Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (383)
  • BSZ  (3)
  • Frobenius-Institut
  • 2025-2025  (4)
  • 2020-2022
  • 2005-2009  (385)
  • 1990-1994  (4)
  • 1960-1964  (4)
  • 2009  (5)
  • 2005  (384)
  • 1963  (4)
  • Safari Tech Books Online  (381)
  • Frobenius-Gesellschaft  (4)
  • Boston, MA :Safari,  (381)
  • Baden-Baden : Nomos
  • New York [u.a.] : Routledge
  • Oxford : Oxford University Press
  • Paris
  • Wiesbaden : Harrassowitz
  • Wiesbaden : VS Verlag für Sozialwissenschaften
Datasource
Material
Language
Years
Year
Subjects(RVK)
  • 1
    Journal/Serial
    Journal/Serial
    Berlin : Dietrich Reimer Verlag GmbH | Leipzig : Harrassowitz | Bamberg : Meisenbach | Wiesbaden : Harrassowitz | Wiesbaden : Steiner | Stuttgart : Kohlhammer | Frankfurt am Main : Reimer ; 1.1938/40 - 11.1965; 13.1967 -
    Show associated volumes/articles
    ISSN: 0078-7809
    Language: German
    Dates of Publication: 1.1938/40 - 11.1965; 13.1967 -
    Additional Information: 12.1966 Mitteilungen zur Kulturkunde Wiesbaden : Steiner, 1966
    Parallel Title: Erscheint auch als Paideuma
    DDC: 900
    Keywords: Volkskunde, Völkerkunde ; Zeitschrift ; Ethnologie ; Volkskunde ; Kultur ; Ethnologie ; Afrika ; Ethnologie
    Note: Repr.: New York, NY : Johnson , Beteil. Körp. bis 2.1941/43: Forschungsinstitut für Kulturmorphologie an der Johann Wolfgang Goethe-Universität Frankfurt
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Berlin : Dietrich Reimer Verlag GmbH | Stuttgart : Kohlhammer | Leipzig : Harrassowitz | Bamberg : Meisenbach | Wiesbaden : Harrassowitz | Wiesbaden : Steiner ; 1.1938/40 -
    ISSN: 0078-7809
    Language: German
    Pages: Online-Ressource
    Dates of Publication: 1.1938/40 -
    Parallel Title: Erscheint auch als Paideuma
    Parallel Title: Druckausg. 12.1966 Mitteilungen zur Kulturkunde
    Former Title: Mitteilungen zur Kulturkunde
    DDC: 900
    Keywords: Ethnologie ; Volkskunde ; Kultur ; Ethnologie ; Ethnologie ; Afrika ; Zeitschrift ; Zeitschrift ; Online-Publikation ; Zeitschrift ; Online-Publikation ; Zeitschrift ; Online-Publikation ; Zeitschrift ; Online-Publikation ; Zeitschrift ; Zeitschrift ; Online-Publikation ; Zeitschrift ; Online-Publikation ; Zeitschrift ; Online-Publikation ; Zeitschrift ; Online-Publikation ; Zeitschrift ; Zeitschrift ; Zeitschrift ; Ethnologie ; Zeitschrift ; Online-Publikation ; Volkskunde ; Zeitschrift ; Online-Publikation ; Kultur ; Ethnologie ; Zeitschrift ; Online-Publikation ; Afrika ; Ethnologie ; Zeitschrift ; Online-Publikation
    Note: Gesehen am 26.06.23 , Beteil. Körp. bis 2.1941/43: Forschungsinstitut für Kulturmorphologie an der Johann Wolfgang Goethe-Universität Frankfurt
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Journal/Serial
    Journal/Serial
    Berlin : Dietrich Reimer Verlag GmbH | Leipzig : Harrassowitz | Bamberg : Meisenbach | Wiesbaden : Harrassowitz | Wiesbaden : Steiner | Stuttgart : Kohlhammer | Frankfurt am Main : Reimer ; 1.1938/40 - 11.1965; 13.1967 -
    Show associated volumes/articles
    ISSN: 0078-7809
    Language: German
    Dates of Publication: 1.1938/40 - 11.1965; 13.1967 -
    Additional Information: 12.1966 Mitteilungen zur Kulturkunde Wiesbaden : Steiner, 1966
    Parallel Title: Erscheint auch als Paideuma
    DDC: 900
    Keywords: Volkskunde, Völkerkunde ; Zeitschrift ; Ethnologie ; Volkskunde ; Kultur ; Ethnologie ; Afrika ; Ethnologie
    Note: Repr.: New York, NY : Johnson , Beteil. Körp. bis 2.1941/43: Forschungsinstitut für Kulturmorphologie an der Johann Wolfgang Goethe-Universität Frankfurt
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Journal/Serial
    Journal/Serial
    Berlin : Dietrich Reimer Verlag GmbH | Leipzig : Harrassowitz | Bamberg : Meisenbach | Wiesbaden : Harrassowitz | Wiesbaden : Steiner | Stuttgart : Kohlhammer | Frankfurt am Main : Reimer ; 1.1938/40 - 11.1965; 13.1967 -
    ISSN: 0078-7809
    Language: German
    Dates of Publication: 1.1938/40 - 11.1965; 13.1967 -
    Additional Information: 12.1966 Mitteilungen zur Kulturkunde Wiesbaden : Steiner, 1966
    Parallel Title: Erscheint auch als Paideuma
    DDC: 900
    Keywords: Volkskunde, Völkerkunde ; Zeitschrift ; Ethnologie ; Volkskunde ; Kultur ; Ethnologie ; Afrika ; Ethnologie
    Note: Repr.: New York, NY : Johnson , Beteil. Körp. bis 2.1941/43: Forschungsinstitut für Kulturmorphologie an der Johann Wolfgang Goethe-Universität Frankfurt
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Indianaolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: This is the definitive resource for every network administrator, consultant, and architect who needs to maximize availability, scalability, and performance in Windows server environments. Drawing on two decades of Windows server experience, Jeffrey Shapiro and Marcin Policht have written the most realistic, comprehensive, and independent Windows high availability guide ever published. One step at, a time, they help you plan, implement, and manage clustering, load balancing, fault tolerance, SQL Server, Exchange Server, and much more. Along the way, they address crucial high availability topics that are virtually ignored by most books, such as disaster recovery, performance monitoring, and operations management. Shapiro and Policht offer a clear, concise roadmap for keeping Windows servers running 24x7 and delivering on even the most challenging service-level agreements. They provide real-world case studies and easy-to-use instructions designed to help readers make better decisions more rapidly. Coverage includes Building the foundations for a highly available Active Directory and network architecture Selecting and integrating high-performance hardware, storage, and networks Installing and configuring Windows Clustering Services for both scale-out and failover Leveraging the Microsoft Operations Framework (MOF) and Microsoft Systems Architecture (MSA) Delivering high-performance, high availability file- and print-server solutions Using clustering to maximize SQL Server and Exchange Server availability Restoring failed servers: best practices and step-by-step techniques for recovering from downtime or disaster Deploying Network Load Balancing (NLB) IIS and application servers Administering Windows Server 2003 high-performance systems-including performance monitoring and alerts with Microsoft Operations Manager Avoiding the pitfalls associated with Windows high availability solutions © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    ISBN: 9780596517168 , 0596517165 , 0596005040
    Language: English
    Pages: xxxv, 816 p. , ill. ; , 24 cm
    Parallel Title: Erscheint auch als
    DDC: 384.5/35
    Keywords: Flash (Computer file) ; Mobile communication systems ; Multimedia communications ; Electronic books ; local ; Flash (Computer file) ; Mobile communication systems ; Multimedia communications ; Réseaux multimédias ; TECHNOLOGY & ENGINEERING ; Mobile & Wireless Communications ; Flash (Logiciel) ; Radiocommunications mobiles
    Abstract: With the advent of Flash Communication Server MX (FCS), Macromedia believes that it's on the edge of a breakthrough in how people think about the Internet. FCS has been designed to provide web developers with the means to add polished interactive audio and video features to their sites, the sort of features that users have come to expect. Naturally, the process of efficiently integrating rich media into applications, web sites, and web content is a complex one, to say the least. That's where Programming Flash Communication Server factors in. As the foremost reference on FCS, it helps readers understand how FCS can facilitate: Video on demand Live webcasts Video chat and messaging Shared desktop conferences Live auctions Interactive whiteboard presentations Workflow collaboration Multi-user games Programming Flash Communication Server not only explains how to use the pre-built FCS components to construct a simple application, it also explains the architecture so that developers can program custom components to make even more advanced applications. In addition, the book explains how to truly optimize performance, and talks about considerations for networked applications as well as the media issues pertaining to FCS. Programming Flash Communication Server gives developers a sorely needed leg up on this potentially intimidating technology. It lets users develop cool web applications ranging from direct dating experiences with real-time video, to pre-recorded corporate presentations, to news services with video and audio, and much more. At last, the ability to build web sites with rich interactive features--minus the complex downloads and installation hassles--is a reality. And now, with Programming Flash Communication Server from O'Reilly by your side, you can do more quickly and easily than you ever dreamed possible.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    ISBN: 9781587050404 , 1587050404
    Language: English
    Pages: xxxiii, 696 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    DDC: 621.382
    Keywords: Signaling system 7 ; Telecommunication systems ; Telephone switching systems, Electronic ; Telephone systems ; Electronic books ; local ; Telecommunication systems ; Telephone switching systems, Electronic ; Telephone systems ; Téléphonie ; Système de signalisation 7 ; Téléphone ; Systèmes de commutation électronique ; Signaling system 7 ; Telecommunication systems ; Systèmes de télécommunications ; Telephone systems
    Abstract: A complete, practical guide to the world's most popular signaling system, including SIGTRAN, GSM-MAP, and Intelligent Networks. Provides in-depth coverage of the SS7 protocols, including implementation details Covers SS7 over IP (SIGTRAN) using real-world examples Covers SS7/C7 from both a North American and European perspective, providing a broad international understanding of the technology and associated standards Explains mobile wireless concepts and signaling, including mobile application part (MAP) Provides a thorough explanation of the Intelligent Network (IN) and associated protocols (INAP/AIN) Signaling System No. 7 (SS7) is a signaling network and protocol that is used globally to bring telecommunications networks, both fixed-line and cellular, to life. SS7 has numerous applications and is at the very heart of telecommunications. Setting up phone calls, providing cellular roaming and messaging, and supplying converged voice and data services are only a few of the ways that SS7 is used in the communications network. SS7 also provides the point of interconnection between converging voice and data networks. This transition, which affects everyone who works with the data network, has bolstered the need for practical and applied information on SS7. In short, anyone who is interested in telecommunications should have a solid understanding of SS7. Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services will help you understand SS7 from several perspectives. It examines the framework and architecture of SS7, as well as how it is used to provide today's telecommunications services. It also examines each level of the SS7 protocol-all the way down to the bit level of messages. In addition, the SIGTRAN standards are discussed in detail, showing the migration from SS7 to IP and explaining how SS7 information is transported over IP.
    Note: Includes bibliographical references (p. [665]-673) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Drawing on her breakthrough research with 115 CEOs, Luda Kopeikina offers practical, proven techniques for structuring decisions, achieving clarity about the real issues involved, and using that clarity to improve the quality of every decision you make. Kopeikina begins by defining clarity in decision-making, identifying five root causes for decision difficulty, and introducing the "Clarity State": that singular moment of focus where things fall into place, and solutions become obvious. Next, she introduces a set of powerful techniques for overcoming decision difficulties, stripping away decision complexity, and achieving the Clarity State. Kopeikina concludes with a detailed case study tracing how real executives use these techniques to make crucial strategic decisions.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Pearson Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxii, 185 p. , ill. ; , 24 cm
    Keywords: Business presentations ; Debates and debating ; Public speaking ; Questioning ; Self presentation ; Verbal self-defense ; Electronic books ; local
    Abstract: Jerry Weissman has made a career of coaching nearly 500 execs on their IPO roadshows, the most critical presentations of their lives. Now, he's written an indispensable guide to answering the toughest questions you'll ever face. Using compelling examples from Presidential debates to stock analyst meetings, Weissman teaches how to respond with perfect assurance. Discover how to avoid the defensive, evasive, or contentious answers that have destroyed political careers and ruin credibility. Learn to control your entire exchange with a hostile questioner: the question, answer, interactions with questioner and audience, timing, and above all, yourself. Whether an executive, politician, fundraiser, interviewee, teacher, student -- or even a family member at Thanksgiving dinner -- you're judged on how you handle these moments. Get this book: handle them brilliantly.
    Note: Includes bibliographical references (p. 169-173) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School | Boston, MA :Safari,
    Language: English
    Pages: xliii, 241 p. , ill. ; , 24 cm
    DDC: 658.408
    Keywords: Capitalism ; Social responsibility of business ; Electronic books ; local
    Abstract: Capitalism is indeed at a crossroads, facing international terrorism, worldwide environmental change, and an accelerating backlash against globalization. Companies are at crossroads, too: finding new strategies for profitable growth is now more challenging. Both sets of problems are intimately linked. Learn how to identify sustainable products and technologies that can drive new growth while also helping to solve today's most crucial social and environmental problems. Hart shows how to become truly indigenous to all markets -- and avoid the pitfalls of traditional 'greening' and 'sustainability' strategies. This book doesn't just point the way to a capitalism that is more inclusive and more welcome: it offers specific techniques to recharge innovation, growth, and profitability.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: A new edition of this book is now available, ISBN-10: 0137142846 ISBN:13 9780137142842 Sams Teach Yourself SAP in 24 Hours, Second Edition is the perfect tool for learning one of the most sophisticated enterprise solutions available today. Designed to being with the basics, you will become acquainted with the entire SAP system, from navigation to creating your own reports. You'll also cover: Implementation tools and methodologies NetWeaver ECC 5.0 Designing Screens and menus Reporting Integration with Microsoft Office And more Written by leading SAP consultants with over 20 years of combined experience, this easy-to-understand tutorial is ideal for getting up and running with SAP quickly and efficiently.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Indianapolis : Prentice Hall Financial Times | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 650.1
    Keywords: Career development ; Success in business ; Vocational guidance ; Electronic books ; local
    Abstract: In FROM DAY ONE , long-time CEO Bill White reveals the key skills that lead to breakthrough success, and helps integrate them into your repertoire as you manage your career for outstanding results. Discover how to identify the best possible first job, first company, first boss... and get them. Walk in at 9 am on your first day, knowing exactly what it takes to succeed. Leverage the experience of world-class executives and benefit from practical tips about everything from "managing your boss" to networking; learn how to make a superb first impression; set the best priorities for your first day, week, month; uncover unspoken "local knowledge" about success; make the most of feedback; demonstrate potential without overstepping bounds; strengthen crucial skills, from listening to estimating and forecasting. This is practical, realistic advice straight from the "corner office".
