Novells Guide to Bordermanager Pdf, Epub, Ebook

Total Page:16

File Type:pdf, Size:1020Kb

Novells Guide to Bordermanager Pdf, Epub, Ebook NOVELLS GUIDE TO BORDERMANAGER PDF, EPUB, EBOOK J.D. Marymee, Sandy Stevens | 384 pages | 01 Jan 1998 | John Wiley & Sons Inc | 9780764545405 | English | Foster City, United States pdfFiller. On-line PDF form Filler, Editor, Type on PDF, Fill, Print, Email, Fax and Export All of the information presented in this book has been gathered from hands-on, real world experiences of the authors. A best-seller that once showed you how to reign in a panther can now show you …. Today, software engineers need to know not only how to program effectively but also how to …. You Will Learn Python 3! Zed Shaw has perfected the world's best system for learning Python …. If you think you should have access to this content, click the button to contact our support team. Contact us. To read the full version of this content please select one of the options below. You may be able to access this content by logging in via Shibboleth, Open Athens or with your Emerald account. To rent this content from Deepdyve, please click the button. Rent from Deepdyve. Join us on our journey Platform update page Visit emeraldpublishing. This retrieval method along with NetWare's fast file IO and other proprietary code made BorderManager's proxy engine one of the fastest in existence. This makes it possible for the customer to choose which NetWare or Linux kernel the services will run on. At this time Novell all but announced the end of development for the NetWare kernel numerous public and private statements that there is no bit future for NetWare and that Linux is the path to bit computing for OES. The desire to deliver a functional equivalent could not be done by a full software code port as much of the cache engine was sold as part of the Volera Excelerator and Novell holds a great desire to use or create open-source software for basic services such as this. The product was removed from the Novell price list on 15 February In the late summer of Novell announced, that there would be a BorderManager 3. Third-party filtering solutions are available for Novell BorderManager, from the following companies:. From Wikipedia, the free encyclopedia. Initial release August 25, Stable release 3. Retrieved 24 March Deploying Novell’s BorderManager Internet Security Firewall: a case study | Emerald Insight Dhowell, use NeoTrace from www. I will be talking about this in an upcoming article and at a presentation I am giving at Novell's BrainShare Europe in France next month. NeoTrace is a lot better than ping. Does mean that you will have to have a permanently assigned IP address on the private side you would normally only need this for a server. Workstations use dynamic NAT which means the path to them from the outside world is only open while the workstation is talking to the outside world. How do I bind a secondary IP to a card? I have known companies to be able to run their Web server on the same box as BorderManager. Just make sure you have plenty of memory on the server. Syntax for secondary IP address is: add secondary ipaddress x. NCF towards the bottom to it will automatically happen each time the server is started. It will not see the print servers otherwise. It might let you print to the Novell printers without using the client. Dhowell, both would be static. Do I still need to add a secondary IP address to the private card? With Win2K, that is. BorderManager runs on just about any Intel platform. Is BorderManager going to be that much better? Earlier you stated this would be a public address. Do I need two public addresses to bind to the card? I only have access to one public IP. Do you remember the exact title? CHET: Thanks! It might be possible to use one address to send e-mail to your server while other traffic is routed accordingly, but I think that would require filtering to be in place and that is not a subject that is easy to get into. Will BorderManager do the same? Mikkilusa, I believe that BorderManager single sign on is a little different from the single sign on used with PeopleSoft. Tchase, that explains it. Does this clarify my previous question? Workstations pass through it to get to the Internet. Mikkilusa, I am not sure. Add more security? In the case you have outlined you would need a BorderManager server at each end to do a site-to-site VPN. Unfortunately at this point in the game VPNs are a proprietary solution from vendor to vendor, so you have to use the same equipment at each end of the connection. Where access rules control where you can go, filters control how you can get there i. Harold66, MS proxy and Checkpoint 1 to mention a couple of products that work with Microsoft. Past the 45 days, you have to subscribe to the service to get updated category lists. Oh my goodness! Now I've got to get the Novell everyday too. The preceding was unpaid plug. It is on the BorderManager CD and should be fully functional out of the box except for the 45 day window. Depending on the speed of the line, the initial download of the updated category files may take a while. It's the top of the hour Thanks to Ron for presenting tonight But wait Don't turn up all the features at once. Get used to each one before going onto the next one. CHET: Cool! Send your information to jharvey techrepublic. Tonight was a black TechRepublic T-shirt and cap combo. Editor's Picks. PS5 restock: Here's where and how to buy a PlayStation 5 this week. Welcome to Information Age! Technology is moving extremely fast and you don't want to miss anything, sign up to our newsletter and you will get all the latest tech news straight into your inbox! I want to recieve updates for the followoing:. I accept that