Sunday, December 6, 2009

The Complete IS IS Routing Protocol or Practical UNIX and Internet Security

The Complete IS-IS Routing Protocol

Author: Hannes Gredler

The IS-IS routing protocol has gone through a high-speed evolution in recent years. Initially deployed by the largest ISPs in a desperate search for a stable link-state protocol, it quickly gained popularity for its advantages in link-state routing. Today, it is a widely deployed protocol even at smaller ISPs but because of its meteoric adoption it has been sparsely documented. As service providers add multivendor platforms from both Cisco and Juniper Networks, it is difficult to get a complete picture of the IS-IS that is deployed in the field. As service providers deploy increasingly multivendor implementations of IS-IS, they desperately need to know how to interoperate the protocol on different routing platforms. Only a book such as The Complete IS-IS Routing Protocol can provide the insight and practical solutions necessary, because it takes a multivendor, real-world competitive approach to implementing IS-IS. The Complete IS-IS Routing Protocol will be the seminal book on IS-IS for many years to come.



See also: Its Okay to Be the Boss or Call Me Ted

Practical UNIX and Internet Security

Author: Simson Garfinkel

When Practical UNIX Security was first published in 1991, it became an instant classic. Crammed with information about host security, it saved many a UNIX system administrator and user from disaster.

This second edition is a complete rewrite of the original book. It's packed with twice the pages and offers even more practical information for UNIX users and administrators. In it you'll find coverage of features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. The first edition was practical, entertaining, and full of useful scripts, tips, and warnings. This edition is all those things -- and more.

If you are a UNIX system administrator or user in this security-conscious age, you need this book. It's a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection. It's complete -- covering both host and network security -- and doesn't require that you be a programmer or a UNIX guru to use it.

Practical UNIX & Internet Security describes the issues, approaches, and methods for implementing security measures. It covers UNIX basics, the details of security, the ways that intruders can get into your system, and the ways you can detect them, clean up after them, and even prosecute them if they do get in. Filled with practical scripts, tricks, and warnings, Practical UNIX & Internet Security tells you everything you need to know to make your UNIX system as secure as it possible can be.

Contents include:

  • Part I: Computer Security Basics. Introduction and security policies.
  • Part II: User Responsibilities. Users and their passwords, groups, the superuser, the UNIX filesystem, and cryptography.
  • Part III: System Administrator Responsibilities. Backups, defending accounts, integrity checking, log files, programmed threats, physical security, and personnel security.
  • Part IV: Network and Internet Security: telephone security, UUCP, TCP/IP networks, TCP/IP services, WWW, RPC, NIS, NIS+, Kerberos, and NFS.
  • Part V: Advanced Topics: firewalls, wrappers, proxies, and secure programming.
  • Part VI: Handling Security Incidents: discovering a breakin, U.S. law, and trust.
  • VII: Appendices. UNIX system security checklist, important files, UNIX processes, paper and electronic sources, security organizations, and table of IP services.



Table of Contents:
Preface to the Second Edition
1. Introduction
2. Policies & Guidelines
3. Users and Passwords
4. Users, Groups, and the Superuser
5. The UNIX Filesystem
6. Cryptography
7. Backups
8. Defending Your Accounts
9. Integrity Management
10. Auditing and Logging
11. Protecting Against Programmed Threats
12. Physical Security
13. Personnel Security
14. Modems
15. UUCP 438
16. TCP/IP Networks
17. UNIX TCP/IP Services
18. WWW Security
19. RPC and Configuration Management
20. NFS
21. Firewalls
22. Wrappers & Proxies
23. Writing Secure SUID and Network Programs
24. Discovering a Break-in
25. Denial of Service Attacks and Solutions
26. Computer Security and U.S. Law
27. Who Do You Trust?
APPENDICES.
A. UNIX Security Checklist
B. Important Files
C. UNIX Processes
D. Paper Sources
E. Electronic Resources
F. Other Sources

Saturday, December 5, 2009

Project Management for Modern Information Systems or Essential Digital Manipulation Manual for Photographers

Project Management for Modern Information Systems

Author: Brandon

In the past, project success has been defined too narrowly as simply meeting time and cost constraints for a given scope of work. However, in order for an IT project to be completely successful that basic definition of success needs to be extended to include meeting return on investment expectations, product quality, stakeholder satisfaction, security, maintainability and adaptability. Also, the formal methods and tools of the project management discipline need to evolve to address the changes in modern software engineering and our high-tech global workplaces.

With this broader and more appropriate definition of success, IT project management techniques and tools can be modernized, extended, and otherwise focused to be more effective. Project Management for Modern Information Systems describes and illustrates practices, procedures, methods, and tools for IT project management that address this extended definition of project success for modern times.


About the Author:
Dan Brandon obtained a BS from Case Western Reserve University, an MS, and PhD in Engineering University of Connecticut; his PhD specialization was in computer methods. Before returning to the university environment, Dr. Brandon accumulated over thirty years of commercial experience in both the IT technical and management arenas. He is currently a Professor of Information Technology Management (ITM) and chairperson of that department at Christian Brothers University (CBU) in Memphis, TN. He has been published in a number of books, journals, and conference proceedings. He is a member of the Society of Information Management (SIM), the Information Resource Management Association (IRMA), and theProject Management Institute (PMI). He continues to do consulting with a number of companies both locally and internationally. Currently he is involved in the design and development of comprehensive open source software systems for project management and other business applications.



