f4053

download f4053

of 7

Transcript of f4053

  • 8/13/2019 f4053

    1/7

    July August 2006 IT Pro 53

    B O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S B O O K S

    W

    IRELESS

    The Right Wireless

    for the Job

    Developing Practical Wireless Appli-

    cations, Dean A. Gratton. Set forpublication in December, this book

    explores the question of whether wirelessmanufacturers are using the right tech-nology for the right product, given theindustrys range of capabilities.The authordiscusses strengths and weaknesses ofcurrently available wireless technologies,

    and,more specifically,draws the readers attention to the diversecollection of standardized and proprietary solutions available to

    manufacturers.Gratton describes how each technology works and explores

    overlapping, complementary, and competing technologies. Thebook looks at the suitability of wireless applications in these con-texts,and also considers the practicality of a wireless world as away to understand consumers and specific demographic groups.Additionally, the author compares the differences between per-sonal- and wide-area communications, considering personal-area technologies alongside 3G and WiMax.

    Aimed at a technologically intermediate to advanced audience,the book is one of the first to discuss applications surroundingtechnologies such as ZigBee, near-field communications, andultra-wideband.The author talks about the Bluetooth 2.0, plus

    the new EDR specification alongside some fundamentalintroductions to Wi-Fi,namely, 802.11i and 802.11n.

    Digital Press; ISBN 1555583105; 50 pp.;$31.47.

    GSM-3G

    Centraland EasternEurope24-25 October 2006Bucharest, Romania

    The two-day GSM-3G conference will

    explore Central and Eastern Europe mar-

    ket developments,as well as how to sustain

    profitability in the competitive CEE market.

    Topics of discussion include driving growth inthe CEE,CEE forecast analysis, and simplifying

    regulations.Regional overview discussions will

    cover case studies such as Vodafone Romanias

    3G rollout, and Vipnets HSDPA rollout in

    Croatia. Also, the conference will explore

    integrating 3G and DVB-H TV services, and

    options for 3G VAS.

    Event visitors can listen to development-strat-

    egy presentations such as those on 3G-to-4G

    standardization and fixed-mobile convergence.

    The conference will also assess potentially dis-

    ruptive technologies, covering topics such as the

    expansion of Wi-Fi in Europe, strategies forcommunicating and pricing the WiMax value

    proposition, and a panel discussion of WiMax

    versus 3G.

    According to conference organizers, Informa

    Telecoms & Media says that the total number

    of Central and Eastern European GSM sub-

    scribers passed 250 million at the start of

    November 2005. Fueled by continued strong

    growth in developing marketsparticularly in

    Russia, Ukraine, and Polandthe milestone

    was reached six to seven months after the region

    passed the 200 million subscriber mark. Growth

    still remains strong in 2006, and Informa fore-

    casts indicate that the region is on track to pass

    300 million subscriptions in 2007.Consequently,

    conference organizers believe the region offers

    good long-term growth prospects.

    As of March 2006, a total of 13 W-CDMA net-

    works had been launched commercially in the

    CEE region, and four more were pre-commer-

    cial.There are 18 additional regional W-CDMA

    networks in the planning/deployment phase,

    including largest-market networks in Poland,

    Hungary, and the Czech Republic.

    http://www.gsm-3gworldseries.com/cee/

    Next-GenerationWireless

    Next Generation Wireless Systems and

    Networks, Hsiao-Hwa Chen andMohsen Guizani.

    This book covers wireless systems and net-works. Chapter topics include wireless com-

    munications fundamentals, 2G and 3G mobile cellular systems,and MIMO/ multi-user signal processing in Beyond-3G wireless.

    Although the book is aimed at specialists,it includes essentialbackground information as well.For example,the text discussesbasics of wireless communications such as 3G wireless standards,spread spectrum and CDMA systems, It goes on to introduce3G standards,such as W-CDMA,CDMA2000 and TD-SCDMA.Beyond that, it looks at more futuristic topics, including cogni-tive radio technology and 3GPP E-UTRA technology.Further,the book addresses emerging wireless communication systemsand networks such as Super-3G technology, 4G wireless,UWB,

    OFDMA and MIMO.John Wiley & Sons; ISBN 0470024348; 512 pp.; $120.

