Human Readable Messages

Human Readable Messages

Author: Mez Breeze

Publisher:

Published: 2012-01

Total Pages: 328

ISBN-13: 9783950291094

DOWNLOAD EBOOK

Mez does for code poetry as jodi and Vuk Cosic have done for ASCII Art: Turning a great, but naively executed concept into something brilliant, paving the ground for a whole generation of digital artists." (Florian Cramer).


Netprov

Netprov

Author: Rob Wittig

Publisher: Amherst College Press

Published: 2021-12-14

Total Pages: 253

ISBN-13: 1943208298

DOWNLOAD EBOOK

Netprov is an emerging interdisciplinary digital art form that offers a literature-based “show” of insightful, healing satire that is as deep as the novels of the past. This accessible history of Netprov emerges out of an ongoing conversation about the changing roles and power dynamics of author and reader in an age of real-time interactivity. Rob Wittig describes a literary genre in which all the world is a platform and all participants are players. Beyond serving as a history of the genre, this book includes tips and examples to help those new to the genre teach and create netprovs. “Jargon-free and ambitious in scope, Netprov meets the needs of several types of readers. Casual readers will be met with straightforward and easy-to-follow definitions and examples. Scholars will find deep wells of in- formation about networked roleplay games. Teachers and students will find instructions for how-to play, and a ready-made academic context to make their play meaningful and memorable.” —Kathi Inman Berens, Portland State University


JXTA

JXTA

Author: Daniel Brookshier

Publisher: Sams Publishing

Published: 2002

Total Pages: 436

ISBN-13: 9780672323669

DOWNLOAD EBOOK

JXTA: Java P2P Programming provides an invaluable introduction to this new technology, filled with useful information and practical examples. It was created by members of the JXTA community, sharing their real-world experience to introduce developers to JXTA. It starts with the fundamentals of P2P and demonstrates how JXTA fulfills the P2P promise, then covers the essentials of JXTA including the protocols, the JXTA Shell, and groups. Later chapters include case studies demonstrating JXTA to synchronize data and to create distributed applications. Includes a foreward by Juan Carlos Soto, Group Marketing Manager for Project JXTA at Sun Microsystems and the jxta.org Open Source Community Manager.


Schematron

Schematron

Author: Erik Siegel

Publisher: XML Press

Published: 2022-10-25

Total Pages: 253

ISBN-13: 1937434818

DOWNLOAD EBOOK

Schematron is a validation language that checks XML documents against business rules. It extends the validation provided by languages such as Document Type Definitions (DTD), W3C XML Schema, and RELAX NG, giving you the ability to check your XML documents for compliance with rules that can be difficult, if not impossible, to check with the other validation languages. Schematron: A language for validating XML is aimed at programmers and others who process XML. It explains the language in detail along with many examples. Anyone who uses Schematron or who would like to begin using it will find a wealth of information in this book.


Snort For Dummies

Snort For Dummies

Author: Charlie Scott

Publisher: John Wiley & Sons

Published: 2004-06-14

Total Pages: 386

ISBN-13: 0764576895

DOWNLOAD EBOOK

Snort is the world's most widely deployed open source intrusion-detection system, with more than 500,000 downloads-a package that can perform protocol analysis, handle content searching and matching, and detect a variety of attacks and probes Drawing on years of security experience and multiple Snort implementations, the authors guide readers through installation, configuration, and management of Snort in a busy operations environment No experience with intrusion detection systems (IDS) required Shows network administrators how to plan an IDS implementation, identify how Snort fits into a security management environment, deploy Snort on Linux and Windows systems, understand and create Snort detection rules, generate reports with ACID and other tools, and discover the nature and source of attacks in real time CD-ROM includes Snort, ACID, and a variety of management tools


Web Security, Privacy & Commerce

Web Security, Privacy & Commerce

Author: Simson Garfinkel

Publisher: "O'Reilly Media, Inc."

Published: 2002

Total Pages: 786

ISBN-13: 0596000456

DOWNLOAD EBOOK

"Web Security, Privacy & Commerce" cuts through the hype and the front page stories. It tells readers what the real risks are and explains how to minimize them. Whether a casual (but concerned) Web surfer or a system administrator responsible for the security of a critical Web server, this book will tells users what they need to know.


Object Design

Object Design

Author: Rebecca Wirfs-Brock

Publisher: Addison-Wesley Professional

Published: 2003

Total Pages: 420

ISBN-13: 9780201379433

DOWNLOAD EBOOK

Object technology pioneer Wirfs-Brock teams with expert McKean to present a thoroughly updated, modern, and proven method for the design of software. The book is packed with practical design techniques that enable the practitioner to get the job done.


Evaluation and Decision Models with Multiple Criteria

Evaluation and Decision Models with Multiple Criteria

Author: Raymond Bisdorff

Publisher: Springer

Published: 2015-06-09

Total Pages: 648

ISBN-13: 3662468166

DOWNLOAD EBOOK

This book showcases a large variety of multiple criteria decision applications (MCDAs), presenting them in a coherent framework provided by the methodology chapters and the comments accompanying each case study. The chapters describing MCDAs invite the reader to experiment with MCDA methods and perhaps develop new variants using data from these case studies or other cases they encounter, equipping them with a broader perception of real-world problems and how to overcome them with the help of MCDAs.


Practical UNIX and Internet Security

Practical UNIX and Internet Security

Author: Simson Garfinkel

Publisher: "O'Reilly Media, Inc."

Published: 2003-02-21

Total Pages: 989

ISBN-13: 1449310125

DOWNLOAD EBOOK

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.


XMPP: The Definitive Guide

XMPP: The Definitive Guide

Author: Peter Saint-Andre

Publisher: "O'Reilly Media, Inc."

Published: 2009-04-16

Total Pages: 308

ISBN-13: 0596555598

DOWNLOAD EBOOK

This practical book provides everything you need to know about the Extensible Messaging and Presence Protocol (XMPP). This open technology for real-time communication is used in many diverse applications such as instant messaging, Voice over IP, real-time collaboration, social networking, microblogging, lightweight middleware, cloud computing, and more. XMPP: The Definitive Guide walks you through the thought processes and design decisions involved in building a complete XMPP-enabled application, and adding real-time interfaces to existing applications. You'll not only learn simple yet powerful XMPP tools, but you'll also discover, through real-world developer stories, how common XMPP "building blocks" can help solve particular classes of problems. With this book, you will: Learn the basics of XMPP technologies, including architectural issues, addressing, and communication primitives Understand the terminology of XMPP and learn about the wealth of XMPP servers, clients, and code libraries Become familiar with the XMPP concepts and services you need to solve common problems Construct a complete business application or real-time service with XMPP Every day, more software developers and service providers are using XMPP for real-time applications, and with the help of XMPP: The Definitive Guide, you can, too.