-0764579561
  • File Size: 7.9 MiB
  • Hits: 793 times

Access Denied: The Practice and Policy of Global Internet Filtering - pdf

Access Denied: The Practice and Policy of Global Internet Filtering

Review
“In Access Denied an unlikely avant-garde of scholars, lawyers, hacktivists, and computer programmers come together to combat efforts by repressive regimes, corporate firms, and intelligence agencies to surveil, filter, and block the Internet. Through critical analysis, regional surveys, and the use of innovative software, the authors reveal the penumbra of a networked global civil society emerging from the Dark Side’s efforts to eclipse the Internet. Everyone who supports open thought and the free flow of information should read Access Denied.
James Der Derian, Director, Global Security Program, Watson Institute for International Studies, Brown University

“No one had a clear sense of the nature of Internet censorship until now. This extraordinary work maps the unfreedom of the Net. Unfortunately, that state is becoming the norm.”
Lawrence Lessig

“The Web provides everybody with access to information. That makes those in power nervous. Transparency is the best defense against further narrowing of information access and the starting point for rolling back existing barriers. Access Denied provides the definitive analysis of government justifications for denying their own people access to some information and also documents global Internet filtering practices on a country-by-country basis. This is timely and important.”
Jonathan Aronson, Annenberg School for Communication, University of Southern California

Book Description
Many countries around the world block or filter Internet content, denying access to information—often about politics, but also relating to sexuality, culture, or religion—that they deem too sensitive for ordinary citizens. Access Denied documents and analyzes Internet filtering practices in over three dozen countries, offering the first rigorously conducted study of this accelerating trend.

Internet filtering takes place in at least forty states worldwide including many countries in Asia and the Middle East and North Africa. Related Internet content control mechanisms are also in place in Canada, the United States and a cluster of countries in Europe. Drawing on a just-completed survey of global Internet filtering undertaken by the OpenNet Initiative (a collaboration of the Berkman Center for Internet and Society at Harvard Law School, the Citizen Lab at the University of Toronto, the Oxford Internet Institute at Oxford University, and the University of Cambridge) and relying on work by regional experts and an extensive network of researchers, Access Denied examines the political, legal, social, and cultural contexts of Internet filtering in these states from a variety of perspectives. Chapters discuss the mechanisms and politics of Internet filtering, the strengths and limitations of the technology that powers it, the relevance of international law, ethical considerations for corporations that supply states with the tools for blocking and filtering, and the implications of Internet filtering for activist communities that increasingly rely on Internet technologies for communicating their missions.

Reports on Internet content regulation in forty different countries follow, with each country profile outlining the types of content blocked by category and documenting key findings.

Contributors: Ross Anderson, Malcolm Birdling, Ronald Deibert, Robert Faris, Vesselina Haralampieva, Steven Murdoch, Helmi Noman, John Palfrey, Rafal Rohozinski, Mary Rundle, Nart Villeneuve, Stephanie Wang, and Jonathan Zittrain

Book Details

  • Paperback: 320 pages
  • Publisher: The MIT Press (February 29, 2008)
  • Language: English
  • ISBN-10: 0262541963
  • ISBN-13: 978-0262541961
  • File Size: 6.4 MiB
  • Hits: 962 times

Mission-Critical Network Planning - pdf

Mission Critical Network PlanningBook Description
Whether a terrorist attack, fiber cut, security breach, natural disaster or traffic overload, today's networks must be designed to withstand adverse conditions and provide continuous service. This comprehensive, leading-edge book reveals the techniques and strategies to help you keep enterprise data and voice networks in service under critical circumstances. You learn numerous ways to minimize single points of failure through redundancy and backups, and discover how to select the right networking technologies to improve survivability and performance.

About the Author
Matthew Liotine is currently vice president of BLR Consulting and has formerly served as a product marketing director at AT&T Bell Laboratories. A former president of the Society of Information & Management Science, Chicago Chapter, Dr. Liotine holds a Ph.D. in engineering from Princeton University.

Book Details

  • Hardcover: 432 pages
  • Publisher: Artech House Publishers (October 2003)
  • Language: English
  • ISBN-10: 158053516X
  • File Size: 6.4 MiB
  • Hits: 841 times

Hacking Exposed, 6th Edition: Network Security Secrets & Solutions - pdf

Hacking Exposed, 6th Edition: Network Security Secrets & SolutionsBook Description
The tenth anniversary edition of the world’s bestselling computer security book!

The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today’s most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more.