  • 8/13/2019 f4053

    2/7

    54 IT Pro July August 2006

    WIRELE

    SS

    Mobile Business Expo31 October-3 November 2006Chicago

    Wireless technology can give your company a

    competitive advantage through increased pro-

    ductivity, better customer care,and more timely

    communication and information exchange; but creating

    that mobile advantage is the trick.Mobile Business Expo

    is a three-day conference intended for business and IT

    professionals who want to improve communication,

    processes,and productivity using wireless technologies.

    From field-worker support to RFID asset management,

    IT managers and business managers must collaborate

    to develop an integrated mobility strategy. The exposcase studies,demonstrations,workshops,and conference

    tracks cover the ingredients necessary to build a mobile

    workforce and leverage wireless technology across asset

    management systems.

    Visitors can learn how to integrate technologies such

    as WLANs, voice over WLAN,mobile broadband,field

    and sales force applications,RFID, MESH, and WiMax.

    The conference will also explore topics such as future

    developments in the wireless LAN 802.11 standard, best

    practices in securing and managing wireless systems, and

    extending legacy business application across a mobile

    infrastructure Business issues include customer rela-

    tionship management,fixed/mobile convergences role inenterprise communications, future wireless develop-

    ments to watch, and which technologies to consider now.

    The conference will cover topics such as evolving

    metro-area access (metroscale Wi-Fi, mobile WiMax,

    and broadband cellular), threat analysis, and vulnera-

    bility management in a mobile world. Other topics

    include unified communications and data collection

    devices.

    http://www.mobilebusinessexpo.com/ index.php

    IEE Mobility

    Conference25-27 October 2006Bangkok, Thailand

    IEE Mobility Conference and Exhibition is a mobile-

    technologies event that features a three-day menu of

    keynote speeches, symposiums, technical presenta-

    tions, and industry updates.Each day, keynote speakers

    will provide mobile-industry updates on topics such as

    technologies, standards, applications, and mobile

    devices.

    Industry presentations are technology-specific how-

    to sessions for developers and system integrators.Theindustry tracks cover areas including Palm OS,

    Windows, Java, and Symbian application development

    environments,network integration to a mobile (General

    Packet Radio Service and 802.11 wireless local area net-

    works) environment, and working with mobile-device

    platforms.

    Oral technical-presentation tracks discuss research on

    next-generation systems, latest operating systems, soft-

    ware development platforms, networking technologies,

    and mobile device capabilities.

    Also included are research papers that provide

    glimpses of near- and long-term trends. Special sessions

    cover topics such as trends and technical challenges ofnext-generation mobile communication systems,ad hoc

    and sensor networks, IP mobility, and user interface

    design.

    Mobile-realm usability-engineering topics will include

    the human-computer interaction perspective, parallel-

    processing improvement over wireless communication,

    and location discovery and mobility modeling/forecast-

    ing in wireless networks.

    http://www.mobilityconference.org

    UnlicensedBands

    Coexistence in Wireless Networks:

    Challenges and System-Level So-

    lutions in the Unlicensed Bands,Nada Golmie.The increasing popular-ity of wireless networks makes inter-

    ference and crosstalk between multi- ple systemsinevitable. Set for publication in September, this bookdescribes techniques for quantifying these disruptions and

    their performance effects on unlicensed-band wireless net-works. It also presents system-level solutions, advocating

    the need for new hardware implementations.The book starts with basic concepts and wireless proto-

    cols before moving on to interference-performance eval-uation, interference modeling, and coexistence solutions.It concludes with common misconceptions and pitfalls.Theauthor illustrates her theory by referencing real-world sys-tems such as Bluetooth and Wi-Fi.

