Sams Teach Yourself COBOL in 24 Hours with CD-ROM
Author: Thane Hubbell
Sams Teach Yourself COBOL in 24 Hours teaches the basics of COBOL programming in 24 step-by-step lessons. Each lesson builds on the previous one providing a solid foundation in COBOL programming concepts and techniques. Coupled with the source code and the compiler available from Fujitsu, this hands-on guide is the easiest, fastest way to begin creating standard COBOL compliant code. Business professionals and programmers from other languages will find this hands-on, task-oriented tutorial extremely useful for learning the essential features and concepts of COBOL programming. Writing a program can be a complex task. Concentrating on one development tool guides you to good results every time. There will be no programs that will not compile!
Table of Contents:
Introduction | ||
Pt. I | COBOL Program Basics | |
Hour 1 | Getting Started | |
Hour 2 | Writing Your First Program in COBOL | |
Hour 3 | Different Data Types | |
Hour 4 | Basic User Interface | |
Hour 5 | Procedure Division | |
Hour 6 | Manipulating Data | |
Hour 7 | Manipulating String Data | |
Hour 8 | Conditional Statements | |
Hour 9 | The Evaluate Statement | |
Hour 10 | Processing Loops | |
Hour 11 | Advanced Perform Statements | |
Hour 12 | Tables | |
Pt. II | File Handling | |
Hour 13 | Sequential Files | |
Hour 14 | Indexed Files | |
Hour 15 | Reading Indexed File Records | |
Hour 16 | Updating Indexed File Records | |
Hour 17 | Sorting | |
Pt. III | Business Processing | |
Hour 18 | Master File Updating | |
Hour 19 | Reporting | |
Hour 20 | Advanced Reporting | |
Pt. IV | Miscellaneous Functions | |
Hour 21 | Date Manipulation | |
Hour 22 | Other Intrinsic Functions | |
Pt. IV | Advanced Topics | |
Hour 23 | The Call Interface | |
Hour 24 | The Graphical User Interface | |
Index |
Interesting textbook: Superplonk 2006 or Soups
Network Security Assessment
Author: Chris McNab
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack. Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. By grouping threats in this way, you learn to create defensive strategies against entire attack categories, providing protection now and into the future. Network Security Assessment helps you assess: Web services, including Microsoft IIS, Apache, Tomcat, and subsystems such as OpenSSL, Microsoft FrontPage, and Outlook Web Access (OWA) Web application technologies, including ASP, JSP, PHP, middleware, and backend databases such as MySQL, Oracle, and Microsoft SQL Server Microsoft Windows networking components, including RPC, NetBIOS, and CIFS services SMTP, POP3, and IMAP email services IP services that provide secure inbound network access, including IPsec, Microsoft PPTP, and SSL VPNs Unix RPC services on Linux, Solaris, IRIX, and other platforms Various types of application-level vulnerabilities that hacker tools and scripts exploit Assessment is the firststepany organization should take to start managing information risks correctly. With techniques to identify and assess risks in line with CESG CHECK and NSA IAM government standards, Network Security Assessment gives you a precise method to do just that.
Slashdot.org
A good framework for anyone who is serious about running network security scans to security his perimeter and interior networks. ...If you are looking for a to-the-point book that does not get bogged down with screen prints and meaningless hacker stories and myths, Network Security Assessment is a good place to start.
No comments:
Post a Comment