f4053
Transcript of f4053
-
8/13/2019 f4053
1/7
July August 2006 IT Pro 53
B O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S B O O K S
W
IRELESS
The Right Wireless
for the Job
Developing Practical Wireless Appli-
cations, Dean A. Gratton. Set forpublication in December, this book
explores the question of whether wirelessmanufacturers are using the right tech-nology for the right product, given theindustrys range of capabilities.The authordiscusses strengths and weaknesses ofcurrently available wireless technologies,
and,more specifically,draws the readers attention to the diversecollection of standardized and proprietary solutions available to
manufacturers.Gratton describes how each technology works and explores
overlapping, complementary, and competing technologies. Thebook looks at the suitability of wireless applications in these con-texts,and also considers the practicality of a wireless world as away to understand consumers and specific demographic groups.Additionally, the author compares the differences between per-sonal- and wide-area communications, considering personal-area technologies alongside 3G and WiMax.
Aimed at a technologically intermediate to advanced audience,the book is one of the first to discuss applications surroundingtechnologies such as ZigBee, near-field communications, andultra-wideband.The author talks about the Bluetooth 2.0, plus
the new EDR specification alongside some fundamentalintroductions to Wi-Fi,namely, 802.11i and 802.11n.
Digital Press; ISBN 1555583105; 50 pp.;$31.47.
GSM-3G
Centraland EasternEurope24-25 October 2006Bucharest, Romania
The two-day GSM-3G conference will
explore Central and Eastern Europe mar-
ket developments,as well as how to sustain
profitability in the competitive CEE market.
Topics of discussion include driving growth inthe CEE,CEE forecast analysis, and simplifying
regulations.Regional overview discussions will
cover case studies such as Vodafone Romanias
3G rollout, and Vipnets HSDPA rollout in
Croatia. Also, the conference will explore
integrating 3G and DVB-H TV services, and
options for 3G VAS.
Event visitors can listen to development-strat-
egy presentations such as those on 3G-to-4G
standardization and fixed-mobile convergence.
The conference will also assess potentially dis-
ruptive technologies, covering topics such as the
expansion of Wi-Fi in Europe, strategies forcommunicating and pricing the WiMax value
proposition, and a panel discussion of WiMax
versus 3G.
According to conference organizers, Informa
Telecoms & Media says that the total number
of Central and Eastern European GSM sub-
scribers passed 250 million at the start of
November 2005. Fueled by continued strong
growth in developing marketsparticularly in
Russia, Ukraine, and Polandthe milestone
was reached six to seven months after the region
passed the 200 million subscriber mark. Growth
still remains strong in 2006, and Informa fore-
casts indicate that the region is on track to pass
300 million subscriptions in 2007.Consequently,
conference organizers believe the region offers
good long-term growth prospects.
As of March 2006, a total of 13 W-CDMA net-
works had been launched commercially in the
CEE region, and four more were pre-commer-
cial.There are 18 additional regional W-CDMA
networks in the planning/deployment phase,
including largest-market networks in Poland,
Hungary, and the Czech Republic.
http://www.gsm-3gworldseries.com/cee/
Next-GenerationWireless
Next Generation Wireless Systems and
Networks, Hsiao-Hwa Chen andMohsen Guizani.
This book covers wireless systems and net-works. Chapter topics include wireless com-
munications fundamentals, 2G and 3G mobile cellular systems,and MIMO/ multi-user signal processing in Beyond-3G wireless.
Although the book is aimed at specialists,it includes essentialbackground information as well.For example,the text discussesbasics of wireless communications such as 3G wireless standards,spread spectrum and CDMA systems, It goes on to introduce3G standards,such as W-CDMA,CDMA2000 and TD-SCDMA.Beyond that, it looks at more futuristic topics, including cogni-tive radio technology and 3GPP E-UTRA technology.Further,the book addresses emerging wireless communication systemsand networks such as Super-3G technology, 4G wireless,UWB,
OFDMA and MIMO.John Wiley & Sons; ISBN 0470024348; 512 pp.; $120.
-
8/13/2019 f4053
2/7
54 IT Pro July August 2006
WIRELE
SS
Mobile Business Expo31 October-3 November 2006Chicago
Wireless technology can give your company a
competitive advantage through increased pro-
ductivity, better customer care,and more timely
communication and information exchange; but creating
that mobile advantage is the trick.Mobile Business Expo
is a three-day conference intended for business and IT
professionals who want to improve communication,
processes,and productivity using wireless technologies.