Hacking Exposed 6 applies the authors’ internationally renowned computer security methodologies, technical rigor, and “from-the-trenches” experience to make computer technology usage and deployments safer and more secure for businesses and consumers.

“Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime.” –From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc.

“A cross between a spy novel and a tech manual.” –Mark A. Kellner, Washington Times

“The seminal book on white-hat hacking and countermeasures . . . Should be required reading for anyone with a server or a network to secure.” –Bill Machrone, PC Magazine

“A must-read for anyone in security . . . One of the best security books available.” –Tony Bradley, CISSP, About.com

From the Back Cover
The world’s bestselling computer security book–fully expanded and updated

“Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime.” –From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc.

“For security to be successful in any company, you must 'think evil’ and be attuned to your 'real risk’…Hacking Expose 6 defines both.” –Patrick Heim, CISO, Kaiser Permanente

“The definitive resource to understanding the hacking mindset and the defenses against it.” –Vince Rossi, CEO & President, St. Bernard Software

“Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim.” –Bill Loesch, CTO, Guard ID Systems

“This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information.” –Kip Boyle, CISO, PEMCO Mutual Insurance Company

“The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf,” –Jeff Moss, Founder of the popular Black Hat Security Conference

Meet the formidable demands of security in today’s hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested “attack-countermeasure” philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker’s extensive arsenal.

New and updated material:

  • New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
  • Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
  • The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
  • New wireless and RFID security tools, including multilayered encryption and gateways
  • All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
  • Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
  • VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
  • Fully updated chapters on hacking the Internet user, web hacking, and securing code

Book Details

  • Paperback: 720 pages
  • Publisher: McGraw-Hill Osborne; 6 edition (1 Feb 2009)
  • Language English
  • ISBN-10: 0071613749
  • ISBN-13: 978-0071613743
  • File Size: 9.9 MiB
  • Hits: 2,342 times

Hacking Exposed Wireless: Wireless Security Secrets & Solutions - pdf

Hacking Exposed Wireless: Wireless Security Secrets & SolutionsBook Description
IT professionals are looking for a book that gives them more than just theory and generic security information. With the best-selling Hacking Exposed series already established as the leader in the marketplace, Hacking Exposed Wireless provides real, tactical wireless security implementation coverage by showing how to execute the attacks and implement the defenses. This is an invaluable resource for any IT professional who works with wireless technology.

From the Back Cover
Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You’ll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.

  • Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth
  • Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks
  • Defend against WEP key brute-force, aircrack, and traffic injection hacks
  • Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles
  • Prevent rogue AP and certificate authentication attacks
  • Perform packet injection from Linux
  • Launch DoS attacks using device driver-independent tools
  • Exploit wireless device drivers using the Metasploit 3.0 Framework
  • Identify and avoid malicious hotspots
  • Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys

Book Details

  • Paperback: 386 pages
  • Publisher: McGraw-Hill Osborne; illustrated edition edition (1 May 2007)
  • Language English
  • ISBN-10: 0072262583
  • ISBN-13: 978-0072262582
  • File Size: 12.2 MiB
  • Hits: 2,054 times

Networking with Microsoft Windows Vista: Your Guide to Easy and Secure Windows Vista Networking - pdf

Networking with Microsoft Windows Vista: Your Guide to Easy and Secure Windows Vista Networking Book Description

Your Guide to Easy and Secure Windows Vista Networking is a complete beginner's guide to creating, configuring, administering, and using a small network using Windows Vista computers. Inside you'll find comprehensive coverage of networking hardware, including Ethernet (wired) hardware (from NICs to cables to switches to routers) and wireless Hardware–from wireless NICs to access points to range extenders.

 

We include handy "buyer's guides" that tell you how to make smart choices when purchasing network hardware. With hardware in hand, we then show you how to roll up your shirtsleeves and put everything together, including configuring a router, laying cable, and connecting the devices. Next, we then show you how to wrangle with Windows Vista's networking features. These techniques include using the Network and Sharing Center, managing wired and wireless connections, accessing shared network resources, sharing local resources on the network, and working with network files offline. And if you are a music and video aficionado, we've got you covered with a special chapter that shows you just how to set up a networked Vista PC as your digital media hub!

 

No networking book would be complete without extensive coverage of security issues that affect anyone connected to the Internet. We show you how to secure each computer, secure your global networking settings, and batten down your wireless connections. The last part of the book includes intermediate networking tasks such as

making remote connections, monitoring the network, troubleshooting network problems, and setting up Vista's built-in web server and FTP server.

