Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (209)
  • BVB
  • 2000-2004  (209)
  • Safari Tech Books Online  (209)
  • Beijing ; : O'Reilly  (161)
  • Boston, MA : Addison-Wesley  (48)
Datasource
  • MPI Ethno. Forsch.  (209)
  • BVB
  • BSZ  (1)
  • GBV  (1)
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: JavaServer pages ; Java (Computer program language) ; Servlets ; Electronic books ; local
    Abstract: Servlets and JavaServer Pages™ is the first complete guide to building dynamic Java-based Web applications using the new JavaServer Pages 2.0 and Servlets 2.4. Servlets and JavaServer Pages (JSP) provide a robust solution to developing large, complex Web applications, including multiserver projects. In addition to built-in security, portability, and a Web server, they offer developers the freedom to work with any operating system that supports Java-be it Linux, Windows, OSX, or Solaris. This authoritative book begins by explaining how to set up a Servlet and JSP development environment, including a discussion of containers, Java support, and installing and configuring Tomcat. The authors then thoroughly explore servlets and JSP, including significant coverage of custom tag libraries, newly available filters, and popular servlet and JSP design patterns. Readers can then test-drive the knowledge gained by constructing a book-support Web site. Among the topics covered in-depth are: Exception handling JavaBeans and the new JSP Expression Language (JSP EL) The JavaServer Pages Standard Tag Library (JSTL) and coding custom tag libraries Filters Error handling Session and state management Security Design patterns, including Struts Internationalization Multiclient support Database connectivity The actual book-support site (www.jspbook.com) features frequently asked questions, working code examples, and references. With Servlets and JavaServer Pages™ as their guide, readers will learn how to fully harness the power of these flexible Java technologies. 0321136497B05082003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Inside Java™ 2 Platform Security , the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java experts at Sun Microsystems, provides a detailed look into the central workings of the Java security architecture and describes tools and techniques for successful implementation on even the most demanding network computing environment. While Java has always provided a stronger security model than other platforms, this book reviews all the methods and practices required to improve security without sacrificing functionality. With tips on how to customize, extend, and refine the Java security architecture, users will have everything they need to protect their information assets from both external and internal threats. This book's in-depth coverage encompasses security architecture, deployment, customization, new developments, and much more. Security fundamentals Secure class loading Specifying fine-grained security policy Enforcing security policy with AccessController, SecurityManager, and more Digital certificates, certification paths, signed code, JAAS, and other authentication measures Java-based cryptography with code examples JSSE, Java GSS-API, and RMI for network security Previews of other platforms for security, including Java Card, J2ME and Jini Designed for both the system administrator and software practitioner, this book delivers vital knowledge for building and maintaining a secure system using the Java 2 platform. With detailed code and usage examples throughout, Inside Java™ 2 Platform Security, Second Edition , is an indispensable resource for all platform security needs. The Java™ Series is supported, endorsed, and authored by the creators of the Java technology at Sun Microsystems, Inc. It is the official place to go for complete, expert, and definitive information on Java technology. The books in this Series provide the inside information you need to build effective, robust, and portable applications and applets. The Series is an indispensable resource for anyone targeting the Java™ 2 platform.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Java (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: .NET for Java Developers is the definitive guide to leveraging your Java programming experience in the .NET environment. Understanding the similarities and differences between the C# and Java APIs enables Java programmers to quickly begin rapid application Windows development using C#. The numerous code examples, which have been tested using Visual Studio® .NET 2003 and Java 1.4, show readers how to create feature-rich .NET applications by translating Java coding practices into C#. The authors begin by detailing the .NET Framework and then immediately introduce readers to coding and the Visual Studio® .NET IDE. They compare the features of C# and Java, and provide a systematic analysis of how the two languages relate to each other. Readers cover the essentials of C# programming, from object creation to event programming, before moving into advanced areas, such as database access, XML processing, GUI programming, and reflection. Key topics that explain how to do smart C# programming rather than emulating Java code in C#: Database access Inheritance and polymorphism Thread programming Garbage collection and memory management C# application deployment Delegates Processing XML .NET for Java Developers provides Java developers, programmers, and architects with experience-based advice for a successful transition into the .NET environment. 0672324024B06242003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Visual Basic® .NET Power Coding is the experienced developer's guide to mastering advanced Visual Basic .NET concepts. Paul Kimmel saves readers time and money by providing thorough explanations of essential topics so you can quickly begin creating robust programs that have fewer bugs. He also demonstrates important concepts by using numerous real-world examples that include working code that has been tested against Visual Basic .NET 2003. After a brief review of language idioms, Kimmel moves to more advanced techniques that help programmers solve their most challenging problems. Central to advanced development and deployment are chapters on security, Web services, ASP.NET programming, COM Interop, and Remoting. This book also covers thin client programming, which offers businesses a real solution to managing deployment and upgrades with Windows Forms using Reflection and HTTP. An appendix walks readers through migrating Visual Basic 6.0 applications to Visual Basic .NET. A companion Web site includes the complete downloadable source code, extensive reusable examples, and updates from the author. This book can be read cover-to-cover or used as a reference to answer questions faced by experienced VB .NET developers, including: Chapter 4: What can you do with Reflection technology? Chapter 6: How can you safely incorporate multithreaded behavior into Visual Basic .NET applications? Chapter 8: How would you serialize objects and implement Remoting for distributed projects? Chapter 14: How do you return an ADO.NET DataSet from a Web service? Chapter 18: What are the best practices for securing Web applications? Visual Basic® .NET Power Coding empowers developers to exploit all the advanced features of Visual Basic .NET. 0672324075B06062003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Language: English
    Pages: x, 179 p. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.6'92
    Keywords: Electronic mail systems ; Electronic books ; local
    Abstract: If you had a list of the words used to describe sendmail, they'd probably include reliable, flexible, configurable, complex, monolithic, and daunting. But you're not likely to find the word easy. Even seasoned sendmail pros are sometimes frustrated by the intricacies of sendmail's configuration files. With a little determination and the help of a good reference book, like sendmail , Third Edition, you can master this demanding program. But when there's a significant point release, like sendmail V8.13, where do you turn? An excellent companion to our popular sendmail , Third Edition, the sendmail 8.13 Companion provides a timely way to document the improvements in V8.13 in parallel with its release. The book highlights the important changes in the latest update to sendmail, pointing out not just what is handy or nice to have, but what's critical in getting the best behavior from sendmail. This is especially important now that spam is on the rise, and because mobile technology requires roving laptops to use encrypted connections. Not surprisingly, many of the changes and additions to V8.13 have been driven by the ongoing fight against spam. Anyone concerned about spam--and who isn't?--will benefit greatly by upgrading to V8.13 sendmail. Among its many enhancements, V8.13 includes new routines that support the SPF sending site authentication standard (in the Milter library), simultaneous connection control, high connection rate control, and finer tuning of SASL parameters. The additions to the Milter library, alone, make upgrading worthwhile, but sendmail's connection control makes it a no-brainer. The key to understanding them is the sendmail 8.13 Companion . The book is divided into twenty-five chapters that parallel the chapters in the third edition of the sendmail book. For instance, if you're interested in Options configuration (Chapter 24 in sendmail), you'll turn to Chapter 24 in your companion volume to find out what's new in V8.13. For a simple dot release (8.12 to 8.13), V8.13 sendmail has added more features, options, and fundamental changes than any other single dot release has included. If you need to set up or manage sendmail, you'll want this companion volume close at hand. Even if you aren't ready to upgrade to V8.13, you'll find the key to understanding them is the sendmail 8.13 Companion a useful guide to understanding and staying current with the latest changes in sendmail.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 298 , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 283 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Electronic books ; local
    Abstract: If you think that getting creative with Excel means the underhanded tweaking of numbers, think again. Excel Hacks shows even the most experienced users how to do things with Excel they might never have thought of doing--and lets them have a little fun while they're at it.Microsoft Excel is not just the dominant spreadsheet in the world; it's also one of the most popular applications ever created. Its success lies not only in its power and flexibility, but also in its streamlined, familiar interface that casually conceals its considerable capabilities. You don't need to know everything that Excel can do in order to use it effectively, but if you're like the millions of Excel power users looking to improve productivity, then Excel Hacks will show you a wide variety of Excel tasks you can put to use, most of which are off the beaten path.With this book, Excel power users can bring a hacker's creative approach to both common and uncommon Excel topics--"hackers" in this sense being those who like to tinker with technology to improve it. The "100 Industrial Strength Tips and Tools" in Excel Hacks include little known "backdoor" adjustments for everything from reducing workbook and worksheet frustration to hacking built-in features such as pivot tables, charts, formulas and functions, and even the macro language.This resourceful roll-up-your-sleeves guide is for intermediate to advanced Excel users eager to explore new ways to make Excel do things--from data analysis to worksheet management to import/export--that you never thought possible. Excel Hacks will help you increase productivity with Excel and give you hours of "hacking" enjoyment along the way.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 455 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 006.7/4
    Keywords: Application program interfaces (Computer software) ; Microsoft .NET Framework ; XML (Document markup language) ; Electronic books ; local
    Abstract: If you're seeking ways to build network-based applications or XML-based web services, Microsoft provides most of the tools you'll need. XML is integrated into the .NET Framework and Visual Studio .NET, but if you want to get a grasp on how .NET and XML actually work together, that's a different story. With .NET & XML , you can get under the hood to see how the .NET Framework implements XML, giving you the skills to write understandable XML-based code that interoperates with code written with other tools, and even other languages. .NET & XML starts by introducing XML and the .NET Framework, and then teaches you how to read and write XML before moving on to complex methods for manipulating, navigating, transforming, and constraining it. To demonstrate the power of XML in .NET, author Niel Bornstein builds a simple hardware store inventory system throughout the book. As you move from chapter to chapter, you'll absorb increasingly complex information until you have enough knowledge to successfully program your own XML-based applications. This tutorial also contains a quick reference to the API, plus appendices present additional .NET assemblies that you can use to work with XML, and how to work with the .NET XML configuration file format. One study puts the potential market for new software based on XML at or near $100 billion over the next five years. The .NET Framework gives you a way to become a part of it. But to use XML and .NET effectively, you need to understand how these two technologies work together. This book gives you the insight to take full advantage of the power the two provide.
