The Best Damn Windows Server 2008 Book Period

The Best Damn Windows Server 2008 Book Period
Author: Anthony Piltzecker
Publsiher: Elsevier
Total Pages: 824
Release: 2011-08-31
ISBN 10: 9780080560076
ISBN 13: 0080560075
Language: EN, FR, DE, ES & NL

The Best Damn Windows Server 2008 Book Period Book Review:

Best Damn Windows Server 2008 Book Period, Second Edition is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller. Web server management with Internet Information Services 7.0 Virtualize multiple operating systems on a single server Hardening Security, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller

The Best Damn Windows Server 2008 Book Period 2nd Edition

The Best Damn Windows Server 2008 Book Period  2nd Edition
Author: Anthony Piltzecker
Publsiher: Anonim
Total Pages: 824
Release: 2011
ISBN 10:
ISBN 13: OCLC:1105772718
Language: EN, FR, DE, ES & NL

The Best Damn Windows Server 2008 Book Period 2nd Edition Book Review:

Best Damn Windows Server 2008 Book Period, Second Edition is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller. Web server management with Internet Information Services 7.0 Virtualize multiple operating systems on a single server Hardening Security, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller.

The Best Damn Windows Server 2008 Book Period

The Best Damn Windows Server 2008 Book Period
Author: Anthony Piltzecker,Tony Piltzecker
Publsiher: Syngress Media Incorporated
Total Pages: 796
Release: 2008
ISBN 10: 9781597492737
ISBN 13: 1597492736
Language: EN, FR, DE, ES & NL

The Best Damn Windows Server 2008 Book Period Book Review:

Now completely revised and updated to Windows Server 2008, this book shows readers how to increase the reliability and flexibility of their server infrastructure with built-in Web and virtualization technologies. Bonus coverage includes securing IIS, Exchange Server and SQL Server.

The Best Damn Windows Server 2003 Book Period

The Best Damn Windows Server 2003 Book Period
Author: Debra Littlejohn Shinder,Thomas W Shinder
Publsiher: Elsevier
Total Pages: 1000
Release: 2004-06-18
ISBN 10: 9780080476070
ISBN 13: 0080476074
Language: EN, FR, DE, ES & NL

The Best Damn Windows Server 2003 Book Period Book Review:

In keeping with past trends, full migration to this latest Microsoft Server Operating System will begin in earnest 12 months after its release, in mid-to-late 2004. This book will hit the market just as large enterprises begin the process of moving from Windows 2000 Server to Windows Server 2003. The title says everything you need to know about this book. No other book on the market combines this breadth and depth of coverage with the kind of product expertise and quality standard expected from Syngress. Every aspect of Planning, Installing, Configuring and Troubleshooting a Windows Server 2003 network is distilled and documented, with plenty of examples and illustrations. An unlike its competition, this is a book that was written from the ground up for Windows Server 2003. * Everything a System Administrator will ever need to know about running a Windows Server 2003 network. * This is the book that meets the needs of today's Windows Server 2003 professional. * Every aspect of Planning, Installing, Configuring and Troubleshooting a Windows Server 2003 network is distilled and documented, with plenty of examples and illustrations.

The Best Damn Exchange SQL and IIS Book Period

The Best Damn Exchange  SQL and IIS Book Period
Author: Henrik Walther,Mark Horninger,Chris Adams
Publsiher: Syngress
Total Pages: 1224
Release: 2011-08-31
ISBN 10: 0080556884
ISBN 13: 9780080556888
Language: EN, FR, DE, ES & NL

The Best Damn Exchange SQL and IIS Book Period Book Review:

Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support "anywhere access" present IT professionals with a steep learning curve. Making certain that these products are configured to meet regulatory compliance requirements adds addtionaly complexity to day-to-day management network management. The Best Damn Exchange, SQL and IIS Book Period delivers an all-in-one reference for Windows System Administrators deploying the 2007 releases of these core Microsoft servers. The coverage is comprehensive, and provides users with just about everything they need to manage a Windows enterprise server. Special Bonus coverage includes how to gather and analyze the many log files generated by these servers. All-in-one coverage includes Exchange, SQL, and IIS Servers Integrated coverage on all key security features Bonus coverage includes analyzing server logs and integrating Communicator 2007