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Strategy Bites Back is the antidote to conventional strategy books -- and conventional strategy formation. Edited by the legendary Henry Mintzberg, it contains contributions from everyone from Gary Hamel to Napoleon Bonaparte, Michael Porter to Hans Christian Andersen: essays, poems, case studies, cartoons, whatever it takes to 'free your mind' and unleash the crucial emotional side of strategy formation. Coverage includes: strategy and brinkmanship, culture, seduction; strategy lessons from your mother, from beehives, chess grandmasters, even the National Zoo. Along the way, Mintzberg and his colleagues take on the sacred cows and entrenched beliefs that keep strategists from recognizing their most powerful options. Strategy Bites Back doesn't just make strategy fun: it helps define strategies that offer huge upsides and real inspiration.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 278 p. , ill. ; , 24 cm
    Keywords: Conflict management ; Decision making ; Leadership ; Electronic books ; local
    Abstract: Harvard Business School's Michael Roberto draws on powerful decision-making case studies from every walk of life, showing how to promote honest, constructive dissent and skepticism; use it to improve decisions; and align organizations behind those decisions. Learn from disasters like the Space Shuttle Columbia and JFK's Bay of Pigs Invasion, from successes like Sid Caesar and Bill Parcells, from George W. Bush's decision-making after 9/11. Roberto complements his compelling case studies with extensive new research on executive decisionmaking. Discover how to test and probe a management team; when 'yes' means 'yes' and when it doesn't; and how to build real consensus that leads to action. Gain important new insights into managing teams, mitigating risk, promoting corporate ethics, and much more.
    Note: Includes bibliographical references (p. 237-270) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Indianapolis : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 338.4/762138
    Keywords: Electronic industries ; Technological innovations ; Electronic industries ; Household electronics ; Electronic books ; local
    Abstract: "The consumer electronics world sets a blistering pace for innovation, and anyone hoping to keep up-or take the lead-should read this book. Insightful and comprehensive, it maps out the industry terrain, and then points the way toward opportunities that lie ahead. Bailey and Wenzek have put together a compelling read on this fas­cinating global industry." -Tom Kelley, General Manager IDEO author, The Ten Faces of Innovation "Consumer electronics is one of the largest, fastest growing, most exciting, and most ruthless markets in the global economy. And technology and innovation are pouring into the space at an accelerating pace. Unfortunately, many vendors are not making money. Maniacal focus on return on investment is the key to success, and this book provides thought-provoking ideas on how to drive it." -Mike Bingle, Managing Director Silver Lake Partners "An industry built on the foundation of market dominance is being shaken up. In consumer electronics, those keystone companies that appraise the innovative value of niche players regain profitable growth. This book outlines what it takes to win in a turbulent ecosystem." -Marco Iansiti, Professor of Business Administration Harvard Business School The consumer electronics industry is entering an era of extraordinary growth. The industry's best companies will ride that wave to unprecedented success. But, today, many CE companies are struggling with business models that are simply untenable. They must change to survive: they must change even more dramatically to win. In this book, two world-renowned consultants preview the industry's future-from online gaming to telehealthcare, and beyond. Next, they present a powerful new blueprint, offering indispensable guidance on everything from technology platforms to user interface design, branding to channel strategies. You'll discover how to uncover new sources of value, design better models for doing business, and fuel growth by reaching new geographical markets. Whatever your role in the industry, this book will help you: · Make better decisions, find your differentiators, and focus on your key success drivers · Tap into the emergent "meta-value" that arises when technologies, devices, services, and content come together · Reach tomorrow's smart, service-sensitive shopper: not just the "technology-hungry" customers · Widen margins by adding value consumers will pay for · Transform cost structures to support rapid growth and nonstop change ·...
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams ; | Boston, MA :Safari,
    Language: English
    Pages: 948 p. ; , 24 cm
    DDC: 005.2762
    Keywords: JBoss (Computer file) ; Web sites ; Authoring programs ; Electronic books ; local
    Abstract: If you need to understand how JBoss works, why not learn it from the people who created it? JBoss 4.0 - The Official Guide is the authoritative resource recognized as the official print documentation for JBoss 4.0. The only book for advanced JBoss users, this guide presents a complete understanding to configuring and using JBoss 4.0. It is fully up-to-date with the new features and changes in JBoss 4.0, including those used to integrate development with Eclipse, incorporate Aspect-Oriented Programming and implement J2EE 1.4 functionality months ahead of the commercial competition. Get under the hood and explore everything that JBoss 4.0 can offer you with JBoss 4.0 - The Official Guide .
    Note: Includes CD-ROM
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Upper River Saddle, N.J. : Pearson/Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xvii, 209 p. ; , 22 cm
    DDC: 658.4/09
    Keywords: Executive ability ; Executives ; Leadership ; Management ; Electronic books ; local
    Abstract: Managers are expected to be leaders, innovators, magicians, dynamic motivators, stern but fair judges, diplomats, politicians, therapists, financial wizards, warriors, and saints. They must deliver on executive mandates, no matter how crazy. For some people, it's a breeze. They glide effortlessly through the hassles and politics, getting raises, promotions, results. They know the rules of management. Rules for managing a team -- and managingyourself. They're surprisingly easy to learn and live by. Richard Templar has brought them all together in one place: the quick, irreverent The Rules of Management. Templar covers everything from setting realistic targets to holding effective meetings; finding the right people to inspiring loyalty. Learn when and how to let people think they know more than you (even if they don't) -- and recognize when they really do! Discover how to adapt your style to each team member... get people to bring solutions, not problems... create your own private game plan for success, complete with Plans "B" and "C"... capitalize on luck... manage stress and stay healthy... get respect... and take charge.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: viii, 612 p. ; , 24 cm
    DDC: 006.786
    Keywords: Flash (Computer file) ; Computer animation ; Electronic books ; local
    Abstract: Explore the depth and flexibility of Macromedia Flash 8 with Sams Teach Yourself Macromedia Flash 8 in 24 Hours . Fundamental topics are presented one-by-one in a series of 24 one-hour lessons that will help you master the basics of Flash. Author Phillip Kerman , an internationally-known Macromedia trainer and multimedia expert, offers you a clearly-written, well-organized introduction to Macromedia Flash 8 without becoming too overwhelming. You will cover such subjects as: Drawing and Painting Original Art Using Motion Tween to Animate Animatng Using Movie Clips Using Actions to Create Non-Linear Movies Optimizing a Flash Site Publishing a Creation Not only will you master the basics of Macromedia Flash 8 with Sams Teach Yourself Macromedia Flash 8 in 24 Hours , you will also be better prepared to learn more advanced topics in the future.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Indianapolis, IN : Sams | Boston, MA :Safari,
    Language: English
    Pages: xx, 911 p. , ill. ; , 24 cm
    Edition: 5th ed.
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0672329417 ISBN-13: 9780672329418 Join the leagues of thousands of programmers and learn C++ from some of the best. The fifth edition of the best seller Sams Teach Yourself C++ in 21 Days , written by Jesse Liberty, a well-known C++ and C# programming manual author and Bradley L. Jones, manager for a number of high profiler developer websites, has been updated to the new ANSI/ISO C++ Standard. This is an excellent hands-on guide for the beginning programmer. Packed with examples of syntax and detailed analysis of code, fundamentals such as managing I/O, loops, arrays and creating C++ applications are all covered in the 21 easy-to-follow lessons. You will also be given access to a website that will provide you will all the source code examples developed in the book as a practice tool. C++ is the preferred language for millions of developers-make Sams Teach Yourself the preferred way to learn it!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit ; | Boston, MA :Safari,
    Language: English
    Pages: 144 p. , ill. ; , 23 cm
    DDC: 778.590285536
    Keywords: iDVD (Computer file) ; iMovie (Computer file) ; DVD-Video discs ; Authoring programs ; Motion pictures ; Editing ; Data processing ; Electronic books ; local
    Abstract: So you've got a copy of iMovie HD and iDVD 5, a camcorder, and plenty of footage-but how do you get all this video footage into a watchable movie? Maybe you don't want to spend a lot of time learning all the ins and outs of the software, but just want to get your movie finished. Realizing that many users won't want to waste a single minute reading about all they can do with iMovie and iDVD, best-selling author Jeff Carlson cuts straight to the chase, using simple project-based instruction and big, colorful screen shots to guide them through the process of making their first movie on an interactive DVD. By focusing on that first project, rather than exploring every option and feature, Jeff demonstrates the quickest, easiest, smartest route to cinematic success. Each short lesson builds on the last as users learn how to shoot, edit, and produce their own movies and then distribute them on DVDs to share with friends, family, and colleagues.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Indianapolis, IN : Wharton Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The iPod is a harbinger of a revolution in product design: innovation that targets customer emotion, self-image, and fantasy, not just product function. Read the hidden stories behind BodyMedia's SenseWear body monitor, Herman Miller's Mirra Chair, Swiffer's mops, OXO's potato peelers, Adidas' intelligent shoes, the new Ford F-150 pickup truck, and many other winning innovations. Meet the innovators, learning how they inspire and motivate their people, as they shepherd their visions through corporate bureaucracy to profitable reality. The authors deconstruct the entire process of design innovation, showing how it really works, and how today's smartest companies are innovating more effectively than ever before.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 247 p. ; , 24 cm
    Keywords: Trump, Donald ; 1946- ; Businessmen ; United States ; Biography ; Entrepreneurship ; United States ; Case studies ; Public relations ; United States ; Case studies ; Real estate developers ; United States ; Biography ; Success in business ; United States ; Case studies ; Electronic books ; local
    Abstract: In the wake of his incredibly successful TV show, The Apprentice, Donald Trump has gone beyond celebrity to become a true legend. He is the billionaire everyone recognizes, one whose name is its own global brand. Slater convinced Trump to give him unprecedented access: over 100 hours of private conversations and meetings. Wherever Trump went, Slater was there: as a 'fly on the wall' at secret deal-making sessions, on a Gulfstream jet trip to the dedication of Trump's newest skyscraper, everywhere. Slater interviewed 150 Trump employees and colleagues -- even top competitors such as Kirk Kerkorian and Steve Wynn. Now, he reveals the man in full: the businessman and dealmaker, strategist and survivor, celebrity and personality always striving for more attention and success, whatever the obstacles. Learn how Trump transformed himself from an unknown local real estate developer to a global magnate. See how he really does business, discovering lessons that go far beyond anything he's let the public see before. Witness his brilliant media management; watch him leverage his celebrity to save his casino business from billion-dollar debts, twice. Most remarkable of all, discover how Trump really feels about his celebrity, his empire, his life. Robert Slater was born in New York City on October 1, 1943, and grew up in South Orange, New Jersey. He graduated from Columbia High School in 1962 and graduated with honors from the University of Pennsylvania in 1966, where he majored in political science. He received a masters of science degree in international relations from the London School of Economics in 1967. He worked for UPI and Time Magazine for many years, in both the United States and the Middle East.
    Note: Includes bibliographical references (p. 231-239) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Language: English
    Pages: xix, 266 p., [16] p. of plates , ill. ; , 24 cm
    DDC: 658.4/092
    Keywords: MacArthur, Douglas ; 1880-1964 ; Military leadership ; MacArthur, Douglas ; 1880-1964 ; United States. ; Army ; Biography ; Command of troops ; Case studies ; Generals ; United States ; Biography ; Leadership ; United States ; Case studies ; Management ; United States ; Case studies ; Strategy ; Case studies ; Electronic books ; local
    Abstract: General Douglas A. MacArthur's extraordinary life of leadership spanned three wars and more than six decades inside and outside the military. He defined principles of leadership that were decades ahead of their time: principles reflecting extraordinary wisdom about strategy, motivation, organization, execution, and personal growth. Now, Theodore and Donna Kinni distill 52 powerful leadership lessons from MacArthur's life. On MacArthur's command, millions of American soldiers risked their lives. After winning the peace in World War II, he led 80 million citizens of Japan to embrace the most radical and successful cultural change any nation has ever achieved: the transformation from militaristic emperorship to modern democracy. Those extraordinary achievements arose directly from MacArthur's singular approach to leadership. This book reveals what MacArthur knew about defining victory and setting the right priorities for achieving it; building sleek, fast-response organizations; inspiring subordinates to unprecedented performance; focusing relentlessly on results; transforming organizational culture to value speed, knowledge, and honor; pursuing personal excellence; and winning.
    Note: Includes bibliographical references (p. [245]-249) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Philadelphia, Pa. : Wharton School ; | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 228 p. , ill. ; , 24 cm
    DDC: 658.044
    Keywords: Business networks ; Strategic alliances (Business) ; Success in business ; Electronic books ; local
    Abstract: To maximize long term profits, companies and their managers must focus more on win/win collaboration with business partners rather than using coercion and adversarial tactics to force compliance. Stallkamp pioneered new strategies for collaboration as President of Chrysler Corporation. His breakthrough strategy (SCORE--Supplier Cost Reduction Effort)turned Chrysler around and into the world's most profitable automaker. Organizations ranging from Dell Computer to the U.S. Air Force are now profiting from the lessons they learned from Chrysler. Stallkamp offers a complete blueprint for deploying strategic collaboration with suppliers, customers, and employees. Learn how Stallkamp overcame the pitfalls and cultural obstacles. Stallkamp reveals detailed metrics that demonstrate the remarkable cost and quality improvements strategic collaboration makes possible. Stallkamp's proven techniques address strategy, communication, leadership, measurement, information sharing, responsibility sharing, and more. Simply put, this is everything needed to establish collaborative relationships that drive unprecedented business value.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Indianapolis, Ind. : SAMS | Boston, MA :Safari,
    Language: English
    Pages: xxi, 858 p. , ill. ; , 23 cm. +
    Keywords: Microsoft Project ; Project management ; Computer programs ; Electronic books ; local
    Abstract: This go-to-resource is a must-have for anyone using Project Server 2003! Written by a widely recognized authority on project management, QuantumPM, this in-depth approach to planning and implementing Microsoft Office Project Server 2003 is derived from the team's technical and practical client experiences. Microsoft Office Project Server 2003 Unleashed provides an in-depth look at Microsoft Office Project Server 2003 and the possibilities of this technology.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Pearson/Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 230 p. ; , 24 cm
    Keywords: Business enterprises ; Franchises (Retail trade) ; Success in business ; Electronic books ; local
    Abstract: In this book, Dr. Scott A. Shane systematically helps businesses assess the pros and cons of the decision to franchise. This book focuses squarely on the issues and challenges faced by franchisors. Shane answers key questions such as: What do successful franchisors do differently from unsuccessful franchisors? Why do some companies in an industry choose to franchise while their competitors don't? How does the decision to franchise affect your ability to compete with firms that don't? For businesses that choose to move forward, Shane presents proven principles for every aspect of building a successful franchising system, including: recruiting, selecting, managing and supporting franchisees; establishing territories and pricing; managing expansion; and navigating the unique legal and institutional challenges of franchising.
    Note: Includes bibliographical references (p. 213-221) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xliv, 256 p. , ill. ; , 24 cm
    Keywords: Business ethics ; Leadership ; Moral and ethical aspects ; Moral development ; Success in business ; Moral and ethical aspects ; Electronic books ; local
    Abstract: Through a combination of research, and original thought leadership, the authors demonstrate how the best performing companies have leaders who actively apply moral values to achieve enduring personal and organizational success. These individuals exhibit moral intelligence: a strong moral compass and the ability to follow it. Lennick and Kiel reveal how dozens of companies benefit from the moral intelligence of their leaders, help build specific moral competencies leaders need: integrity, responsibility, compassion, forgiveness, and more. This book also includes the new Moral and Emotional Competency Inventory (MECI): an indispensable metric to assess moral intelligence. Leaders with strong moral intelligence can build the trust and commitment that are the foundation of truly great businesses. Be one of those leaders, lead one of those companies, with Moral Intelligence.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Language: English
    Pages: xiv, 248 p. ; , 24 cm
    DDC: 658.4012
    Keywords: Strategic planning ; Technological innovations ; Management ; Electronic books ; local
    Abstract: Innovation is more urgently necessary than it's ever been. Now, three leading experts on commercializing innovation systematically sort through the wreckage of yesterday's strategies, learning lessons and identifying ideas worth preserving and adapting. To prepare this book, the authors thoroughly examined the record of more than 250 innovation programs from organizations of widely differing sizes and industries, from 1998 through 2003. Based on this unprecedented research, they reveal the right time to use each innovation 'arrow', how to account for contingencies and risks; and how to focus on core innovation challenges -- not just superficial symptoms. Along the way, the authors define a focused, integrated model for innovation: one that is more nuanced and complex, but also better-grounded, more durable, and far more effective.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Indianapolis, Ind. : Pearson Education, Inc. | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 575 p. , ill. ; , 23 cm
    Edition: NetWare ed.