    Note: "Understanding the code and markup behind the wizards"--Cover. - Includes biblographic references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 006.6
    Keywords: Computer graphics ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: " Graphics Programming with GDI+ explores and exploits a wonderful range of GDI+ programming concepts, techniques, and applications for programmers of beginner to intermediate abilities. Being a prolific contributor to the Internet community of developers, Mahesh Chand is offering what seems to be a natural extension of what he does best-sharing his programming skills with other talented programmers. Each chapter compels to the next." -Jason Hattingh, Director, Greystone Digital FX "Mahesh does a very good job getting .NET developers up to speed using the GDI+ features supported in the .NET Framework. There is good coverage of graphics fundamentals that helps the reader better understand the concepts of graphics programming with GDI+, and there are some excellent sample applications that demonstrate the graphics topics covered to reinforce the concepts presented." -Charles G. Parker, President, Parallel Consulting, Inc. " Graphics Programming with GDI+ is a comprehensive reference for anyone who wants to leverage this technology. It presents a clear discussion of the topics in such a manner that is comprehensible to the beginner, but sufficiently in-depth to challenge seasoned programmers." -Deborah J. Bechtold, MCSD, MCDBA "This is the most comprehensive book about graphics programming using GDI+ so far. This book will be a very useful handbook for everyone who does graphics programming for Windows." -Min Liu, Software Design Engineer of GDI+, Microsoft Corporation Graphics Programming with GDI+ is the .NET developer's guide to writing graphics applications for Windows and the Web. Through the use of detailed examples it provides experienced programmers with a deep understanding of the entire GDI+ API defined in the .NET Framework class library. The book begins with an introduction to GDI+ and the basics of graphics programming in Windows. The core of the book is a hands-on guide to practical topics, including how to use Windows Forms and optimize GDI+ performance. Chapters demonstrate how to develop real-world tools such as GDI+Painter, GDI+Editor, ImageViewer, and ImageAnimator. The author provides extensive reusable sample code in C# throughout, and complete downloadable source code in C# and Visual Basic .NET is available online, as are color versions of screen shots from the book. Key topics include: How GDI+ compares to GDI How GDI+ is defined and used in the .NET Framework How to draw, paint, and fill graphics objects Viewing and manip...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 1228 p. , ill. ; , 23 cm
    DDC: 005.2/768
    Keywords: Microsoft Visual studio ; Microsoft Windows (Computer file) ; Application software ; Development ; C# (Computer program language) ; Microsoft .NET Framework ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: For those of you who develop standalone Windows applications for PCs and other devices, Microsoft's .NET Windows Forms provide a much better way to get it done. This new technology gives you more power and flexibility for a fraction of the effort compared to classic Win32 development, with a streamlined programming model that deals automatically with many tedious details that once plagued developers. As with most things .NET, the only hitch is the learning curve. But that's where acclaimed author Jesse Liberty makes the difference with Programming .NET Windows Applications . With this tutorial, you will explore all aspects of using .NET Windows Forms class libraries and the associated programming tools in Visual Studio .NET, enabling you to build applications for the Windows 9x, Windows 2000 and Windows XP desktop platforms. Step-by-step, you'll learn ways to design applications that either function alone on a PC, or work in combination with your web-based application server to take advantage of the richer interface and higher level of security. The book also explains how your new Windows applications can sidestep problems that used to arise from the use of DLLs (known collectively as "DLL hell"), and how .NET Windows Forms can be used as an alternative to ASP.NET and browser-based approaches for building web application clients. Jesse Liberty definitely knows his stuff when it comes to the .NET platform. As the author of O'Reilly's Programming C# and Learning Visual Basic .NET , he's well-known for his clear and concise style that prompted one reviewer to say, "It's as if he knows exactly what questions I'm going to ask ahead of time." Jesse also co-authored Programming ASP.NET with contract programmer Dan Hurwitz, and now the two have teamed up again to bring you this comprehensive tutorial--without a doubt, the best source available for learning how to program with .NET Windows Forms.
    Note: "Covers .NET 1.1 & Visual studio .NET 2003" -- Cover. - "Rich client applications with C# or FB.NET" -- Cover. - Includes index. - Originally published 2003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.7/2
    Keywords: Microsoft .NET ; Web site development ; Web sites ; Design ; Electronic books ; local
    Abstract: The complete software developer's guide to working in .NET environments Praise for .NET Patterns: "Was both insightful and comprehensive. It's great to see these patterns presented within the context of many architectural dilemmas facing the vastly interconnected enterprise. Web service architects are sure to see enormous value in this text." -Ed Draper, Microsoft Patterns have proven to be practical tools for the programmer who knows how to use them. In .NET Patterns , distributed computing and .NET expert Christian Thilmany presents both an introduction to patterns for programmers working in the .NET environment and a library of patterns unique to the .NET platform. Part of John Vlissides' critically acclaimed Addison-Wesley Software Patterns Series, .NET Patterns extends the proven concept of design patterns into the arena of .NET design and development. Now, .NET developers can depend on patterns to provide solutions to recurring problems in software design. In addition to covering both lower and higher level programming with patterns, this book also includes helpful primers on XML and web services, as well as thorough coverage of debugging, exceptions, error handling, and architecture. Whether you're working in .NET environments or transitioning to .NET environments, you'll find .NET Patterns a comprehensive resource for software solutions.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 243 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Java (Computer program language) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Sometimes the simplest answer is the best. Many Enterprise Java developers, accustomed to dealing with Java's spiraling complexity, have fallen into the habit of choosing overly complicated solutions to problems when simpler options are available. Building server applications with "heavyweight" Java-based architectures, such as WebLogic, JBoss, and WebSphere, can be costly and cumbersome. When you've reached the point where you spend more time writing code to support your chosen framework than to solve your actual problems, it's time to think in terms of simplicity.In Better, Faster, Lighter Java , authors Bruce Tate and Justin Gehtland argue that the old heavyweight architectures are unwieldy, complicated, and contribute to slow and buggy application code. As an alternative means for building better applications, the authors present two "lightweight" open source architectures: Hibernate--a persistence framework that does its job with a minimal API and gets out of the way, and Spring--a container that's not invasive, heavy or complicated.Hibernate and Spring are designed to be fairly simple to learn and use, and place reasonable demands on system resources. Better, Faster, Lighter Java shows you how they can help you create enterprise applications that are easier to maintain, write, and debug, and are ultimately much faster.Written for intermediate to advanced Java developers, Better, Faster, Lighter Java , offers fresh ideas--often unorthodox--to help you rethink the way you work, and techniques and principles you'll use to build simpler applications. You'll learn to spend more time on what's important. When you're finished with this book, you'll find that your Java is better, faster, and lighter than ever before.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 193 , ill., forms ; , 24 cm
    Edition: 1st ed.
    DDC: 346.0482
    Keywords: Computer software industry ; Licenses ; Copyright ; Computer programs ; Free computer software ; law and legislation ; Open source software ; Law and legislation ; Electronic books ; local
    Abstract: If you've held back from developing open source or free software projects because you don't understand the implications of the various licenses, you're not alone. Many developers believe in releasing their software freely, but have hesitated to do so because they're concerned about losing control over their software. Licensing issues are complicated, and both the facts and fallacies you hear word-of-mouth can add to the confusion. Understanding Open Source and Free Software Licensing helps you make sense of the different options available to you. This concise guide focuses on annotated licenses, offering an in-depth explanation of how they compare and interoperate, and how license choices affect project possibilities. Written in clear language that you don't have to be a lawyer to understand, the book answers such questions as: What rights am I giving up? How will my use of OS/FS licensing affect future users or future developers? Does a particular use of this software--such as combining it with proprietary software--leave me vulnerable to lawsuits?Following a quick look at copyright law, contracts, and the definition of "open source," the book tackles the spectrum of licensing, including: The MIT (or X), BSD, Apache and Academic Free licenses The GPL, LGPL, and Mozilla licenses The QT, Artistic, and Creative Commons licenses Classic Proprietary licenses Sun Community Source license and Microsoft Shared Source project The book wraps up with a look at the legal effects--both positive and negative--of open source/free software licensing.Licensing is a major part of what open source and free software are all about, but it's still one of the most complicated areas of law. Even the very simple licenses are tricky. Understanding Open Source and Free Software Licensing bridges the gap between the open source vision and the practical implications of its legal underpinnings. If open source and free software licenses interest you, this book will help you understand them. If you're an open source/free software developer, this book is an absolute necessity.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: IEEE 802.11 (Standard) ; Wireless LANs ; Security measures ; Electronic books ; local
    Abstract: " Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards." --Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC "This is certainly the definitive text on the internals of 802.11 security!" --John Viega, founder and chief scientist, Secure Software, Inc. "This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN." --Simon Blake-Wilson, Director of Information Security, BCI Business professionals and advanced home users are captivated by the convenience of working on wireless networks. But how can privacy and security be maintained effectively? Real 802.11 Security describes an entirely new approach to wireless LAN security based on the latest developments in Wi-Fi technology. This is the book that will show you how to establish real security within your Wi-Fi LAN. Recent developments in Wi-Fi security achieve what no amount of reconfiguration can do: They solve the problem at the source. Wi-Fi Protected Access (WPA) repairs weaknesses in existing Wi-Fi systems and is designed to allow software upgrades. The upcoming 802.11i standard will offer a much higher level of security than previously offered and will provide flexible, extremely secure solutions for future products. Real 802.11 Security addresses the theory, implementations, and reality of Wi-Fi security. It provides an overview of security issues, explains how security works in Wi-Fi networks, and explores various security and authentication protocols. The book concludes with an in-depth discussion of real-world security issues and attack tools. Written by two experts in wireless security, Jon Edney and William Arbaugh, this book shows you how to stay informed and aware when making security decisions, and what steps you can take to implement the most effective, proactive wireless security now and in the future. 0321136209B06242003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 3rd ed.