From field-worker support to RFID asset management,
IT managers and business managers must collaborate
to develop an integrated mobility strategy. The exposcase studies,demonstrations,workshops,and conference
tracks cover the ingredients necessary to build a mobile
workforce and leverage wireless technology across asset
management systems.
Visitors can learn how to integrate technologies such
as WLANs, voice over WLAN,mobile broadband,field
and sales force applications,RFID, MESH, and WiMax.
The conference will also explore topics such as future
developments in the wireless LAN 802.11 standard, best
practices in securing and managing wireless systems, and
extending legacy business application across a mobile
infrastructure Business issues include customer rela-
tionship management,fixed/mobile convergences role inenterprise communications, future wireless develop-
ments to watch, and which technologies to consider now.
The conference will cover topics such as evolving
metro-area access (metroscale Wi-Fi, mobile WiMax,
and broadband cellular), threat analysis, and vulnera-
bility management in a mobile world. Other topics
include unified communications and data collection
devices.
http://www.mobilebusinessexpo.com/ index.php
IEE Mobility
Conference25-27 October 2006Bangkok, Thailand
IEE Mobility Conference and Exhibition is a mobile-
technologies event that features a three-day menu of
keynote speeches, symposiums, technical presenta-
tions, and industry updates.Each day, keynote speakers
will provide mobile-industry updates on topics such as
technologies, standards, applications, and mobile
devices.
Industry presentations are technology-specific how-
to sessions for developers and system integrators.Theindustry tracks cover areas including Palm OS,
Windows, Java, and Symbian application development
environments,network integration to a mobile (General
Packet Radio Service and 802.11 wireless local area net-
works) environment, and working with mobile-device
platforms.
Oral technical-presentation tracks discuss research on
next-generation systems, latest operating systems, soft-
ware development platforms, networking technologies,
and mobile device capabilities.
Also included are research papers that provide
glimpses of near- and long-term trends. Special sessions
cover topics such as trends and technical challenges ofnext-generation mobile communication systems,ad hoc
and sensor networks, IP mobility, and user interface
design.
Mobile-realm usability-engineering topics will include
the human-computer interaction perspective, parallel-
processing improvement over wireless communication,
and location discovery and mobility modeling/forecast-
ing in wireless networks.
http://www.mobilityconference.org
UnlicensedBands
Coexistence in Wireless Networks:
Challenges and System-Level So-
lutions in the Unlicensed Bands,Nada Golmie.The increasing popular-ity of wireless networks makes inter-
ference and crosstalk between multi- ple systemsinevitable. Set for publication in September, this bookdescribes techniques for quantifying these disruptions and
their performance effects on unlicensed-band wireless net-works. It also presents system-level solutions, advocating
the need for new hardware implementations.The book starts with basic concepts and wireless proto-
cols before moving on to interference-performance eval-uation, interference modeling, and coexistence solutions.It concludes with common misconceptions and pitfalls.Theauthor illustrates her theory by referencing real-world sys-tems such as Bluetooth and Wi-Fi.
Case studies and illustrations should make this bookinteresting for electrical engineering and computer sciencegraduate students, WLAN and WPAN systems designers,practitioners developing new interference suppression tech-niques, and general users of merging wireless technology.
Cambridge University Press; ISBN 0521857686; 192 pp.;$70.
O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S
-
8/13/2019 f4053
3/7
IT Pro Resources
If you have a book, event, or Web site youd likeIT Professionalto include in Resources, send infor-mation to itproducts@ computer.org for considera-tion. We cant promise to include all submissions,but we will review them.
July August 2006 IT Pro 55
O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S
IT Worlds Wireless
http://wireless.itworld.com
This site, managed byIT World, provides
information on wireless technology.
Links are organized in news and topic sections
along the left side of the page.The news section con-
tains a sampling of breaking wireless news headlines.
The topics section is divided into areas including
application development, network management,
products and services,standards and regulations,and
trends and technologies.The home page also contains
links to webcasts,analyst briefings,white papers,and
newsletters.
One of the offerings in the white papers section ison benchmarking voice over IP over Wi-Fi (Vo-Fi).
The paper claims that benchmarking wireless systems
is difficult, with many variables and elements. This
Technology Note documents the results of a voice
benchmark run on a properly instrumented test
configuration.
developerWorks:Wireless Technology
http://www-128.ibm.com/developerworks/wireless/
This Web site is IBMs technical resource for devel-
opers.The site provides tools, code,and education for
DB2,eServer, Lotus,Rational,Tivoli,and WebSphere,
as well as open standards information on Web serv-
ices, Wireless, Linux, XML, and Java technologies.