    DDC: 005.4/3
    Keywords: NetWare ; Handbooks, manuals, etc ; Operating systems (Computers) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Novell® Open Enterprise Server Administrator's Handbook, NetWare® Edition covers the major components and features of Open Enterprise Server (OES) on the NetWare platform. This book helps you understand how to integrate the benefits of OES in an existing environment. After a brief introduction to the concepts necessary to introduce features, the book focuses on the implementation of OES on the NetWare platform. While this book is not a reference for network theory, protocols or architectures, the administrator will learn about adding open source options, features and technologies that extend the applicability and value of NetWare and how to use the major components and features of OES on NetWare.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams ; | Boston, MA :Safari,
    Language: English
    Pages: xx, 647 p. , ill. ; , 24 cm. +
    Keywords: Electronic books ; local
    Abstract: Master the newest version of SUSE Linux with SUSE Linux 10 Unleashed . This comprehensive guide to SUSE Linux includes a DVD with the full version of SUSE Linux 10.0 and provides you with intermediate and advanced information to guide you through the installation, management and maintenance of your SUSE Linux 10.0 system. You will gain expert insight into the most important topics, including: Configuring with YaST2 and SaX2 Launching your desktop Productivity tools Using the Internet and creating websites Secure file transfer Managing users and data Keeping your system current Setting up networks and Samba Managing databases Learn how to make the most of your SUSE Linux 10.0 system with the help of SUSE Linux 10 Unleashed .
    Note: Accompanying DVD contains the complete binary version SUSE Linux 10.0. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.5/7
    Keywords: Microsoft Outlook ; Electronic mail systems ; Computer programs ; Personal information management ; Computer programs ; Time management ; Computer programs ; Electronic books ; local
    Abstract: Discover many useful customizations you can do with Outlook to improve efficiency both at home and on the job. Get more out of Outlook! The Outlook Answer Book brings together hundreds of bite-size tips and tricks for saving time, using Outlook more efficiently, uncovering its hidden power, and overcoming its quirks and pitfalls. With this book's fast-paced Q&A format, you can find new ideas and better solutions fast. From Favorite Folders to the Journal, you'll learn how to take advantage of Outlook features you've never used-or even noticed! You'll master simple techniques for automating routine tasks...customizations that make Outlook far more powerful...easy backup and troubleshooting solutions...even new ways to protect your privacy and security. Bite-size, useful items include FAQ 1.5 How Can I Get Outlook to Start Automatically? FAQ 1.8 Can I Add Shortcuts to the Quick Launch Bar for Specific Outlook Tasks? FAQ 4.54 How Can I Open Blocked E-mail Attachments? FAQ 6.33 How Do I Share My Notes with Others? FAQ 7.1 What Is the Difference Between Journaling and Other Outlook Features Such As Notes and Tasks? FAQ 9.15 What Is the Research Service? FAQ 10.10 How Do I Customize a Default Outlook Form? FAQ 14.1 What Is Outlook Web Access (OWA)? FAQ 14.39 How Can I Get a Map Showing the Location of a Contact's Address? FAQ 16.26 How Do I Recover Items from a Backup? © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Language: English
    Pages: xxxiii, 363 p. , ill. ; , 24 cm
    DDC: 658.3/14
    Keywords: Employee morale ; Employee motivation ; Job satisfaction ; Success in business ; Electronic books ; local
    Abstract: Enthusiastic employees far out-produce and outperform the average workforce:they step up to do the hard, even 'impossible' jobs. Most people are enthusiastic when they're hired: hopeful, ready to work hard, eager to contribute. What happens? Management, that's what. The authors tell you what managers do wrong, and what they need to do instead. It's about giving workers what they want most, summarized in the Three-Factor Theory: to be treated fairly; to feel proud of their work and organizations; and to experience camaraderie. Sounds simple, but every manager knows how tough it can be. Nostrums, fads, and quick and easy solutions have abounded in the management literature, but swiftly go out of style when they fail to meet the test in the workplace. The authors provide research-grounded answers to crucial questions such as: Which leadership and management practices can have the greatest positive performance impact? What does employee satisfaction really mean? What's the relationship between employee satisfaction, customer loyalty, and profit? Sirota and his colleagues detail exactly how to create an environment where enthusiasm flourishes and businesses grow.
    Note: Includes bibliographical references (p. 335-346) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xx, 539 p. , ill. ; , 24 cm
    DDC: 006.786
    Keywords: Flash (Computer file) ; Electronic books ; local
    Abstract: If you are looking for a fast, visual way to learn Macromedia Flash 8 and create your interactive website, Macromedia Flash 8 On Demand is the book you need. Step-by-step instructions with accompanying 4-color visuals mean you'll spend less time reading and more time learning. You'll learn how you can easily integrate and add interactivity with tools, develop content using pre-built components and effectively improve authoring capabilities with custom extensions. The new features icon used throughout the book highlights what's new in Macromedia Flash 8 and a troubleshooting guide is included to help solve your most common problems. Also, the companion software shows you how to perform everyday tasks and helps you gain web authoring experience. Let Macromedia Flash 8 On Demand help you master Macromedia Flash 8.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: As an administrator of a Novell® Open Enterprise Server (OES) on a SUSE® LINUX system, you are looking for ways to leverage it as a platform for delivering Novell's robust network services. Look no further. Novell Open Enterprise Server Administrator's Handbook, SUSE LINUX Edition provides you with the information that you need to take advantage of Novell rich array of nework management tools on a SUSE-powered system. By focusing on the implementation of OES on the SUSE LINUX platform, administrators learn how to integrate the benefits of OES in an existing environment. While this is not a reference work for network theory, protocols or architectures, it will provide the reader with a brief introduction to the concepts necessary to understand features of the product. Novell Open Enterprise Server Administrator's Handbook, SUSE LINUX Edition provides you with quick access to the information about the technologies, concepts and techniques that you need to get the job done.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Indianapolis, IN : Wharton | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Most global businesses focus nearly all their efforts on selling to the wealthiest 14% of the world's population. It's getting harder and harder to make a profit that way: these markets are oversaturated, overcompetitive, and declining. The Invisible Market shows how to unleash new growth and profitability by serving the other 86%. Vihajan Mahajan offers detailed strategies and implementation techniques for product design, pricing, packaging, distribution, advertising, and more. Discover radically different 'rules of engagement' that make emerging markets tick, and how European and Asian companies are already driving billions of dollars in sales there. Mahajan shows how to understand and manage lack of infrastructure and media, low literacy levels, and 'unconventional' consumer behavior. Learn how to redefine the 'real' competition; tap into the informal economy and unconventional channels; leverage expatriate word-of-mouth; pool demand to reach critical mass; piggyback innovations on local tradition; and price and package to reflect local realities. As traditional markets become increasingly unprofitable, emerging markets become the #1 opportunity for growth.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Pearson Education | Boston, MA :Safari,
    Language: English
    Pages: xiv, 241 p. ; , 24 cm
    DDC: 658.4/063
    Keywords: Israel. ; Tseva haganah le-Yiśraʼel ; Espionage, Israeli ; Military intelligence ; Israel ; Success in business ; Case studies ; Technological innovations ; Economic aspects ; Israel ; Case studies ; Electronic books ; local
    Abstract: When you're outgunned, when you're outnumbered 100 to 1, you have two choices: innovate and improvise. Or die. Spies, Inc. is a lesson in entrepreneurship on the fly: succeeding when resources are scarce and failure is not an option. " Stacy Perman tells a mystery never told before-the story of the marriage of technological innovation and spycraft. It is this marriage that has made Israeli intelligence so distinctively unique, and it is written like a real thriller." -AVNER COHEN, AUTHOR OF ISRAEL AND THE BOMB " Stacy Perman has done some first-rate research, uncovering and explaining the significant nexus between Israel's military intelligence efforts and the high-tech innovation that has become a hallmark of the Israeli economy. There are valuable business lessons to be learned throughout these pages for organizations-be they companies or countries-hoping to build a high-tech base for their economies. Above all, there is superb drama in Spies, Inc. and plenty of insight into the inner workings of an engine for innovation." - ROBERT SLATER, AUTHOR OF MICROSOFT REBOOTED: HOW BILL GATES AND STEVE BALLMER REINVENTED THEIR COMPANY AND JACK WELCH & THE G.E. WAY: MANAGEMENT INSIGHTS AND LEADERSHIP SECRETS OF THE LEGENDARY CEO " Spies, Inc. is both a compelling tale of high-tech espionage and an insightful business manual for the twenty-first century. As Stacy Perman chronicles the derring-do of a band of Israeli intelligence operatives, she shows how the country's fight for survival has forced it to think and act with brash creativity- both on and off the battlefield." - JOSHUA HAMMER, JERUSALEM BUREAU CHIEF, NEWSWEEK, AND AUTHOR OF A SEASON IN BETHLEHEM: UNHOLY WAR IN A SACRED PLACE In Spies, Inc. former Time and Business 2.0 writer Stacy Perman reveals the spellbinding story of the Israeli military and 8200, the ultra-secret high-tech intelligence unit whose alumni helped create a number of the groundbreaking technologies behind today's information revolution. An incredible tale in its own right, 8200 is also a remarkable case study in innovation, offering compelling lessons for every business. Likened to the NSA in the U.S., 8200 was established to capture, decipher, and analyze enemy transmissions. But unlike the NSA, 8200 did not have an endless font of resources at its disposal...and, due to secrecy, it couldn't generally buy "off-the-shelf" as a matter of procedure. Instead, it invented and customized many of its own technologies around the ...
    Note: Includes bibliographical references (p. 233-235) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize a data center site Learn how to lay out key infrastructure objects within the data center for greatest efficiency, from buffer zones to server rows Apply proven installation methods by studying sample illustrations of both overhead and under-floor systems Extract the best practices and design strategies for both in-room and standby electrical infrastructure Avoid accidental downtime, improve productivity, and ensure user safety Safeguard and streamline your network infrastructure with a well-organized physical hierarchy Understand the special challenges of retrofitting overburdened server environments Implement solutions from a wide array of sample illustrations and examples of essential data center signage Safeguard servers with operations standards for people working in or visiting the data center Download templates used by Cisco to design its data centers, customizable to square footage and geography Avoid excess construction costs by designing a data center that meets your needs today and for many years to come All data centers are unique, but they all share the same mission: to protect your company's valuable information. Build the Best Data Center Facility for Your Business answers your individual questions in one flexible step-by-step reference guide. Benefit from the author's concise and practical approach to data center design and management. The author distills this complex topic by sharing his first-hand and worldwide experience and expertise. Regardless of your experience level, you can fill your knowledge gaps on how to safeguard your company's valuable equipment and intellectual property. This easy-to-navigate book is divided into two parts: Part I covers data center design and physical infrastructure details, and Part II covers data center management and operations. You can also access supplementary online materials for installation instructions, which include customizable data center design templates, written cabling specifications, and sample drawings. If you need a starting point for designing your first data center, regardless of size; if you need to prepare yourself with comprehensive strategies to retrofit or improve an existing one; or if you need proven methods to manage a d...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 454 p. , ill. ; , 24 cm
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions. Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems. Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detectio...
    Note: Includes bibliographical references (p. [427]-430) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xx, 374 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Local area networks (Computer networks) ; Telecommunication ; Switching systems ; Electronic books ; local
    Abstract: The essential guide for understanding Ethernet switched networks Understand various Ethernet technologies from 10BASE-T to Gigabit Ethernet Learn about common switching modes, paths, and architectures Delve into the Cisco Catalyst switch architecture and examine the various Catalyst switch models, including the 6000/6500, 4500, and 3750 Become familiar with VLAN concepts, including types of trunks, VLAN Trunking Protocol (VTP), and private VLANs Understand Multilayer Switching (MLS) and the various hardware components that make MLS work Learn how to configure Cisco Catalyst switches in both native and hybrid mode Implement QoS on Cisco Catalyst switches Deploy multicast features and protocols, including PIM, IGMP snooping, and CGMP Utilize data link layer features such as BPDU Guard, BPDU Filter, Root Guard, Loop Guard, RSTP, and MST Evaluate design and configuration best practices Learn how to manage LANs and troubleshoot common problems Local-area networks (LANs) are becoming increasingly congested and overburdened because of a dramatic increase in traffic, faster CPUs and operating systems, and more network-intensive applications. Many organizations that use network and computing technology use LAN switching to take advantage of high-speed traffic forwarding and improved performance of traditional Ethernet technologies that don't require costly wiring upgrades or time-consuming host reconfiguration. Cisco LAN Switching Fundamentals provides administrators of campus networks with the most up-to-date introduction to LAN switching within a traditional Ethernet environment. Cisco LAN Switching Fundamentals presents an in-depth look at modern campus network requirements. It provides an easy-to-understand introduction to LAN switching best practices using Cisco Catalyst switches. This book provides you with a wealth of details on the architecture, operation, and configuration of the Cisco Catalyst family of switches. You learn about a wide range of topics, including quality of service (QoS), multicast, Rapid Spanning Tree Protocol (RSTP), Multiple Spanning Tree (MST), private virtual LANs (VLANs), and configuration using the native and hybrid software interfaces. Design advice and configuration examples are discussed liberally throughout the book to provide you with the best perspective on effective deployment techniques. Finally, the book wraps up with a discussion of steps necessary to troubleshoot common problems and optimize LAN performance. ...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention System Secure your endpoint systems with host IPS Build and manipulate policies for the systems you wish to protect Learn how to use groups and hosts in the Cisco Security Agent architecture and how the components are related Install local agent components on various operating systems Explore the event database on the management system to view and filter information Examine Cisco Security Agent reporting mechanisms for monitoring system activity Apply Application Deployment Investigation to report on installed applications, hotfixes, and service packs Collect detailed information on processes and see how they use and are used by system resources Create and tune policies to control your environment without impacting usability Learn how to maintain the Cisco Security Agent architecture, including administrative access roles and backups Cisco Security Agent presents a detailed explanation of Cisco Security Agent, illustrating the use of host Intrusion Prevention Systems (IPS) in modern self-defending network protection schemes. At the endpoint, the deployment of a host IPS provides protection against both worms and viruses. Rather than focusing exclusively on reconnaissance phases of network attacks a host IPS approaches the problem from the other direction, preventing malicious activity on the host by focusing on behavior. By changing the focus to behavior, damaging activity can be detected and blocked-regardless of the attack. Cisco Security Agent is an innovative product in that it secures the portion of corporate networks that are in the greatest need of protection-the end systems. It also has the ability to prevent a day-zero attack, which is a worm that spreads from system to system, taking advantage of vulnerabilities in networks where either the latest patches have not been installed or for which patches are not yet available. Cisco Security Agent utilizes a unique architecture that correlates behavior occurring on the end systems by monitoring clues such as file and memory access, process behavior, COM object access, and access to shared libraries as well as other important indicators. Cisco Security Agent is the first book to explore the features and benefits of this powerful host IPS product. Divided into seven parts, the book provides a detailed overview of Cisco Security Agent features and deployment scenarios. Part...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que ; | Boston, MA :Safari,
    Language: English
    Pages: 256 p. , ill. ; , 26 cm
    DDC: 004.16
    Keywords: Microcomputers ; Electronic books ; local
    Abstract: Your new PC just arrived. You open the box, excited to hook it up, start surfing the web, send e-mails...and then you see all of the cords, CD-ROMs and parts that need to be connected and installed, and suddenly it doesn't seem like so much fun anymore. The instructions look even more intimidating. Don't panic! Easy Computer Basics can help. This up-to-date, full-color, highly visual guide will walk you through the entire set-up process and then show you how to use the different programs to accomplish common tasks. You'll learn how to: Use Microsoft Windows, Works and Word Connect to the Internet Surf the web Read and write e-mail View and edit digital pictures Download and listen to digital music Add new devices, such as printers and hard drives Perform basic maintenance and security tasks Having a computer is supposed to be fun, so don't let its size or complexity take the fun out of your experience. Make your PC work for you with Easy Computer Basics .