    DDC: 005.1/17
    Keywords: Computer software ; Development ; Object-oriented methods (Computer science) ; UML (Computer science) ; Electronic books ; local
    Abstract: Would you like to understand the most important elements of Class diagrams? (See page 35.) Do you want to see the new UML 2.0 interaction frame notation for adding control flow to sequence diagrams (see page 58) and the unofficial notation that many prefer? (See page 60.) Do you want to know what changes have been made to all versions of the UML? (See page 151.) Do you want a quick reference to the most useful parts of the UML notation? (See the inside covers.) Do you want to find out what diagram types were added to the UML 2.0 without wading through the spec? (See page 11.) More than 300,000 developers have benefited from past editions of UML Distilled . This third edition is the best resource for quick, no-nonsense insights into understanding and using UML 2.0 and prior versions of the UML. Some readers will want to quickly get up to speed with the UML 2.0 and learn the essentials of the UML. Others will use this book as a handy, quick reference to the most common parts of the UML. The author delivers on both of these promises in a short, concise, and focused presentation. This book describes all the major UML diagram types, what they're used for, and the basic notation involved in creating and deciphering them. These diagrams include class, sequence, object, package, deployment, use case, state machine, activity, communication, composite structure, component, interaction overview, and timing diagrams. The examples are clear and the explanations cut to the fundamental design logic. If you are like most developers, you don't have time to keep up with all the new innovations in software engineering. This new edition of Fowler's classic work gets you acquainted with some of the best thinking about efficient object-oriented software design using the UML--in a convenient format that will be essential to anyone who designs software professionally.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Reading this book has filled a gap in my education. I feel a sense of completion, understand that UNIX is really a style of community. Now I get it, at least I get it one level deeper than I ever did before. This book came at a perfect moment for me, a moment when I shifted from visualizing programs as things to programs as the shadows cast by communities. From this perspective, Eric makes UNIX make perfect sense." --Kent Beck, author of Extreme Programming Explained, Test Driven Development , and Contributing to Eclipse "A delightful, fascinating read, and the lessons in problem-solvng are essential to every programmer, on any OS." --Bruce Eckel, author of Thinking in Java and Thinking in C++ Writing better software: 30 years of UNIX development wisdom In this book, five years in the making, the author encapsulates three decades of unwritten, hard-won software engineering wisdom. Raymond brings together for the first time the philosophy, design patterns, tools, culture, and traditions that make UNIX home to the world's best and most innovative software, and shows how these are carried forward in Linux and today's open-source movement. Using examples from leading open-source projects, he shows UNIX and Linux programmers how to apply this wisdom in building software that's more elegant, more portable, more reusable, and longer-lived. Raymond incorporates commentary from thirteen UNIX pioneers: Ken Thompson , the inventor of UNIX. Ken Arnold , part of the group that created the 4BSD UNIX releases and co-author of The Java Programming Language . Steven M. Bellovin , co-creator of Usenet and co-author of Firewalls and Internet Security . Stuart Feldman , a member of the Bell Labs UNIX development group and the author of make and f77 . Jim Gettys and Keith Packard , principal architects of the X windowing system. Steve Johnson , author of yacc and of the Portable C Compiler. Brian Kernighan , co-author of The C Programming Language, The UNIX Programming Environment, The Practice of Programming, and of the awk programming language. David Korn , creator of the korn shell and author of The New Korn Shell Command and Programming Language . Mike Lesk , a member of the Bell Labs development group and author of the ms macro package, the tbl and refer tools, lex and UUCP . Doug McIlroy , Director of the Bell Labs research group where UNIX was born and inventor of the UNIX pipe. Marshall Kirk McKusick , developer of the 4.2BSD fast filesystem and a leader ...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 427 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.4/32
    Keywords: Berkeley BSD (Computer file) ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun."Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks , the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools--and even fun--for administrators and power users of BSD systems. BSD Hacks takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command.The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas: Customizing the User Environment Dealing with Files and Filesystems The Boot and Login Environments Backing Up Networking Hacks Securing the System Going Beyond the Basics Keeping Up-to-Date Grokking BSD If you want more than your average BSD user--you want to explore and experiment, unearth shortcuts, create useful tools, and come up with fun things to try on your own-- BSD Hacks is a must-have. This book will turn regular users into power users and system administrators into super system administrators.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xx, 309 p. , ill. (chiefly col.) ; , 23 cm
    Edition: 1st ed.
    DDC: 775
    Keywords: Photography ; Digital techniques ; Electronic books ; local
    Abstract: Your digital camera is more than new incarnation of your old film camera. Yes, it still produces photos, but it also offers new outlets for creativity, including instant gratification of seeing your photos now, the ability to experiment without worrying about expense, the technology to fine-tune your photos with advanced professional techniques, and the means to share your work instantaneously with anyone, anyplace in the world. It's no wonder that digital cameras are outselling traditional cameras for the first time ever. But the question most digital camera users ask is this, "How do I get from taking 'decent' photos to doing the things I'd really like to do? How do I tap into that potential?" Digital Photography Hacks is your passport to taking the kind of digital photos you've always aspired to. Written by Derrick Story, photographer and author of Digital Photography Pocket Guide and other books, it goes beyond the standard fare of most digital photography books--such as camera basics, understanding memory cards, and when to use a flash--to the things that professional photographers have learned through thousands of shots' worth of experience, years of experimentation, and fiddling and hacking. The book includes a foreword by photographer Rick Smolan, author of America 24/7. With exquisite, full-color photos throughout, the book presents a collection of tips, tricks, and techniques for photographers ready to move beyond the basics. And if you don't have the latest in digital camera photography, this book will show you how to extend the life and functionality of your existing camera. All the hacks in the book are platform-agnostic, designed for use on both Mac on Windows-based computers. You'll find 100 proven techniques in the areas of: Daytime and nighttime photo secrets Flash magic Digital camera attachments The computer connection Photoshop magic Fun photo projects Camera phone tricks This book is for the photographer you are now, and the one you want to be. Digital Photography Hacks is for the creative adventurer who resides in each of us.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 269 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Note: "Intrusion detection with open source tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 327 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: MySQL (Electronic resource) ; Object-oriented programming (Computer science) ; PHP (Computer program language) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Abstract: If you're using PHP 4, then chances are good that an upgrade to PHP 5 is in your future. The more you've heard about the exciting new features in PHP 5, the sooner that upgrade is probably going to be. Although an in-depth, soup-to-nuts reference guide to the language is good to have on hand, it's not the book an experienced PHP programmer needs to get started with the latest release. What you need is a lean and focused guide that answers your most pressing questions: what's new with the technology, what's different, and how do I make the best use of it? In other words, you need a copy of Upgrading to PHP 5 . This book is targeted toward PHP developers who are already familiar with PHP 4. Rather than serve as a definitive guide to the entire language, the book zeroes in on PHP 5's new features, and covers these features definitively. You'll find a concise appraisal of the differences between PHP 4 and PHP 5, a detailed look at what's new in this latest version, and you'll see how PHP 5 improves on PHP 4 code. See PHP 4 and PHP 5 code side-by-side, to learn how the new features make it easier to solve common PHP problems. Each new feature is shown in code, helping you understand why it's there, when to use it, and how it's better than PHP 4. Short, sample programs are included throughout the book. Topics covered in Upgrading to PHP 5 include: The new set of robust object-oriented programming features An improved MySQL extension, supporting MySQL 4.1, prepared statements, and bound parameters Completely rewritten support for XML: DOM, XSLT, SAX, and SimpleXML Easy web services with SOAP SQLite, an embedded database library bundled with PHP 5 Cleaner error handling with exceptions Other new language features, such as iterators, streams, and more. Upgrading to PHP 5 won't make you wade through information you've covered before. Written by Adam Trachtenberg, coauthor of the popular PHP Cookbook , this book will take you straight into the heart of all that's new in PHP 5. By the time you've finished, you'll know PHP 5 in practice as well as in theory.
    Note: "All that's new in PHP 5, covers MySQL 4.1"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 350 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: Internet programming ; PHP (Computer program language) ; Electronic books ; local
    Abstract: PHP has gained a following among non-technical web designers who need to add interactive aspects to their sites. Offering a gentle learning curve, PHP is an accessible yet powerful language for creating dynamic web pages. As its popularity has grown, PHP's basic feature set has become increasingly more sophisticated. Now PHP 5 boasts advanced features--such as new object-oriented capabilities and support for XML and Web Services--that will please even the most experienced web professionals while still remaining user-friendly enough for those with a lower tolerance for technical jargon.If you've wanted to try your hand at PHP but haven't known where to start, then Learning PHP 5 is the book you need. If you've wanted to try your hand at PHP but haven't known where to start, then Learning PHP 5 is the book you need. With attention to both PHP 4 and the new PHP version 5, it provides everything from a explanation of how PHP works with your web server and web browser to the ins and outs of working with databases and HTML forms. Written by the co-author of the popular PHP Cookbook , this book is for intelligent (but not necessarily highly-technical) readers. Learning PHP 5 guides you through every aspect of the language you'll need to master for professional web programming results. This book provides a hands-on learning experience complete with exercises to make sure the lessons stick. Learning PHP 5 covers the following topics, and more: How PHP works with your web browser and web server PHP language basics, including data, variables, logic and looping Working with arrays and functions Making web forms Working with databases like MySQL Remembering users with sessions Parsing and generating XML Debugging Written by David Sklar, coauthor of the PHP Cookbook and an instructor in PHP, this book offers the ideal classroom learning experience whether you're in a classroom or on your own. From learning how to install PHP to designing database-backed web applications, Learning PHP 5 will guide you through every aspect of the language you'll need to master to achieve professional web programming results.