The developerWorks wireless technology zone
stores hundreds of articles, tutorials, and tips for
developers that use wireless technology and related
applications. With a massive amount of available
information,this page serves as both an overview and
starting point for users who want to learn about wire-
less technology. The page describes wireless basics
within the overall context of the technology, especiallyas it pertains to application development and e-busi-
ness.The page also offers starting points for relevant
developerWorks articles, tutorials,tips,IBM learning
services education, webcasts, workshops, and IBM
products.
The technical library sectionwhich links off the
main pagecontains a wireless technology articles list.
Visitors can view the list by product, title, topic,or key-
word, and sort results. Wireless technology tips and
tricks are also available. Additionally, this page offers
free wireless-technology online tutorials from
developerWorks for beginner to advanced developers.
W
IRELESS
RFID in the
Enterprise
The January 2006 issue ofIEEEPervasive Computing focuses onapplications of RFID (radio fre-
quency identification),a wireless com-munication technology that letscomputers read the identity of inex-pensive electronic tags from a dis-tance, without requiring a battery inthe tags. No becoming a competitive
edge for companies like Wal-Mart and FedEx, RFID ispoised for yet another wave of innovative use,as the tech-
nologies mature and become less expensive.This special issue begins with an Introduction to RFID
from Roy Want,a principal engineer at Intel Research.Heoutlines the basics of RFID and what challenges stillremain.
One article of this special issue tells how Fraport AGused RFID in facilities maintenance at FrankfurtInternational Airport. Europes second largest airport,Frankfurt handled more than 50 million passengers andalmost 500,000 aircraft arrivals and departures in 2004.Facilities maintenance is a huge task, requiring specificidentification for thousands of pieces of equipment.This article tells about how the company successfully
deployed RFID to tag these items, first starting with apilot project.
Another article describes an RFID-based system totrack manufacturing lots. Infineon Technologies uses thissystem in its wafer fabrication facility in Villach,Austria.The system combines active RFID, passive RFID, andultrasound sensors to track plastic wafer boxes and wafercassettes in the companys chip-manufacturing process.Itsbeen in use for almost two years and has proved to be reli-able and efficient in localizing and communicating withmany moving physical objects.
Find out about these and other RFID applications in
the January issue of Pervasive, http://www.computer.org/
pervasive.
-
8/13/2019 f4053
4/7
56 IT Pro July August 2006
O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S
All Linux Devices
http://alllinuxdevices.com/
All Linux Devices is a resource for profes-
sionals interested in staying aware of Linux and open
source community news.The site publishes all its Web con-
tentincluding free software and open source tools
using Linux software exclusively.
Your All Linux Devices (YLT) allows readers to receive
personalized news from a variety of sources,for example,
content filtered from the All Linux Devices newswire.The
Next Generation (LT-TNG) offers system improvements,
with enhanced control features available to members
(sign-up is free).Members can customize Talkbacks,which
appear in time order or thread order, and there is anoption to show full talkback bodies or just the talkback
subject and contributor.Triggers deliver news content as
it breaks, and are available to account members.
On the main page,non-registered members have access
to breaking news headlines that hyperlink to the main sto-
ries.A sidebar on the left-hand side of the page provides
links to new Linux products.
UNIX/LINUX
Open Source
BusinessConferenceEast17-18 October 2006Boston
This conference targets several kinds of IT work-
ers: those looking to leverage open source into
a business; those seeking to understand and
mitigate open source legal risks;and those interested
in talking to the industrys open source startups and
learning about business models.One of this conferences tracks is Stacking the
Enterprise Deck: The Rise of LAMP/J and its
Implications for Enterprise Infrastructure. Among
Java, .Net,LAMP, LAMJ, and J2EE the question
remains:Which open source stack,or combination
thereof, is the best fit for the enterprise? The tracks
panel will tackle the choice. Attendees will hear
industry leaders sound off with their views about
what to consider when implementing, integrating,
and deploying a collection of open source compo-
nents into an enterprises infrastructure.