    Case studies and illustrations should make this bookinteresting for electrical engineering and computer sciencegraduate students, WLAN and WPAN systems designers,practitioners developing new interference suppression tech-niques, and general users of merging wireless technology.

    Cambridge University Press; ISBN 0521857686; 192 pp.;$70.

    O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S

  • 8/13/2019 f4053

    3/7

    IT Pro Resources

    If you have a book, event, or Web site youd likeIT Professionalto include in Resources, send infor-mation to itproducts@ computer.org for considera-tion. We cant promise to include all submissions,but we will review them.

    July August 2006 IT Pro 55

    O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S

    IT Worlds Wireless

    http://wireless.itworld.com

    This site, managed byIT World, provides

    information on wireless technology.

    Links are organized in news and topic sections

    along the left side of the page.The news section con-

    tains a sampling of breaking wireless news headlines.

    The topics section is divided into areas including

    application development, network management,

    products and services,standards and regulations,and

    trends and technologies.The home page also contains

    links to webcasts,analyst briefings,white papers,and

    newsletters.

    One of the offerings in the white papers section ison benchmarking voice over IP over Wi-Fi (Vo-Fi).

    The paper claims that benchmarking wireless systems

    is difficult, with many variables and elements. This

    Technology Note documents the results of a voice

    benchmark run on a properly instrumented test

    configuration.

    developerWorks:Wireless Technology

    http://www-128.ibm.com/developerworks/wireless/

    This Web site is IBMs technical resource for devel-

    opers.The site provides tools, code,and education for

    DB2,eServer, Lotus,Rational,Tivoli,and WebSphere,

    as well as open standards information on Web serv-

    ices, Wireless, Linux, XML, and Java technologies.

    The developerWorks wireless technology zone

    stores hundreds of articles, tutorials, and tips for

    developers that use wireless technology and related

    applications. With a massive amount of available

    information,this page serves as both an overview and

    starting point for users who want to learn about wire-

    less technology. The page describes wireless basics

    within the overall context of the technology, especiallyas it pertains to application development and e-busi-

    ness.The page also offers starting points for relevant

    developerWorks articles, tutorials,tips,IBM learning

    services education, webcasts, workshops, and IBM

    products.

    The technical library sectionwhich links off the

    main pagecontains a wireless technology articles list.

    Visitors can view the list by product, title, topic,or key-

    word, and sort results. Wireless technology tips and

    tricks are also available. Additionally, this page offers

    free wireless-technology online tutorials from

    developerWorks for beginner to advanced developers.

    W

    IRELESS

    RFID in the

    Enterprise

    The January 2006 issue ofIEEEPervasive Computing focuses onapplications of RFID (radio fre-

    quency identification),a wireless com-munication technology that letscomputers read the identity of inex-pensive electronic tags from a dis-tance, without requiring a battery inthe tags. No becoming a competitive

    edge for companies like Wal-Mart and FedEx, RFID ispoised for yet another wave of innovative use,as the tech-

    nologies mature and become less expensive.This special issue begins with an Introduction to RFID

    from Roy Want,a principal engineer at Intel Research.Heoutlines the basics of RFID and what challenges stillremain.

    One article of this special issue tells how Fraport AGused RFID in facilities maintenance at FrankfurtInternational Airport. Europes second largest airport,Frankfurt handled more than 50 million passengers andalmost 500,000 aircraft arrivals and departures in 2004.Facilities maintenance is a huge task, requiring specificidentification for thousands of pieces of equipment.This article tells about how the company successfully

    deployed RFID to tag these items, first starting with apilot project.

    Another article describes an RFID-based system totrack manufacturing lots. Infineon Technologies uses thissystem in its wafer fabrication facility in Villach,Austria.The system combines active RFID, passive RFID, andultrasound sensors to track plastic wafer boxes and wafercassettes in the companys chip-manufacturing process.Itsbeen in use for almost two years and has proved to be reli-able and efficient in localizing and communicating withmany moving physical objects.