the data provided on this form will be processed, stored, and used in accordance with the terms set out in our privacy policy. No thanks I don't want to stay up to date. Like so many other once high-flying software companies, Novell has struggled to come to terms with competition from Microsoft. Ostensibly, the vendor of the NetWare network operating system reported double-digit year-on-year revenue growth in its first fiscal quarter, posting revenues up And this at a time when most major software vendors — Microsoft apart — are struggling to grow at all. So is CEO Jack Messman responsible for one of the greatest technology company comebacks in recent years? But the pairing of CTP and Novell seems to have masked growing weaknesses in both, and vindicated the broad scepticism that the deal received from users and analysts when it was first announced. Key issue: Novell's purchase of Cambridge Technology Partners has done nothing more than mask the continuing decline in revenues at both companies, raising questions about CEO Jack Messman's ability to turn the company around. The software side of the business, in particular, is heavily dependent on NetWare. The only respite for Novell has been the slow economic climate, as many organisations that had planned to abandon NetWare in recent months have postponed migrating to Microsoft due to financial constraints. However, eDirectory has been growing strongly since it was unbundled from the NetWare operating system in , despite competition from a similar, but technically inferior, product from Microsoft called Active Directory, which is bundled with Windows Once corporate adoption of web services technologies takes off — expected to be around — demand for directory software with built-in web services capability will grow considerably. This is because in order to access web services, users require a central location where programs and procedures can find out how to communicate with other programs and procedures. Demonstrating the critical role that directory software plays in a web services environment will, therefore, be crucial for Novell in the coming quarters. What's the fate of BorderManager? | Network World Technology is moving extremely fast and you don't want to miss anything, sign up to our newsletter and you will get all the latest tech news straight into your inbox! I want to recieve updates for the followoing:. I accept that the data provided on this form will be processed, stored, and used in accordance with the terms set out in our privacy policy. No thanks I don't want to stay up to date. Like so many other once high-flying software companies, Novell has struggled to come to terms with competition from Microsoft. Ostensibly, the vendor of the NetWare network operating system reported double-digit year-on-year revenue growth in its first fiscal quarter, posting revenues up And this at a time when most major software vendors — Microsoft apart — are struggling to grow at all. So is CEO Jack Messman responsible for one of the greatest technology company comebacks in recent years? But the pairing of CTP and Novell seems to have masked growing weaknesses in both, and vindicated the broad scepticism that the deal received from users and analysts when it was first announced. Key issue: Novell's purchase of Cambridge Technology Partners has done nothing more than mask the continuing decline in revenues at both companies, raising questions about CEO Jack Messman's ability to turn the company around. The software side of the business, in particular, is heavily dependent on NetWare. The only respite for Novell has been the slow economic climate, as many organisations that had planned to abandon NetWare in recent months have postponed migrating to Microsoft due to financial constraints.
Recommended publications
  • PROYECTO FIN DE CARRERA Auditoría De Los Sistemas Y
    Escuela Politécnica Superior Departamento de Informática PROYECTO FIN DE CARRERA Ingeniería Técnica en Informática de Gestión Auditoría de los sistemas y la seguridad en entornos mixtos (Linux - Windows) Autor: Roberto Garrido Pelaz Tutor: Miguel Ángel Ramos González Leganés, Noviembre de 2014 ii Título: Auditoría de los sistemas y la seguridad en entornos mixtos (Linux - Windows) Autor: Roberto Garrido Pelaz Tutor: Miguel Ángel Ramos González EL TRIBUNAL Presidente: ___________________________________ Vocal: ______________________________________ Secretario: ___________________________________ Realizado el acto de defensa y lectura del Proyecto Fin de Carrera el día __ de ___________ de 2014 en Leganés, en la Escuela Politécnica Superior de la Universidad Carlos III de Madrid, acuerda otorgarle la CALIFICACIÓN de __________________. VOCAL SECRETARIO PRESIDENTE Agradecimientos Roberto Garrido Pelaz i A Rebeca, porque das sentido a mi vida. Gracias a Miguel y Carmen, mis padres, por vuestro trabajo de toda una vida, por haberme enseñado el valor del esfuerzo y el trabajo. También gracias a mi hermano Miguel, por servirme de inspiración para seguir mejorando. A mi tutor Miguel Ángel Ramos, por tu experiencia, por tu apoyo y paciencia. Gracias a todos los que habéis contribuido a mi crecimiento personal y profesional durante estos años. Y a la música, por acompañarme durante todos mis caminos andados. Roberto Garrido Pelaz ii Resumen Los sistemas de información son ya activos estratégicos para cualquier organización, y la ventaja actual reside en el gran número de alternativas para las organizaciones en cuanto a tecnologías de la información. Nos encontramos con entornos cada vez más heterogéneos y modelos más flexibles, con los que se intenta alcanzar una ventaja competitiva a todos los niveles, y donde es fundamental el uso de ciertos protocolos y estándares tecnológicos.