Another track, Technology and Decentraliza-
tion, is a keynote presented by Peter Thiel, co-founder of PayPal.Thiel believes that in the second
half of the 20th century, technological innovation
was a major driver of the world economys decen-
tralization, enabling small businesses to compete
with larger organizations.The globalization of infor-
mation tended to diversify power and enable people
to act much more locally than before. Thiel will
explore the question of whether this trend towards
decentralization will continue,culminating in world-
wide anarchocapitalism, or whether technologi-
cal innovative forcesespecially in the IT
industrymight cause the pendulum to reverse
toward some kind of economic or political central-
ization.
The Open Source: Moving Beyond Just
Software track will feature Sun Microsystems
president and COO Jonathan Schwartz discussing
open source repercussions. Many think of open
source merely as software bits and bytes. Sun, a
contributor of open source code, sees a world in
which open source also means commercially
viable communities, innovative Internet services,
hardware, and devices, and, ultimately, massive
economic opportunity.
http://www.osbc.com/live/13/
Do You Do Ubuntu?
Ubuntu Linux for Non-Geeks: APain-Free, Project-Based, Get-
Things-Done Guidebook, RickfordGrant
Ubuntu is a new version of Linuxintended specifically for novice users.NoStarch Press brings these characteristicstogether with Rickford Grant,a teacherand author experienced in explaining
technical concepts to novices.That makes this book a hands-on,project-based,take-it-slow, guidebook intended for thoseinterested inbut nervous aboutentering the Linux world.Using immersion-learning techniques favored by languagecourses, step-by-step projects build upon earlier tutorial con-cepts,helping readers absorb and apply what theyve learned.
Topics covered include how to
download and install free applications, games, and utilities; connect to the Internet and wireless networks; configure hardware, including printers, scanners,and remov-
able storage devices; watch DVDs, listen to music, and sync an iPod; and tackle more advanced tasks, such as compiling software
from source,and handling software based on Java, Python,and Tcl/Tk.
No Starch Press;ISBN 1-59327-118-2;360 pp.with CD;$34.95.
-
8/13/2019 f4053
5/7
O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S
July August 2006 IT Pro 57
A Window to Unix
Introduction to Unix/Linux,Christopher Diaz. The authorbelieves that Unix system has
steadily gained in popularity overthe years.Many businesses and edu-cational institutions as well as indi-viduals have begun using Unix/Linux, believing in its power, stabil-ity, reliability, and flexibility. This
book serves as a guide to Windows users interested in theconversion to Unix.
The author provides some background and knowledgeneeded to become familiar with the Unix/Linux environ-
ment and operations.For educational institutions,the bookpresents a broad Unix background for courses in comput-
Linux World
Conference and Expo14-17 August 2006San Francisco
Instructors will lead attendees in tracks focusing on
Linux and open source. Conference tracks include
mobile and embedded Linux, kernel and system
development, high-performance computing and virtu-
alization, the Linux desktop,network management and
interoperability, security, open source best practices,
open source and your business, and open source devel-
opment. Half-day tutorials will train IT solutions deci-
sion-makers on relevant issues and technologies.From a single server to a network of workstations, the
Linux environment can be a daunting one for adminis-
trators knowledgeable in other platforms. To help ease
the transition, the Linux Systems and Administration
tutorial will provide information about using Linux in the
real world.Starting with a single server and finishing with
a multi-server, 1,000-plus user environment, the course
will also accommodate question-and-answer interruption.
Conference organizers expect attendees who complete
the course to feel confident in their ability to set up and
maintain a secure Linux server with services.
Administrators and users are both concerned with
redundant protection of critical data. RAID (RedundantArray of Independent Discs) is a mechanism for ensur-
ing that protection, which Linux natively offers through
software offered as an alternative to the expensive hard-
ware typically associated with building a RAID. The
tutorial,How to Create,Destroy, and Recover Software
RAIDS under Linux will explain how to ensure
RAID1 and RAID5 protection of Linux systems.Watch
tutorial leaders create software RAID parti-
tions, construct RAID arrays, install Linux
directly to the RAID,and destroy one of thedisks; witness the continued operation and
booting of the system followed by a complete
recovery of the RAID to fully synchronized protection
again.
Hands-on labs will feature applications and tools train-
ing. For example,Write a Real Working Linux Driver
gives attendees a device for which they must write a
working Linux kernel driver that is acceptable in the
main Linux kernel tree.Instruction topics include under-
standing the kernel build process, understanding the
module load process, driver-author basics of the kernel
driver and device model, how to interact with a kernel
driver from userspace, understanding how to talk to the
hardware, and proper kernel coding guidelines.