 

•    No longer is networking a topic that only geeks need to understand. If you have even one computer on the Internet or if you use wireless in your home or office, you need this book!

•    Extensive hardware coverage that shows you what equipment to buy and how to set it up!

•    Easy to follow buyer's guides that enable anyone to make smart and informed choices when purchasing networking hardware.

•    Complete and comprehensive coverage of Windows Vista's networking features.

•    Thwart hackers, crackers, thieves and other Internet malefactors by following our easy to understand chapters on security!

•    Loaded with tips, tricks, and shortcuts to make networking easier and more secure.

•    Chock full of real-world examples and network configurations that you can put to work today!


About the Author

Paul McFedries is a full-time technical writer who has worked with computers in one form or another since 1975 and has used Windows since version 1 was foisted upon an unsuspecting (and underwhelmed) world in the mid-1980s. He is the author of more than 60 computer books that have sold more than three million copies worldwide. His recent titles include the Sams Publishing books Windows Vista Unleashed and Windows Home Server Unleashed and the Que Publishing books Formulas and Functions with Microsoft Excel 2007, Tricks of the Microsoft Office 2007 Gurus, and Microsoft Access 2007 Forms, Reports, and Queries. Please visit Paul's website at http://www.mcfedries.com/. Paul is also the proprietor of Word Spy (http://www.wordspy.com) a website devoted to tracking new words and phrases as they enter the English language.

 

Book Details

  • Paperback: 552 pages
  • Publisher: Que; 1 edition (December 29, 2007)
  • Language: English
  • ISBN-10: 0789737779
  • ISBN-13: 978-0789737779

  • File Size: 16.8 MiB
  • Hits: 557 times


The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws - pdf

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Book Description
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.

The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias “PortSwigger”, Dafydd developed the popular Burp Suite of web application hack tools.

Book Details

  • Paperback: 768 pages
  • Publisher: Wiley (October 22, 2007)
  • Language: English
  • ISBN-10: 0470170778
  • ISBN-13: 978-0470170779
  • File Size: 4.8 MiB
  • Hits: 1,614 times

Wireless Programming with J2ME: Cracking the Code - pdf

Wireless Programming with J2ME: Cracking the CodeBook Description
Part of the new Cracking the Code Series, Wireless Programming with J2ME provides a look at the code behind wireless Java applications. Think of J2ME as a tiny version of Java specifically for mobile devices — perfect for bringing powerful, robust applications to mobile phone, pagers, PDAs, and other handhelds. Writing applications for handheld and mobile devices is different than regular Java programming. Mobile developers have to deal with limited screen real estate, bandwidth and computing power. This book covers six wireless applications complete with Flow Diagrams and line-by-line code description. It covers all of J2ME including CDC,CLDC and MIDP with an emphasis on practical code.


Book Details

  • Paperback: 408 pages
  • Publisher: Wiley (December 15, 2001)
  • Language: English
  • ISBN-10: 0764548859
  • ISBN-13: 978-0764548857
  • File Size: 4.9 MiB
  • Hits: 1,120 times

Windows Server 2008 Security Resource Kit (PRO – Resource Kit) - pdf

Windows Server 2008 Security Resource Kit (PRO   Resource Kit)Amazon.com Review
Get the definitive reference for planning and implementing security features in Windows Server 2008 with expert insights from Microsoft Most Valuable Professionals (MVPs) and the Windows Server Security Team at Microsoft. This official Microsoft RESOURCE KIT delivers the in-depth, technical information and tools you need to help protect your Windows® based clients, server roles, networks, and Internet services. Leading security experts explain how to plan and implement comprehensive security with special emphasis on new Windows security tools, security objects, security services, user authentication and access control, network security, application security, Windows Firewall, Active Directory® security, group policy, auditing, and patch management. The kit also provides best practices based on real-world implementations. You also get must-have tools, scripts, templates, and other key job aids, including an eBook of the entire RESOURCE KIT on CD.

Key Book Benefits

Definitive technical information and expert insights straight from the Windows Server Security Team and leading Microsoft MVPs

Provides in-depth information that every Windows administrator needs to know about helping protect Windows-based environments

Includes best practices from real-world implementations

CD includes additional job aids, including tools, scripts, and a fully searchable version of the entire RESOURCE KIT book

Q&A with Jesper M. Johansson, author of Windows Server 2008 Security Resource Kit

The credentials of the contributors to Windows Server 2008 Security Resource Kit are quite impressive. How important was it to assemble such a group for this title?

