Monday, January 26, 2009

Beginning DotNetNuke Design Skinning and Management or Security Warrior

Beginning DotNetNuke Design, Skinning and Management

Author: Andrew Hay



• "Skinning" refers to an application's ability to change the look of the design by a setting in the application

• Explains how DotNetNuke skins can be created in either ASP.NET or HTML with CSS and can be developed with any Web tool that creates HTML/CSS or ASP.NET

• Combines the hot topic of using the DotNetNuke application framework with CSS and other site layout technologies to manage the user experience, look, feel, and functionality of Web sites

• Covers how to package, install, and remove a skin and offers programming tools for skins

• Discusses efficient design, when to use HTML versus CSS versus ASP.NET for a design, and browser-safe designs




Table of Contents:
Introduction.

Part I: Getting Acquainted.

Chapter 1: Introducing DotNetNuke Skinning.

Chapter 2: Installing DotNetNuke.

Chapter 3: Installing Skin Packages.

Chapter 4: Exploring Skins.

Chapter 5: Creating Custom Skins.

Part II: Welcome to the Neighborhood.

Chapter 6: The Neighborhood Association Website.

Chapter 7: Skinning the Neighborhood Association Website.

Chapter 8: Designing the Navigation.

Chapter 9: Leveraging Web User Controls.

Part III: Increasing the Property Value.

Chapter 10: Exploring Silverlight.

Chapter 11: Using Cascading Style Sheets.

Chapter 12: Web Standards and Compliance.

Chapter 13: Targeting Modules with CSS.

Chapter 14: Exploring AJAX in DotNetNuke.

Chapter 15: Using sIFR with DotNetNuke.

Appendix A: Exercises and Solutions.

Appendix B: Glossary of Terms and Acronyms.

Index.

See also: Efficace amministrazione di piccola impresa: Un metodo imprenditoriale

Security Warrior

Author: Cyrus Peikari

It's easy to find books on computer security. Many users and administrators are becoming overwhelmed, and justifiably so. The sophistication of attacks against computer systems increases with each exploit in the wild. What's the worst an attacker can do to you? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be threatened. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and advanced attacks against Unix and Windows systems, this book leaves you knowing your enemy and prepared to do battle.

Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on machines: Trojaned binaries, "spyware" that looks innocuous while sending private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive, up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book, on your shelf -- and in your hands.

Library Journal

Network security assessment (see also Computer Media, LJ 8/03) involves identifying vulnerabilities so that they can be minimized, and these guides address the topic from varying perspectives. Case Studies delves into implementing the framework of network security standards (IAM, or Information Assurance Methodology) defined by the U.S. National Security Agency (NSA), while Network Security Assessment focuses partially on NSA IAM and partially on the UK's Government Communication Headquarters (GCHQ) security framework, CESG (Communications and Electronics Security Group) CHECK. Case Studies' checklists, case studies, and sample templates create a practical and useful guide for firms that provide security assessments, individuals who have taken an IAM class, and organizations conducting security audits. A nice overview of an often-confusing topic, moving from the security contract stage through final reporting and follow-up. Network Security Assessment's broader coverage-as well as its step-by-step discussion of security risks and how to combat or minimize them-makes it a good choice for those addressing security issues in general. Its take on multiple services and operating systems, and its real-world examples create a comprehensive, useful guide. Both are appropriate for larger libraries; buy McNab's if you can afford only one. For advanced administrators and security experts, Warrior addresses security assessment in general. It focuses most heavily, however, on the topic of reverse engineering, or of disassembling applications to see what is going on at their lowest levels. This allows administrators to dissect malware and spyware in order to disinfect and secure their systems more effectively. Its coverage of multiple environments and tools and the overview of attacks from a cracker's perspective make this an appropriate purchase for larger libraries. Copyright 2004 Reed Business Information.



No comments:

Post a Comment