    [Show full text]
  • Micro Focus File Reporter 3.6 Installation Guide
    Micro Focus File Reporter 3.6 Installation Guide January 6, 2020 Legal Notices Condrey Corporation makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Condrey Corporation reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Condrey Corporation makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Condrey Corporation reserves the right to make changes to any and all parts of the software at any time, without obligation to notify any person or entity of such revisions or changes. See the Software EULA for full license and warranty information with regard to the Software. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. Condrey Corporation assumes no responsibility for your failure to obtain any necessary export approvals.
    [Show full text]
  • Protokollsupport
    Reference Guide WinRoute Pro 4.1 SE För version 4.1 Build 22 och sinare Tiny Software Inc. Contents Innehållsförteckning Läs mig först 2 Beskrivning av WinRoute 5 WinRoute sammanfattning...................................................................................... 6 Omfattande protokollsupport .................................................................................. 9 NAT-router............................................................................................................ 10 Introduktion i NAT .................................................................................... 11 Hur NAT fungerar...................................................................................... 12 WinRoutes struktur .................................................................................... 13 Att ställa in NAT på båda gränssnitten ...................................................... 15 Portmappning - paketbefordran ................................................................. 18 Portmappning för system med flera hem (flera IP-adresser)...................... 21 Multi-NAT ................................................................................................. 22 Gränssnittstabell......................................................................................... 24 VPN-support .............................................................................................. 24 Brandvägg med paketfilter.................................................................................... 25 Översikt
    [Show full text]
  • OES 2015 SP1: Installation Guide Is Available at the Open Enterprise Server 2015 SP1 Documentation Website
    Open Enterprise Server 2015 SP1 Installation Guide June 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/. Copyright © 2016 Novell, Inc., a Micro Focus company. All Rights Reserved. Contents About This Guide 9 1 What’s New or Changed in the OES Install 11 1.1 What’s New (Update 28-OES 2015 SP1). .11 1.2 What’s New (OES 2015 SP1) . 11 1.3 What’s New (January 2016 eDirectory 8.8 SP8 Patch 6 Hot Patch 1). 12 1.4 What’s New (OES 2015) . 12 2 Preparing to Install OES 2015 SP1 15 2.1 Before You Install . 15 2.2 Meeting All Server Software and Hardware Requirements . 15 2.2.1 Server Software . 15 2.2.2 Server Hardware . 16 2.3 NetIQ eDirectory Rights Needed for Installing OES. 17 2.3.1 Rights to Install the First OES Server in a Tree . 17 2.3.2 Rights to Install the First Three Servers in an eDirectory Tree . 17 2.3.3 Rights to Install the First Three Servers in any eDirectory Partition . 17 2.4 Installing and Configuring OES as a Subcontainer Administrator . 17 2.4.1 Rights Required for Subcontainer Administrators . 18 2.4.2 Providing Required Rights to the Subcontainer Administrator for Installing and Managing Samba. 20 2.4.3 Starting a New Installation as a Subcontainer Administrator . 22 2.4.4 Adding/Configuring OES Services as a Different Administrator.