Table of Contents:
Ch. IA framework for digital accounting1
Ch. IIThe evolution of accounting software15
Ch. IIIThe XML-based Web languages and accounting42
Ch. IVElectronic data interchange88
Ch. VThe revenue cycle131
Ch. VIThe expenditure cycle190
Ch. VIIThe conversion cycle230
Ch. VIIIThe general ledger cycle260
Ch. IXFinancial management, strategic management and digital accounting293
Ch. XControls, security, and audit in online digital accounting318

Look this: Globalization and Its Discontents or Leadership Without Easy Answers

Essential Digital Manipulation Manual for Photographers

Author: Mike Crawford

Now available in paperback, The Essential Digital Manipulation Manual is an in-depth resource for photographers at every level. Clear, concise explanations demystify techniques for capturing, editing, transforming, and manipulating top-quality images. Professional enhancement and correction, digital updates to traditional film-based darkroom techniques, and advanced professional finishes are explored in depth. A comprehensive rundown of all of the major filters found in Photoshop and other image-editing packages, as well as information on output and storage issues, make this the definitive reference guide for professional and amateur photographers alike.



Thursday, December 3, 2009

Performance by Design or Modern Digital and Analog Communication Systems

Performance by Design: Computer Capacity Planning by Example

Author: Daniel A Menasc

Practical systems modeling: planning performance, availability, security, and more

Computing systems must meet increasingly strict Quality of Service (QoS) requirements for performance, availability, security, and maintainability. To achieve these goals, designers, analysts, and capacity planners need a far more thorough understanding of QoS issues, and the implications of their decisions. Now, three leading experts present a complete, application-driven framework for understanding and estimating performance. You'll learn exactly how to map real-life systems to accurate performance models, and use those models to make better decisions--both up front and throughout the entire system lifecycle. Coverage includes:


  • State-of-the-art quantitative analysis techniques, supported by extensive numerical examples and exercises
  • QoS issues in requirements analysis, specification, design, development, testing, deployment, operation, and system evolution
  • Specific scenarios, including e-Business and database services, servers, clusters, and data centers
  • Techniques for identifying potential congestion at both software and hardware levels
  • Performance Engineering concepts and tools
  • Detailed solution techniques including exact and approximate MVA and Markov Chains
  • Modeling of software contention, fork-and-join, service rate variability, and priority
About the Web Site

The accompanying Web site provides companion Excel workbooks that implement many of the book's algorithms and numerical examples.



Look this: Security Analysis or What the CEO Wants You to Know

Modern Digital and Analog Communication Systems

Author: B P Lathi

Lathi's trademark user-friendly and highly readable text presents a complete and modern treatment of communication systems. It begins by introducing students to the basics of communication systems without using probabilistic theory. Only after a solid knowledge base--an understanding of how communication systems work--has been built are concepts requiring probability theory covered. This third edition has been thoroughly updated and revised to include expanded coverage of digital communications. New topics discussed include spread-spectrum systems, cellular communication systems, global positioning systems (GPS), and an entire chapter on emerging digital technologies (such as SONET, ISDN, BISDN, ATM, and video compression).
Ideal for the first communication systems course for electrical engineers, Modern Digital and Analog Communication Systems offers students a superb pedagogical style; it consistently does an excellent job of explaining difficult concepts clearly, using prose as well as mathematics. The author makes every effort to give intuitive insights--rather than just proofs--as well as heuristic explanations of theoretical results wherever possible. Featuring lucid explanations, well-chosen examples clarifying abstract mathematical results, and excellent illustrations, this unique text is highly informative and easily accessible to students.



Table of Contents:
Preface
1Introduction1
2Introduction to Signals14
3Analysis and Transmission of Signals71
4Amplitude (Linear) Modulation151
5Angle (Exponential) Modulation208
6Sampling and Pulse Code Modulation251
7Principles of Digital Data Transmission294
8Emerging Digital Communications Technologies354
9Some Recent Developments and Miscellaneous Topics404
10Introduction to Theory of Probability434
11Random Processes487
12Behavior of Analog Systems in the Presence of Noise532
13Behavior of Digital Communication Systems in the Presence of Noise577
14Optimum Signal Detection626
15Introduction to Information Theory679
16Error Correcting Codes728
App. AOrthogonality of Some Signal Sets764
App. BSchwarz Inequality766
App. CGram-Schmidt Orthogonalization of a Vector Set768
App. D: Miscellaneous771
Index775

Wednesday, December 2, 2009

Instant Vegas Movie Studio DVD or iSeries i5 Primer

Instant Vegas Movie Studio +DVD

Author: Douglas Spotted Eagl

Get to work fast with carefully detailed screenshots and step-by-step directions that illustrate the most-used features of Vegas Movie Studio software in a concise, time-efficient way. Learn how to navigate the interface and perform the essential tasks, from editing video and audio to compositing and outputting.