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: We all have those "go-to" people in our lives. The one you go-to for advice, the one you go-to for comfort, the one you go-to with technical questions...now you can be the one that others go-to for help with Microsoft Office 2003. Tricks of the Microsoft Office Gurus is full of exclusive tricks from Paul McFedries , an Office "insider," that will help you learn the Office applications inside and out. Designed to bridge the gap between your expectation and reality, you will go beyond the basics and learn newly discovered techniques, shortcuts and best practices, including: Using Excel's "Camera Tool" for what-if analysis Embedding fonts in shared documents Adding a live stock price quote to a worksheet Using dummy text to layout and format a document Publishing Outlook Calendar to the web Using Word to customize Power Point handouts Through real-world examples that showcase how the tips and tricks can be used in everyday business tasks, Tricks of the Microsoft Office Gurus will help you get the most out of Office 2003.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que ; | Boston, MA :Safari,
    ISBN: 9780789732729 , 0789732726 , 0789732726
    Language: English
    Pages: 480 p. ; , 23 cm
    Series Statement: Exam cram 2
    Parallel Title: Erscheint auch als
    DDC: 658.4038011
    Keywords: Management information systems Study guides Auditing ; Examinations ; Management information systems ; Auditing ; Examinations ; Study guides ; Electronic books ; local ; Electronic books ; Study guides ; Electronic book
    Abstract: Want an affordable yet innovative approach to studying for the Certified Information Systems Auditor (CISA) 2005 exam? CISA 2005 Exam Cram 2 is your solution. You will have the essential material for passing the CISA 2005 exam right at your fingertips. All exam objectives are covered and you'll find practice exams, exam alerts, notes, tips and cautions to help guide you through your exam preparation. A CD also provides you with a video introduction to the exam and complete explanations of answers to the practice questions from Certified Tech Trainers (CTT). As a special bonus, you will receive $75 in discounts on CTT products and services. For your smartest, most efficient way to get certified, choose CISA 2005 Exam Cram 2 .
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: xvi, 486 p. , ill. ; , 24 cm
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Electronic books ; local
    Abstract: The world of mathematical formulas and jargon in Microsoft Excel is complex and can be intimidating for even advanced computer users. Perhaps like you, a majority of users find it difficult to get the most they can out of this very valuable program. Formulas and Functions with Microsoft Excel 2003 strives to break down the complexities by focusing on the four primary technologies to master: ranges, formulas, data analysis tools and lists. Chapters such as "Getting the Most Out of Ranges," "Building Your Own Functions Using VBA," and "Solving Complex Problems with Solver" will teach you practical skills and solutions that you can put to work immediately. Frustration will become a thing of the past as you begin to master the complex world of Excel!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 1187 p. , ill. ; , 24 cm. +
    DDC: 005.4'476
    Keywords: NetWare ; Computer networks ; Management ; Examinations ; Study guides ; Local area networks (Computer networks) ; Management ; Study guides ; Novell software ; Examinations ; Study guides ; Electronic books ; local
    Abstract: If you are studying for the Novell CNE certification tests 681, 682, 664 or 683, you need Novell's CNE Study Guide for NetWare 6 . It is the official Novell study guide and is the most effective tool to turn the passing rate in your favor. Loaded with illustrations, screen shots and hands-on exercises, it also includes sample test questions for all exams. A CD is included that provides you with a 3-user version of NetWare 6 server and NetWare 6 client software. Go after the most sought-after certification that Novell offers with this book in your hand.
    Note: "CD-ROM included; 3-user version of NetWare 6 server; NetWare 6 client software"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxi, 793 p. , ill. (some col.) ; , 24 cm. +
    DDC: 006.696
    Keywords: Maya (Computer file) ; Computer animation ; Three-dimensional display systems ; Electronic books ; local
    Abstract: If you thought Angelina Jolie was responsible for Lara Croft's curves, think again! Long before the Hollywood actress brought the Tomb Raider heroine to life, Alias' 3D modeling software Maya was used to create the lovely Lara; Ms. Jolie simply filled in her curves! When you're ready to start creating equally compelling characters of your own, you need this comprehensive volume! In these pages, gaming-industry veteran Antony Ward uses a combination of informative narrative, hands-on tutorials, and a slew of illustrations and screen shots to show you how to use Maya to address the most complex element of game creation-developing great characters! As you follow along, Antony uses the development of two diverse characters-a female figure and a fantastical character with outrageous proportions, wings, and a demon-like face-to demonstrate the techniques involved in modeling detailing, optimizing, texturing, rigging, binding, and animating characters with Maya. The companion CD includes lesson files, scripts, an automatic rigging tool, demo software, and more!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 504 p. , ill. ; , 23 cm
    DDC: 005.5
    Keywords: Microsoft Office ; Application software ; Development ; Microsoft .NET ; Electronic books ; local
    Abstract: This book delivers real-world strategies and coding techniques for creating Microsoft Office-based solutions that work seamlessly in the .NET environment-information that's been put to work by Microsoft's own product support and development teams.
    Note: At head of title: Microsoft. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Redmond, WA : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xlvii, 350 p. , col. ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The smart way to learn Windows XP-one step at a time! This fully updated edition makes it easy to teach yourself how to personalize and manage your system, use the new service pack, enjoy digital media technologies, troubleshoot problems, and more.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xliii, 273 p. , ill. ; , 24 cm. +
    Series Statement: Step by step
    DDC: 004.6/8
    Keywords: Intranets (Computer networks) ; Web servers ; Electronic books ; local
    Abstract: Teach yourself how to simplify team collaboration using Windows SharePoint Servicesone step at a time! With Step by Step, you work at your own pace through easy-to-follow lessons and hands-on exercises to learn essential techniques for using the document and project collaboration tools in Windows SharePoint Services. Designed for beginning-level and intermediate-level users, Step by Step puts you in charge of developing exactly the skills you need, just when you need them!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 887 p. , ill. ; , 23 cm. +
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: In-depth technical information and tools to help IT professionals deploy Microsoft Windows desktop operating systems and applications-straight from the source. Get definitive guidance, plus must-have tools, templates, and scripts on CD.
    Note: Accompanying CD-ROM includes scripts, worksheets, white papers, and an eBook. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xvii, 283 p. , ill. ; , 24 cm
    Edition: 4th ed.
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Learning Perl , better known as "the Llama book", starts the programmer on the way to mastery. Written by three prominent members of the Perl community who each have several years of experience teaching Perl around the world, this edition has been updated to account for all the recent changes to the language up to Perl 5.8. Perl is the language for people who want to get work done. It started as a tool for Unix system administrators who needed something powerful for small tasks. Since then, Perl has blossomed into a full-featured programming language used for web programming, database manipulation, XML processing, and system administration--on practically all platforms--while remaining the favorite tool for the small daily tasks it was designed for. You might start using Perl because you need it, but you'll continue to use it because you love it. Informed by their years of success at teaching Perl as consultants, the authors have re-engineered the Llama to better match the pace and scope appropriate for readers getting started with Perl, while retaining the detailed discussion, thorough examples, and eclectic wit for which the Llama is famous. The book includes new exercises and solutions so you can practice what you've learned while it's still fresh in your mind. Here are just some of the topics covered: Perl variable types subroutines file operations regular expressions text processing strings and sorting process management using third party modules If you ask Perl programmers today what book they relied on most when they were learning Perl, you'll find that an overwhelming majority will point to the Llama. With good reason. Other books may teach you to program in Perl, but this book will turn you into a Perl programmer.
    Note: "Covers Perl 5.8" -- Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 438 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 381.1702854678
    Keywords: eBay (Firm) ; Auctions ; Computer network resources ; Internet auctions ; Electronic books ; local
    Abstract: Whatever you call it--an online auction house, the world's largest flea market, or a vast social experiment--no metaphor completely describes the huge trading community that is eBay. Underneath it all, eBay is also a computer program and a complex socio-economic system, requiring experience, finesse, and the right tools to master. eBay Hacks , 2nd Edition has been completely revised and updated to make use of an array of new tools and features, as well as to reflect the changes in the eBay API, eBay's policies, and general practices of its increasingly sophisticated users. In all, the new edition of eBay Hacks sports 30 brand-new hacks plus dozens of hacks that have been expanded, deepened, or otherwise completely rewritten. eBay Hacks shows you how to become a more efficient buyer and seller with clever tricks and shortcuts that will surprise even the most experienced eBayers. The book's wide range of topics covers all aspects of using eBay, such as advanced searching techniques, sniping tools, selling strategies, photography tips, and even research techniques for PowerSellers. But eBay Hacks doesn't just cover the basics; you willl learn how to write scripts to automate tedious tasks, take better photos, and tap into the eBay API to develop your own custom tools. Unlike any other book, eBay Hacks , 2nd Edition also provides insight into the social aspects of the eBay community, with diplomatic tools to help to get what you want with the least hassle and risk of negative feedback. This bestseller supplies you with the tools you need to master eBay, whether as a buyer or seller, casual surfer or serious collector, novice or seasoned expert. With this guide, you will become a savvy power user who trades smarter and safer, makes more money, enjoys successes, and has fun doing it.
    Note: "Tips & tools for bidding, buying, and selling"--Cover. - Includes index. - Previous ed.: 2003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: ix, 117 p. , ill. ; , 18 cm
    Edition: 1st ed.
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Eclipse is the world's most popular IDE for Java development. And although there are plenty of large tomes that cover all the nooks and crannies of Eclipse, what you really need is a quick, handy guide to the features that are used over and over again in Java programming. You need answers to basic questions such as: Where was that menu? What does that command do again? And how can I set my classpath on a per-project basis? This practical pocket guide gets you up to speed quickly with Eclipse. It covers basic concepts, including Views and editors, as well as features that are not commonly understood, such as Perspectives and Launch Configurations. You'll learn how to write and debug your Java code--and how to integrate that code with tools such as Ant and JUnit. You'll also get a toolbox full of tips and tricks to handle common--and sometimes unexpected--tasks that you'll run across in your Java development cycle. Additionally, the Eclipse IDE Pocket Guide has a thorough appendix detailing all of Eclipse's important views, menus, and commands. The Eclipse IDE Pocket Guide is just the resource you need for using Eclipse, whether it's on a daily, weekly, or monthly basis. Put it in your back pocket, or just throw it in your backpack. With this guide in hand, you're ready to tackle the Eclipse programming environment.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media Inc. | Boston, MA :Safari,
    Language: English
    Pages: xii, 388 p. , ill. (some col.) ; , 24 cm
    Edition: 1st ed.
    Keywords: iPhoto (Computer file) ; Image processing ; Digital techniques ; Macintosh (Computer) ; Photography ; Digital techniques ; Electronic books ; local
    Abstract: Our Missing Manual is hands-down the bestselling book on iPhoto. And now, updated to cover Apple's newest release, iPhoto 5: The Missing Manual comes fully loaded--and in full color--so you can exercise all the power, flexibility, and creativity of the stunning new iPhoto 5. Some of iPhoto 5's fifty new features are tiny nips and tucks, such as menu rewordings, quiet refinements, and secret keystrokes that take most people days to stumble through. Others are big-ticket overhauls aimed at both power users (RAW-file import and editing, color correction sliders, real-time histogram) and everyday shutterbugs (nested file folders, individual-photo control in slideshows, and a completely rewritten book-layout kit). Additional improvements include a robust search feature (similar to that of iTunes) and the addition of "objects" for slideshow and book projects (using objects, you can manipulate images without affecting pictures in your master library). iPhoto 5: The Missing Manual covers them all with the scrupulous objectivity, clever wit, and technical wisdom you count on from David Pogue along with the Mac and digital photography expertise of Derrick Story. Their authoritative guide starts out with a crash course on digital photography, complete with tutorials on buying a digital camera, composing brilliant photos in various situations (including sports photography, portraits, nighttime photography--even kid photography!) and making digital movies. iPhoto 5: The Missing Manual then launches into every detail of iPhoto, from camera-meets-Mac basics to storing, searching, and editing; from sharing your digital photography with the world (via customized slideshows--complete with iTunes soundtrack, if you like--prints, photo books, email, the Web, and even your network) to exporting to QuickTime and iDVD. And don't forget iPhoto "stunts," such as building custom screen savers and desktop backdrops; exporting pictures; making the most of plug-ins, add-ons, and beef-ups; using AppleScript; and managing files with backups, CDs, and photo libraries. iPhoto 5: The Missing Manual gives you everything you need to become the digital photographer extraordinaire you want to be.