Security Strategies in Windows Platforms and Applications

Security Strategies in Windows Platforms and Applications
Author: Michael G. Solomon
Publsiher: Jones & Bartlett Publishers
Total Pages: 400
Release: 2013-08-01
ISBN 10: 1284031667
ISBN 13: 9781284031669
Language: EN, FR, DE, ES & NL

Security Strategies in Windows Platforms and Applications Book Review:

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES More than 90 percent of individuals, students, educators, businesses, organizations, and governments use Microsoft Windows, which has experienced frequent attacks against its well-publicized vulnerabilities. Revised and updated to keep pace with this ever changing field, Security Strategies in Windows Platforms and Applications, Second Edition focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system. Particular emphasis is placed on Windows XP, Vista, and 7 on the desktop, and Windows Server 2003 and 2008 versions. It highlights how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style, and step-by-step examples, this must-have resource will ensure readers are educated on the latest Windows security. Key Features: -Discusses the Microsoft Windows Threat Landscape -Highlights Microsoft Windows security features -Covers managing security in Microsoft Windows -Explains hardening Microsoft Windows operating systems and applications -Reviews security trends for Microsoft Windows computers Instructor Materials for Security Strategies in Windows Platforms and Applications include: PowerPoint Lecture Slides Exam Questions Case Scenarios/Handouts

Security Strategies in Windows Platforms and Applications

Security Strategies in Windows Platforms and Applications
Author: Michael G. Solomon
Publsiher: Jones & Bartlett Publishers
Total Pages: 384
Release: 2010-11-15
ISBN 10: 0763791938
ISBN 13: 9780763791933
Language: EN, FR, DE, ES & NL

Security Strategies in Windows Platforms and Applications Book Review:

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! More than 90 percent of individuals, students, educators, businesses, organizations, and governments use Microsoft Windows, which has experienced frequent attacks against its well-publicized vulnerabilities. Written by an industry expert, Security Strategies in Windows Platforms and Applications focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system. Particular emphasis is placed on Windows XP, Vista, and 7 on the desktop, and Windows Server 2003 and 2008 versions. It highlights how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style, and step-by-step examples, this must-have resource will ensure readers are educated on the latest Windows security strategies and techniques.

Firewall Fundamentals

Firewall Fundamentals
Author: Wes Noonan,Ido Dubrawsky
Publsiher: Pearson Education
Total Pages: 408
Release: 2006-06-02
ISBN 10: 9780132796699
ISBN 13: 0132796694
Language: EN, FR, DE, ES & NL

Firewall Fundamentals Book Review:

The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management and troubleshooting tasks Includes configuration, deployment, and management checklists Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from a wide variety of threats. Firewall technology continues to be the most prevalent form of protection against existing and new threats to computers and networks. A full understanding of what firewalls can do, how they can be deployed to maximum effect, and the differences among firewall types can make the difference between continued network integrity and complete network or computer failure. Firewall Fundamentals introduces readers to firewall concepts and explores various commercial and open source firewall implementations--including Cisco, Linksys, and Linux--allowing network administrators and small office/home office computer users to effectively choose and configure their devices. Firewall Fundamentals is written in clear and easy-to-understand language and helps novice users understand what firewalls are and how and where they are used. It introduces various types of firewalls, first conceptually and then by explaining how different firewall implementations actually work. It also provides numerous implementation examples, demonstrating the use of firewalls in both personal and business-related scenarios, and explains how a firewall should be installed and configured. Additionally, generic firewall troubleshooting methodologies and common management tasks are clearly defined and explained.

The Best Damn Server Virtualization Book Period

The Best Damn Server Virtualization Book Period
Author: Rogier Dittner,David Rule
Publsiher: Syngress
Total Pages: 960
Release: 2011-04-18
ISBN 10: 9780080556659
ISBN 13: 0080556655
Language: EN, FR, DE, ES & NL

The Best Damn Server Virtualization Book Period Book Review:

Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot. Virtualization allows you to consolidate many servers onto a single physical server reducing hardware, electrical, cooling, and administrative costs. These virtual servers run completely independent of each other so if one crashes the other are not affected. Planning and implementing a server consolidation is a complex process. This book details the requirements for such a project, includes sample forms and templates, and delivers several physical to virtual migration strategies which will save both time and costs. Readers of this book will easily be able to plan and deploy VMware, Microsoft Virtual Server, and Xen. Create a virtual network to exchange information or provide a service to other virtual machines or computers Use virtualization to support removable media such as CD or DVD optical disks Reduce server costs, administration overhead, and complexity