In my opinion, it was necessary. Server products are necessarily complex, and security, by its very nature, requires a very broad understanding of the product. Developing that understanding in a single person is possible, but very time consuming and still does not lead to the breadth of perspective that you find in a group of people. No single person can truly understand both what it is like to implement Active Directory in a 50,000 seat organization, and how to run a 50-seat small business network long-term, and neither of them is probably going to also be one of the world’s foremost experts on implementing public key cryptography infrastructures. By putting together this world-wide team of experts (representing four countries on three continents) we were able to produce a resource that had far more depth and breadth of knowledge than would otherwise have been possible, and you get the expertise of 12 of the foremost experts on Windows Security in a single package.

What extras are available on the Resource Kit CD?

First, you get a bonus chapter on Rights Management Services, as well as an electronic copy of the entire book. I am very excited about the electronic copy because it provides a searchable way to read the book. These types of books are always used as references and being able to search it is very valuable.

You also get some tools that may come in handy for managing servers. Scripting Guru Ed Wilson wrote some custom PowerShell scripts specifically for this book to manage user accounts and other security related aspects of your deployment. In addition, I wrote a couple of tools for the book. One is my password generator, which I first made available several years ago. It enables you to manage unique administrator account passwords and service account passwords on hundreds or thousands of servers on a network. I also included my elevation tools, which allow you to launch an elevated instance of Windows Explorer, as well as elevating any command you want from the command line. Having worked with User Account Control (UAC) daily for about two years I find that one of the biggest impediments to running under UAC is the multiple prompts you get when you perform many file operations. As an administrator, that is a very common task. Elevating Windows Explorer lets you do those operations with a single elevation prompt, and still leave UAC turned on.

Comparing the two programs, what are some of the fundamental differences between Windows Server 2008 and Windows Server 2003?

To me, the biggest difference is the fact that while Windows Server 2003 was built under the security best practices of 2002, Windows Server 2008 incorporates all the secure development practices Microsoft learned in the five years since. The field of secure software development has progressed immensely between 2002 and 2007, and incorporating them will make Windows Server 2008 much more able to stand up to the threats we will see in the next five years. By the way, it is with a heavy heart that I say that, as I worked hard on security in Windows Server 2003, but it is true.

Apart from the engineering process, the first thing people will notice is the completely new management model in Windows Server 2008. Instead of installing a lot of separate components, you now deploy roles to the server. This makes a lot of sense because the roles are what you bought the server to fill. By implementing that metaphor in the management tools the risk for misconfiguration is greatly reduced.

The new kernel features are also very important and will make a big difference for many. First, the new virtualization features are fundamentally going to change how we build and run data centers. The improvements in security, reliability, and performance in the kernel features, such as thread scheduling, and in the networking features, such as the new network file system, also are going to be valuable to many.

What do you feel is the biggest security oversight made by network admins?

Put a slightly different way, the area where I see the most room for improvement is in security posture management. Administrators are far too focused on vulnerabilities and on the types of “hardening” tweaks that were useful in the 1990s, when software shipped wide open by default. Today, those things are not nearly as important as it is to manage the security posture of your servers. Far too many administrators still believe in the perimeter and fail to recognize that just about every organizational network today is semi-hostile, at best. The biggest security oversight is not to analyze and manage the threats posed to servers by other actors on the network. The Security Resource Kit goes into depth in discussing what I refer to as Network Threat Modeling, as the analysis phase of Server and Domain Isolation – probably the most powerful security tool in the arsenal today. Yet, the proportion of networks that use these tools is infinitesimal.

What are your thoughts on the constant hype surrounding potential security flaws in Vista?

As I have written elsewhere (http://msinfluentials.com/blogs/jesper/archive/2008/01/24/do-vista-users-need-fewer-patches-than-xp-users.aspx) I fail to see any data backing up the argument. Certainly, there have been flaws in Vista – and anyone who expected it to be flawless was unrealistic – but the improvements are tremendous over Windows XP. Windows Vista has about half as many critical problems as Windows XP in the same time-frame. I’m not sure that it would have been reasonable to expect it to perform much better than that given how large and complex modern software is and how fast the security landscape is moving.