    Find out about these and other RFID applications in

    the January issue of Pervasive, http://www.computer.org/

    pervasive.

  • 8/13/2019 f4053

    4/7

    56 IT Pro July August 2006

    O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S

    All Linux Devices

    http://alllinuxdevices.com/

    All Linux Devices is a resource for profes-

    sionals interested in staying aware of Linux and open

    source community news.The site publishes all its Web con-

    tentincluding free software and open source tools

    using Linux software exclusively.

    Your All Linux Devices (YLT) allows readers to receive

    personalized news from a variety of sources,for example,

    content filtered from the All Linux Devices newswire.The

    Next Generation (LT-TNG) offers system improvements,

    with enhanced control features available to members

    (sign-up is free).Members can customize Talkbacks,which

    appear in time order or thread order, and there is anoption to show full talkback bodies or just the talkback

    subject and contributor.Triggers deliver news content as

    it breaks, and are available to account members.

    On the main page,non-registered members have access

    to breaking news headlines that hyperlink to the main sto-

    ries.A sidebar on the left-hand side of the page provides

    links to new Linux products.

    UNIX/LINUX

    Open Source

    BusinessConferenceEast17-18 October 2006Boston

    This conference targets several kinds of IT work-

    ers: those looking to leverage open source into

    a business; those seeking to understand and

    mitigate open source legal risks;and those interested

    in talking to the industrys open source startups and

    learning about business models.One of this conferences tracks is Stacking the

    Enterprise Deck: The Rise of LAMP/J and its

    Implications for Enterprise Infrastructure. Among

    Java, .Net,LAMP, LAMJ, and J2EE the question

    remains:Which open source stack,or combination

    thereof, is the best fit for the enterprise? The tracks

    panel will tackle the choice. Attendees will hear

    industry leaders sound off with their views about

    what to consider when implementing, integrating,

    and deploying a collection of open source compo-

    nents into an enterprises infrastructure.

    Another track, Technology and Decentraliza-

    tion, is a keynote presented by Peter Thiel, co-founder of PayPal.Thiel believes that in the second

    half of the 20th century, technological innovation

    was a major driver of the world economys decen-

    tralization, enabling small businesses to compete

    with larger organizations.The globalization of infor-

    mation tended to diversify power and enable people

    to act much more locally than before. Thiel will

    explore the question of whether this trend towards

    decentralization will continue,culminating in world-

    wide anarchocapitalism, or whether technologi-

    cal innovative forcesespecially in the IT

    industrymight cause the pendulum to reverse

    toward some kind of economic or political central-

    ization.

    The Open Source: Moving Beyond Just

    Software track will feature Sun Microsystems

    president and COO Jonathan Schwartz discussing

    open source repercussions. Many think of open

    source merely as software bits and bytes. Sun, a

    contributor of open source code, sees a world in

    which open source also means commercially

    viable communities, innovative Internet services,

    hardware, and devices, and, ultimately, massive

    economic opportunity.

    http://www.osbc.com/live/13/

    Do You Do Ubuntu?

    Ubuntu Linux for Non-Geeks: APain-Free, Project-Based, Get-

    Things-Done Guidebook, RickfordGrant

    Ubuntu is a new version of Linuxintended specifically for novice users.NoStarch Press brings these characteristicstogether with Rickford Grant,a teacherand author experienced in explaining

    technical concepts to novices.That makes this book a hands-on,project-based,take-it-slow, guidebook intended for thoseinterested inbut nervous aboutentering the Linux world.Using immersion-learning techniques favored by languagecourses, step-by-step projects build upon earlier tutorial con-cepts,helping readers absorb and apply what theyve learned.

    Topics covered include how to

    download and install free applications, games, and utilities; connect to the Internet and wireless networks; configure hardware, including printers, scanners,and remov-

    able storage devices; watch DVDs, listen to music, and sync an iPod; and tackle more advanced tasks, such as compiling software

    from source,and handling software based on Java, Python,and Tcl/Tk.