    Note: "A pain-free introduction to building interactive web sites"--Cover. - 1st ed., 2004. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 189 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Keywords: Computer software ; Development ; eXtreme programming ; Electronic books ; local
    Abstract: "In this second edition of Extreme Programming Explained, Kent Beck organizes and presents five years' worth of experiences, growth, and change revolving around XP. If you are seriously interested in understanding how you and your team can start down the path of improvement with XP, you must read this book." - Francesco Cirillo, Chief Executive Officer, XPLabs S.R.L. "The first edition of this book told us what XP was-it changed the way many of us think about software development. This second edition takes it farther and gives us a lot more of the 'why' of XP, the motivations and the principles behind the practices. This is great stuff. Armed with the 'what' and the 'why,' we can now all set out to confidently work on the 'how': how to run our projects better, and how to get agile techniques adopted in our organizations." - Dave Thomas, The Pragmatic Programmers LLC "This book is dynamite! It was revolutionary when it first appeared a few years ago, and this new edition is equally profound. For those who insist on cookbook checklists, there's an excellent chapter on 'primary practices,' but I urge you to begin by truly contemplating the meaning of the opening sentence in the first chapter of Kent Beck's book: 'XP is about social change.' You should do whatever it takes to ensure that every IT professional and every IT manager-all the way up to the CIO-has a copy of Extreme Programming Explained on his or her desk." - Ed Yourdon, author and consultant "XP is a powerful set of concepts for simplifying the process of software design, development, and testing. It is about minimalism and incrementalism, which are especially useful principles when tackling complex problems that require a balance of creativity and discipline." - Michael A. Cusumano, Professor, MIT Sloan School of Management, and author of The Business of Software " Extreme Programming Explained is the work of a talented and passionate craftsman. Kent Beck has brought together a compelling collection of ideas about programming and management that deserves your full attention. My only beef is that our profession has gotten to a point where such common-sense ideas are labeled 'extreme.'..." - Lou Mazzucchelli, Fellow, Cutter Business Technology Council "If your organization is ready for a change in the way it develops software, there's the slow incremental approach, fixing things one by one, or the fast track, jumping feet first into Extreme Programming. Do not be frightened by th...
    Note: Includes bibliographical references (p. 161-174) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Language: English
    Pages: xvii, 374 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Abstract: An enormous system comprising myriad technologies, options, and releases, Oracle's complexities have spawned numerous areas of specialization. For each area of specialization there are equally specialized how-to books and manuals. O'Reilly's Oracle Essentials claims a unique place among these books. Rather than focusing on one area, the book explains the foundational concepts of the Oracle technology and the core technical and business aspects of using it.The new edition of this classic book, Oracle Essentials, 3rd Edition: Oracle Database 10 g, distills a vast amount of knowledge into an easy-to-read volume covering every aspect of the Oracle database. Readers of all levels will learn about Oracle's features and technologies, including the product line, architecture, data structures, networking, concurrency, tuning, and much more.Featuring focused text, abundant illustrations, and helpful hints, the new edition offers a valuable overview of Oracle's Database 10 g --the industry's first database to support grid computing. Recent releases such as Oracle 9 i and 8 i are also covered. The book contains chapters on: Oracle products, options, and overall architecture for Oracle 10 g and prior recent releases Installing and running Oracle: how to configure, start up, and shut down the database, and various networking issues Oracle data structures, datatypes, and ways of extending datatypes, with an introduction to Oracle objects (e.g., tables, views, indexes) Managing Oracle: security, the Oracle Enterprise Manager, fragmentation and reorganization, and backup and recovery Oracle performance: characteristics of disk, memory, and CPU tuning Multi-user concurrency, online transaction processing (OLTP), and high availability Hardware architectures (e.g., SMP, MPP, NUMA) and their impact on Oracle Data warehousing and distributed databases Network deployment: using Oracle as an Internet computing platform and for grid computing What's new in Oracle 10 g : a summary of the database changes described in the book Oracle Essentials, 3rd Edition: Oracle Database 10 g was written for anyone whose job involves managing or building systems using Oracle DBMS technology or working with staff that uses Oracle technology. This book is the perfect all-in-one source for understanding the complexities and capabilities of Oracle.
    Note: "What you need to know about oracle database architecture and features"--Cover. - Includes bibliographical references (p. 347-355) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 531 , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 620/.001/171
    Keywords: Computer programs ; Testing ; Systems engineering ; Mathematical models ; Electronic books ; local
    Abstract: Master SPIN, the breakthrough tool for improving software reliability SPIN is the world's most popular, and arguably one of the world's most powerful, tools for detecting software defects in concurrent system designs. Literally thousands of people have used SPIN since it was first introduced almost fifteen years ago. The tool has been applied to everything from the verification of complex call processing software that is used in telephone exchanges, to the validation of intricate control software for interplanetary spacecraft. This is the most comprehensive reference guide to SPIN, written by the principal designer of the tool. It covers the tool's specification language and theoretical foundation, and gives detailed advice on methods for tackling the most complex software verification problems. Sum Design and verify both abstract and detailed verification models of complex systems software Sum Develop a solid understanding of the theory behind logic model checking Sum Become an expert user of the SPIN command line interface, the Xspin graphical user interface, and the TimeLine editing tool Sum Learn the basic theory of omega automata, linear temporal logic, depth-first and breadth-first search, search optimization, and model extraction from source code The SPIN software was awarded the prestigious Software System Award by the Association for Computing Machinery (ACM), which previously recognized systems such as UNIX, SmallTalk, TCP/IP, Tcl/Tk, and the World Wide Web.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Language: English
    Pages: xvi, 276 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/65
    Keywords: Database management ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: As users come to depend on MySQL, they find that they have to deal with issues of reliability, scalability, and performance--issues that are not well documented but are critical to a smoothly functioning site. This book is an insider's guide to these little understood topics.Author Jeremy Zawodny has managed large numbers of MySQL servers for mission-critical work at Yahoo!, maintained years of contacts with the MySQL AB team, and presents regularly at conferences. Jeremy and Derek have spent months experimenting, interviewing major users of MySQL, talking to MySQL AB, benchmarking, and writing some of their own tools in order to produce the information in this book.In High Performance MySQL you will learn about MySQL indexing and optimization in depth so you can make better use of these key features. You will learn practical replication, backup, and load-balancing strategies with information that goes beyond available tools to discuss their effects in real-life environments. And you'll learn the supporting techniques you need to carry out these tasks, including advanced configuration, benchmarking, and investigating logs.Topics include: A review of configuration and setup options Storage engines and table types Benchmarking Indexes Query Optimization Application Design Server Performance Replication Load-balancing Backup and Recovery Security
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 658/.05421
    Keywords: System design ; Use cases (Systems engineering) ; Electronic books ; local
    Abstract: This book describes how to gather and define software requirements using a process based on use cases. It shows systems analysts and designers how use cases can provide solutions to the most challenging requirements issues, resulting in effective, quality systems that meet the needs of users. Use Cases, Second Edition: Requirements in Context describes a three-step method for establishing requirements-an iterative process that produces increasingly refined requirements. Drawing on their extensive, real-world experience, the authors offer a wealth of advice on use-case driven lifecycles, planning for change, and keeping on track. In addition, they include numerous detailed examples to illustrate practical applications. This second edition incorporates the many advancements in use case methodology that have occurred over the past few years. Specifically, this new edition features major changes to the methodology's iterations, and the section on management reflects the faster-paced, more "chaordic" software lifecycles prominent today. In addition, the authors have included a new chapter on use case traceability issues and have revised the appendixes to show more clearly how use cases evolve. The book opens with a brief introduction to use cases and the Unified Modeling Language (UML). It explains how use cases reduce the incidence of duplicate and inconsistent requirements, and how they facilitate the documentation process and communication among stakeholders. The book shows you how to: Describe the context of relationships and interactions between actors and applications using use case diagrams and scenarios Specify functional and nonfunctional requirements Create the candidate use case list Break out detailed use cases and add detail to use case diagrams Add triggers, preconditions, basic course of events, and exceptions to use cases Manage the iterative/incremental use case driven project lifecycle Trace back to use cases, nonfunctionals, and business rules Avoid classic mistakes and pitfalls The book also highlights numerous currently available tools, including use case name filters, the context matrix, user interface requirements, and the authors' own "hierarchy killer."
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 723 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/762
    Keywords: JavaServer pages ; Java (Computer program language) ; Servlets ; Web site development ; Electronic books ; local
    Abstract: With literally hundreds of examples and thousands of lines of code, the Java Servlet and JSP Cookbook yields tips and techniques that any Java web developer who uses JavaServer Pages or servlets will use every day, along with full-fledged solutions to significant web application development problems that developers can insert directly into their own applications. Java Servlet and JSP Cookbook presents real-world problems, and provides concise, practical solutions to each. Finding even one tested code "recipe" that solves a gnarly problem in this comprehensive collection of solutions and best practices will save hours of frustration--easily justifying the cost of this invaluable book.But "Java Servlet and JSP Cookbook" is more than just a wealth of cut-and-paste code. It also offers clear explanations of how and why the code works, warns of potential pitfalls, and directs you to sources of additional information, so you can learn to adapt the problem-solving techniques to similar situations.These recipes include vital topics like the use of Ant to setup a build environment, extensive coverage of the WAR file format and web.xml deployment descriptor, file-uploading, error-handling, cookies, logging, dealing with non-HTML content, multimedia, request filtering, web services, I18N, web services, and a host of other topics that frustrate even the most seasoned developers.For Java web developers of all levels who are eager to put into practice the theory presented in other API-focused books, the solutions presented in this practical book will prove invaluable over and over again. This is painless way for less experienced developers who prefer to learn by doing to expand their skills and productivity, while accomplishing practical solutions to the pressing problems they face every day. More experienced developers can use these recipes to solve time-consuming problems quickly, freeing up their time for the more creative aspects of their work.