Therefore, I have to think that the reasons for the hype are something other than data. The popular press seems to operate on the assumption that complaining about Microsoft generates advertising revenue, and they are probably correct. The fact of the matter today is that a significant portion of the software industry, specifically the security portion, has built its business almost exclusively on selling software that purports to protect Microsoft’s customers from Microsoft’s screw-ups. It is simply terrifying to it, and a grave threat to its business model, that Microsoft should actually manage to produce software, and particularly operating systems, that are so secure they do not need most of the products that portion of the industry sells.

The popular press, being a largely advertising funded business, has happily latched on to this perception and boosted the unsubstantiated claims of Windows Vista’s vulnerability to the benefit of their major advertisers. It is truly a sick eco-system that harms the customer in both the short and long term. The threats today, as I mentioned above, are trending toward the types of things that the security software industry cannot protect against. The new threats are against people, and the focus needs to shift to helping people make better security decisions and take responsibility for their own actions. Unfortunately, the current unsubstantiated hype about Windows Vista is not about protecting customers, it is about selling unnecessary security software and inculcating users and IT managers alike in the belief that they must buy third party software to run Windows safely; a belief that, with a few notable exceptions, such as anti-virus software, is falsified by the data. In fact, the hype has even lead to a huge growth industry in malicious, fake, security software. I have seen a lot of people lured by the hype into buying security software that is not security software at all, but simply malware in disguise. The average consumer, inundated with hype, is unable to make out what to really believe. This sick ecosystem is harmful and the press and the pundits are not helping, but only increasing the hype.

In your opinion, which network faces the biggest security risk today: the small office with multiple power users or large corporation with a large LUA base?

The unmanaged networks. I have seen very well managed and very secure networks in both small and large organizations, and I have seen poorly managed and very insecure networks in both as well. It is not really a matter of size but of how much time and effort is put into the security aspects of it. One of the largest weaknesses seems to be training. Security today is about end-points. The attacks are against people far more prevalent than those against technology and vulnerabilities. We need to, as an industry, understand how to push the security out to the assets that we are trying to protect. In the past we have centralized security because it was a way to centralize management of security. The challenge now is to de-centralize security, while still permitting centralized management. This is a non-trivial task, but it must be done. As a starting point, I dare every IT manager to start analyzing the risks to his or her network, and specifically, what it is they want the network to be used for. Once you understand what it is you want the network to provide you have a chance to work on making it provide that and nothing else. To me, that is the most important thing we can do. A properly staffed IT group, with adequate training and resources to train its users, an organizational mandate to protect the organization’s assets, and a keen understanding of the business they serve will build a network that is adequately secured regardless of the size of the network. Windows Server 2008 certainly provides some very powerful technologies to help you manage security in your network, but while that is a necessary component, it is insufficient by itself. At a very base level, it is about the people and the processes you have, more than about the technology. Technology will help, but it is just a tool that your people will implement using a process that helps or hurts.

About the Author
Jesper Johansson, Ph. D. in Management Information Systems, has 20 years experience in information technology security. He is a security architect for a large e-commerce company, responsible for application security strategy across the range of properties and services. Prior, he was a security manager for Microsoft Corporation. He is author of several TechNet Magazine security articles and is a co-author of two other security books, Protect Your Windows Network and Windows Vista Security. When he is not working on information security, he teaches scuba diving.

The Windows Server Security Team designs, develops, tests, and supports Windows Server security solutions for Microsoft.

Book Details

  • Paperback: 750 pages
  • Publisher: Microsoft Press (March 10, 2008)
  • Language: English
  • ISBN-10: 0735625042
  • ISBN-13: 978-0735625044
  • File Size: 7.3 MiB
  • Hits: 712 times

Google Hacking for Penetration Testers,2: vol. 2 - pdf

Google Hacking for Penetration Testers,2: vol. 2Book Description
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because I’ve seen it with my own eyes. As the founder of the Google Hacking Database (GHDB) and the Search engine hacking forums at http://johnny.ihackstuff.com, I am constantly amazed at what the Google hacking community comes up with. It turns out the rumors are true-creative Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out onto the web, and Google hackers snatch it right up. Protect yourself from Google hackers with this new volume of information.
-Johnny Long

. Learn Google Searching Basics
Explore Google’s Web-based Interface, build Google queries, and work with Google URLs.
. Use Advanced Operators to Perform Advanced Queries
Combine advanced operators and learn about colliding operators and bad search-fu.
. Learn the Ways of the Google Hacker
See how to use caches for anonymity and review directory listings and traversal techniques.
. Review Document Grinding and Database Digging
See the ways to use Google to locate documents and then search within the documents to locate information.
. Understand Google’s Part in an Information Collection Framework
Learn the principles of automating searches and the applications of data mining.
. Locate Exploits and Finding Targets
Locate exploit code and then vulnerable targets.
. See Ten Simple Security Searches
Learn a few searches that give good results just about every time and are good for a security assessment.
. Track Down Web Servers
Locate and profile web servers, login portals, network hardware and utilities.
. See How Bad Guys Troll for Data
Find ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information.
. Hack Google Services
Learn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more.