    No Starch Press;ISBN 1-59327-118-2;360 pp.with CD;$34.95.

  • 8/13/2019 f4053

    5/7

    O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S

    July August 2006 IT Pro 57

    A Window to Unix

    Introduction to Unix/Linux,Christopher Diaz. The authorbelieves that Unix system has

    steadily gained in popularity overthe years.Many businesses and edu-cational institutions as well as indi-viduals have begun using Unix/Linux, believing in its power, stabil-ity, reliability, and flexibility. This

    book serves as a guide to Windows users interested in theconversion to Unix.

    The author provides some background and knowledgeneeded to become familiar with the Unix/Linux environ-

    ment and operations.For educational institutions,the bookpresents a broad Unix background for courses in comput-

    Linux World

    Conference and Expo14-17 August 2006San Francisco

    Instructors will lead attendees in tracks focusing on

    Linux and open source. Conference tracks include

    mobile and embedded Linux, kernel and system

    development, high-performance computing and virtu-

    alization, the Linux desktop,network management and

    interoperability, security, open source best practices,

    open source and your business, and open source devel-

    opment. Half-day tutorials will train IT solutions deci-

    sion-makers on relevant issues and technologies.From a single server to a network of workstations, the

    Linux environment can be a daunting one for adminis-

    trators knowledgeable in other platforms. To help ease

    the transition, the Linux Systems and Administration

    tutorial will provide information about using Linux in the

    real world.Starting with a single server and finishing with

    a multi-server, 1,000-plus user environment, the course

    will also accommodate question-and-answer interruption.

    Conference organizers expect attendees who complete

    the course to feel confident in their ability to set up and

    maintain a secure Linux server with services.

    Administrators and users are both concerned with

    redundant protection of critical data. RAID (RedundantArray of Independent Discs) is a mechanism for ensur-

    ing that protection, which Linux natively offers through

    software offered as an alternative to the expensive hard-

    ware typically associated with building a RAID. The

    tutorial,How to Create,Destroy, and Recover Software

    RAIDS under Linux will explain how to ensure

    RAID1 and RAID5 protection of Linux systems.Watch

    tutorial leaders create software RAID parti-

    tions, construct RAID arrays, install Linux

    directly to the RAID,and destroy one of thedisks; witness the continued operation and

    booting of the system followed by a complete

    recovery of the RAID to fully synchronized protection

    again.

    Hands-on labs will feature applications and tools train-

    ing. For example,Write a Real Working Linux Driver

    gives attendees a device for which they must write a

    working Linux kernel driver that is acceptable in the

    main Linux kernel tree.Instruction topics include under-

    standing the kernel build process, understanding the

    module load process, driver-author basics of the kernel

    driver and device model, how to interact with a kernel

    driver from userspace, understanding how to talk to the

    hardware, and proper kernel coding guidelines.

    Participants must have the ability to build, install, and

    run a standard kernel.org kernel, as well as an interme-

    diate understanding of the C language. They must also

    bring a laptop with a working USB connection running

    the latest version of the 2.6 kernel from kernel.org.

    Healthcare Day and Financial Services Day are

    one-day programs in which IT professionals from the

    financial and healthcare industries interface directly with

    their peers who are already using Linux and open source.

    OSDL Kernel Sessions feature Linux kernel engineers

    including Greg Kroah-Hartman and otherswho willexplain the kernel development process, how to con-

    tribute to the process, and what it takes to submit new

    device drivers into the machine kernel.

    This conference also offers free Linux certification

    testing from the Linux Professional Institute to all paid

    conference attendees.

    http://www.linuxworldexpo.com/live/12/events/12SFO06A

    U

    NIX/LINUX

    ers,business,engineering,mathematics,and education.Theauthor also supplies basic user information to assist read-ers who wish to learn Unix independently.

    A reader using any Unix version will find this book help-ful, as many of the concepts apply universally to allUnix/Linux systems.The book explores file creation andediting as well as how to develop professional-lookingtypeset documents. Other programming-related topicsinclude writing code that processes files and increases userconvenience, and how to build, run, debug, measure, andanalyze C++ program performance.