    Note: Includes bibliographic references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 831 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Electronic books ; local
    Abstract: Easy to learn and use, the C# language is targeted at developers for Microsoft's .NET platform who've worked with a C-like language before, such as C, C++, or Java. There's no shortage of excellent tutorials and documentation to help new developers get a handle on the language, such as O'Reilly's Learning C# or Programming C# . But when you need practical answers to the day-to-day questions you run up against, a tutorial isn't going to do the trick. The C# Cookbook gets straight to the heart of the problem with code recipes collected especially for developers working on the .NET platform. The C# Cookbook offers a definitive collection of solutions and examples for this new programming language. Recipes range from simple tasks to the more complex, and are organized with respect to the types of problems you'll need to solve as you progress in your experience as a C# programmer. Nearly every recipe contains a complete, documented code sample showing you how to solve the specific problem, as well as a discussion of how the underlying technology works and a discussion of alternatives, limitations, and other considerations where appropriate. The recipes in the C# Cookbook are organized into seventeen chapters, each of which focuses on a particular topic in creating C# solutions. Among the topics covered, you'll find: Numeric data types in C# Strings and characters Classes and structures Exception handling Delegates and events Regular expressions Data structures and algorithms Networking Security Unsafe Code You don't need to be an experienced C# or .NET developer to use this book. The C# Cookbook is designed for users of all levels with recipes targeted at the real-world developer who needs to solve problems now, not learn lots of theory first. With this guide, all developers will be able to learn and improve their mastery of both the language and the .NET Framework Class Libraries.
    Note: "The definitive collection of solutions and examples"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 658.7
    Keywords: Business logistics ; Electronic books ; local
    Abstract: "An excellent summary of the state of supply chain management going into the twenty-first century. Explains the essential concepts clearly and offers practical, down-to-earth advice for making supply chains more efficient and adaptive. Truly a survival guide for executives as they struggle to cope with the increasing competition between supply chains." - Christian Knoll , Vice President of Global Supply Chain Management, SAP AG "Through real-world case studies and graphic illustrations, David Taylor clearly demonstrates the bottom-line benefits of managing the supply chain effectively. Although the book is written for managers, I recommend it for everyone from the executive suite to the shipping floor because they all have to work together to master the supply chain. But beware-you can expect many passionate employees demanding improvements in your company's supply chain after reading this book!" - David Myers , President, WinfoSoft Inc., Former Board Member of Supply Chain Council "A comprehensive, thoroughly researched, and well-designed book that gives managers the information they need in a highly readable form. I am already starting to use the techniques in this book to improve our international distribution system." - Jim Muller , Vice President of Produce Sales, SoFresh Produce "Supply chain management is a deceptively deep subject. Simple business practices combine to form complex systems that seem to defy rational analysis: Companies that form trading partnerships continue to compete despite their best efforts to cooperate; small variations in consumer buying create devastating swings in upstream demand, and so on. In his trademark fashion, Taylor clearly reveals the hidden logic at work in your supply chain and gives you the practical tools you need to make better management decisions. A must-read for every manager who affects a supply chain, and in today's marketplace there are few managers who are exempt from this requirement." - Adrian J. Bowles , Ph.D., President, CoSource.net "David Taylor has done it again. With his new book, David makes supply chain management easy to grasp for the working manager, just as he did with his earlier guides to business technology. If you work for a company that is part of a supply chain, you need this book." - Dirk Riehle , Ph.D. "David Taylor has done a masterful job of defining the core issues in supply chain management without getting trapped in the quicksand of jargon. This concise book is wel...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: v. , ill. ; , 25 cm
    Edition: 3rd ed.
    Series Statement: Addison-Wesley professional computing series
    Keywords: UNIX (Computer file) ; Computer networks ; Internet programming ; Electronic books ; local
    Abstract: UNIX Network Programming, Volume 1: The Sockets Networking API, Third Edition "Everyone will want this book because it provides a great mix of practical experience, historical perspective, and a depth of understanding that only comes from being intimately involved in the field. I've already enjoyed and learned from reading this book, and surely you will too." --Sam Leffler The classic guide to UNIX networking APIs... now completely updated! To build today's highly distributed, networked applications and services, you need deep mastery of sockets and other key networking APIs. One book delivers comprehensive, start-to-finish guidance for building robust, high-performance networked systems in any environment: UNIX Network Programming, Volume 1, Third Edition. Building on the legendary work of W. Richard Stevens, this edition has been fully updated by two leading network programming experts to address today's most crucial standards, implementations, and techniques. New topics include: POSIX Single UNIX Specification Version 3 IPv6 APIs (including updated guidance on IPv6/IPv4 interoperability) The new SCTP transport protocol IPsec-based Key Management Sockets FreeBSD 4.8/5.1, Red Hat Linux 9.x, Solaris 9, AIX 5.x, HP-UX, and Mac OS X implementations New network program debugging techniques Source Specific Multicast API, the key enabler for widespread IP multicast deployment The authors also update and extend Stevens' definitive coverage of these crucial UNIX networking standards and techniques: TCP and UDP transport Sockets: elementary, advanced, routed, and raw I/O: multiplexing, advanced functions, nonblocking, and signal-driven Daemons and inetd UNIX domain protocols ioctl operations Broadcasting and multicasting Threads Streams Design: TCP iterative, concurrent, preforked, and prethreaded servers Since 1990, network programmers have turned to one source for the insights and techniques they need: W. Richard Stevens' UNIX Network Programming . Now, there's an edition specifically designed for today's challenges--and tomorrow's.
    Note: Includes bibliographical references and indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 460 p. , ill. ; , 23 cm
    DDC: 005.72
    Keywords: XML (Document markup language) ; Electronic books ; local
    Abstract: Developers and system administrators alike are uncovering the true power of XML, the Extensible Markup Language that enables data to be sent over the Internet from one computer platform to another or one application to another and retain its original format. Flexible enough to be customized for applications as diverse as web sites, electronic data interchange, voice mail systems, wireless devices, web services, and more, XML is quickly becoming ubiquitous. XML Hacks is a roll-up-your-sleeves guide that distills years of ingenious XML hacking into a complete set of practical tips, tricks, and tools for web developers, system administrators, and programmers who want to go far beyond basic tutorials to leverage the untapped power of XML.With plenty of useful real-world projects that illustrate how to define, read, create, and manipulate XML documents, XML Hacks shows readers how to put XML's power to work on the Internet and within productivity applications. Each Hack in this book can be read easily in a few minutes, saving programmers and administrators countless hours of searching for the right answer. And this is an O'Reilly Hacks book, so it's not just practical, imminently useful, and time-saving. It's also fun.From Anatomy of an XML Document to Exploring SOAP Messages XML Hacks shows you how to save time and accomplish more with fewer resources. If you want much more than the average XML user--to explore and experiment, do things you didn't know you could do with XML, discover clever shortcuts, and show off just a little--this invaluable book is a must-have.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 343 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: You've probably heard the buzz about Eclipse, the powerful open source platform that gives Java developers a new way to approach development projects. It's like a shiny new car--no longer content to just admire Eclipse, you're now itching to get in and drive. Eclipse is to Java developers what Visual Studio is to .NET developers--it's an integrated development environment (IDE) that combines a code editor, compiler, debugger, text editor, graphical user interface (GUI) builder, and other components into a single, user-friendly application. It provides a solid foundation that enables Java developers to construct and run integrated software-development tools for web development, application design, modeling, performance, testing, and much more. As with any extensive programming tool, however, there's a lot to learn. And there s no better guy than well-known Java expert Steve Holzner to teach you. An award-winning and best-selling author who has been writing about Java topics since the language first appeared, Holzner delivers just the kind of targeted, practical, everyday knowledge you need to hone your mastery of Eclipse. Perfect as a companion to an Eclipse programming tutorial (such as Holzner's own Eclipse , O'Reilly, April 2004) or an ideal stand-alone for all those developers who either don't want or don't need the tutorial approach, the Eclipse Cookbook contains task-oriented recipes for more than 800 situations you may encounter while using this new Java platform--from deploying a web application automatically to reverse engineering compiled code, from re-naming all references to a class across multiple packages to initializing the SWT JNI libraries. Each recipe in the ever-popular and utterly practical problem-solution-discussion format for O'Reilly cookbooks contains a clear and thorough description of the problem, a brief but complete discussion of a solution, and in-action examples illustrating that solution. The Eclipse Cookbook will satiate Java programmers at all levels who are ready to go beyond tutorials--far beyond writing plug-ins and extensions--and actually use the powerful and convenient Eclipse day to day.