The Best Damn Firewall Book Period

The Best Damn Firewall Book Period
Author: Thomas W Shinder
Publsiher: Elsevier
Total Pages: 1168
Release: 2011-04-18
ISBN 10: 9780080556871
ISBN 13: 0080556876
Language: EN, FR, DE, ES & NL

The Best Damn Firewall Book Period Book Review:

The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point. Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit. Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP applications around firewalls, and analyzing security log files. Sections are organized by major vendor, and include hardware, software and VPN configurations for each product line. New to this Edition: Microsoft firewall protection, from Windows Firewall to ISA Server 2006 Cisco PIX Version 7, including VPN configuration and IDS Analyzing Firewall Logs and Reports VoIP and Firewall Bypassing

The British National Bibliography

The British National Bibliography
Author: Arthur James Wells
Publsiher: Anonim
Total Pages: 329
Release: 2009
ISBN 10:
ISBN 13: STANFORD:36105211722678
Language: EN, FR, DE, ES & NL

The British National Bibliography Book Review:

VMware vSphere For Dummies

VMware vSphere For Dummies
Author: Daniel Mitchell,Tom Keegan
Publsiher: John Wiley & Sons
Total Pages: 384
Release: 2011-02-09
ISBN 10: 1118067355
ISBN 13: 9781118067352
Language: EN, FR, DE, ES & NL

VMware vSphere For Dummies Book Review:

A plain-English guide to the market-leading virtualization and cloud computing technology With virtualization, a single server can host dozens or hundreds of virtual machines running a variety of operating systems, and even hook them together in a virtual network or cloud infrastructure. This practical guide shows you how to create a virtual system using the VMware VSphere environment. You'll find all the information you need to understand, design, and deploy one—without getting overwhelmed with technical detail. And once you’re up and running, this book is the perfect reference for maintenance and troubleshooting issues. Introduces you to virtualization and VMware’s virtualization/cloud computing technology, the most recent version is VMware vSphere Shows you how to design a vSphere environment Covers installation, deployment, management, maintenance, and troubleshooting Provides what IT managers and system administrators need to roll out their first virtualized or cloud infrastructure, or to get up to speed on VMware’s technology Get up and running on the cloud with VMware vSphere For Dummies!

SQL Server Forenisc Analysis

SQL Server Forenisc Analysis
Author: Kevvie Fowler
Publsiher: Pearson Education
Total Pages: 512
Release: 2008-12-16
ISBN 10: 9780321617675
ISBN 13: 0321617673
Language: EN, FR, DE, ES & NL

SQL Server Forenisc Analysis Book Review:

“What Kevvie Fowler has done here is truly amazing: He has defined, established, and documented SQL server forensic methods and techniques, exposing readers to an entirely new area of forensics along the way. This fantastic book is a much needed and incredible contribution to the incident response and forensic communities.” —Curtis W. Rose, founder of Curtis W. Rose and Associates and coauthor of Real Digital Forensics The Authoritative, Step-by-Step Guide to Investigating SQL Server Database Intrusions Many forensics investigations lead to the discovery that an SQL Server database might have been breached. If investigators cannot assess and qualify the scope of an intrusion, they may be forced to report it publicly–a disclosure that is painful for companies and customers alike. There is only one way to avoid this problem: Master the specific skills needed to fully investigate SQL Server intrusions. In SQL Server Forensic Analysis, author Kevvie Fowler shows how to collect and preserve database artifacts safely and non-disruptively; analyze them to confirm or rule out database intrusions; and retrace the actions of an intruder within a database server. A chapter-length case study reinforces Fowler’s techniques as he guides you through a real-world investigation from start to finish. The techniques described in SQL Server Forensic Analysis can be used both to identify unauthorized data access and modifications and to gather the information needed to recover from an intrusion by restoring the pre-incident database state. Coverage includes Determining whether data was actually compromised during a database intrusion and, if so, which data Real-world forensic techniques that can be applied on all SQL Server instances, including those with default logging Identifying, extracting, and analyzing database evidence from both published and unpublished areas of SQL Server Building a complete SQL Server incident response toolkit Detecting and circumventing SQL Server rootkits Identifying and recovering previously deleted database data using native SQL Server commands SQL Server Forensic Analysis is the first book of its kind to focus on the unique area of SQL Server incident response and forensics. Whether you’re a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, auditor, or database professional, you’ll find this book an indispensable resource.