Participants must have the ability to build, install, and
run a standard kernel.org kernel, as well as an interme-
diate understanding of the C language. They must also
bring a laptop with a working USB connection running
the latest version of the 2.6 kernel from kernel.org.
Healthcare Day and Financial Services Day are
one-day programs in which IT professionals from the
financial and healthcare industries interface directly with
their peers who are already using Linux and open source.
OSDL Kernel Sessions feature Linux kernel engineers
including Greg Kroah-Hartman and otherswho willexplain the kernel development process, how to con-
tribute to the process, and what it takes to submit new
device drivers into the machine kernel.
This conference also offers free Linux certification
testing from the Linux Professional Institute to all paid
conference attendees.
http://www.linuxworldexpo.com/live/12/events/12SFO06A
U
NIX/LINUX
ers,business,engineering,mathematics,and education.Theauthor also supplies basic user information to assist read-ers who wish to learn Unix independently.
A reader using any Unix version will find this book help-ful, as many of the concepts apply universally to allUnix/Linux systems.The book explores file creation andediting as well as how to develop professional-lookingtypeset documents. Other programming-related topicsinclude writing code that processes files and increases userconvenience, and how to build, run, debug, measure, andanalyze C++ program performance.
This book can serve as a resource for the student whowants to learn more about the Unix system, as well as a
guide for the individual making the transition to Unix.Charles River Media; ISBN 1584504498;448 pp.;$31.47.
-
8/13/2019 f4053
6/7
58 IT Pro July August 2006
B O O K S W E B S I T E S C O N F E R E N C E S B O O K S W E B S I T E S C O N F E R E N C E S B O O K S S I T E S C
ACM/IFIP/USENIX 7th
InternationalMiddlewareConference27 November 1 December 2006Melbourne, Australia
The Middleware Conference invites discussion about
recent advances in middleware design and con-
struction. This year, the conferences scope is the
design, implementation, deployment, and evaluation of
distributed-systems platforms and architectures for
future computing environments. Middleware is distrib-uted-systems software that resides between applications
and underlying operating systems, network protocol
stacks, and hardware. Its primary role is to coordinate
application-component connection and interoperability
by bridging the gap between application programs and
lower-level hardware and software infrastructure.
Conference workshops include
International Workshop on Middleware for Sensor
Networks,
First International Workshop on Advanced Data
Processing in Ubiquitous Computing,
Middleware for Service Oriented
Computing,
Model Driven Development forMiddleware,
Fourth International Workshop on
Middleware for Grid Computing,
Fifth Workshop on Adaptive and Reflective
Middleware, and
Fourth International Workshop on Middleware for
Pervasive and Ad-hoc Computing.
The Middleware Doctoral Symposium will be held in
conjunction with Middleware 2006.MDS 2006 is a forum
where doctoral students can present their work. The
symposiums goals are to expose students to helpful crit-
icism before they defend their theses, and to foster dis-
cussions on future career directions. Topics of the
conference will include discussions on platforms and
architecture, middleware for Web services and Web-serv-
ice composition, middleware for cluster and grid com-
puting, peer-to-peer middleware solutions, and
event-based, publish/subscribe message-oriented mid-
dleware.
Systems-issues tracks will look at reliability, fault tol-
erance,general quality-of-service,and middleware scal-
ability.
http://2006.middleware-conference.org
UNIX/LINUX
Is the Switch Rightfor You?
Paradigm Shift: Seven Keys of
Highly Successful Linux and
Open Source Adoptions, MarkTeter.Some IT professionals believethat open source software providesmore opportunity for innovationthan commercial or proprietary soft-ware. Some organizations contendthat open source spurs more oppor-
tunities for technical innovation that encourages busi-ness innovation.This book targets executives, technologydecision-makers, and project managers who could ben-efit from a crash course on Linux and open source adop-tion. Written for those in charge of planning andimplementing strategies and infrastructure projects, thebook provides information and recommendations thathelp readers understand the principles behind Linux-based computing. It also discusses how to mitigate theassociated challenges.
Media Resource Technology;ISBN 0977343707;337 pp.;$49.95.