    Note: "Covers Eclipse 3.0"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 409 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.7/1376
    Keywords: Internet Relay Chat ; Electronic books ; local
    Abstract: IRC (Internet Relay Chat) may very well turn out to be the world's most successful hack. In 1988, Jarkko Oikarinen wrote the original IRC program at the University of Oulu, Finland. As he says in his foreword, "IRC started as one summer trainee's programming exercise. A hack grew into a software development project that hundreds of people participated in, and then became a worldwide environment where tens of thousands of people now spend time with each other. I have found many of my friends through IRC and learnt a significant part of my present software engineering knowledge while using and working with IRC. That would not have been possible without learning from code examples and hacks from others".IRC has continued to grow in popularity since its inception. Millions of people from all over the world now use IRC to chat with friends, discuss projects and collaborate on research. With a simple, clearly defined protocol, IRC has become one of the most accessible chat environments, with clients written for a multitude of operating systems. And IRC is more than just a simple chat system it is a network of intercommunicating servers, allowing thousands of clients to connect from anywhere in the world using the IRC protocol.While IRC is easy to get into and many people are happy to use it without being aware of what's happening under the hood, there are those who hunger for more knowledge, and this book is for them. IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net).Like all of our Hacks books, there are many different ways to use IRC Hacks . You can read the book from cover to cover, but you might be better served by picking an interesting item from the table of contents and just diving in.If you're relatively new to IRC, you should considering starting with a few hacks from each progressive chapter. Chapter 1 starts you off by showing you how to connect to IRC, while Chapter 2 acquaints you with the everyday concepts you'll need to use IRC effectively. Chapter 3 is all about users and channels, and introduces the first pieces of code. Chapter 4 shows you how to make useful enhancements to IRC clients.Chapter 5 is where you will learn the basics about creating IRC bots, with Chapters 6-...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 317 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Java programmers know how finicky Java can be to work with. An omitted semi-colon or the slightest typo will cause the Java command-line compiler to spew pages of annoying error messages across your screen. And it doesn't fix them--that's up to you: fix them, compile again, and hope that nothing goes wrong this time.Eclipse, the popular Java integrated development environment (IDE) provides an elegant and powerful remedy for this common, frustrating scenario. It doesn't just catch your errors before you compile, it also suggests solutions. All you need to do is point and click. And it's free--what could be better? Still, if you're like most programmers, mastering a new technology--no matter how productive it will make you in the long run--is going to take a chunk out of your productivity now. You want to get up to speed quickly without sacrificing efficiency.O'Reilly's new guide to the technology, Eclipse , provides exactly what you're looking for: a fast-track approach to mastery of Eclipse. This insightful, hands-on book delivers clear and concise coverage, with no fluff, that gets down to business immediately. The book is tightly focused, covering all aspects of Eclipse: the menus, preferences, views, perspectives, editors, team and debugging techniques, and how they're used every day by thousands of developers. Development of practical skills is emphasized with dozens of examples presented throughout the book.From cover-to-cover, the book is pure Eclipse, covering hundreds of techniques beginning with the most basic Java development through creating your own plug-in editors for the Eclipse environment. Some of the topics you'll learn about include: Using Eclipse to develop Java code Testing and debugging Working in teams using CVS Building Eclipse projects using Ant The Standard Widget Toolkit (SWT) Web development Developing Struts applications with Eclipse From basics to advanced topics, Eclipse takes you through the fundamentals of Eclipse and more. You may be an Eclipse novice when you pick up the book, but you'll be a pro by the time you've finished.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Language: English
    Pages: p. cm
    DDC: 005.1/2
    Keywords: Computer software ; Development ; Software patterns ; Electronic books ; local
    Abstract: Design patterns are immensely powerful, but to build large-scale robust systems, you need more. Pattern-Oriented Analysis and Design introduces a methodology for "composing" proven design patterns into reliable, robust large-scale software systems. Using POAD, you can quickly build systems that are far more robust, scalable, and maintainable-using UML class diagrams as your building blocks. POAD: What it is, how it works, and what problems it solves Structural and behavioral approaches to design pattern composition Design models and UML techniques for pattern composition POAD processes: in depth coverage of analysis, design, and design refinement A systematic process to compose design patterns 4 chapter-length case studies: feedback control, customer behavior simulation, digital content processing, and distributed medical informatics Building on POAD: advanced trends and research Pattern-Oriented Analysis and Design takes design patterns to the next level. Whether you're an architect, designer, developer, or manager, it will help you build better software systems faster.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1/4
    Keywords: Computer software ; Testing ; Computers ; Testing ; Electronic books ; local
    Abstract: The advent of agile methodologies and test-driven development has brought software testing to the forefront of application development. Yet in today's harried rush-to-market development environment, organizations must find a delicate balance between product release and product quality. In Critical Testing Processes , the author distills knowledge gained from 20 years of testing experience into twelve critical processes. These include highly visible processes by which peers and management judge competence, and mission-critical processes in which performance affects the company's profits and reputation. After each process is introduced, the author demonstrates its use through an engaging case study. Instead of cumbersome regulations, this book provides checklists-lightweight, flexible tools for implementing process-oriented testing, gathering metrics, and making incremental process changes. By demonstrating critical processes in various organizational, operational, and technological contexts, this book shows readers how to: Handle recurrent tests efficiently and consistently Develop a cohesive, cooperative team that sidesteps redundancies Build a reputation for reliability through the effective communication of test results Define the focus of tests for maximum customer satisfaction and organizational success Because testing is a collaborative process with the participation of staff throughout the organization, the author discusses interpersonal and cultural issues in depth. This book also devotes ample coverage to the often-overlooked areas of planning and perfecting tests. Whatever your role in testing-from test engineering to managing hundreds of test engineers- Critical Testing Processes will offer valuable insights into what you do, why it's important, and how you can perform better. 0201748681B04222003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 299 p. ; , 23 cm
    Edition: 1st ed.
    DDC: 302.23/0973
    Keywords: Facts and Comparisons electronic resources ; Digital media ; United States ; Internet ; Political aspects ; United States ; Internet ; Social aspects ; United States ; Mass media and technology ; United States ; Online journalism ; United States ; Web publishing ; United States ; Electronic books ; local
    Abstract: " We the Media , has become something of a bible for those who believe the online medium will change journalism for the better." -Financial Times Big Media has lost its monopoly on the news, thanks to the Internet. Now that it's possible to publish in real time to a worldwide audience, a new breed of grassroots journalists are taking the news into their own hands. Armed with laptops, cell phones, and digital cameras, these readers-turned-reporters are transforming the news from a lecture into a conversation. In We the Media , nationally acclaimed newspaper columnist and blogger Dan Gillmor tells the story of this emerging phenomenon and sheds light on this deep shift in how we make--and consume--the news. Gillmor shows how anyone can produce the news, using personal blogs, Internet chat groups, email, and a host of other tools. He sends a wake-up call tonewsmakers-politicians, business executives, celebrities-and the marketers and PR flacks who promote them. He explains how to successfully play by the rules of this new era and shift from "control" to "engagement." And he makes a strong case to his fell journalists that, in the face of a plethora of Internet-fueled news vehicles, they must change or become irrelevant. Journalism in the 21st century will be fundamentally different from the Big Media oligarchy that prevails today. We the Media casts light on the future of journalism, and invites us all to be part of it. Dan Gillmor is founder of Grassroots Media Inc., a project aimed at enabling grassroots journalism and expanding its reach. The company's first launch is Bayosphere.com, a site "of, by, and for the San Francisco Bay Area." Dan Gillmor is the founder of the Center for Citizen Media, a project to enable and expand reach of grassroots media. From 1994-2004, Gillmor was a columnist at the San Jose Mercury News , Silicon Valley's daily newspaper, and wrote a weblog for SiliconValley.com. He joined the Mercury News after six years with the Detroit Free Press . Before that, he was with the Kansas City Times and several newspapers in Vermont. He has won or shared in several regional and national journalism awards. Before becoming a journalist he played music professionally for seven years.
    Note: "Web site directory": p. 251-257. - Includes bibliographical references (p. 261-279) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    ISBN: 0201914670
    Language: English
    Pages: xiii, 770 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.13/3
    Keywords: Java foundation classes ; Graphical user interfaces (Computer systems) ; Electronic books ; local
    Abstract: The JFC Swing Tutorial is back, fully revised and updated to include the latest revisions to the JFC Swing API and the Java™ 2 platform. In this book, authors and Java experts Kathy Walrath, Mary Campione, Alison Huml, and Sharon Zakhour-working closely with the Sun Microsystems Swing team-explore the ins and outs of creating GUIs with Swing components. This task-oriented, example-driven tutorial allows you to create user interfaces that work without change on multiple platforms, appearing and performing as well as or better than native interfaces. Leveraging the full power of the latest edition of the Java 2 platform, the authors bring the art of GUI creation to life with content new to this edition. This includes an easy-to-use tabbed reference section, new introductory chapters, and coverage of newer features such as JSpinner, JFormattedTextField, JProgressBar, mouse wheel support, the rearchitected focus subsystem, and improved support for drag and drop. Coverage includes: Introductory material for developers getting started with Swing, including sections on basic components such as text fields, labels, and buttons, as well as on using images The latest advice from the Swing team about thread safety Advanced Swing material, including changing key bindings, manipulating the focus, using data models, and adding painting code that uses the powerful Java 2D™ API How-to discussions on using individual components and containers, including advanced components such as tables, trees, and text editors Over 150 complete, working code examples For the novice or experienced Java developer looking to create robust, powerful, and visually stunning GUIs, The JFC Swing Tutorial, Second Edition, is an indispensable tutorial and reference.
    Note: Includes index. - Previous ed. cataloged under Walrath
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 863 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Juniper Networks, Inc ; Computer networks ; Equipment and supplies ; Routers (Computer networks) ; Electronic books ; local
    Abstract: Juniper Networks® creates and deploys high-performance routing platforms used by many of the world's largest service providers. Written by the leading experts and technical writers at Juniper Networks, the Juniper Networks® Field Guide and Reference is the definitive practical guide and reference to Juniper Networks hardware and software. This comprehensive book culls and condenses nearly six thousand pages of technical documentation, field alerts, technical FAQs, and more into a single convenient and accessible resource. It provides essential information for anyone designing, building, installing, configuring, and operating scalable IP networks. You will find in-depth information about JUNOS™ software, Juniper Networks routers, system management, interfaces, security, and VPNs. All the latest Juniper Networks technologies and releases are covered, including JUNOS 5.4, the T640 routing node and the T320 router, and all M-series routers. Other topics covered include: Router architecture and hardware components, including the T-series routing platforms and M-series routers CLI configuration and system management with SNMP Router interfaces, including Ethernet, SONET/SDH, tunnel, and channelized interfaces Class of service (CoS) IP Security (IPSec) Routing policy and firewall filters Routing protocols, including IS-IS, OSPF, RIP, BGP, PIM, DVMRP, IGMP, SAP, SDP, MSDP, and multicast scoping IPv6, including IPv4-to-IPv6 transition mechanisms Various MPLS applications Virtual Private Networks, covering Layer 2 and Layer 3 VPNs In addition, this pragmatic guide features sample configurations that come directly from the Juniper Networks testing labs, as well as a summary of all the critical JUNOS software monitoring commands. Whether you work with Juniper Networks products as a network engineer, administrator, or operator-or if you are just interested in learning how to build scalable multivendor IP networks-you will want to keep this thorough resource close at hand. 0321122445B09032002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 294 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.6/2
    Keywords: Directory services (Computer network technology) ; LDAP (Computer network protocol) ; Electronic books ; local
    Abstract: Be more productive and make your life easier. That's what LDAP System Administration is all about.System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately "see" the updated information.Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux® distributions and Mac OS® X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses: Configuration and access control Distributed directories; replication and referral Using OpenLDAP to replace NIS Using OpenLDAP to manage email configurations Using LDAP for abstraction with FTP and HTTP servers, Samba, and Radius Interoperating with different LDAP servers, including Active Directory Programming using Net::LDAP If you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxv, 762 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: C (Computer program language) ; C++ (Computer program language) ; Computer security ; Computer software ; Development ; Electronic books ; local
    Abstract: Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult. Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code. It contains a wealth of solutions to problems faced by those who care about the security of their applications. It covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering. The rich set of code samples provided in the book's more than 200 recipes will help programmers secure the C and C++ programs they write for both Unix® (including Linux®) and Windows® environments. Readers will learn: How to avoid common programming errors, such as buffer overflows, race conditions, and format string problems How to properly SSL-enable applications How to create secure channels for client-server communication without SSL How to integrate Public Key Infrastructure (PKI) into applications Best practices for using cryptography properly Techniques and strategies for properly validating input to programs How to launch programs securely How to use file access mechanisms properly Techniques for protecting applications from reverse engineering The book's web site supplements the book by providing a place to post new recipes, including those written in additional languages like Perl, Java, and Python. Monthly prizes will reward the best recipes submitted by readers. Secure Programming Cookbook for C and C++ is destined to become an essential part of any developer's library, a code companion developers will turn to again and again as they seek to protect their systems from attackers and reduce the risks they face in today's dangerous world.
