Thursday, January 22, 2009

Delivering Business Intelligence with Microsoft SQL Server 2005 or Netcat Power Tools

Delivering Business Intelligence with Microsoft SQL Server 2005

Author: Brian Larson

Transform disparate enterprise data into actionable business intelligence

Put timely, mission-critical information in the hands of employees across your organization using Microsoft SQL Server 2005 and the comprehensive information in this unique resource. Delivering Business Intelligence with Microsoft SQL Server 2005 shows you, step-by-step, how to author, customize, and distribute information that will give your company the competitive edge. It's all right here--from data mining, warehousing, and scripting techniques to MDX queries, KPI analysis, and the all-new Unified Dimensional Model. Real-world examples, start-to-finish exercises, and downloadable code throughout illustrate all of the integration, analysis, and reporting capabilities of SQL Server 2005.

Brian Larson is a Phi Beta Kappa graduate of Luther College in Decorah, Iowa, with degrees in Physics and Computer Science. He has 20 years of experience in the computer industry and 16 years of experience as a consultant creating custom database applications. Brian is currently Chief of Technology for Superior Consulting Services in Minneapolis, Minnesota, a Microsoft Consulting Partner for Reporting Services. He is a Microsoft Certified Solution Developer (MCSD) and a Microsoft Certified Database Administratior (MCDBA).

Brian served as a member of the Reporting Services development team as a consultant to Microsoft. In that role, he contributed to the original code base of Reporting Services.

Brian has presented seminars and provided training and mentoring on Reporting Services across the country. He is a contributor and columnist for SQL Server magazine and is currentlywriting the B.I. Powers column appearing on the SQL Server magazine website. In addition to this book, Brian is the author of Microsoft SQL Server 2005 Reporting Services, also from McGraw-Hill/Osborne.



Table of Contents:
Ch. 1Equipping the organization for effective decision making3
Ch. 2Making the most of what you've got - using business intelligence13
Ch. 3Searching for the source - the source of business intelligence25
Ch. 4One-stop shopping - the unified dimensional model43
Ch. 5First steps - beginning the development of business intelligence61
Ch. 6Building foundations - creating and populating data marts95
Ch. 7Fill 'er up - using integration services for populating data marts141
Ch. 8Cubism - measures and dimensions273
Ch. 9Bells and whistles - special features of OLAP cubes321
Ch. 10Writing a new script - MDX scripting375
Ch. 11Pulling it out and building it up - MDX queries421
Ch. 12Panning for gold - introduction to data mining457
Ch. 13Building the mine - working with the data mining model483
Ch. 14Spelunking - exploration using data mining519
Ch. 15On report - delivering business intelligence with reporting services555
Ch. 16Let's get together - integrating OLAP with your applications673
Ch. 17Another point of view - Excel pivot tables and pivot charts717

Books about: Working Shirking and Sabotage or The Legal and Regulatory Environment of E Business

Netcat Power Tools

Author: Jan Kanclirz Jr

Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.

* Get Up and Running with Netcat Simple yet powerful...Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.

* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.

* Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town...Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on yournetwork.

* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.

* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.

* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.

* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.

* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user.

* Comprehensive introduction to the #4 most popular open source security tool
available
* Tips and tricks on the legitimate uses of Netcat
* Detailed information on its nefarious purposes
* Demystifies security issues surrounding Netcat
* Case studies featuring dozens of ways to use Netcat in daily tasks



No comments:

Post a Comment