Thursday, February 19, 2009

Sams Teach Yourself COBOL in 24 Hours with CD ROM or Network Security Assessment

Sams Teach Yourself COBOL in 24 Hours with CD-ROM

Author: Thane Hubbell

Sams Teach Yourself COBOL in 24 Hours teaches the basics of COBOL programming in 24 step-by-step lessons. Each lesson builds on the previous one providing a solid foundation in COBOL programming concepts and techniques. Coupled with the source code and the compiler available from Fujitsu, this hands-on guide is the easiest, fastest way to begin creating standard COBOL compliant code. Business professionals and programmers from other languages will find this hands-on, task-oriented tutorial extremely useful for learning the essential features and concepts of COBOL programming. Writing a program can be a complex task. Concentrating on one development tool guides you to good results every time. There will be no programs that will not compile!



Table of Contents:
Introduction
Pt. ICOBOL Program Basics
Hour 1Getting Started
Hour 2Writing Your First Program in COBOL
Hour 3Different Data Types
Hour 4Basic User Interface
Hour 5Procedure Division
Hour 6Manipulating Data
Hour 7Manipulating String Data
Hour 8Conditional Statements
Hour 9The Evaluate Statement
Hour 10Processing Loops
Hour 11Advanced Perform Statements
Hour 12Tables
Pt. IIFile Handling
Hour 13Sequential Files
Hour 14Indexed Files
Hour 15Reading Indexed File Records
Hour 16Updating Indexed File Records
Hour 17Sorting
Pt. IIIBusiness Processing
Hour 18Master File Updating
Hour 19Reporting
Hour 20Advanced Reporting
Pt. IVMiscellaneous Functions
Hour 21Date Manipulation
Hour 22Other Intrinsic Functions
Pt. IVAdvanced Topics
Hour 23The Call Interface
Hour 24The Graphical User Interface
Index

Interesting textbook: Superplonk 2006 or Soups

Network Security Assessment

Author: Chris McNab

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack. Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. By grouping threats in this way, you learn to create defensive strategies against entire attack categories, providing protection now and into the future. Network Security Assessment helps you assess: Web services, including Microsoft IIS, Apache, Tomcat, and subsystems such as OpenSSL, Microsoft FrontPage, and Outlook Web Access (OWA) Web application technologies, including ASP, JSP, PHP, middleware, and backend databases such as MySQL, Oracle, and Microsoft SQL Server Microsoft Windows networking components, including RPC, NetBIOS, and CIFS services SMTP, POP3, and IMAP email services IP services that provide secure inbound network access, including IPsec, Microsoft PPTP, and SSL VPNs Unix RPC services on Linux, Solaris, IRIX, and other platforms Various types of application-level vulnerabilities that hacker tools and scripts exploit Assessment is the firststepany organization should take to start managing information risks correctly. With techniques to identify and assess risks in line with CESG CHECK and NSA IAM government standards, Network Security Assessment gives you a precise method to do just that.

Slashdot.org

A good framework for anyone who is serious about running network security scans to security his perimeter and interior networks. ...If you are looking for a to-the-point book that does not get bogged down with screen prints and meaningless hacker stories and myths, Network Security Assessment is a good place to start.



No comments:

Post a Comment