    Note: "The brilliance of digital photos on the Macintosh"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xix, 149 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: JBoss ; Handbooks, manuals, etc ; Application software ; Development ; Handbooks, manuals, etc ; Client/server computing ; Handbooks, manuals, etc ; Java (Computer program language) ; Handbooks, manuals, etc ; Open source software ; Handbooks, manuals, etc ; Web servers ; Management ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: There's nothing ordinary about JBoss. What began as an open source EJB container project six years ago has become a fully certified J2EE 1.4 application server with the largest market share, competitive with proprietary Java application servers in features and quality. And with its dynamic architecture, JBoss isn't just a J2EE server. You can alter the services to make J2EE work the way you want, or even throw J2EE away completely. After more than a million downloads, many JBoss users are no longer trying it out on internal test boxes, but rolling it out on production machines. JBoss: A Developer's Notebook takes you on a complete tour of JBoss in a very unique way: rather than long discussions, you will find code--lots of code. In fact, the book is a collection of hands-on labs that take you through the critical JBoss features step-by-step. You don't just read about JBoss, you learn it through direct practical application. That includes exploring the server's many configurations: from bare features for simple applications, to the lightweight J2EE configuration, to everything JBoss has in store-including Hibernate and Tomcat. JBoss: A Developer's Notebook also introduces the management console, the web services messaging features, enhanced monitoring capabilities, and shows you how to improve performance. At the end of each lab, you'll find a section called "What about..." that anticipates and answers likely follow-up questions, along with a section that points you to articles and other resources if you need more information. JBoss is truly an extraordinary application server. And we have an extraordinary way for you to learn it.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Beijing : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 380 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Asterisk (Computer file) ; Internet telephony ; Open source software ; Telephone ; Private branch exchanges ; Electronic books ; local
    Abstract: It may be a while before Internet telephony with VoIP (Voice over Internet Protocol) reaches critical mass, but there's already tremendous movement in that direction. A lot of organizations are not only attracted to VoIP's promise of cost savings, but its ability to move data, images, and voice traffic over the same connection. Think of it: a single Internet phone call can take information sharing to a whole new level. That's why many IT administrators and developers are actively looking to set up VoIP-based private telephone switching systems within the enterprise. The efficiency that network users can reach with it is almost mind-boggling. And cheap, if the system is built with open source software like Asterisk. There are commercial VoIP options out there, but many are expensive systems running old, complicated code on obsolete hardware. Asterisk runs on Linux and can interoperate with almost all standards-based telephony equipment. And you can program it to your liking. Asterisk's flexibility comes at a price, however: it's not a simple system to learn, and the documentation is lacking. Asterisk: The Future of Telephony solves that problem by offering a complete roadmap for installing, configuring, and integrating Asterisk with existing phone systems. Our guide walks you through a basic dial plan step by step, and gives you enough working knowledge to set up a simple but complete system. What you end up with is largely up to you. Asterisk embraces the concept of standards-compliance, but also gives you freedom to choose how to implement your system. Asterisk: The Future of Telephony outlines all the options, and shows you how to set up voicemail services, call conferencing, interactive voice response, call waiting, caller ID, and more. You'll also learn how Asterisk merges voice and data traffic seamlessly across disparate networks. And you won't need additional hardware. For interconnection with digital and analog telephone equipment, Asterisk supports a number of hardware devices. Ready for the future of telephony? We'll help you hook it up.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxi, 548 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: A smart collection of insider tips and tricks, Windows XP Hacks , Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes extensive coverage of hot-button issues such as: security web browsing controlling the control panel removing uninstallable XP components pop-up ads You'll also find timesaving hacks for file distribution; digital media, such as iTunes; and high-visibility web software, services, and exploits that have emerged since the book's last edition. Each hack in the book can be read easily in just a few minutes, saving countless hours of searching for the right answer.Now completely revised and updated to cover Service Pack 2 (SP2), the second edition of this bestseller carefully breaks down the new features that come with SP2, including IE pop-up blocker, Windows Firewall, and the new wireless client.Written by Preston Gralla, the compact and affordable Windows XP Hacks , Second Edition provides direct, hands-on solutions that can be applied to the challenges facing XP beginners, as well as the more experienced power user. Each year, Windows XP is pre-installed on 90 million PCs worldwide, making it the world's most popular operating system.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 372 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Microsoft Visual BASIC ; C# (Computer program language) ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Like most complex tasks, .NET programming is fraught with potential costly, and time-consuming hazards. The millions of Microsoft developers worldwide who create applications for the .NET platform can attest to that. Thankfully there's now a book that shows you how to avoid such costly and time-consuming mistakes. It's called .NET Gotchas .The ultimate guide for efficient, pain-free coding, .NET Gotchas from O'Reilly contains 75 common .NET programming pitfalls--and advice on how to work around them. It will help you steer away from those mistakes that cause application performance problems, or so taint code that it just doesn't work right.The book is organized into nine chapters, each focusing on those features and constructs of the .NET platform that consistently baffle developers. Within each chapter are several "gotchas," with detailed examples, discussions, and guidelines for avoiding them. No doubt about it, when applied, these concise presentations of best practices will help you lead a more productive, stress-free existence.What's more, because code examples are written in both VB.NET and C#, .NET Gotchas is of interest to more than 75 percent of the growing numbers of .NET programmers. So if you're a .NET developer who's mired in the trenches and yearning for a better way, this book is most definitely for you.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 519 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Swing (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Abstract: Swing Hacks helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. If you're a Java developer looking to build enterprise applications with a first-class look and feel, Swing is definitely one skill you need to master. This latest title from O'Reilly is a reference to the cool stuff in Swing. It's about the interesting things you learn over the years--creative, original, even weird hacks--the things that make you say, "I didn't know you could even do that with Swing!" Swing Hacks will show you how to extend Swing's rich component set in advanced and sometimes non-obvious ways. The book touches upon the entire Swing gamut-tables, trees, sliders, spinners, progress bars, internal frames, and text components. Detail is also provided on JTable/JTree, threaded component models, and translucent windows. You'll learn how to filter lists, power-up trees and tables, and add drag-and-drop support. Swing Hacks will show you how to do fun things that will directly enhance your own applications. Some are visual enhancements to make your software look better. Some are functional improvements to make your software do something it couldn't do before. Some are even just plain silly, in print only to prove it could be done. The book will also give you give you a small glimpse of the applications coming in the future. New technology is streaming into the Java community at a blistering rate, and it gives application developers a whole new set of blocks to play with. With its profusion of tips and tricks, Swing Hacks isn't just for the developer who wants to build a better user interface. It's also ideally suited for client-side Java developers who want to deliver polished applications, enthusiasts who want to push Java client application boundaries, and coders who want to bring powerful techniques to their own applications. Whatever your programming needs, Swing Hacks is packed with programming lessons that increase your competency with interface-building tools.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xviii, 395 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    DDC: 005.4465
    Keywords: Mac OS ; UNIX (Computer file) ; TIGER System (Information retrieval system) ; UNIX device drivers (Computer programs) ; Electronic books ; local
    Abstract: If you're one of the many Unix developers drawn to Mac OS X for its Unix core, you'll find yourself in surprisingly unfamiliar territory. Unix and Mac OS X are kissing cousins, but there are enough pitfalls and minefields in going from one to another that even a Unix guru can stumble, and most guides to Mac OS X are written for Mac aficionados. For a Unix developer, approaching Tiger from the Mac side is a bit like learning Russian by reading the Russian side of a Russian-English dictionary. Fortunately, O'Reilly has been the Unix authority for over 25 years, and in Mac OS X Tiger for Unix Geeks , that depth of understanding shows.This is the book for Mac command-line fans. Completely revised and updated to cover Mac OS X Tiger, this new edition helps you quickly and painlessly get acclimated with Tiger's familiar-yet foreign-Unix environment. Topics include: Using the Terminal and understanding how it differs from an xterm Using Directory Services, Open Directory (LDAP), and NetInfo Compiling code with GCC 3 Library linking and porting Unix software Creating and installing packages with Fink Using DarwinPorts Search through metadata with Spotlight's command-line utilities Building the Darwin kernel Running X Windows on top of Mac OS X, or better yet, run Mac OS X on a Windows machine with PearPC! Mac OS X Tiger for Unix Geeks is the ideal survival guide for taming the Unix side of Tiger. If you're a Unix geek with an interest in Mac OS X, you'll find this clear, concise book invaluable.
    Note: First ed. published as: Mac OS X for Unix geeks; 2nd ed. published as: Mac OS X Panther for Unix geeks, 2004. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 253 p. , ill. ; , 24 cm
    Keywords: Internet programming ; Web site development ; Electronic books ; local
    Abstract: Perhaps the most explosive technological trend over the past two years has been blogging. As a matter of fact, it's been reported that the number of blogs during that time has grown from 100,000 to 4.8 million-with no end to this growth in sight.What's the technology that makes blogging tick? The answer is RSS--a format that allows bloggers to offer XML-based feeds of their content. It's also the same technology that's incorporated into the websites of media outlets so they can offer material (headlines, links, articles, etc.) syndicated by other sites.As the main technology behind this rapidly growing field of content syndication, RSS is constantly evolving to keep pace with worldwide demand. That's where Developing Feeds with RSS and Atom steps in. It provides bloggers, web developers, and programmers with a thorough explanation of syndication in general and the most popular technologies used to develop feeds.This book not only highlights all the new features of RSS 2.0-the most recent RSS specification-but also offers complete coverage of its close second in the XML-feed arena, Atom. The book has been exhaustively revised to explain: metadata interpretation the different forms of content syndication the increasing use of web services how to use popular RSS news aggregators on the market After an introduction that examines Internet content syndication in general (its purpose, limitations, and traditions), this step-by-step guide tackles various RSS and Atom vocabularies, as well as techniques for applying syndication to problems beyond news feeds. Most importantly, it gives you a firm handle on how to create your own feeds, and consume or combine other feeds.If you're interested in producing your own content feed, Developing Feeds with RSS and Atom is the one book you'll want in hand.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 443 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Keywords: Google ; Computer software ; Reusability ; Internet programming ; Web search engines ; Electronic books ; local
    Abstract: Whether you're a high school student looking for the latest info on your favorite rock group, or a seasoned attorney researching an old case, you're probably using Google. It seems like everyone is. And who can blame them? With access to more than three million documents in over 30 languages, Google is a researcher's dream. It's no wonder, then, that nearly 150 million Google searches are conducted each day. As a result, people are hungry to learn new ways to maximize its usefulness. Truth is, there are dozens upon dozens of techniques to learn--each designed to make your Google search more time-efficient, more productive, and more fun. And Google Hacks , Second Edition has the inside scoop on them all. An absolute must-have guide for anyone who searches the Internet--and these days that's just about everybody-- Google Hacks , Second Edition takes its best-selling predecessor one step further. In plain language, Google Hacks , Second Edition is an updated collection of industrial-strength, real-world tested solutions to practical research problems. Best of all, each of its 100 hacks are easy to read and digest--no confusing terminology or extraneous information to hamper your understanding. And although they can be read in just a few short minutes, when put to use, they can easily save you hours of research time. Now that's bang for your buck!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 221 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: C-Sharp (Computer program language) ; Computer programming ; Electronic books ; local
    Abstract: In the three years since Microsoft made C# available, there have been lots of tweaks to the language. That's because C# is not only essential for making .NET work, it's a big way for Microsoft to attract millions of Java, C and C++ developers to the platform. And C# has definitely made some inroads. Because of its popularity among developers, the language received standardization from ECMA International, making it possible to port C# applications to other platforms. To bolster its appeal, C# 2.0 has undergone some key changes as part of Visual Studio 2005 that will make development with .NET quicker and easier.That's precisely what Visual C# 2005: A Developer's Notebook allows you to do. There are some great new features in C# and this unique "all lab, no lecture" guide covers them all with 50 hands-on projects. Each project explores a new feature, with emphasis on changes that increase productivity, simplify programming tasks, and add functionality to applications.C#'s component-based design combines the productivity of Microsoft's popular Visual Basic with the raw power of C++ for web-based applications. Many reviewers note a similarity between C# and Java--in fact, a new feature that took the Java development team five years to incorporate into Java is now available in C# 2.0. Called "generics", this feature enables developers to reuse and customize their existing code, so they can dramatically cut down the time it takes to develop new applications. Visual C# 2005: A Developer's Notebook is full of no-nonsense code without the usual page-filling commentary. You'll find suggestions for further experimentation, links to on-line documentation, plus practical notes and warnings. The book also tells developers how to acquire, install and configure Visual Studio 2005. Are you a coder to the core? Learn what C# 2.0 can do for you now.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 363 p. , ill. ; , 23 cm
    Keywords: Attention ; Brain ; Listening ; Movement, Psychology of ; Reasoning ; Thought and thinking ; Visual perception ; Electronic books ; local
    Abstract: The brain is a fearsomely complex information-processing environment--one that often eludes our ability to understand it. At any given time, the brain is collecting, filtering, and analyzing information and, in response, performing countless intricate processes, some of which are automatic, some voluntary, some conscious, and some unconscious.Cognitive neuroscience is one of the ways we have to understand the workings of our minds. It's the study of the brain biology behind our mental functions: a collection of methods--like brain scanning and computational modeling--combined with a way of looking at psychological phenomena and discovering where, why, and how the brain makes them happen.Want to know more? Mind Hacks is a collection of probes into the moment-by-moment works of the brain. Using cognitive neuroscience, these experiments, tricks, and tips related to vision, motor skills, attention, cognition, subliminal perception, and more throw light on how the human brain works. Each hack examines specific operations of the brain. By seeing how the brain responds, we pick up clues about the architecture and design of the brain, learning a little bit more about how the brain is put together. Mind Hacks begins your exploration of the mind with a look inside the brain itself, using hacks such as "Transcranial Magnetic Stimulation: Turn On and Off Bits of the Brain" and "Tour the Cortex and the Four Lobes." Also among the 100 hacks in this book, you'll find: Release Eye Fixations for Faster Reactions See Movement When All is Still Feel the Presence and Loss of Attention Detect Sounds on the Margins of Certainty Mold Your Body Schema Test Your Handedness See a Person in Moving Lights Make Events Understandable as Cause-and-Effect Boost Memory by Using Context Understand Detail and the Limits of Attention Steven Johnson, author of "Mind Wide Open" writes in his foreword to the book, "These hacks amaze because they reveal the brain's hidden logic; they shed light on the cheats and shortcuts and latent assumptions our brains make about the world." If you want to know more about what's going on in your head, then Mind Hacks is the key--let yourself play with the interface between you and the world.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xiii, 270 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysis But the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.
    Note: "Solutions and examples for Snort administrators"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xii, 177 p. , ill. ; , 26 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer security ; Computers ; Access control ; Data protection ; Identity theft ; Electronic books ; local
    Abstract: From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances shows you how to regain control of your life. You'll learn how to keep private information private, stop nosy bosses, get off that incredibly annoying mailing list, and more. Unless you know what data is available about you and how to protect it, you're a sitting duck. Computer Privacy Annoyances is your guide to a safer, saner, and more private life. Written by privacy pro Dan Tynan, and based on interviews with privacy experts from all over the globe, Computer Privacy Annoyances serves up real-world advice in bite-sized portions that will help you stop the snoops in their tracks. The book even addresses non-computing threats, from telemarketer-cum-stalkers, thieves at your mailbox, nosy folks in your HR department, cell phone eavesdroppers, and more. The key areas covered include: Privacy at Home Privacy on the Net Privacy at Work Privacy in Public Privacy and Uncle Sam Privacy in the Future Daniel Tynan has written about Internet privacy and security for nearly a decade. His work has appeared in more than 40 national publications. As executive editor at PC World , Tynan edited a special issue on Internet Privacy that won a Grand Neal Award and was a finalist for a National Magazine Award. He has won more than a dozen other honors, including nine Neals, four Maggies, and two Computer Press Association Awards.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 188 p. , ill. (cheifly col. ill.) ; , 24 cm
    DDC: 005.72
    Keywords: Database design ; Database searching ; Information storage and retrieval systems ; Design ; Electronic books ; local
    Abstract: How do you find your way in an age of information overload? How can you filter streams of complex information to pull out only what you want? Why does it matter how information is structured when Google seems to magically bring up the right answer to your questions? What does it mean to be "findable" in this day and age? This eye-opening new book examines the convergence of information and connectivity. Written by Peter Morville, author of the groundbreaking Information Architecture for the World Wide Web , the book defines our current age as a state of unlimited findability. In other words, anyone can find anything at any time. Complete navigability. Morville discusses the Internet, GIS, and other network technologies that are coming together to make unlimited findability possible. He explores how the melding of these innovations impacts society, since Web access is now a standard requirement for successful people and businesses. But before he does that, Morville looks back at the history of wayfinding and human evolution, suggesting that our fear of being lost has driven us to create maps, charts, and now, the mobile Internet. The book's central thesis is that information literacy, information architecture, and usability are all critical components of this new world order. Hand in hand with that is the contention that only by planning and designing the best possible software, devices, and Internet, will we be able to maintain this connectivity in the future. Morville's book is highlighted with full color illustrations and rich examples that bring his prose to life. Ambient Findability doesn't preach or pretend to know all the answers. Instead, it presents research, stories, and examples in support of its novel ideas. Are we truly at a critical point in our evolution where the quality of our digital networks will dictate how we behave as a species? Is findability indeed the primary key to a successful global marketplace in the 21st century and beyond. Peter Morville takes you on a thought-provoking tour of these memes and more -- ideas that will not only fascinate but will stir your creativity in practical ways that you can apply to your work immediately. "A lively, enjoyable and informative tour of a topic that's only going to become more important." --David Weinberger, Author, Small Pieces Loosely Joined and The Cluetrain Manifesto "I envy the young scholar who finds this inventive book, by whatever strange means are necessary. The future ...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 377 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Keywords: Embedded computer systems ; Electronic books ; local
    Abstract: Embedded computer systems literally surround us: they're in our cell phones, PDAs, cars, TVs, refrigerators, heating systems, and more. In fact, embedded systems are one of the most rapidly growing segments of the computer industry today.Along with the growing list of devices for which embedded computer systems are appropriate, interest is growing among programmers, hobbyists, and engineers of all types in how to design and build devices of their own. Furthermore, the knowledge offered by this book into the fundamentals of these computer systems can benefit anyone who has to evaluate and apply the systems.The second edition of Designing Embedded Hardware has been updated to include information on the latest generation of processors and microcontrollers, including the new MAXQ processor. If you're new to this and don't know what a MAXQ is, don't worry--the book spells out the basics of embedded design for beginners while providing material useful for advanced systems designers. Designing Embedded Hardware steers a course between those books dedicated to writing code for particular microprocessors, and those that stress the philosophy of embedded system design without providing any practical information. Having designed 40 embedded computer systems of his own, author John Catsoulis brings a wealth of real-world experience to show readers how to design and create entirely new embedded devices and computerized gadgets, as well as how to customize and extend off-the-shelf systems.Loaded with real examples, this book also provides a roadmap to the pitfalls and traps to avoid. Designing Embedded Hardware includes: The theory and practice of embedded systems Understanding schematics and data sheets Powering an embedded system Producing and debugging an embedded system Processors such as the PIC, Atmel AVR, and Motorola 68000-series Digital Signal Processing (DSP) architectures Protocols (SPI and I2C) used to add peripherals RS-232C, RS-422, infrared communication, and USB CAN and Ethernet networking Pulse Width Monitoring and motor control If you want to build your own embedded system, or tweak an existing one, this invaluable book gives you the understanding and practical skills you need.