    This book can serve as a resource for the student whowants to learn more about the Unix system, as well as a

    guide for the individual making the transition to Unix.Charles River Media; ISBN 1584504498;448 pp.;$31.47.

  • 8/13/2019 f4053

    6/7

    58 IT Pro July August 2006

    B O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S B O O K S S I T E S C

    ACM/IFIP/USENIX 7th

    InternationalMiddlewareConference27 November 1 December 2006Melbourne, Australia

    The Middleware Conference invites discussion about

    recent advances in middleware design and con-

    struction. This year, the conferences scope is the

    design, implementation, deployment, and evaluation of

    distributed-systems platforms and architectures for

    future computing environments. Middleware is distrib-uted-systems software that resides between applications

    and underlying operating systems, network protocol

    stacks, and hardware. Its primary role is to coordinate

    application-component connection and interoperability

    by bridging the gap between application programs and

    lower-level hardware and software infrastructure.

    Conference workshops include

    International Workshop on Middleware for Sensor

    Networks,

    First International Workshop on Advanced Data

    Processing in Ubiquitous Computing,

    Middleware for Service Oriented

    Computing,

    Model Driven Development forMiddleware,

    Fourth International Workshop on

    Middleware for Grid Computing,

    Fifth Workshop on Adaptive and Reflective

    Middleware, and

    Fourth International Workshop on Middleware for

    Pervasive and Ad-hoc Computing.

    The Middleware Doctoral Symposium will be held in

    conjunction with Middleware 2006.MDS 2006 is a forum

    where doctoral students can present their work. The

    symposiums goals are to expose students to helpful crit-

    icism before they defend their theses, and to foster dis-

    cussions on future career directions. Topics of the

    conference will include discussions on platforms and

    architecture, middleware for Web services and Web-serv-

    ice composition, middleware for cluster and grid com-

    puting, peer-to-peer middleware solutions, and

    event-based, publish/subscribe message-oriented mid-

    dleware.

    Systems-issues tracks will look at reliability, fault tol-

    erance,general quality-of-service,and middleware scal-

    ability.

    http://2006.middleware-conference.org

    UNIX/LINUX

    Is the Switch Rightfor You?

    Paradigm Shift: Seven Keys of

    Highly Successful Linux and

    Open Source Adoptions, MarkTeter.Some IT professionals believethat open source software providesmore opportunity for innovationthan commercial or proprietary soft-ware. Some organizations contendthat open source spurs more oppor-

    tunities for technical innovation that encourages busi-ness innovation.This book targets executives, technologydecision-makers, and project managers who could ben-efit from a crash course on Linux and open source adop-tion. Written for those in charge of planning andimplementing strategies and infrastructure projects, thebook provides information and recommendations thathelp readers understand the principles behind Linux-based computing. It also discusses how to mitigate theassociated challenges.

    Media Resource Technology;ISBN 0977343707;337 pp.;$49.95.

    Sporting the Porting

    Unix to Linux Porting: A Compre-

    hensive Reference, Alfredo Men-doza, Chakarat Skawratananond,

    Artis Walker. Increasingly, developers,architects, and project managers face thechallenge of porting their C,C++, and Javaapplications from Unix to Linux environ-ments.This book aims to be a completeguide to porting applications from three

    Unix platforms:Solaris, HP-UX, and AIX.Three of IBMs Linux-porting specialists lead readers

    through the entire project,from scoping and analysis to recod-ing and testing. The book presents a start-to-finish portingmethodology that discusses porting tasks and offers an assess-ment questionnaire for new project work. Readers can dis-cover what Linux offers in terms of APIs, library functions,versioning,system features, and toolsand their implicationsfor any project.

    The authors also address each individual Unix platform,identifying specific porting challenges and best practice solu-tions.Application developers will learn about the differences

    among Unix operating systems in todays IT infrastructure.Prentice Hall PTR; ISBN 0131871099; 720 pp.;$64.99.