About the Author
Johnny Long is a “clean-living” family guy who just so happens to like hacking stuff. Over the past two years, Johnny’s most visible focus has been on this Google hacking “thing” which has served as yet another diversion to a serious (and bill-paying) job as a professional hacker and security researcher for Computer Sciences Corporation. In his spare time, Johnny enjoys making random pirate noises (“Yarrrrr!”), spending time with his wife and kids, convincing others that acting like a kid is part of his job as a parent, feigning artistic ability with programs like Bryce and Photoshop, pushing all the pretty shiny buttons on them new-fangled Mac computers, and making much-too-serious security types either look at him funny or start laughing uncontrollably. Johnny has written or contributed to several books, including “Google Hacking for Penetration Testers” from Syngress Publishing, which has secured rave reviews and has lots of pictures.

Book Details

  • Paperback: 448 pages
  • Publisher: Syngress (20 Aug 2007)
  • Language English
  • ISBN-10: 1597491764
  • ISBN-13: 978-1597491761
  • File Size: 32.2 MiB
  • Hits: 1,128 times

PayPal Hacks: 100 Industrial-Strength Tips & Tools - pdf

PayPal Hacks: 100 Industrial Strength Tips & ToolsBook Description
If you’ve bought or sold items through eBay, or through hundreds of other online sites, then you’re familiar with PayPal, the online payment service. With PayPal, a valid email address, and a credit card or bank account, you can easily send and receive payments online. Not a bank or financial institution itself, PayPal describes its service as one that builds on the financial infrastructure of bank accounts and credit cards, and using advanced propriety fraud prevention systems, creates a safe, global, real-time payment solution. Put simply, PayPal provides the means for people to conduct financial transactions online, instantly and securely. But there’s more to PayPal than meets the eye. PayPal Hacks shows you how to make the most of PayPal to get the most out of your online business or transactions. Authors Shannon Sofield of Payloadz.com and PayPal evangelist David Nielsen guide you through the rigors of using and developing with PayPal. Whether you’re building an ecommerce site using PayPal as a transaction provider, or simply trying to pay for an eBay auction without getting burned, PayPal Hacks will give you the skinny on this leading global online payment service. The collection of tips and tricks in PayPal Hacks shows you how to find or even build the right tools for using PayPal to buy and sell on eBay or as a transaction provider for ecommerce on your own site. Written for all PayPal users, from those just starting out to those developing sophisticated ecommerce sites, this book begins with the basics such as setting up your account, then moves quickly into specific tips and tools for buyers, sellers, and developers. With PayPal Hacks, you can: Learn extra steps to help protect yourself while buying or selling on eBay Save time and money with advanced tips and undocumented features Learn dozens of easy-to-follow procedures to help you request and receive payments and fill orders Use PayPal to handle subscriptions, affiliate systems, and donations Create and customize your customers checkout process Effortlessly integrate PayPal s shopping cart system into your own website Implement digital fulfillment with Instant Payment Notification (IPN) and Payment Data Transfer (PDT) Develop and distribute ecommerce applications with the PayPal API Each hack consists of a task to be accomplished or a creative solution to a problem, presented in a clear, logical, and task-oriented format. PayPal Hacks provides the tools and details necessary to make PayPal more profitable, more flexible, and more convenient.

About the Author
Shannon Sofield began working with Macromedia development tools when Macromedia acquired Future Splash (this product evolved into what is now known as Macromedia Flash). Since then, he has expanded his expertise to include most of the Macromedia product line. He specializes in advanced applications for Macromedia Flash 5, Generator, and, more recently, Dreamweaver UltraDev. His company, Superfreaker Studios , is located in New York City. The company focuses mainly on creating and developing ready-made applications for Macromedia users to integrate into their own product and service offerings. Shannon’s role in web development for Superfreaker Studios covers much of the development process, including conceptualization, design, programming, implementation, and evaluation. His technical title at Superfreaker is “Keeper of the Light.” Shannon has worked to provide solutions for clients such as The State of New Jersey, Xerox, Rockefeller Center, Princeton University, and National Discount Brokers. He also works in association with Motion Over Time of New York, educating and training clients in the use of Macromedia products. In the rare event that the shores of the Atlantic receive ridable surf, Shannon can be found catching some waves at his local beach (sometimes in lieu of his programming duties).