    Note: "Create new computers and devices"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 969 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Computer animation ; Handbooks, manuals, etc ; Computer drawing ; Handbooks, manuals, etc ; Computer games ; Programming ; Handbooks, manuals, etc ; Java (Computer program language) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Although the number of commercial Java games is still small compared to those written in C or C++, the market is expanding rapidly. Recent updates to Java make it faster and easier to create powerful gaming applications-particularly Java 3D-is fueling an explosive growth in Java games. Java games like Puzzle Pirates, Chrome, Star Wars Galaxies, Runescape, Alien Flux, Kingdom of Wars, Law and Order II, Roboforge, Tom Clancy's Politika, and scores of others have earned awards and become bestsellers.Java developers new to graphics and game programming, as well as game developers new to Java 3D, will find Killer Game Programming in Java invaluable. This new book is a practical introduction to the latest Java graphics and game programming technologies and techniques. It is the first book to thoroughly cover Java's 3D capabilities for all types of graphics and game development projects. Killer Game Programming in Java is a comprehensive guide to everything you need to know to program cool, testosterone-drenched Java games. It will give you reusable techniques to create everything from fast, full-screen action games to multiplayer 3D games. In addition to the most thorough coverage of Java 3D available, Killer Game Programming in Java also clearly details the older, better-known 2D APIs, 3D sprites, animated 3D sprites, first-person shooter programming, sound, fractals, and networked games. Killer Game Programming in Java is a must-have for anyone who wants to create adrenaline-fueled games in Java.
    Note: "Java gaming & graphics programming"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 243 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.133
    Keywords: Microsoft Visual BASIC ; Handbooks, manuals, etc ; BASIC (Computer program language) ; Handbooks, manuals, etc ; Microsoft .NET Framework ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: When Microsoft introduced the Visual Basic .NET programming language, as part of its move to the .NET Framework two years ago, many developers willingly made the switch. Millions of others, however, continued to stick with Visual Basic 6. They weren't ready for such a radical change, which included an object-oriented environment similar to Java. They liked the old Visual Basic just fine.In an effort to win over those diehard VB6 developers, the company has included a new version of VB.NET in its upcoming next generation release of the Visual Studio .NET development platform. Visual Basic 2005 comes with innovative language constructs, new compiler features, dramatically enhanced productivity and an improved debugging experience. The language's new version is now available in beta release, and Microsoft is encouraging developers to give it a test drive. Visual Basic 2005: A Developer's Notebook provides the ideal test track. With nearly 50 hands-on projects, this practical introduction to VB 2005 will bring you up to speed on all the new features of this language by allowing you to work with them directly. The book summarizes the changes that VB 2005 brings, and tells you how to acquire, install and configure the beta version of VB 2005 SDK. Each project or experiment explores a different feature, with emphasis on changes that can increase productivity, simplify programming tasks, and help you add new functionality to your applications.This one-of-a-kind book also offers suggestions for further experimentation, links to on-line documentation and other sources of information, and practical notes and warnings from the author.The new Developer's Notebooks series from O'Reilly offers an in-depth first look at important new tools for software developers. Emphasizing example over explanation and practice over theory, they focus on learning by doing you'll get the goods straight from the masters, in an informal and code-intensive style. For those who want to get up speed with VB 2005 right away, this is the perfect all lab, no lecture guide.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 735 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.2762
    Keywords: Computer networks ; Programming ; Java (Computer program language) ; Electronic books ; local
    Abstract: The new third edition of this highly regarded introduction to Java networking programming has been thoroughly revised to cover all of the 100+ significant updates to Java Developers Kit (JDK) 1.5. It is a clear, complete introduction to developing network programs (both applets and applications) using Java, covering everything from networking fundamentals to remote method invocation (RMI). Java Network Programming , 3rd Edition includes chapters on TCP and UDP sockets, multicasting protocol and content handlers, servlets, multithreaded network programming, I/O, HTML parsing and display, the Java Mail API, and the Java Secure Sockets Extension. There's also significant information on the New I/O API that was developed in large part because of the needs of network programmers.This invaluable book is a complete, single source guide to writing sophisticated network applications. Packed with useful examples, it is the essential resource for any serious Java developer.
    Note: Includes index. - Previous ed.: Beijing; Sebastopol, Calif.: O'Reilly, 2000
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 291 p. , ill. (some col.) ; , 23 cm
    Edition: 1st ed.
    DDC: 004.165
    Keywords: Apple Computer, Inc. ; Macintosh Division ; History ; Computer industry ; United States ; History ; Macintosh (Computer) ; Electronic books ; local
    Abstract: There was a time, not too long ago, when the typewriter and notebook ruled, and the computer as an everyday tool was simply a vision. Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the groundbreaking Macintosh computer was born. The book traces the development of the Macintosh, from its inception as an underground skunkworks project in 1979 to its triumphant introduction in 1984 and beyond. The stories in Revolution in the Valley come on extremely good authority. That's because author Andy Hertzfeld was a core member of the team that built the Macintosh system software, and a key creator of the Mac's radically new user interface software. One of the chosen few who worked with the mercurial Steve Jobs, you might call him the ultimate insider. When Revolution in the Valley begins, Hertzfeld is working on Apple's first attempt at a low-cost, consumer-oriented computer: the Apple II. He sees that Steve Jobs is luring some of the company's most brilliant innovators to work on a tiny research effort the Macintosh. Hertzfeld manages to make his way onto the Macintosh research team, and the rest is history. Through lavish illustrations, period photos (many never before published), and Hertzfeld's vivid first-hand accounts, Revolution in the Valley reveals what it was like to be there at the birth of the personal computer revolution. The story comes to life through the book's portrait of the talented and often eccentric characters who made up the Macintosh team. Now, over 20 years later, millions of people are benefiting from the technical achievements of this determined and brilliant group of people.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xix, 437 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.7137682
    Keywords: Microsoft Exchange server ; Client/server computing ; Electronic mail systems ; Electronic books ; local
    Abstract: Ask network administrators what their most critical computer application is, and most will say "email" without a moment's hesitation. If you run a network powered by Windows 2000 or Windows Server 2003, Microsoft Exchange occupies much of your time. According to Microsoft, 110 million Exchange seats have been deployed, but 60% of you are still running Exchange 5.5. That's a problem, because the difference between version 5.5 and the more efficient Exchange 2000 and Exchange Server 2003 is profound.Don't fret. Exchange Server Cookbook offers you a comprehensive how-to guide to these newer versions of Exchange. You'll find quick solutions for the most common tasks you need to perform--everything from installation and maintenance to configuration and optimization, with proven recipes for the most useful tools and utilities. The book also has solutions to some uncommon tasks (that you may not know are possible) and advanced procedures that aren't part of day-to-day operations. These include tasks for critical situations, such as using a recovery storage group.Our reliable desktop reference even shows you how to write scripts for Exchange management and deployment tasks. That's right. While not every Exchange job can be scripted, many can, and we provide lots of working VBScript examples for accomplishing particular goals. Whatever your particular need, you'll find it quickly, because chapters in this Cookbook are laid out by recipe, with cross references to other pertinent solutions in the book. With this guide, you'll learn: The relationship between Exchange and Active Directory When to use the GUI, the command line, or scripting How to prepare forests, domains, and servers How to use Group Policy to control Exchange Diagnostic logging, measure performance, and administrative privileges Recipient management: user accounts, mailboxes, mail-enabled groups Mailbox and public folder database management Message routing and transport functions Security, backup, restore, and recovery operations For every question you have about Exchange 2000 or Exchange Server 2003, our Cookbook has the answer--one that you can find and implement without a moment's hesitation.
    Note: "Step-by-step procedures and scripts for administrators"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 445 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: FreeBSD ; OpenBSD ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Abstract: FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure.FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems.Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate.Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 280 p. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.13
    Keywords: GNU Emacs ; Make (Computer file) ; Utilities (Computer programs) ; Electronic books ; local
    Abstract: The utility simply known as make is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, make still turns up to this day as the central engine in most programming projects; it even builds the Linux kernel. In the third edition of the classic Managing Projects with GNU make , readers will learn why this utility continues to hold its top position in project build software, despite many younger competitors. The premise behind make is simple: after you change source files and want to rebuild your program or other output files, make checks timestamps to see what has changed and rebuilds just what you need, without wasting time rebuilding other files. But on top of this simple principle, make layers a rich collection of options that lets you manipulate multiple directories, build different versions of programs for different platforms, and customize your builds in other ways. This edition focuses on the GNU version of make , which has deservedly become the industry standard. GNU make contains powerful extensions that are explored in this book. It is also popular because it is free software and provides a version for almost every platform, including a version for Microsoft Windows as part of the free Cygwin project. Managing Projects with GNU make , 3rd Edition provides guidelines on meeting the needs of large, modern projects. Also added are a number of interesting advanced topics such as portability, parallelism, and use with Java. Robert Mecklenburg, author of the third edition, has used make for decades with a variety of platforms and languages. In this book he zealously lays forth how to get your builds to be as efficient as possible, reduce maintenance, avoid errors, and thoroughly understand what make is doing. Chapters on C++ and Java provide makefile entries optimized for projects in those languages. The author even includes a discussion of the makefile used to build the book.
    Note: Includes index. - Rev. ed. of: Managing projects with Make / Andrew Oram and Steve Talbott
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 350 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.26/8
    Keywords: Linux ; Electronic data processing ; Distributed processing ; High performance computing ; Operating systems (Computers) ; Parallel processing (Electronic computers) ; Electronic books ; local
    Abstract: To the outside world, a "supercomputer" appears to be a single system. In fact, it's a cluster of computers that share a local area network and have the ability to work together on a single problem as a team. Many businesses used to consider supercomputing beyond the reach of their budgets, but new Linux applications have made high-performance clusters more affordable than ever. These days, the promise of low-cost supercomputing is one of the main reasons many businesses choose Linux over other operating systems.This new guide covers everything a newcomer to clustering will need to plan, build, and deploy a high-performance Linux cluster. The book focuses on clustering for high-performance computation, although much of its information also applies to clustering for high-availability (failover and disaster recovery). The book discusses the key tools you'll need to get started, including good practices to use while exploring the tools and growing a system. You'll learn about planning, hardware choices, bulk installation of Linux on multiple systems, and other basic considerations. Then, you'll learn about software options that can save you hours--or even weeks--of deployment time.Since a wide variety of options exist in each area of clustering software, the author discusses the pros and cons of the major free software projects and chooses those that are most likely to be helpful to new cluster administrators and programmers. A few of the projects introduced in the book include: MPI, the most popular programming library for clusters. This book offers simple but realistic introductory examples along with some pointers for advanced use. OSCAR and Rocks, two comprehensive installation and administrative systems openMosix (a convenient tool for distributing jobs), Linux kernel extensions that migrate processes transparently for load balancing PVFS, one of the parallel filesystems that make clustering I/O easier C3, a set of commands for administering multiple systems Ganglia, OpenPBS, and cloning tools (Kickstart, SIS and G4U) are also covered. The book looks at cluster installation packages (OSCAR & Rocks) and then considers the core packages individually for greater depth or for folks wishing to do a custom installation. Guidelines for debugging, profiling, performance tuning, and managing jobs from multiple users round out this immensely useful book.
    Note: "A comprehensive getting started guide"--Cover. - Includes bibliographical references (p. 329-337) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xviii, 439 p. , col. ill. ; , 26 cm
    DDC: 775
    Keywords: Adobe Photoshop elements ; Image processing ; Digital techniques ; Photography ; Digital techniques ; Electronic books ; local
    Abstract: Are you ready for an Elements book that breaks all the rules-again? Like the best-selling former edition, The Photoshop Elements 4 Book for Digital Photographers breaks new ground by doing something for digital photographers that's rarely done-it cuts through the bull and shows you exactly "how to do it." It's not a bunch of theory; it doesn't challenge you to come up with your own settings or figure things out on your own. Instead, it does something that virtually no other Elements book has ever done-it tells you flat-out which settings to use, when to use them, and why. If you're looking for one of those "tell-me-everything-about-the-Unsharp-Mask-filter" books, this isn't it. You can grab any other Elements book on the shelf, because they all do that. Instead, this book gives you the inside tips and tricks of the trade for correcting, editing, sharpening, retouching, and presenting your photos like a pro. You'll be absolutely amazed at how easy and effective these techniques are-once you know the secrets. Newly updated to cover Photoshop Elements 4, this full-color, easy-to-follow guide includes new tips that take advantage of Elements 4's hottest new features, including the Magic Selection Brush, which offers a quick way to make accurate selections in your photos; Magic Extractor, which lets you select an image and instantly remove the background; Auto Red Eye and Auto Skin tone tools; cool slideshow effects (text, graphics, narration, pans and zooms, and more); online sharing service; and more! This book is for Windows users only.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: 149 p. , col. ill. ; , 22 cm
    Keywords: Apple computer ; Computer storage devices ; Storage area networks (Computer networks) ; Electronic books ; local
    Abstract: Apple's exciting new enterprise-class file system offers high-speed access to centralized shared data. This handy booklet provides invaluable setup, configuration, and troubleshooting tips. Designed as a reference, you'll find clear explanations of everything from multiple-seat topologies to working with Xsan Admin software, plus useful illustrations and schematic diagrams. A must for every Xsan installation.