    Note: "Covers Unix and Windows"--Cover. - "Recipes for cryptography, authentication, networking, input validation & more"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xx, 460 p. , ill. ; , 24 cm. +
    DDC: 650/.0285/5785
    Keywords: SAP Business information warehouse ; Business ; Computer programs ; Data warehousing ; Management information systems ; Electronic books ; local
    Abstract: SAP BW has recently come to the fore as a valuable tool for developing data warehouses that accurately and effectively support critical business decision making. It facilitates easy-to-use and high-performance extraction, transfer, transformation, and loading of data from a variety of data sources, including such comprehensive business management systems as SAP R/3. This practitioner's guide uses step-by-step instructions complete with a plethora of screen captures to illustrate key SAP BW functionalities. It demonstrates how SAP BW implements the fundamental star schema and solves the major challenges inherent in the creation of data warehouses: performance, reliability, and error-handling. Using a real-world business scenario as a running example, SAP® BW presents a comprehensive view of the technology, from underlying concepts and basic techniques through its most sophisticated capabilities. Specific topics covered include: Creating an InfoCube and loading the data Checking the accuracy of data with BW Monitor and the Persistent Staging Area (PSA) Creating queries to generate reports using Business Explorer (BEx) Managing user authorization with the Profile Generator Advanced InfoCube design techniques Aggregates and multicubes Working with the Operational Data Store (ODS) Installing business content and creating an R/3 source system in BW Loading data from SAP R/3 into SAP BW Data maintenance Performance tuning, including parallel query option and data packet sizing Object transport Although the focus is on the core SAP BW technology, this book also discusses other relevant technologies, including Basis, ABAP (Advanced Business Application Programming), ALE (Application Link Enabling), and ASAP (Accelerated SAP) for BW. With the clear explanations and practical techniques presented in SAP® BW information systems professionals will gain both the general understanding and specific skills necessary to create high quality data warehouses that support effective decision making. 0201703661B07092002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 599 p. , ill. ; , 23 cm. +
    DDC: 005.1/17
    Keywords: ActiveX ; Application software ; Development ; Internet programming ; Microsoft .NET ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: Written by experts on the Microsoft® .NET programming platform, ADO.NET in a Nutshell delivers everything .NET programmers will need to get a jump-start on ADO.NET technology or to sharpen their skills even further. In the tradition of O'Reilly's In a Nutshell Series, ADO.NET in a Nutshell is the most complete and concise source of ADO.NET information available.ADO.NET is the suite of data access technologies in the .NET Framework that developers use to build applications services accessing relational data and XML. Connecting to databases is a fundamental part of most applications, whether they are web, Windows®, distributed, client/server, XML Web Services, or something entirely different. But ADO.NET is substantially different from Microsoft's previous data access technologies--including the previous version of ADO--so even experienced developers need to understand the basics of the new disconnected model before they start programming with it.Current with the .NET Framework 1.1, ADO.NET in a Nutshell offers one place to look when you need help with anything related to this essential technology, including a reference to the ADO.NET namespaces and object model. In addition to being a valuable reference, this book provides a concise foundation for programming with ADO.NET and covers a variety of issues that programmers face when developing web applications or Web Services that rely on database access. Using C#, this book presents real world, practical examples that will help you put ADO.NET to work immediately.Topics covered in the book include: An Introduction to ADO.NET Connections, Commands and DataReaders Disconnected Data Advanced DataSets Transactions DataViews and Data Binding XML and the DataSet Included with the book is a Visual Studio .NET add-in that integrates the entire reference directly into your help files. When combining ADO.NET in a Nutshell with other books from O'Reilly's .NET In a Nutshell series, you'll have a comprehensive, detailed and independent reference collection that will help you become more productive.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 357 p. , ill. ; , 24 cm. +
    Edition: 1st ed.
    DDC: 005.2/768
    Keywords: Internet programming ; Microsoft .NET Framework ; Virtual computer systems ; Electronic books ; local
    Abstract: Microsoft's Shared Source CLI (code-named "Rotor") is the publicly available implementation of the ECMA Common Language Infrastructure (CLI) and the ECMA C# language specification. Loaded with three million lines of source code, it presents a wealth of programming language technology that targets developers interested in the internal workings of the Microsoft .NET Framework, academics working with advanced compiler technology, and people developing their own CLI implementations. The CLI, at its heart, is an approach to building software that enables code from many independent sources to co-exist and interoperate safely. Shared Source CLI Essentials is a companion guide to Rotor's code. This concise and insightful volume provides a road map for anyone wishing to navigate, understand, or alter the Shared Source CLI code. This book illustrates the design principles used in the CLI standard and discusses the complexities involved when building virtual machines. Included with the book is a CD-ROM that contains all the source code and files. After introducing the CLI, its core concepts, and the Shared Source CLI implementation, Shared Source CLI Essentials covers these topics: The CLI type system Component packaging and assemblies Type loading and JIT Compilation Managed code and the execution engine Garbage collection and memory management The Platform Adaptation Layer (PAL): a portability layer for Win32®, Mac OS® X, and FreeBSD Written by members of the core Microsoft® team that designed the .NET Framework, Shared Source CLI Essentials is for anyone who wants a deeper understanding of what goes on under the hood of the .NET runtime and the ECMA CLI. Advanced .NET programmers, researchers, the academic community, and CLI implementers who have asked hard questions about the .NET Framework will find that this behind-the-scenes look at the .NET nucleus provides them with excellent resources from which they can extract answers.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 168 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.4/465
    Keywords: Mac OS ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Renowned for its friendliness, Mac OS® X has delighted many a loyal Mac® user with its combined ease use and underlying strength. By no means simplistic, its intelligently designed operating system and user interface boast of sophistication and power, while still offering accessibility to even the most inexperienced computer users. But Mac OS X has gone one step further: it's turned unsuspecting Mac users into Unix® users, too. Perhaps you're already familiar with Unix, just not on the Mac. Or perhaps you opened your Utilities folder, spotted the Terminal icon and double-clicked on it just to see what it does. Suddenly faced with a command line interface, you may have asked, "What does this mean?" followed by the most pressing question, "Why on earth would I ever want to venture into this seemingly user-unfriendly territory?" The new edition of Learning Unix for Mac OS X Panther answers these questions and more. This compact book provides a user-friendly tour for the uninitiated of the Mac's Unix base. You can safely explore Terminal and familiarize yourself with the command line, learning as you go about the hundreds of Unix programs that come with your Mac. You'll begin to understand the power and flexibility of Unix. And if Unix isn't new to you, you'll discover how it translates into this latest Mac incarnation. Updated to cover Mac OS X Panther (Mac OS X 10.3), this book will keep you current with the latest features of your Mac. Learning Unix for Mac OS X Panther begins with a quick but in-depth introduction to Terminal and the command line interface. All the common commands are simply explained with accompanying examples, exercises, and opportunities for experimentation. There are even problem checklists to help you along the way if you get stuck. You'll learn how to: Customize your shell environment Manage files and directories Successfully print from the Unix command line Edit and create files with the vi editor Perform remote logins Access Internet functions, and much more Unix continues to thrive as an operating system because of its power, flexibility, and simplicity, and the vast community that supports it. Mac OS X Panther makes it possible for you to run Unix programs side-by-side with native Mac programs on your Mac desktop. Learning Unix for Mac OS X Panther puts the power of these programs at your fingertips.
    Note: "Unlock the power of UNIX"--Cover. - Includes index. - Rev. ed. of: Learning Unix for Mac OS X
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 391 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Embedded computer systems ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux® is being adopted by an increasing number of embedded systems developers, who have been won over by its sophisticated scheduling and networking, its cost-free license, its open development model, and the support offered by rich and powerful programming tools. While there is a great deal of hype surrounding the use of Linux in embedded systems, there is not a lot of practical information. Building Embedded Linux Systems is the first in-depth, hard-core guide to putting together an embedded system based on the Linux kernel. This indispensable book features arcane and previously undocumented procedures for: Building your own GNU development toolchain Using an efficient embedded development framework Selecting, configuring, building, and installing a target-specific kernel Creating a complete target root filesystem Setting up, manipulating, and using solid-state storage devices Installing and configuring a bootloader for the target Cross-compiling a slew of utilities and packages Debugging your embedded system using a plethora of tools and techniques Details are provided for various target architectures and hardware configurations, including a thorough review of Linux's support for embedded hardware. All explanations rely on the use of open source and free software packages. By presenting how to build the operating system components from pristine sources and how to find more documentation or help, this book greatly simplifies the task of keeping complete control over one's embedded operating system, whether it be for technical or sound financial reasons.Author Karim Yaghmour, a well-known designer and speaker who is responsible for the Linux Trace Toolkit, starts by discussing the strengths and weaknesses of Linux as an embedded operating system. Licensing issues are included, followed by a discussion of the basics of building embedded Linux systems. The configuration, setup, and use of over forty different open source and free software packages commonly used in embedded Linux systems are also covered. uClibc, BusyBox, U-Boot, OpenSSH, thttpd, tftp, strace, and gdb are among the packages discussed.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 1205 p. , ill. ; , 24 cm
    Edition: 3rd ed., rev. and updated.