    [Show full text]
  • Netiq Edirectory Installation Guide, See the Netiq Edirectory Online Documentation Web Site
    NetIQ® eDirectory™ Installation Guide February 2018 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.netiq.com/company/legal/. Copyright © 2018 NetIQ Corporation, a Micro Focus company. All Rights Reserved. Contents About this Book and the Library 7 About NetIQ Corporation 9 1 Install and Upgrade Features 11 Multiple Package Formats for Installing eDirectory 9.1. 11 Installing eDirectory 9.1 in a Custom Location . 12 Specifying a Custom Location for Application Files . 12 Specifying a Custom Location for Data Files . 13 Specifying a Custom Location for Configuration Files . 13 Non-root Install . 14 Standards Compliance . 14 FHS Compliance . 14 LSB Compliance . 15 Server Health Checks . 15 Need for Health Checks . 15 What Makes a Server Healthy? . 16 Performing Health Checks . 16 Types of Health Checks . 17 Categorization of Health. 17 Log Files. 18 SecretStore Integration with eDirectory . 19 eDirectory Instrumentation Installation . 20 For More Information . 20 2 Installing or Upgrading NetIQ eDirectory on Linux 21 System Requirements. 21 Prerequisites . 23 Hardware Requirements . 25 Forcing the Backlink Process to Run . 25 Upgrading eDirectory . 26 Server Health Checks . 26 Upgrading on Linux Servers Other Than OES. 27 Unattended Upgrade of eDirectory on Linux . .27 Upgrading the Tarball Deployment of eDirectory 9.1 . 28 Upgrading Multiple Instances. 29 Installing eDirectory . 30 Using SLP with eDirectory . 30 Using the nds-install Utility to Install eDirectory Components . 31 Non-root User Installing eDirectory 9.1 . 34 Using the ndsconfig Utility to Add or Remove the eDirectory Replica Server .
    [Show full text]
  • Oes 2018 Sp2)
    Open Enterprise Server 2018 SP2 Installation Guide August 2020 Legal Notices Copyright © 2017 - 2020 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are as may be set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Contents About This Guide 9 1 What’s New or Changed in the OES Install 11 1.1 What’s New or Changed (OES 2018 SP2) . .11 1.2 What’s New or Changed (OES 2018 SP1) . .11 1.3 What's New or Changed (Update 6 - OES 2018 - Recommended) . 12 1.4 What’s New or Changed (OES 2018) . 12 2 Preparing to Install OES 2018 SP2 13 2.1 Before You Install . 13 2.2 Meeting All Server Software and Hardware Requirements . 13 2.2.1 Server Software . 13 2.2.2 Server Hardware . 14 2.3 NetIQ eDirectory Rights Needed for Installing OES. .15 2.3.1 Rights to Install the First OES Server in a Tree . 15 2.3.2 Rights to Install the First Three Servers in an eDirectory Tree . 15 2.3.3 Rights to Install the First Three Servers in any eDirectory Partition . 15 2.4 Installing and Configuring OES as a Subcontainer Administrator . 15 2.4.1 Rights Required for Subcontainer Administrators . 16 2.4.2 Providing Required Rights to the Subcontainer Administrator for Installing and Managing Samba.
    [Show full text]
  • OES 11 SP2: Dynamic Storage Technology Administration Guide ( Documentation/Oes11/Stor Dst Lx/Data/Bookinfo.Html)
    Open Enterprise Server 11 SP3 Dynamic Storage Technology Administration Guide July 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/. Copyright © 2016 Novell, Inc. All Rights Reserved. Contents About This Guide 11 1 Overview of Dynamic Storage Technology 13 1.1 Understanding Dynamic Storage Technology . 14 1.1.1 Merged View of the File Tree. .14 1.1.2 File Systems . 16 1.1.3 File Access Protocols . 16 1.1.4 Secure File Access . 17 1.1.5 Local File Access for Backup and Archive. 17 1.2 Benefits of Dynamic Storage Technology. 17 1.2.1 Merged View File Access for End Users . 18 1.2.2 Policy-Based Migration between Primary and Secondary Storage Areas . 18 1.2.3 Faster and Smaller Backups of Important Data . 18 1.2.4 Faster Disaster Recovery . .19 1.2.5 More Efficient Use of Expensive Storage. 19 1.2.6 Fast Storage for Active Data and Slower, Less Expensive Storage for Old Data . 19 1.2.7 Moving Files from an Existing Secondary Volume. 19 1.2.8 Access to the Secondary Storage Area without the Performance Penalties of HSM Solutions . 20 1.3 Shadowing Scenarios . 20 1.3.1 Existing Volume as Primary with an Empty Volume as Secondary . 20 1.3.2 Empty Volume as Primary with an Existing Volume as Secondary . 21 1.4 DST Policy Scenarios . 22 1.4.1 Move Files Based on the Last Time Accessed or Modified .