  • 8/13/2019 f4053

    7/7

    July August 2006 IT Pro 59

    F E R E N C E S

    S

    ECURITY

    Detecting DoS Attacks

    According to the article Denial-of-Service Attack-DetectionTechniques, (Glenn Carl and

    colleagues,IEEE Internet Computing,Jan.-Feb. 2006), the Internet wasdesigned for the minimal processingand best-effort forwarding of anypacket, malicious or not. For cyberat-tackers motivated by revenge, pres-

    tige, politics, or moneythis architecture provides anunregulated network path to victims.

    Denial-of-service (DoS) attacks exploit this to target mis-sion-critical services. A quantitative estimate of worldwide

    DoS attack frequency found 12,000 attacks over a three-week period in 2001.1 The2004 CSI/FBI Computer Crimeand Security Survey listed DoS attacks among the most finan-cially expensive security incidents.The magnitude of the inci-dence rate and potential recovery expense has garnered theinterest of security managers and researchers alike.

    Despite these dire circumstances, the authors see light atthe end of the tunnel, in that there are several ways to detectsuch attacks and circumvent them.In this article, they sur-vey various approaches for detecting DoS flooding attacksnetwork-based attacks in which agents intentionally saturatesystem resources with increased network traffic.

    See this article in the January-February 2006 issue ofIEEE

    Internet Computing magazine.

    Security from A to Z

    Dictionary of Information Security

    ,Robert Slade. According to HalTipton CISSP (Certified Infor-

    mation Security Professional), ISSAP(Information Systems Security Archi-tecture Professional),ISSMP (Informa-tion Systems Security ManagementProfessional), and author of the booksforeword, What is needed now in the

    world of information security is a single glossary of termsusing the preferred definition for each term to be publishedand used throughout the world.I personally have come faceto face with this definition problem as the chief instructor

    over the past dozen years for the International InformationSystems Security Certification Consortium (ISC)2. In thatrole,I have developed several courses that addressed top-ics contained in the Common Body of Knowledge for theinformation security field that dealt with concepts and def-initions. I struggled continuously to select the most appro-priate definition for many of the most important terms.Asa result, I am supportive of the idea of publishing an officialglossary of terms for information security professionals andrelated personnel. Rob Slade has undertaken this difficulttask, and his Dictionary should prove to be one of the mosthelpful additions to the professional library of every oneof us working in the field of information security.

    Syngress Publishing; ISBN 1597491152;300 pp.; $29.95.

    ComputerSecurityResource Center

    http://csrc.nist.gov

    The Computer Security Resource Center

    (CSRC) is a US government site devoted to

    sharing information security tools and prac-

    tices.Although some of the information of this

    site targets the government vendor audience,there are large sections devoted to small busi-

    ness and home users, too. For example,

    recently posted draft publication Guidance

    for Securing Microsoft Windows XP Home

    Edition, shares tips and a checklist of meas-

    ures that all home users should take.The small

    business division lists several workshops avail-

    able throughout the US on how to implement

    information security for small business.

    Another page (http://csrc.nist.gov/virus/)

    gives a general introduction to computer

    viruses and links to sources for specific topics.

    BiometricConsortiumConference 2006Baltimore, Maryland19-21 September 2006

    Sponsored by several US government agencies, includ-

    ing the National Institute of Standards and Technology

    and the National Security Agency (NSA), this confer-ence discusses recent technology advances, new initiatives,

    as well as biometric business models and market strategies.

    It also addresses trends in biometrics research; the devel-

    opment and application of biometric technologies; and the

    use of biometrics in government programs and commercial

    applications.

    The conference has three major tracks, one of which is

    information/industry. This tracks first day starts with an

    Introduction to Biometrics session and ends with a panel on

    commercial biometrics solutions. Other sessions later in the

    week focus on standards, system vulnerabilities, and remote

    authentication.

    http://www.biometrics.org/bc2006/index.htm