Dave Nielsen is a Technical Evangelist within the PayPal Developer Network, a member of SDForum’s Executive Council and the founder of the Web Services SIG of Silicon Valley. Dave has a Bachelor of Science degree in Business from Cal Poly: San Luis Obispo.

Dave Burchell got his start with computers by programming the Radio Shack TRS-80 in BASIC and the Commodore 64 in 6510 assembly. Currently, Dave’s favorite programming languages are Perl and XSLT. A fervent proponent of XML, Dave enjoys solving content management problems with markup and Open Source software. His other interests include American history and Hellenistic philosophy. Dave lives with his wife, Renee, and children, Max, Gus, and Samantha Grace, in Lincoln, Nebraska. His Web site is http://incolor.inebraska.com/burchell/

Book Details

  • Paperback: 368 pages
  • Publisher: O’Reilly Media, Inc.; 1st ed edition (7 Sep 2004)
  • Language English
  • ISBN-10: 0596007515
  • ISBN-13: 978-0596007515
  • File Size: 7.4 MiB
  • Hits: 684 times

Reverse Engineering Code with IDA Pro - pdf

Reverse Engineering Code with IDA ProBook Description
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro’s interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world’s most powerful and popular took for reverse engineering code.

*Reverse Engineer REAL Hostile Code
To follow along with this chapter, you must download a file called !DANGER!INFECTEDMALWARE!DANGER!… ’nuff said.

*Download the Code!
The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language.

*Portable Executable (PE) and Executable and Linking Formats (ELF)
Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering.

*Break Hostile Code Armor and Write your own Exploits
Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow.

*Master Debugging
Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers.

*Stop Anti-Reversing
Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how!

*Track a Protocol through a Binary and Recover its Message Structure
Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message.

*Develop IDA Scripts and Plug-ins
Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks.

About the Author
Dan Kaminsky is the Director of Penetration Testing for IOActive. Previously of Cisco and Avaya, Dan has been operating professionally in the security space since 1999. He is best known for his “Black Ops” series of talks at the well respected Black Hat Briefings conferences. He is also the only speaker who has attended and spoken at every single “Blue Hat” Microsoft internal training event. Dan focuses on design level fault analysis, particularly against massive-scale network applications. Dan regularly collects detailed data on the health of the worlwide Internet, and recently used this data to detect the worldwide proliferation of a major rootkit. Dan is one of the few individuals in the world to combine both technical expertise with executive level consulting skills and prowess.

Book Details

  • Paperback: 316 pages
  • Publisher: Syngress; 1st edition (March, 2008)
  • Language: English
  • ISBN-10: 159749237X
  • ISBN-13: 978-1597492379
  • File Size: 6.5 MiB
  • Hits: 183 times

Ebook CCNA v4.0 - pdf

Ebook CCNA v4.0

Cisco Certified Network Associate (CCNA®) validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN. CCNA curriculum includes basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills. This new curriculum also includes (but is not limited to) the use of these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),VLANs, Ethernet, access control lists (ACLs).


  • File Size: 95.4 MiB
  • Hits: 1,864 times

  • File Size: 57.2 MiB
  • Hits: 1,458 times

Apress – Foundations of Atlas: Rapid Ajax Development with ASP.NET 2.0 - pdf

Apress   Foundations of Atlas: Rapid Ajax Development with ASP.NET 2.0
This book introduces a fast-track path to understanding Atlas, and how this technology can increase the power and functionality of your code while conserving time and effort. The book begins with a bare-bones introduction that explains how Atlas relates to Ajax.

Microsoft Atlas is a web-client framework that makes building Ajax-style applications easier. It provides a prewritten framework that gives you a structured environment in which to work. Atlas also provides you with an object model and standardized debugging to make development faster and simpler.

Ajax is a new way of combining a number of Web technologies including JavaScript, dynamic HTML, and a feature known as XmlHttp (which reduces the need for client browsers to constantly reconnect to the server every time new information is downloaded). But at the moment, people developing with Ajax have to write their code from the ground up, which is complex and time consuming.

The book guides you through a series of practical examples that demonstrate the Atlas framework and available controls. After reading this book, you'll be able to compile a seamless Atlas-based application of your own!

