Using remote copy and replication to keep data synchronized and support 
immediate failover to hot sites 
 Leveraging core computer security concepts and strategies to protect your most 
critical data 
 Securing your entire storage infrastructure, not just servers 
 Using policy-driven data protection and Data Lifecycle Management (DLM) to 
improve security and reduce cost 
 Using ILM to identify your highest-value data and choose the right ways to 
protect it 
 Data Protection and Information Lifecycle Management is an indispensable 
resource for IT executives who must plan and implement strategies for data 
protection; administrators who must protect data on a day-to-day basis; and 
product managers, consultants, and marketers responsible for crafting superior 
data-security solutions. 
_ 
Peter Hipson, "Firefox and Thunderbird: Beyond Browsing and Email" 
Que | ISBN 0789734583 | November 1, 2005 Year | CHM | 11,13 Mb | 360 Pages 
 
 
 There's a new browser in town: Firefox is quickly becoming a leading 
alternative to Microsoft Internet Explorer. If you are new to Firefox and want 
to see what all the buzz is about, Firefox and Thunderbird: Beyond Browsing and 
Email is the guide that you need. By focusing on how to configure and customize 
Firefox and Thunderbird, this book will show you how to quickly get a hold of 
the less intuitive features that most new users struggle to figure out. You will 
discover which of Firefox's many options should be adjusted, which shouldn't, 
and how to locate many hidden preferences that will ultimately create a better 
browsing experience. The author's tips and tricks will teach you how to adjust 
the browser's appearance and behavior, and how to install the most popular 
extensions to maximize the browser's performance. 
 
You'll also be introduced to Firefox's e-mail client companion, Thunderbird. 
You'll cover Thunderbird's built-in spam filters, calendar, and customizeable 
layout and toolbars. Personalize your e-mail with tips and tricks dedicated to 
getting the most out of Thunderbird, and learn how to make it work together with 
Firefox for a seamless online experience. 
 
You can even find out how to contribute to the development of Firefox and 
Thunderbird. A special section on Web development will show you how you can add 
new extensions, themes, and customizations to each one and make an impact on the 
future of Firefox and Thunderbird. 
_ 
Bernd Jahne, "Digital Image Processing" (5th edition) 
Springer | ISBN 3540677542 | 2001 Year | DjVu | 7,59 Mb | 585 Pages 
 
 
 This book offers an integral view of image processing from image acquisition 
to the extraction of the data of interest. The discussion of the general 
concepts is supplemented with examples from applications on PC-based image 
processing systems and ready-to-use implementations of important algorithms. The 
fifth edition has been completely revised and extended. The most notable 
extensions include a detailed discussion on random variables and fields, 3-D 
imaging techniques and a unified approach to regularized parameter estimation. 
The complete.text of the book is now available on the accompanying CD-ROM. It is 
hyperlinked so that it can be used in a very flexible way. The CD-ROM contains a 
full set of exercises to all topics covered by this book and a runtime version 
of the image processing software heurisko. A large collection of images, image 
sequences, and volumetric images is available for practical exercises. 
_ 
Ted Husted, et al - "Struts in Action: Building Web Applications with the 
Leading Java Framework" 
Manning Publications | ISBN 1930110502 | 2002 Year | PDF | 2,26 Mb | 664 Pages 
 
 
 Slashdot.org 
"It doesn't just talk about how to configure and develop with Struts. It's a web 
application manifesto." 
 
JavaRanch.com 
"The author's approach to making the reader a Struts expert is effective... Go 
from Struts beginner to Struts expert." 
_ 
Howard M. Lewis Ship, "Tapestry in Action" 
Manning Publications | ISBN 1932394117 | 2004 Year | PDF | 7,25 Mb | 554 Pages 
 
 
 Dr. Dobbs Journal: 
"An essential book to have... definitely worth the investment." 
 
Javalobby.org: 
"A great book about how to change the way you develop web applications." 
_ 
John Arthorne, Chris Laffra, "Official Eclipse 3.0 FAQs" 
Addison-Wesley Professional | ISBN 0321268385 | 2004 Year | CHM | 2,47 Mb | 432 
Pages 
 
 
 "I had a question about how to use a new Eclipse 3.0 feature, job scheduling, 
so I thought I would try out this book. I immediately found the answer with a 
concise explanation. Cool!" 
-Erich Gamma 
 
Official Eclipse 3.0 FAQs is the convenient source for answers to your most 
crucial questions about writing Eclipse plug-ins. Whether you're creating simple 
extensions for personal use or commercial Eclipse-based applications, you'll 
find hundreds of concise solutions here--including many that aren't answered 
anywhere else. 
 
John Arthorne and Chris Laffra have worked with Eclipse technology since the 
very beginning; both are active members of the Eclipse development community and 
frequently answer questions on Eclipse newsgroups and mailing lists. Here, they 
cover an extraordinary range of topics, from workspace management to 
documentation, SWT to JFace, JDT to natural language support. Many FAQs include 
code samples and references to other information, making the book an invaluable 
desk reference for anyone working with Eclipse. 
 
Just a few of the 350+ questions answered here... 
_ 
Omar Santos, Jazib Frahim, "Cisco ASA: All-in-One Firewall, IPS, and VPN 
Adaptive Security Appliance" 
Cisco Press | ISBN 1587052091 | October 14, 2005 Year | CHM | 21,45 Mb | 840 
Pages 
 
 
 Identify, mitigate, and respond to network attacks 
 Understand the evolution of security technologies that make up the unified ASA 
device and how to install the ASA hardware 
 Examine firewall solutions including network access control, IP routing, AAA, 
application inspection, virtual firewalls, transparent (Layer 2) firewalls, 
failover and redundancy, and QoS 
 Evaluate Intrusion Prevention System (IPS) solutions including IPS integration 
and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) 
configuration 
 Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, 
and Public Key Infrastructure (PKI) 
 Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device 
Manager (ASDM) 
 
Achieving maximum network security is a challenge for most organizations. Cisco® 
ASA, a new unified security device that combines firewall, network antivirus, 
intrusion prevention, and virtual private network (VPN) capabilities, provides 
proactive threat defense that stops attacks before they spread through the 
network. 
 
This new family of adaptive security appliances also controls network activity 
and application traffic and delivers flexible VPN connectivity. The result is a 
powerful multifunction network security device that provides the security 
breadth and depth for protecting your entire network, while reducing the high 
deployment and operations costs and complexities associated with managing 
multiple point products. 
 
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a 
practitioners guide to planning, deploying, and troubleshooting a comprehensive 
security plan with Cisco ASA. The book provides valuable insight and deployment 
examples and demonstrates how adaptive identification and mitigation services on 
Cisco ASA provide a sophisticated security solution for both large and small 
network environments. 
 
The book contains many useful sample configurations, proven design scenarios, 
and discussions of debugs that help you understand how to get the most out of 
Cisco ASA in your own network. 
 
I have found this book really highlights the practical aspects needed for 
building real-world security. It offers the insiders guidance needed to plan, 
implement, configure, and troubleshoot the Cisco ASA in customer environments 
and demonstrates the potential and power of Self-Defending Networks. 
Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems® 
 
This security book is part of the Cisco Press® Networking Technology Series. 
Security titles from Cisco Press help networking professionals secure critical 
data and resources, prevent and mitigate network attacks, and build end-to-end 
self-defending networks. 
_