skip to content

Cunningham, Stace

Works: 10 works in 29 publications in 4 languages and 683 library holdings
Roles: Author, Editor
Classifications: TK5105.59, 005.8
Publication Timeline
Publications about Stace Cunningham
Publications by Stace Cunningham
Most widely held works by Stace Cunningham
Mission critical! Internet security by Bradley Dunsmore( file )
3 editions published in 2001 in English and held by 395 libraries worldwide
Windows 2000 configuration wizards by Inc. Staff Syngress Media( file )
9 editions published in 2000 in English and Undetermined and held by 220 libraries worldwide
Developers are used to working with Wizards, component-like products that allow them to create certain elements - like dialog buttons - quickly and easily while they are coding applications. With the launch of Windows 2000, Microsoft has announced a new set of Wizards that will help administrators and users configure and set up Windows 2000 Professional (the Windows NT 4 Workstation successor) and Windows 2000 Server (the Windows NT 4 Server successor). Windows 2000 Setup and Configuration Wizards covers all the available Wizards, with an emphasis on those new to Windows 2000. Each Wizard is broken down by dialog box, with explanations of all options and required elements so administrators will know what to be prepared with. In addition, coverage of new services that will speed configuration and set up (like the Windows Installer) will be covered. * This is the first book to focus on Wizards and Windows 2000 automated components * Network administrators and developers will save time using this book
Hack proofing your network by Ryan Russell( Book )
7 editions published between 2000 and 2001 in 3 languages and held by 42 libraries worldwide
A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network. Updated coverage of an international bestseller and series flagship Covers more methods of attack and hacker secrets Interest in topic continues to grow - network architects, engineers and administrators continue to scramble for security books Written by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials A great addition to the bestselling "Hack Proofing ..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at
Y2K technical reference for NT server : solutions for NT server, BackOffice, and non-NT network applications by Melissa Craft( Book )
1 edition published in 1999 in English and held by 13 libraries worldwide
Windows 2000 server security by Stace Cunningham( Book )
2 editions published in 2001 in English and held by 5 libraries worldwide
Building a Cisco network for Windows 2000 by Melissa Craft( Book )
3 editions published in 2000 in English and held by 3 libraries worldwide
Microsoft Corporation, the world's largest software vendor, and Cisco Systems, the world's largest internetworking vendor, have jointly developed a common software interface for managing Cisco hardware on Microsoft networks: Cisco Network Services for Active Directory (CNS/AD). Until now, network administrators have been forced to master two completely different product interfaces to effectively manage their networks. Configuring Cisco Network Services for Active Directory is the first book announced for this enormous Information Technology audience. This book is a practical guide to managing CNS/AD. It focuses on how to promote system efficiency and improve network service by using CNS/AD to centralize network management, using the directory as a repository for all policies that govern network usage. The book also describes how to manage Cisco Internetworking Operating System (IOS) networking features and network resources in the same unified way as other enterprise resources, such as user access controls, files, and printers
Mission Critical! Internetworking Security by Inc. Staff Syngress Media( Computer File )
1 edition published in 2000 in English and held by 2 libraries worldwide
Hack Proofing Your Network ( Computer File )
1 edition published in 2000 in English and held by 1 library worldwide
The politics; laws of security; classes of attack; methodology; diffing; decrypting; brute force; unexpected input; buffer overrun; sniffing; session hijacking; spoofing; server holes; client holes; trojans and viruses; reporting security problems; choosing secure systems
Hack proofing by Ryan Russel( Book )
1 edition published in 2001 in Italian and held by 1 library worldwide
Windows 2000 sekyuriti shingijutsu = Configuring Windows 2000 server security ( Book )
1 edition published in 2001 in Japanese and held by 1 library worldwide
Alternative Names
カニンガム, ステイス
English (20)
German (4)
Japanese (3)
Italian (1)
Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.