  • In anticipation of changes during development of the Atlas technology, the updated source code is posted for download on the author's blog, www.philotic.com/blog.
  • This book demystifies the Atlas technology and shows you how to work with it.
  • The first book dedicated to this revolutionary new technology.
  • Written by an experienced .NET author in collaboration with the Atlas development team.
  • File Size: 13.6 MiB
  • Hits: 355 times

Ajax For Dummies - pdf

Ajax For Dummies
Ajax is short for "Asynchronous JavaScript+CSS+DOM+XMLHttpRequest."

Even if you weren't intimidated before, that tidbit is probably enough to make you reach for the Excedrin. Just reach for Ajax For Dummies instead. With screen shots, actual code and explanations, and live Web sites where you can see Ajax applications doing their thing, it will have you using Ajax to create Web applications that look an act like desktop applications in no time. With Ajax, you can speed up and clean up your Web applications. Shoppers at your online store can fill their carts without waiting for multiple page refreshes. Searchers on your sites can get instant results on the same page.

This guide takes you on a tour of how Ajax is used today, complete with examples of Ajax applications in action, such as an Ajax-enabled Yahoo! search or an Ajax-based chat application. Then it gives you basics on using JavaScript. After that you dive in and get info on:

  • Writing some Ajax, interactive mouseovers using Ajax, passing data to the server with GET or POST, and more
  • Connecting to Google for a live search
  • Using free Ajax frameworks so you don't have to start from scratch, including Ajax Gold (written specifically for this book), AJAXLib, and grabbing XML with libXmlRequest
  • All kinds of Ajax techniques, such as using Ajax for drag-and-drop operations, pop-up menus, downloading images behind the scenes, and more
  • Using SACK (simple AJAX code kit), decoding XML with Sarissa, and creating visual effects with Rico
  • Handling XML int Ajax Applications
  • Working with cascading style sheets (CCS) in Ajax, including setting up the styles, displaying a menu, styling text, handling colors and backgrounds, and more
  • Working with Ajax and PHP

Complete with a companion Web site, free Ajax frameworks, and sample code you can use, Ajax for Dummies is your friendly guide to creating truly user-friendly Web sites!

  • File Size: 8.0 MiB
  • Hits: 666 times

Web Development Solutions: Ajax, APIs, Libraries, and Hosted Services Made Easy - pdf

Web Development Solutions: Ajax, APIs, Libraries, and Hosted Services Made EasyBook Description
As a web user, you'll no doubt have noticed some of the breathtaking applications available in today's modern web, such as Google Maps and Flickrdesktop applications than the old style web sites you are used to. You've probably also wished that you could create such things, and then thought "nahhh, I'd need to know a lot of complicated code to be able to even start creating sites like these." Well, think again. There is a lot of complicated code involved in cutting edge "Ajax style" web applications, but a lot of the hard work is already done for you, and available on the Web.

JavaScript libraries exist to provide most of that Ajax/DOM Scripting functionality out of the box. Application programming interfaces (APIs) exist to allow you to transplant complicated applications such as Google Maps and Flickr right into your own web sites. And hosting services such as Flickr and YouTube provide all you need to store and retrieve your media (be it images, video, or whatever) at your leisure, without having to worry about bandwidth issues and file naming nightmares. All you need to know is enough to successfully wire together all this functionality successfully and responsibly, and this book shows you how. It starts from the very beginning of your journey, showing you what's available, what you need, and how to set up an effective development environment. After a solid base has been built, it shows you how to build up each aspect of your site, including storing, retrieving, and displaying content, adding images and video to your site, building effective site navigation and laying it all out beautifully using CSS, promoting your content so you will attract visitors to your site, and adding special effects to enhance usability and design asthetics…all with ready-made functionality available on the Web! Life as a web developer has never been easier.

Summary of Contents

  • Chapter 1: Stop the Web … You're Getting On!
  • Chapter 2: The Dilemma of "Rolling Your Own" Solutions
  • Chapter 3: What You Need to Get Started
  • Chapter 4: Spoiled for ChoiceWhat the Web Offers You
  • Chapter 5: Retrieving and Displaying Content with REST and Ajax
  • Chapter 6: Adding Media Files
  • Chapter 7: Promoting Your Content
  • Chapter 8: Layout and Navigation
  • Chapter 9: Adding Special Effects
  • Chapter 10: What to Do and Where to Find Help When Things Go Wrong
  • File Size: 6.6 MiB
  • Hits: 716 times

Newer Posts Older Posts Home