    Note: Cover title
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xii, 232 p. , ill. ; , 23 cm
    Keywords: Digital video ; Handbooks, manuals, etc ; Video Recording ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Corporations, government offices, and academic institutions have long used video to educate and inform. The only thing that's changed is the people who are producing them: With low-priced equipment and easy-to-use software flooding the market, now you're the person behind the camera, not some high-priced video specialist! This is the guide for you, then-and all of the other nonprofessionals who've been called upon to produce top-quality videos. Long on essentials-like where to place the camera, how to connect microphones, and which font to use in titles-and short on theory, this guide focuses instead on the simple steps and best practices needed to produce great videos. Veteran author Jan Ozer gives you the lowdown on shooting, audio, and lighting before describing the workflow and procedures involved in converting raw DV footage to streaming video and DVDs, and distributing the final product. For software-specific guidance, you can purchase downloadable PDF workbooks that use the book's projects to walk you through the production process.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 308 p. , ill. ; , 23 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: "This set of articles captures decades of in-the trenches experience across a broad spectrum of software topics. Joe Marasco has the scars and the smarts to articulate patterns of success that can satisfy a broad audience. He uses mathematics, physics, common sense, and storytelling along with a no-candy-coating style to provide unique perspectives on significant problems in delivering software results as a business. Whether you are a computer science theoretician, a frustrated software project manager, a successful businessman, or a skeptical programmer, you will learn a lot from this compilation." - Walker Royce , Vice President, IBM Software Services-Rational, and author of Software Project Management (Addison-Wesley) "Joe Marasco's readable essays on managing successful projects show that software development managers-no different from all managers-must embrace the fundamentals of management if they are to succeed: working through people and process to be decisive, dealing with politics, keeping on schedule, and, yes, shipping a well-developed product. Marasco uses plain English to explain many integrated skills, ranging from estimating the time it will take to really do things, to negotiating effectively, even to eloquently describing three distinct phases of our personal development. He frequently uses a 'can we talk?' conversation with a fictional colleague, Roscoe Leroy, in a Socratic dialogue to illustrate the two sides to a point in many areas (reminiscent of Galileo's writings to explain his then-heretical views); in this case, Marasco's advice will help technology professionals escape the clutches of pervasive Dilbertian incompetence, and enable readers to be more effective in our ever-changing world." - Carl Selinge r, author of Stuff You Don't Learn in Engineering School: Skills for Success in the Real World (Wiley-IEEE Press), and contributing editor of IEEE Spectrum magazine The new software management classic: in-the-trenches wisdom from legendary project leader Joe Marasco Over the course of a distinguished career, Joe Marasco earned a reputation as the go-to software project manager: the one to call when you were facing a brutally tough, make-or-break project. Marasco reflected on his experiences in a remarkable series of "Franklin's Kite" essays for The Rational Edge , Rational and IBM's online software development magazine. Now, Marasco collects and updates those essays, bringing his unique insights (and humor) to everythi...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Apache (Computer file : Apache Group) ; Web servers ; Computer programs ; Web sites ; Security measures ; Computer programs ; Electronic books ; local
    Abstract: "Ryan Barnett has raised the bar in terms of running Apache securely. If you run Apache, stop right now and leaf through this book; you need this information." -Stephen Northcutt, The SANS Institute The only end-to-end guide to securing Apache Web servers and Web applications Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications. Firewalls and SSL won't protect you: you must systematically harden your Web application environment. Preventing Web Attacks with Apache brings together all the information you'll need to do that: step-by-step guidance, hands-on examples, and tested configuration files. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against. Exploits discussed include: buffer overflows, denial of service, attacks on vulnerable scripts and programs, credential sniffing and spoofing, client parameter manipulation, brute force attacks, web defacements, and more. Barnett introduces the Center for Internet Security Apache Benchmarks, a set of best-practice Apache security configuration actions and settings he helped to create. He addresses issues related to IT processes and your underlying OS; Apache downloading, installation, and configuration; application hardening; monitoring, and more. He also presents a chapter-length case study using actual Web attack logs and data captured "in the wild." For every sysadmin, Web professional, and security specialist responsible for Apache or Web application security. With this book, you will learn to Address the OS-related flaws most likely to compromise Web server security Perform security-related tasks needed to safely download, configure, and install Apache Lock down your Apache httpd.conf file and install essential Apache security modules Test security with the CIS Apache Benchmark Scoring Tool Use the WASC Web Security Threat Classification to identify and mitigate application threats Test Apache mitigation settings against the Buggy Bank Web application Analyze an Open Web Proxy Honeypot to gather crucial intelligence about attackers Master advanced techniques for detecting and preventing intrusions
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 1142 p. , ill. ; , 24 cm
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!" James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker Jamesaccusource.net "Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003." Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com "Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security." Bob Reinsch bob.reinsch@fosstraining.com " Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information." Richard Siddaway, MCSE rsiddaw@hotmail.com "Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security." Michael VonTungeln, MCSE, CTT mvontung@yahoo.com "I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it. Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all." Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net "R...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Boston, Mass. ; : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xx, 569 p. , ill. ; , 24 cm
    DDC: 004
    Keywords: Computer science ; Forensic sciences ; Electronic books ; local
    Abstract: The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools-including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for "dead analysis" Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xv, 127 p. , col. ill. ; , 23 cm
    DDC: 005.36
    Keywords: Microsoft Excel (Computer file) ; Handbooks, manuals, etc ; Business ; Computer programs ; Handbooks, manuals, etc ; Electronic spreadsheets ; Computer programs ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Excel can be daunting: that empty grid just stares you in the face when you start the program, challenging you to fill in the cells with thenumbers you need to crunch. How do you start? What do you do? Creating Spreadsheets and Charts in Excel: Visual QuickProject Guide answers those questions and puts you on the straight track to getting the job done. This new addition to Peachpit's Visual QuickProject Guide series by Excel guru Maria Langer uses full color screen shots and numbered steps to walk you through the process of creating an Excel workbook file. You'll learn how to build a worksheet from the ground up, enter data, write formulas, and copy cell contents. You'll then see how to duplicate and modify worksheets to fine-tune them for your needs. The project's steps also include creating a consolidation worksheet, formatting all worksheets, creating a colorful pie chart, and setting options for printing your work. There's no time wasted in this book; Maria shows you the quickest and most efficient way to perform each task and doesn't waste paper with lengthy explanations or alternative methods. This slim book is all you'll need to get started creating spreadsheets and charts with Excel.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 798 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: "The book you are about to read will arm you with the knowledge you need to defend your network from attackers-both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." -Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security-one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." -Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." -Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." -Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes-resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools-including Sguil, Argus, and Ethereal-to mine network traffic for full content, session, statistical, and ale...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Note: Includes bibliographical references (p. [389]-395) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 702 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    DDC: 005.1
    Keywords: Linux ; Application software ; Development ; Electronic books ; local
    Abstract: "The first edition of this book has always been kept within arm's reach of my desk due to the wonderful explanations of all areas of the Linux userspace API. This second edition greatly overshadows the first one, and will replace it." --Greg Kroah-Hartman, Linux kernel programmer Develop Software that Leverages the Full Power of Today's Linux Linux Application Development, Second Edition, is the definitive reference for Linux programmers at all levels of experience, including C programmers moving from other operating systems. Building on their widely praised first edition, leading Linux programmers Michael Johnson and Erik Troan systematically present the key APIs and techniques you need to create robust, secure, efficient software or to port existing code to Linux. This book has been fully updated for the Linux 2.6 kernel, GNU C library version 2.3, the latest POSIX standards, and the Single Unix Specification, Issue 6. Its deep coverage of Linux-specific extensions and features helps you take advantage of the full power of contemporary Linux. Along the way, the authors share insights, tips, and tricks for developers working with any recent Linux distribution, and virtually any version of Unix. Topics include Developing in Linux: understanding the operating system, licensing, and documentation The development environment: compilers, linker and loader, and unique debugging tools System programming: process models, file handling, signal processing, directory operations, and job control Terminals, sockets, timers, virtual consoles, and the Linux console Development libraries: string matching, terminal handling, command-line parsing, authentication, and more Hundreds of downloadable code samples New to this edition The GNU C library (glibc), underlying standards, and test macros Writing secure Linux programs, system daemons, and utilities Significantly expanded coverage of memory debugging, including Valgrind and mpr Greatly improved coverage of regular expressions IPv6 networking coverage, including new system library interfaces for using IPv6 and IPv4 interchangeably Coverage of strace, ltrace, real-time signals, poll and epoll system calls, popt library improvements, Pluggable Authentication Modules (PAM), qdbm, and much more Improved index and glossary, plus line-numbered code examples
    Note: Includes bibliographical references (p. 679-682) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 470 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: "With this book, Ted Neward helps you make the leap from being a good Java enterprise developer to a great developer!" -John Crupi, Sun Distinguished Engineer coauthor, Core J2EE Patterns If you want to build better Java enterprise applications and work more efficiently, look no further. Inside, you will find an accessible guide to the nuances of Java 2 Platform, Enterprise Edition (J2EE) development. Learn how to: Use in-process or local storage to avoid the network, see item 44 Set lower isolation levels for better transactional throughput, see item 35 Use Web services for open integration, see item 22 Consider your lookup carefully, see item 16 Pre-generate content to minimize processing, see item 55 Utilize role-based authorization, see item 63 Be robust in the face of failure, see item 7 Employ independent JREs for side-by-side versioning, see item 69 Ted Neward provides you with 75 easily digestible tips that will help you master J2EE development on a systemic and architectural level. His panoramic look at the good, the bad, and the ugly aspects of J2EE development will address your most pressing concerns. Learn how to design your enterprise systems so they adapt to future demands. Improve the efficiency of your code without compromising its correctness. Discover how to implement sophisticated functionality that is not directly supported by the language or platform. After reading Effective Enterprise Java , you will know how to design and implement better, more scalable enterprise-scope Java software systems.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 444 p. , ill. ; , 24 cm
    DDC: 004.6/5
    Keywords: Computer network architectures ; Web services ; Electronic books ; local
    Abstract: Praise for Understanding SOA with Web Services "This book does the best job of describing not only "where we are" in the timeline of enterprise integration efforts, but also providing strategic guidance for where we need to be. The authors have worked diligently to break down the integration problem into functional areas, and send you down the path of strategic integration utilizing XML Web Services and Service-Oriented Architecture as the vehicle of choice. You will love this book!" - Daniel Edgar, Architect, Portland General Electric "E-Government needs a comprehensive guide to SOA with Web Services standards and best practices for implementation to get from the current "as is" to the future "to be" architecture. This book meets that need superbly." - Brand Niemann, Ph.D., Co-Chair, Semantic (Web Services) Interoperability Community of Practice, U.S. Federal CIO Council. "There are many books on SOA available today, but Understanding SOA with Web Services stands out from the pack because of its thorough, outstanding coverage of transactions, reliability, and process. Where most SOA books focus on integration and architecture basics, Lomow and Newcomer fearlessly dive into these more advanced, yet critical, topics, and provide a depth of treatment unavailable anywhere else." - Jason Bloomberg, Senior Analyst, ZapThink LLC "This book provides a wealth of content on Web Services and SOA not found elsewhere. Although the book is technical in nature, it is surprisingly easy to read and digest. Managers who would like to keep up with the most effective technical strategies will find this book required reading." - Hari Mailvaganam, University of British Columbia, Vancouver "I have been teaching companies and lecturing on SOA and XML Web Services for years and sort of felt at home with these technologies. I didn't think anyone else could teach me anything more significant about either of them. This book surprised me. If a person teaching SOA and Web Services can learn something from this book, you can too. This book is a must-read for all architects, senior developers, and concerned CTOs." - Sayed Y. Hashimi, SOA Consultant "Newcomer and Lomow are no doubt the industry luminaries on the topics of Web Services, Service-Oriented Architecture, and integration. This book is sure to be a must-have for developers and architects looking to take advantage of the coming wave of standards-based, loosely coupled integration." - Ronald Schmelzer, Senior Analyst...
    Note: Includes bibliographical references (p. 421-430) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 273 p. , ill. ; , 24 cm
    DDC: 658.4
    Keywords: Industrial management ; Organizational change ; Technological innovations ; Electronic books ; local
    Abstract: "All that have ever tried to impose change in their organization will immediately recognize and truly value the in-depth knowledge and experience captured in this book. It contains a collection of eye-openers that is a treasure chest for pioneers of new organizational ideas, A fantastic toolbox for use in future missions!" -Lise B. Hvatum, product development manager, Schlumberger "If you have need of changing your organization, and especially of introducing new techniques, then you want to understand what is in this book. It will help you avoid common pitfalls that doom many such projects and will show you a clear path to success. The techniques are derived from the experience of many individuals and organizations. Many are also fun to apply. This stuff is really cool-and really hot." -Joseph Bergin, professor of computer science, Pace University, New York "If change is the only guarantee in life, why is it so hard to do? As this book points out, people are not so much resistant to change itself as they are to being changed. Mary Lynn and Linda have successfully used the pattern form to capture and present the recurring lessons of successful change efforts and have placed a powerful knowledge resource in the hands of their readers." -Alan O'Callaghan, researcher, Software Technology Research Laboratory, De Montfort University, United Kingdom "The most difficult part of absorbing patterns, or any technology, into an organization is overcoming the people issues. The patterns in this book are the documentation of having gone through that experience, giving those that dare push the envelope a head start at success." -David E. DeLano, IBM Pervasive Computing "If you have ever wondered how you could possibly foster any cultural changes in your organization, in this book you will find a lot of concrete advice for doing so. I recommend that everyone read this book who has a vast interest in keeping his or her organization flexible and open for cultural change." -Jutta Eckstein, Independent Consultant, Objects In Action Author of Agile Software Development in the Large 48 Patterns for Driving and Sustaining Change in Your Organization Change. It's brutally tough to initiate, even harder to sustain. It takes too long. People resist it. But without it, organizations lose their competitive edge. Fortunately, you can succeed at making change. In Fearless Change, Mary Lynn Manns and Linda Rising illuminate 48 proven techniques, or patterns, for im...