    [Show full text]
  • J I Truste Ne Ork
    Internet Security A Jumpstart for Systems Administrators and IT Managers Tim Speed Juanita Ellis Digital Press An imprint of Elsevier Science Amsterdam, Boston • London • New York o Oxford • Paris • San Diego San Francisco • Singapore • Sydney • Tokyo Digital Press is an imprint of Elsevier Science. Copyright © 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Recognizing the importance of preserving what has been written, Elsevier Science prints its books on acid-free paper whenever possible. Library of Congress Cataloging-in-Publication Data ISBN 1-55558-298-2 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. The publisher offers special discounts on bulk orders of this book. For information, please contact: Manager of Special Sales Elsevier Science 200 Wheeler Road Burlington, MA 01803 Tel: 781-313-4700 Fax: 781-313-4882 For information on all Digital Press publications available, contact our World Wide Web home page at: http://www.digitalpress.com or http://www.bh.com/digitalpress 1098765432 1 Printed in the United States of America To Linda Speed~my split apart. -T.S. To my dad, Charles Ellis. -J.E. This Page Intentionally Left Blank Contents Foreword ix Acknowledgments xi Introduction xiii The Internet and Security I. I The
    [Show full text]
  • Novell Bordermanager 3.9 Installation Guide Novdocx (ENU) 29 January 2007
    Novell BorderManager 3.9 Installation Guide novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Novell BorderManager 3.9 www.novell.com INSTALLATION GUIDE April 05, 2007 novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses.
    [Show full text]
  • Novell Zenworks Mobile Management Datasheet
    Data Sheet Endpoint Management Novell ZENworks Mobile Management Extend your endpoint management to all the mobile devices in your IT environment from a single administrative console. Protect yourself from risk with security policies and manage both employee-owned and company-owned devices. Product Overview If you answered yes to any of these questions, System Requirements Novell® ZENworks® Mobile Management pro- you already know how valuable ZENworks Please visit www.novell.com/zmm for detailed vides advanced device controls and policy Mo bile Management can be: It meets all of product specifications and system requirements. man­­­agement for iOS and Android, and other these management challenges and many Ac tiveSync -enabled devices—all from a sin- more. track device use and the applications gle administrative console. The product ad- that users download onto their devices. dresses all of the pain points administrators Key Benefits BYOD support that helps you optimize and managers face to day, including bring- Novell ZENworks Mobile Management helps user productivity on a variety of device your-own-device policies (BYOD), security, your organization with: platforms—including iOS and Android, application management, asset and inventory and most other ActiveSync devices. management and compliance issues. Centralized management tools Security and compliance capabilities that make it easy to deploy new mobile that provide auditing and compliance Are your users bringing in their own iPads, devices in the workforce, whether the management tools so you know who is Androids and other devices, then asking devices are company issued or privately controlling what and how they are doing it. for access to corporate email? owned.
    [Show full text]
  • Novell Zenworks 6.5 Desktop Management Installation Guide May 19, 2006
    Novell Confidential Manual (ENU) 21 December 2004 Novell ZENworks® Desktop Management 6.5 www.novell.com INSTALLATION GUIDE May 19, 2006 Novell Confidential Manual (ENU) 21 December 2004 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. Please refer to www.novell.com/info/exports/ for more information on exporting Novell software.
    [Show full text]
  • Hacking for Dummies.Pdf
    01 55784X FM.qxd 3/29/04 4:16 PM Page i Hacking FOR DUMmIES‰ by Kevin Beaver Foreword by Stuart McClure 01 55784X FM.qxd 3/29/04 4:16 PM Page v 01 55784X FM.qxd 3/29/04 4:16 PM Page i Hacking FOR DUMmIES‰ by Kevin Beaver Foreword by Stuart McClure 01 55784X FM.qxd 3/29/04 4:16 PM Page ii Hacking For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 Copyright © 2004 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis- sion of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, e-mail: permcoordinator@ wiley.com. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc.
    [Show full text]