Sporting the Porting
Unix to Linux Porting: A Compre-
hensive Reference, Alfredo Men-doza, Chakarat Skawratananond,
Artis Walker. Increasingly, developers,architects, and project managers face thechallenge of porting their C,C++, and Javaapplications from Unix to Linux environ-ments.This book aims to be a completeguide to porting applications from three
Unix platforms:Solaris, HP-UX, and AIX.Three of IBMs Linux-porting specialists lead readers
through the entire project,from scoping and analysis to recod-ing and testing. The book presents a start-to-finish portingmethodology that discusses porting tasks and offers an assess-ment questionnaire for new project work. Readers can dis-cover what Linux offers in terms of APIs, library functions,versioning,system features, and toolsand their implicationsfor any project.
The authors also address each individual Unix platform,identifying specific porting challenges and best practice solu-tions.Application developers will learn about the differences
among Unix operating systems in todays IT infrastructure.Prentice Hall PTR; ISBN 0131871099; 720 pp.;$64.99.
-
8/13/2019 f4053
7/7
July August 2006 IT Pro 59
F E R E N C E S
S
ECURITY
Detecting DoS Attacks
According to the article Denial-of-Service Attack-DetectionTechniques, (Glenn Carl and
colleagues,IEEE Internet Computing,Jan.-Feb. 2006), the Internet wasdesigned for the minimal processingand best-effort forwarding of anypacket, malicious or not. For cyberat-tackers motivated by revenge, pres-
tige, politics, or moneythis architecture provides anunregulated network path to victims.
Denial-of-service (DoS) attacks exploit this to target mis-sion-critical services. A quantitative estimate of worldwide
DoS attack frequency found 12,000 attacks over a three-week period in 2001.1 The2004 CSI/FBI Computer Crimeand Security Survey listed DoS attacks among the most finan-cially expensive security incidents.The magnitude of the inci-dence rate and potential recovery expense has garnered theinterest of security managers and researchers alike.
Despite these dire circumstances, the authors see light atthe end of the tunnel, in that there are several ways to detectsuch attacks and circumvent them.In this article, they sur-vey various approaches for detecting DoS flooding attacksnetwork-based attacks in which agents intentionally saturatesystem resources with increased network traffic.
See this article in the January-February 2006 issue ofIEEE
Internet Computing magazine.
Security from A to Z
Dictionary of Information Security
,Robert Slade. According to HalTipton CISSP (Certified Infor-
mation Security Professional), ISSAP(Information Systems Security Archi-tecture Professional),ISSMP (Informa-tion Systems Security ManagementProfessional), and author of the booksforeword, What is needed now in the
world of information security is a single glossary of termsusing the preferred definition for each term to be publishedand used throughout the world.I personally have come faceto face with this definition problem as the chief instructor
over the past dozen years for the International InformationSystems Security Certification Consortium (ISC)2. In thatrole,I have developed several courses that addressed top-ics contained in the Common Body of Knowledge for theinformation security field that dealt with concepts and def-initions. I struggled continuously to select the most appro-priate definition for many of the most important terms.Asa result, I am supportive of the idea of publishing an officialglossary of terms for information security professionals andrelated personnel. Rob Slade has undertaken this difficulttask, and his Dictionary should prove to be one of the mosthelpful additions to the professional library of every oneof us working in the field of information security.
Syngress Publishing; ISBN 1597491152;300 pp.; $29.95.
ComputerSecurityResource Center
http://csrc.nist.gov
The Computer Security Resource Center
(CSRC) is a US government site devoted to
sharing information security tools and prac-
tices.Although some of the information of this
site targets the government vendor audience,there are large sections devoted to small busi-
ness and home users, too. For example,
recently posted draft publication Guidance
for Securing Microsoft Windows XP Home
Edition, shares tips and a checklist of meas-
ures that all home users should take.The small
business division lists several workshops avail-
able throughout the US on how to implement
information security for small business.
Another page (http://csrc.nist.gov/virus/)
gives a general introduction to computer
viruses and links to sources for specific topics.
BiometricConsortiumConference 2006Baltimore, Maryland19-21 September 2006
Sponsored by several US government agencies, includ-
ing the National Institute of Standards and Technology
and the National Security Agency (NSA), this confer-ence discusses recent technology advances, new initiatives,
as well as biometric business models and market strategies.
It also addresses trends in biometrics research; the devel-
opment and application of biometric technologies; and the
use of biometrics in government programs and commercial
applications.
The conference has three major tracks, one of which is
information/industry. This tracks first day starts with an
Introduction to Biometrics session and ends with a panel on
commercial biometrics solutions. Other sessions later in the
week focus on standards, system vulnerabilities, and remote
authentication.
http://www.biometrics.org/bc2006/index.htm