The Best Damn Firewall Book Period

The Best Damn Firewall Book Period
Author: Syngress
Publsiher: Elsevier
Total Pages: 1329
Release: 2003-10-16
ISBN 10: 9780080476063
ISBN 13: 0080476066
Language: EN, FR, DE, ES & NL

The Best Damn Firewall Book Period Book Review:

This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth. The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ, and why do I want one? And What are some common attacks, and how can I protect my system against them? The Internet's explosive growth over the last decade has forced IT professionals to work even harder to secure the private networks connected to it—from erecting firewalls that keep out malicious intruders to building virtual private networks (VPNs) that permit protected, fully encrypted communications over the Internet's vulnerable public infrastructure. The Best Damn Firewalls Book Period covers the most popular Firewall products, from Cisco's PIX Firewall to Microsoft's ISA Server to CheckPoint NG, and all the components of an effective firewall set up. Anything needed to protect the perimeter of a network can be found in this book. - This book is all encompassing, covering general Firewall issues and protocols, as well as specific products. - Anyone studying for a security specific certification, such as SANS' GIAC Certified Firewall Analyst (GCFW) will find this book an invaluable resource. - The only book to cover all major firewall products from A to Z: CheckPoint, ISA Server, Symatec, BlackICE, PIX Firewall and Nokia.

Windows Server 2012 Security from End to Edge and Beyond

Windows Server 2012 Security from End to Edge and Beyond
Author: Thomas W Shinder,Yuri Diogenes,Debra Littlejohn Shinder
Publsiher: Newnes
Total Pages: 542
Release: 2013-04-18
ISBN 10: 1597499811
ISBN 13: 9781597499811
Language: EN, FR, DE, ES & NL

Windows Server 2012 Security from End to Edge and Beyond Book Review:

Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments. The book's revolutionary "Test Lab Guide" approach lets you test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables you to understand the technologies and move from lab to production faster than ever before. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management. Videos illustrating the functionality in the Test Lab can be downloaded from the authors’ blog http://blogs.technet.com.b.security_talk/. Each chapter wraps up with a bullet list summary of key concepts discussed in the chapter. Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system Written by two Microsoft employees who provide an inside look at the security features of Windows 8 Test Lab Guides enable you to test everything before deploying live to your system

The Linux Command Line

The Linux Command Line
Author: William E. Shotts, Jr.
Publsiher: No Starch Press
Total Pages: 480
Release: 2012
ISBN 10: 1593273894
ISBN 13: 9781593273897
Language: EN, FR, DE, ES & NL

The Linux Command Line Book Review:

You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you'll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more. In addition to that practical knowledge, author William Shotts reveals the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix supercomputers of yore. As you make your way through the book's short, easily-digestible chapters, you'll learn how to: * Create and delete files, directories, and symlinks * Administer your system, including networking, package installation, and process management * Use standard input and output, redirection, and pipelines * Edit files with Vi, the world’s most popular text editor * Write shell scripts to automate common or boring tasks * Slice and dice text files with cut, paste, grep, patch, and sed Once you overcome your initial "shell shock," you'll find that the command line is a natural and expressive way to communicate with your computer. Just don't be surprised if your mouse starts to gather dust. A featured resource in the Linux Foundation's "Evolution of a SysAdmin"

SQL Server Forensic Analysis

SQL Server Forensic Analysis
Author: Kevvie Fowler
Publsiher: Addison-Wesley Professional
Total Pages: 482
Release: 2009
ISBN 10: 9780321544360
ISBN 13: 0321544366
Language: EN, FR, DE, ES & NL

SQL Server Forensic Analysis Book Review:

The tools and techniques investigators need to conduct crucial forensic investigations in SQL Server. • • The database is the part of a forensic investigation that companies are the most concerned about. This book provides data and tools needed to avoid under or over reporting. • Teaches many about aspects about SQL server that are not widely known. • A complete tutorial to conducting SQL Server investigations and using that knowledge to confirm, assess, and investigate a digital intrusion. Companies today are in a terrible bind: They must report all possible data security breaches, but they don't always know if, in a given breech, data has been compromised. As a result, most companies are releasing information to the public about every system breech or attempted system breech they know about. This reporting, in turn, whips up public hysteria and makes many companies look bad. Kevvie Fowler's 'SQL Server Forensic Analysis' is an attempt to calm everyone down and focuses on a key, under-documented component of today's forensics investigations. The book will help investigators determine if a breech was attempted, if information on the database server was compromised in any way, and if any rootkits have been installed that can compromise sensitive data in the future. Readers will learn how to prioritize, acquire, and analyze database evidence using forensically sound practices and free industry tools. The final chapter will include a case study that demonstrates all the techniques from the book applied in a walk-through of a real-world investigation.

Windows 2012 Server Network Security

Windows 2012 Server Network Security
Author: Derrick Rountree
Publsiher: Newnes
Total Pages: 264
Release: 2013-03-19
ISBN 10: 159749965X
ISBN 13: 9781597499651
Language: EN, FR, DE, ES & NL

Windows 2012 Server Network Security Book Review:

Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall Remote desktop services Internet connection sharing Network diagnostics and troubleshooting Windows network security is of primary importance due to the sheer volume of data residing on Windows networks. Windows 2012 Server Network Security provides network administrators with the most focused and in-depth coverage of Windows network security threats along with methods and techniques for securing important mission-critical networks and assets. The book also covers Windows 8. Provides practical examples of how to secure your Windows network. Focuses specifically on Windows network security rather than general concepts. One of the first books to cover Windows Server 2012 network security.

The Best Damn Cisco Internetworking Book Period

The Best Damn Cisco Internetworking Book Period
Author: Syngress
Publsiher: Elsevier
Total Pages: 800
Release: 2003-11-13
ISBN 10: 9780080476056
ISBN 13: 0080476058
Language: EN, FR, DE, ES & NL

The Best Damn Cisco Internetworking Book Period Book Review:

The Best Damn Cisco Internetworking Book Period shows readers everything they need to know about all Cisco internetworking topics. The book provides an understanding of Cisco's current VoIP solutions and the means to put them to work, showing how to configure all of Cisco's core VoIP products—among them Cisco CallManager software, Cisco 7910 series phones, and server-based IP PBXs. It discusses IPv6 Protocols, as well as IP Quality of Service (QoS) and how it applies to Enterprise and Internet Service Provider (ISP) environments. In addition, Cisco wireless technologies are covered in detail. Cisco has placed a high priority on security and here readers will find complete coverage of all the Cisco Security products such as the PIX firewall suite of products, Network Address Translation (NAT), Cisco VPN Concentrator and IPSec, Cisco Authentication, Authorization, and Accounting (AAA), Content Services Switch (CSS), and the Cisco Secure Network Intrusion Detection System. This book is sure to become a dog eared reference for all Cisco engineers and administrators. - The one book that covers all major Cisco Internetworking concepts and configurations. - The only book to cross reference Cisco internetworking topics: Voice Over IP, Remote Access, Wireless, AVVID, and QoS. In addition, new technologies are covered in depth: AVVID, SIP, MGCP, and more. - A 1-stop reference for Cisco professionals needing coverage of core Cisco exam topics.

Halting State

Halting State
Author: Charles Stross
Publsiher: Penguin
Total Pages: 336
Release: 2007-10-02
ISBN 10: 9781101208793
ISBN 13: 1101208791
Language: EN, FR, DE, ES & NL

Halting State Book Review:

“Halting State [is] a near-future story that is at once over-the-top and compellingly believable.” – Vernor Vinge, author of Rainbows End In the year 2018, Sergeant Sue Smith of the Edinburgh constabulary is called in on a special case. A daring bank robbery has taken place at Hayek Associates—a dot-com start-up company that’s just floated onto the London stock exchange. But this crime may be a bit beyond Smith’s expertise. The prime suspects are a band of marauding orcs with a dragon in tow for fire support. The bank is located within the virtual reality land of Avalon Four, and the robbery was supposed to be impossible. When word gets out, Hayek Associates and all its virtual “economies” are going to crash hard. For Smith, the investigation seems pointless. But the deeper she digs, the bigger the case gets. There are powerful players—both real and pixelated—who are watching her every move. Because there is far more at stake than just some game-head’s fantasy financial security…