    Note: Includes bibliographical references (p. 261-266) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Upper Saddle River, New Jersey : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xvi, 234 p. , ill. ; , 24 cm
    DDC: 658.812
    Keywords: Corporations ; Public relations ; Customer relations ; Electronic books ; local
    Abstract: "Establishing a reputation for customer trust, transparency, and advice will be the new differentiator. Congratulations to Glen Urban for moving 'best marketing practice' up a notch." -Philip Kotler, author of several books on marketing, including Kotler on Marketing, Marketing From A to Z, Lateral Marketing, Ten Deadly Marketing Sins, Social Marketing, and the best-selling and authoritative textbook, Marketing Management, now in its 12th edition. Traditional "push/pull" marketing no longer works. Even highly-touted customer relationship initiatives are failing. Smart companies are pioneering an entirely new route to higher margins and sustainable competitive advantage: customer advocacy. This book reveals how it works, why it works, and how to make it work for your company. In today's environment, you must build unprecedented trust among customers who have more information, options, and sophistication than ever. You must transcend "relationship marketing" to focus on maximizing customer interests and deepening customer partnerships. It's not easy. But if you do it, you gain immense opportunities your competitors simply can't touch. Glen Urban offers a complete blueprint for getting there. You'll learn how to improve on all eight elements of customer advocacy, from transparency to partnership. Urban answers frequently asked questions about advocacy strategies, helping you identify and overcome your most significant obstacles. Then, drawing on new case studies, he shows how to align culture, metrics, incentives, and organization, driving effective advocacy throughout your entire organization. Power shift: Why your customers now drive your relationship ...and why they no longer respond to conventional marketing Do your customers trust you now? Assessing your company on eight dimensions of trust Your customers are smarter than you think ...and they'll appreciate being treated that way Tools and plans for moving to customer advocacy Changing culture, people, metrics, incentives, and organization Straight answers on the pitfalls to avoid, and how to get results In today's environment, you must build unprecedented Beyond "relationship marketing": The new route to success with today's empowered customer Don't fight your customers: earn their trust! Craft customer advocacy strategies that work Reduce customer acquisition costs, increase margins, accelerate growth Deepen customer trust, one step at a time Learn from the experiences of today's customer ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Business ; Data processing ; Computer architecture ; Computer software ; Development ; System design ; Electronic books ; local
    Abstract: Praise for Service-Oriented Architecture Compass "A comprehensive roadmap to Service-Oriented Architecture (SOA). SOA is, in reality, a business architecture to be used by those enterprises intending to prosper in the 21st century. Decision makers who desire that their business become flexible can jumpstart that process by adopting the best practices and rules of thumb described in SOA Compass ." -Bob Laird, MCI IT Chief Architect "The book Service-Oriented Architecture Compass shows very clearly by means of real projects how agile business processes can be implemented using Service-Oriented Architectures. The entire development cycle from planning through implementation is presented very close to practice and the critical success factors are presented very convincingly." -Professor Dr. Thomas Obermeier, Vice Dean of FHDW Bergisch Gladbach, Germany "This book is a major improvement in the field. It gives a clear view and all the key points on how to really face a SOA deployment in today's organizations." -Mario Moreno, IT Architect Leader, Generali France "Service-Oriented Architecture enables organizations to be agile and flexible enough to adopt new business strategies and produce new services to overcome the challenges created by business dynamism today. CIOs have to consider SOA as a foundation of their Enterprise Applications Architecture primarily because it demonstrates that IT aligns to business processes and also because it positions IT as a service enabler and maximizes previous investments on business applications. To understand and profit from SOA, this book provides CIOs with the necessary concepts and knowledge needed to understand and adapt it into their IT organizations." -Sabri Hamed Al-Azazi, CIO of Dubai Holding, Sabri "I am extremely impressed by the depth and scale of this book! The title is perfect-when you know where you want to go, you need a compass to guide you there! After good IT strategy leads you to SOA, this book is the perfect vehicle that will drive you from dream to reality. We in DSK Bank will use it as our SOA bible in the ongoing project." -Miro Vichev, CIO, DSK Bank, Bulgaria, member of OTP Group "Service-Oriented Architecture offers a pathway to networking of intra- and inter-corporate business systems. The standards have the potential to create far more flexible and resilient business information systems than have been possible in the past. This book is a must-read for those who care about the future of ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0136068685 ISBN-13: 9780136068686
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxi, 660 p. , ill. ; , 24 cm
    DDC: 005.75/65
    Keywords: IBM Database 2 ; z/OS ; Database management ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Electronic books ; local
    Abstract: A practical guide to DB2 z/OS database administration that is 100 percent focused on running DB2 in z/OS environments The only comprehensive preparation guide for the IBM Certified Database Administrator for DB2 Universal Database V8 z/OS certification Covers database planning, design, implementation, operation, recovery, security, performance, installation, migration, and more Sample test questions help you prepare for both IBM DB2 DBA Tests 700 and 702 IBM DB2 Universal Database Version 8 for z/OS offers enterprises unprecedented opportunities to integrate information, deliver it on demand, and manage it simply and cost-effectively. Now, one of the world's leading DB2 consultants presents the definitive guide to administering DB2 UDB V8 databases in z/OS environments. DB2 for z/OS Version 8 DBA Certification Guide also serves as a key tool for anyone preparing for IBM Certified Database Administrator for DB2 Universal Database V8 for z/OS certification. IBM Gold Consultant Susan Lawson presents hundreds of practical techniques, expert guidelines, and useful tips for every facet of DB2 UDB database administration, including database implementation, operation, recovery, security, auditing, performance, installation, migration, SQL, and more. Coverage includes Understanding the DB2 product family, architecture, attachments, and the DB2 z/OS environment Securing enterprise-class DB2 installations and applications Using SQL to create and manage database objects, and manipulate and retrieve information Mastering key DBA tasks, including loading, reorganizing, quiescing, repairing, and recovering data; recovering and rebuilding indexes; and gathering statistics Implementing data sharing in Parallel Sysplex environments Learning the fundamentals of DB2 application development from the DBA's perspective Leveraging advanced DB2 functions, including stored procedures and other object-relational extensions Optimizing DB2 applications and the DB2 engine for maximum performance Whether you are administering DB2 UDB V8 in z/OS environments, planning to do so, or preparing for DB2 UDB V8 DBA certification, DB2 for z/OS Version 8 DBA Certification Guide will be your single most valuable resource.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 416 p. , ill. ; , 23 cm
    DDC: 006.7/6
    Keywords: Web services ; Electronic books ; local
    Abstract: "Other books claim to present the complete Web services platform architecture, but this is the first one I've seen that really does. The authors have been intimately involved in the creation of the architecture. Who better to write this book?" -Anne Thomas Manes, Vice President and Research Director, Burton Group "This is a very important book, providing a lot of technical detail and background that very few (if any) other books will be able to provide. The list of authors includes some of the top experts in the various specifications covered, and they have done an excellent job explaining the background motivation for and pertinent details of each specification. The benefit of their perspectives and collective expertise alone make the book worth reading." -Eric Newcomer, CTO, IONA Technologies "Most Web services books barely cover the basics, but this book informs practitioners of the "real-world" Web services aspects that they need to know to build real applications. The authors are well-known technical leaders in the Web services community and they helped write the Web services specifications covered in this book. Anyone who wants to do serious Web services development should read this book." -Steve Vinoski, Chief Engineer, Product Innovation, IONA Technologies "There aren't many books that are as ambitious as this one is. The most notable distinguishing factor of this book is that the authors have tried to pair down the specifications for the user and rather than focusing on competing specifications, they focus on complementary ones. Nearly every chapter provides a business justification and need for each feature discussed in the Web services stack. I would recommend this book to developers, integrators, and architects." -Daniel Edgar, Systems Architect, Portland General Electric "Rarely does a project arrive with such a list of qualified and talented authors. The subject matter is timely and significant to the industry. " -Eric Newcomer, author of Understanding SOA with Web Services and Understanding Web Services and Chief Technology officer, IONA The Insider's Guide to Building Breakthrough Services with Today'sNew Web Services Platform Using today's new Web services platform, you can build services that are secure, reliable, efficient at handling transactions, and well suited to your evolving service-oriented architecture. What's more, you can do all that without compromising the simplicity or interoperability that made Web services so ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xvii, 530 p. , ill. ; , 24 cm
    DDC: 006.7
    Keywords: Web sites ; Design ; Electronic books ; local
    Abstract: Tinker with the tools of Web design-in the Garage! Learn how to construct cool and interactive Web sites with this hands-on guide to the world of Web design and usability. In this title from Prentice Hall PTR's Garage Series, author Marc Campbell shows you the "ins and outs" of designing sites with HTML, JavaScript, and CSS as core technologies. Using layout diagrams and graphics to illustrate your journey, Campbell takes you through every step of designing Web sites, from basic layout and usability to uploading your site onto the Web. Want to learn more on a specific topic? Flip to one of the book's "links" that help you delve deeper into certain areas, allowing you to browse the text quickly and easily! Specific topics covered include Managing pop-up windows Working with scripts and style sheets Controlling design space with HTML and CSS Making rollover graphics Using text elements properly Creating e-mail links and hyperlinks Embedding media in Web pages Choosing a Web host Testing and uploading Web sites Whether you're new to Web design or you "speak" HTML as a second language, Web Design Garage will help you discover the solutions you need to create fun and effective Web sites.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xv, 476 p. , ill. ; , 24 cm
    DDC: 621.389/28
    Keywords: Biometric identification ; Identification ; Automation ; Pattern recognition systems ; Electronic books ; local
    Abstract: A breakthrough approach to improving biometrics performance Constructing robust information processing systems for face and voice recognition Supporting high-performance data fusion in multimodal systems Algorithms, implementation techniques, and application examples Machine learning: driving significant improvements in biometric performance As they improve, biometric authentication systems are becoming increasingly indispensable for protecting life and property. This book introduces powerful machine learning techniques that significantly improve biometric performance in a broad spectrum of application domains. Three leading researchers bridge the gap between research, design, and deployment, introducing key algorithms as well as practical implementation techniques. They demonstrate how to construct robust information processing systems for biometric authentication in both face and voice recognition systems, and to support data fusion in multimodal systems. Coverage includes: How machine learning approaches differ from conventional template matching Theoretical pillars of machine learning for complex pattern recognition and classification Expectation-maximization (EM) algorithms and support vector machines (SVM) Multi-layer learning models and back-propagation (BP) algorithms Probabilistic decision-based neural networks (PDNNs) for face biometrics Flexible structural frameworks for incorporating machine learning subsystems in biometric applications Hierarchical mixture of experts and inter-class learning strategies based on class-based modular networks Multi-cue data fusion techniques that integrate face and voice recognition Application case studies
    Note: Includes bibliographical references (p. 427-456) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxxv, 1150 p. , ill. ; , 24 cm. +
    Edition: 4th ed.
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; UNIX Shells ; Electronic books ; local
    Abstract: The world's #1 shell programming book-now fully updated for Linux and more! UNIX Shells by Example is the world's #1 shell programming book, from the world's #1 shell programming instructor: Ellie Quigley. In UNIX Shells by Example, Fourth Edition, Quigley has thoroughly updated her classic and delivers the information today's shell programmers need most-including comprehensive coverage of Linux shell programming with bash! Drawing on 20 years' experience as a shell programming instructor, Quigley guides you through every facet of programming all leading UNIX/Linux shells: bourne, bash, korn, C, and tcsh. Quigley illuminates each concept with up-to-date, classroom-tested code examples designed to help you jump-start your own projects. She also systematically introduces awk, sed, and grep for both UNIX and GNU/Linux . . . making this the only shell programming book you'll ever need! New in this edition: Comprehensive coverage of Linux shell programming with bash Shell Programming QuickStart: makes first-time shell programmers productive in just 15 pages Complete, practical debugging chapter Updated coverage of the latest UNIX and GNU/Linux versions of awk, sed, and grep Shell programming for sysadmins: walks you through key UNIX and Linux system shell scripts Completely updated: Shell programming fundamentals: what shells are, what they do, how they work Choosing the right shell for any application Nearly 50,000 UNIX/Linux sysadmins, developers, and power users have used previous editions of UNIX Shells by Example to become expert shell programmers. With UNIX Shells by Example, Fourth Edition, you can, too-even if you're completely new to shell programming. Then, once you're an expert, you'll turn to this book constantly as the best source for reliable answers, solutions, and code. About the CD-ROM Comprehensive shell programming code library: all source code and data files for this book's hundreds of example programs.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR ; | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 395 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Praise for Rapid J2EE Development "The author provides a good survey of the technologies and approaches for rapid development in the J2EE arena. He touches on all areas that should be of interest to a reader, from design through testing. He illustrates the different phases of rapid development by going into several technologies in depth, and he also lists or otherwise mentions other available technologies. I would recommend this book to anyone looking to get started with developing J2EE applications." -Beth Stearns, Consultant, ComputerEase Publishing "This book has a lot of great material in it. The author really shows his experience in the subject matter. The content is excellent. I haven't seen another book that is as comprehensive or contains as many real-world lessons learned." -Madhu Siddalingaiah, Consultant, SEA Corporation "I think the book does a good job of presenting a set of processes and technologies that enable rapid development. I think this is an extremely useful book, and I would recommend it to others." -Satadip Dutta, Software Engineer, HP "The author skillfully presents a collection of tools, technologies and processes that facilitate rapid development of J2EE applications. I see this book as a valuable addition to any company bookshelf, especially given its broad application across the software lifecycle. It's also quite amazing that a Google search does not reveal any existing publications with this title. This book should neatly fill that hole." -Martin Westacott, Director and Senior Consultant, Solstice Software Limited, U.K. "If you ever needed to put some polish to your J2EE development understanding or would like to move into the role of Senior J2EE Developer, then this is the book for you. The author covers everything you need to take you from design to coding to build process. Along the way he introduces some new valuable 'leading-edge' technologies. All this will leave you with good capabilities to tackle most J2EE projects confidently." -Shane Griggs, J2EE Architect Learn to accelerate J2EE development, from design through testing and beyond. Covers agile development, model-driven architecture, code generation, aspect-oriented programming, test-driven development, and much more. An essential resource for every J2EE developer, project leader, and manager. J2EE is today's premier platform for enterprise-level development, but it's difficult to deliver J2EE solutions as quickly as today's businesses need them. This...
    Note: Includes bibliographical references (p. 375-377) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxi, 366 p. , ill. ; , 25 cm
    DDC: 338.54
    Keywords: Business forecasting ; Economic forecasting ; Economic indicators ; Electronic books ; local
    Abstract: Every day, stocks, bonds, and currencies bounce wildly in response to new economic indicators. Money managers obsess over those statistics, because they provide crucial clues about the future of the economy and the financial markets. Now you can use these indicators to make smarter investment decisions, just like the professionals do.You don't need an economics degree, or a CPA... just this easy-to-use book. Former TIME Magazine senior economics reporter Bernard Baumohl has done the impossible: he's made economic indicators fascinating . Using real-world examples and stories,Baumohl illuminates every U.S. and foreign indicator that matters.Where to find them.What they look like. What the insiders know about their track records. And exactly how to interpret them. Whether you're an investor,broker, portfolio manager, researcher, journalist,or student, you'll find this book indispensable.Nobody can predict the future with certainty. But The Secrets of Economic Indicators will get you as close as humanly possible. What the numbers really mean... ...to stocks, bonds, rates, currencies, and you Ahead of the curve: spotting turning points Calling recessions and recoveries in time to profit from them Leading indicators: where's the economy really heading Decoding initial unemployment claims, housing starts, the yield curve, and other predictors Beyond the borders Why foreign indicators are increasingly important-and how to use them Making sense of indicators in conflict What to do when the numbers disagree Finding the data Free web resources for the latest economic data Investments "This is the most up-to-date guide to economic indicators and their importance to financial markets in print. For anyone trying to follow the economic data, this should be next to your computer so that you can understand and find the data on the Internet." David Wyss, Chief Economist, Standard and Poor's "I find Baumohl's writing fascinating. Just about anyone who's serious about understanding which way the economy is headed will want to read this book. It could be a classic." Harry Domash, Columnist for MSN Money and Publisher, Winning Investing Newsletter "Every business person or investor should keep a copy of Baumohl's book close-at-hand. It is great, at long last, to have someone who has eliminated what may have been so perplexing to so many and to have done so with such remarkable clarity." Hugh Johnson, Chief Investment Officer, First Albany "Bernie Baumohl has writt...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...