As a learning tool or a handy reference-this guide is packed with useful, accessible information for novice and experienced users alike. Beginners get a no-fluff introduction to the intelligent use of Vegas Movie Studio, while more experienced users get real-world examples and creative suggestions for producing better projects. VEG files related to projects found in this book may be downloaded from the VASST Web site.

Douglas Spotted Eagle is an award-winning performer, music producer, and videographer. He is the author of Vegas 6 Editing Workshop among many books, and the host of two web sites for users of Vegas and related products.

John J. Rofrano is a musician, vocalist, songwriter, videographer and software architect. He is the author of the Instant ACID book, tutorials on Sony Vegas, and moderates the ACID and Sony Scripting forum at Digital Media Network site. More information can be found at his web site.

What People Are Saying

Dave Chaimson
"Sony Media Software is pleased to have such talented producers creating training materials for our customers. If you have an interest in learning about the Vegas program, this book will be an invaluable resource, helping you find out about the most important features in an instant. Enjoy!"
vice-president, sales and marketing, Sony Media Software




Interesting book: Northwest Flavors or Receive One Another

iSeries/i5 Primer: Concepts and Techniques for Programmers, Administrators, and System Operators

Author: Holt

This comprehensive, 35-chapter book is the ultimate resource and a "must-have" for every professional working with the i5/iSeries. It is perfect for novice and intermediate programmers as well as for system administrators and operators. In simple, straightforward style, the authors explain core i5/iSeries concepts and show you step by step how to perform a wide variety of essential functions.

The book includes sections on installation, operations, administration, system architecture, programming, the Internet, and troubleshooting. These sections are organized in free-standing style so you don’t have to read the book from cover to cover or even sequentially; you can reference the chapters that interest you most, skip some, and jump back and forth as needed. It even contains a helpful glossary to act as a fast reference for all the terms you need to know.

Completely updated through i5/OS V5, the fourth edition of this best-selling book contains page after page of information covering RPG IV and Java programming, system values, database and SQL, important system security information, the i5/iSeries as an Internet server, and much more. You’ll learn the essential technical concepts you need to get up to speed on all areas of the i5/iSeries, and your increased understanding of the i5/iSeries will boost your productivity.
Even if you have a previous edition of this book, you'll want to get this new edition with all of the V5 update and brand new topics like:

• iSeries Navigator
• Java
• SQL
• iSeries Access
• HTTP Server
• Qshell
• Client/Server and TCP/IP
• Client Access

Thisbook is a learning tool and valuable reference you will use for years to come. As one satisfied reader put it, "If you could own only one i5/iSeries book, this would be it."

With IBM i5/iSeries Primer, Fourth Edition you will:

• Learn how to install an i5 server
• Gain a comprehensive knowledge of i5/iSeries operations
• Understand libraries, objects, library lists, and everything you need to know about files
• Be able to configure a system
• Explore programming basics, including how to use utilities, journaling, and commitment control
• Discover what to do in case of trouble, how to request help from IBM, how to report problems, and how to manage PTFs



Tuesday, December 1, 2009

The Digital Photographers Notebook or SELinux

The Digital Photographer's Notebook: A Pro's Guide to Adobe Photoshop CS3, Lightroom, and Bridge

Author: Kevin Ames

In the world of digital photography, inspiration can come at any time. Great images are created behind the camera and then refined at the computer. "Photographers live in the moment when shooting, and I believe we do the same when in front of the monitor," writes Kevin Ames, veteran photographer and Photoshop master. Building on his popular column in Photoshop User magazine, Kevin expands the scope of the original articles to include in-depth information about all aspects of digital photography.

With this book, you'll gain a focused yet thorough understanding of Adobe's suite of digital photography applications - Photoshop CS3 (including the Camera Raw plug-in), Lightroom, and Bridge. You'll not only learn what these powerful applications can do, you'll also learn which one is best for a given task and see how the applications come together to allow you to work efficiently - all while creating and delivering stunning photographs. Whether dealing with workflow, organization, or truly creative enhancements, Kevin candidly shares his personal image-making process from start to finish.

In addition, there are clear and illuminating explanations of many issues relevant to the digital photographer, such as the profound differences between RAW and JPEG, the many benefits of "shooting tethered," and how lighting really works. Whether you've been shooting digital for years or you're just making the switch from film, The Digital Photographer's Notebook is an essential guide to managing your portfolio and creating head-turning photographs.



SELinux: NSA's IOpen Source Security Enhanced Linux

Author: McCarty

The intensive search for a more secure operating system hasoften left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system—including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE—all of it free and open source.

SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days—when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system—are prevented on a properly administered SELinux system.

The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include:

  • A readable and concrete explanation of SELinux concepts and the SELinux security model
  • Installation instructions for numerous distributions Basic system and user administration
  • A detailed dissection of the SELinux policy language

Examples and guidelines for altering and adding policies With SELinux, a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system—and who doesn't?—this book provides the means.