    DDC: 004.692
    Keywords: Sendmail ; Electronic mail systems ; Computer programs ; Electronic books ; local
    Abstract: Reliable, flexible, and configurable enough to solve the mail routing needs of any web site, sendmail has withstood the test of time, but has become no less daunting in its complexity. Even the most experienced system administrators have found it challenging to configure and difficult to understand. For help in unraveling its intricacies, sendmail administrators have turned unanimously to one reliable source--the bat book, or sendmail by Bryan Costales and the creator of sendmail, Eric Allman. Now in its third edition, this best-selling reference will help you master the most demanding version of sendmail yet.The new edition of sendmail has been completely revised to cover sendmail 8.12--a version with more features and fundamental changes than any previous version of the Unix-based email routing program. Because the latest version of sendmail differs so significantly from earlier versions, a massive rewrite of this best-selling reference was called for.The book begins by guiding you through the building and installation of sendmail and its companion programs, such as vacation and makemap. These additional programs are pivotal to sendmail's daily operation. Next, you'll cover the day-to-day administration of sendmail. This section includes two entirely new chapters, "Performance Tuning" to help you make mail delivery as efficient as possible, and "Handling Spam" to deal with sendmail's rich anti-spam features. The next section of the book tackles the sendmail configuration file and debugging. And finally, the book wraps up with five appendices that provide more detail about sendmail than you may ever need. Altogether, versions 8.10 through 8.12 include dozens of new features, options, and macros, and this greatly expanded edition thoroughly addresses each, and provides and advance look at sendmail version 8.13 (expected to be released in 2003).With sendmail , Third Edition in hand, you will be able to configure this challenging but necessary utility for whatever needs your system requires. This much anticipated revision is essential reading for sendmail administrators.
    Note: Includes bibliographical references (p. 1177-1182) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 267 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Parallel Title: Erscheint auch als
    DDC: 005.13/3
    Keywords: Database design ; Java (Computer program language) ; Relational databases ; Electronic books ; local
    Abstract: When creating complex Java enterprise applications, do you spend a lot of time thumbing through a myriad of books and other resources searching for what you hope will be the API that's right for the project at hand? Java Database Best Practices rescues you from having to wade through books on each of the various APIs before figuring out which method to use! This comprehensive guide introduces each of the dominant APIs (Enterprise JavaBeans, Java Data Objects, the Java Database Connectivity API (JDBC) as well as other, lesser-known options), explores the methodology and design components that use those APIs, and then offers practices most appropriate for different types and makes of databases, as well as different types of applications. Java Database Practices also examines database design, from table and database architecture to normalization, and offers a number of best practices for handling these tasks as well. Learn how to move through the various forms of normalization, understand when to denormalize, and even get detailed instructions on optimizing your SQL queries to make the best use of your database structure. Through it all, this book focuses on practical application of these techniques, giving you information that can immediately be applied to your own enterprise projects.Enterprise applications in today's world are about data-- whether it be information about a product to buy, a user's credit card information, or the color that a customer prefers for their auto purchases. And just as data has grown in importance, the task of accessing that data has grown in complexity. Until now, you have been left on your own to determine which model best suits your application, and how best to use your chosen API. Java Database Practices is the one stop reference book to help you determine what's appropriate for your specific project at hand. Whether it's choosing between an alphabet soup of APIs and technologies--EJB, JDO, JDBC, SQL, RDBMS, OODBMS, and more on the horizon, this book is an indispensable resource you can't do without.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 520 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: DHTML (Document markup language) ; Internet programming ; JavaScript (Computer program language) ; Electronic books ; local
    Abstract: On numerous online forums for JavaScript and DHTML, the majority of questions begin with "How do I...?" This new Cookbook provides the answers. After reading thousands of forum threads over the years, author and scripting pioneer Danny Goodman has compiled a list of problems that frequently vex scripters of various experience levels. He has now applied state-of-the-art ECMA and W3C DOM standards and used best practices to create this extensive collection of practical recipes that can bring your web pages to life.The JavaScript & DHTML Cookbook is all about adding value to the content of a web page. The book focuses on practical and sensible applications of scripting, rather than flying images and gratuitous color changes. For every problem Goodman addresses, there's a solution or "recipe"--a focused piece of code that web developers can insert directly into their applications. Yet, rather than just cut-and-paste code, you also get explanations of how and why the code works, so you can learn to adapt the problem-solving techniques to your designs.The recipes range from simple tasks, such as manipulating strings and validating dates in JavaScript, to entire libraries that demonstrate complex tasks, such as cross-browser positioning of HTML elements and sorting tables. This book contains over 150 recipes on the following topics: Working with interactive forms and style sheets Presenting user-friendly page navigation Creating dynamic content Producing visual effects for stationary content Positioning HTML elements Managing browser windows and multiple frames This book is the ideal companion to O'Reilly's JavaScript: The Definitive Guide and Dynamic HTML: The Definitive Reference . If you own either of these books, the JavaScript & DHTML Cookbook is a must.
    Note: "Solutions & examples for web programmers"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Language: English
    Pages: vi, 121 p. ; , 18 cm
    Edition: 2nd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; PL/SQL (Computer program language) ; Relational databases ; Electronic books ; local
    Abstract: Like most PL/SQL programmers, you've found Oracle PL/SQL Programming to be a reference book you can't do without. Packed with examples and recommendations, it's a book that has helped everyone, from Oracle Forms developers to database administrators, make the most of PL/SQL. But you can't always carry it with you, and even at your desk there are times when you just need a reminder, a quick answer to a problem you're up against. For times like those, PL/SQL experts Stephen Feuerstein, Bill Pribyl, and Chip Dawes have written a new edition of Oracle PL/SQL Language Pocket Reference . Updated for Oracle9i, this little book is easy to take with you and use anywhere for quick problem solving. The second edition of the Oracle PL/SQL Language Pocket Reference boils down the most vital information from Oracle PL/SQL Programming into a convenient quick reference to PL/SQL basics. This compact book will be indispensable for new and seasoned Oracle database developers alike. It summarizes features available in Oracle9i and provides essential information on PL/SQL block structure, fundamental language elements, control statements, and use of procedures, functions, packages, triggers, Oracle objects, external procedures, and methods of calling Java classes from PL/SQL. O'Reilly's Pocket References have become a favorite among developers and database administrators everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point in your work and need to get to a solution quickly, the new edition of Oracle PL/SQL Language Pocket Reference is the book you'll want to have.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: ix, 118 p. ; , 18 cm
    Keywords: C# (Computer program language) ; Electronic books ; local
    Abstract: C# programmers all have one thing in common -- they're learning a new language. That fact alone brings challenges, frustrations, and constant demands on your patience. And, no matter how good your reference books are, you can't always stop to thumb through hundreds of pages to find the piece of information you need. Your answer is the C# Language Pocket Reference . Concise and easy to use, this handy pocket guide to C# comes from the authors of C# in a Nutshell , and is a must-have quick reference for anyone implementing this new object-oriented language.The C# Language Pocket Reference offers the convenience of a quick reference in a format that will actually fit in your pocket. The book includes a guide to C# language elements, a brief overview of the Framework Class library, a cross-reference for namespaces and assemblies, a list of compiler syntax and switches, a regular expressions reference guide, and more. You'll be surprised at how much information can fit into this slim volume.O'Reilly's Pocket References have become a favorite among programmers everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point in your work and need to get to a solution quickly, the new C# Language Pocket Reference is the book you'll want to have.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 642 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 006.7/6
    Keywords: Application program interfaces (Computer software) ; Internet programming ; Java (Computer program language) ; Web services ; Electronic books ; local
    Abstract: Java Web Services in a Nutshell is a high-speed tutorial and a quick reference for the technologies that Sun Microsystems is creating for implementing web services with Java. This book is a succinct introduction and handy reference to the Java/XML APIs, more commonly known as the JWSDP or "Java Web Services Development Pack." These APIs are taking the Java world by storm, as they are capable of handling everything from simple XML to SOAP to full ebXML vocabularies. Although "web services" technology has suffered from much hype and overly grand expectations, there is plenty of solid development going on, especially in extending enterprise applications, and a huge amount of this development is being done in Java. As a result, the J2EE APIs for web services are evolving rapidly, and this new "in a Nutshell" book covers them all in depth. One of the most important APIs in the JWSDP is JAX-RPC (Java API for XML-based RPC). It's also the API that developers most consistently post questions about. Java Web Services in a Nutshell covers all aspects of JAX-RPC in detail, with tutorial coverage alone exceeding 150 pages. This book offers developers everything they need to program with JAX-RPC. Java Web Services in a Nutshell begins with an introduction to Java web services, including a discussion of how they differ from web applications. The author looks at the protocols and interfaces that underpin web services, the J2EE technologies that address web services, WSDL as the means for describe web services, and more. Subsequent chapters cover: JAX-RPC SOAP and the SOAP with Attachments API for Java (SAAJ) Reliable SOAP messaging with JAXM WSDL Advanced JAX-RPC JAXR, the XML-based registry API Web Services Tools The balance of the book is made up of an API Quick Reference containing documentation for the various API packages. Intended for Java developers who need to implement Java services or who need their applications to access existing web services, Java Web Services in a Nutshell delivers practical information to help developers make sense of the rapidly changing and poorly organized official documentation. If web services and Enterprise Java are any part of your job description -- of if you'd like them to be -- you'll want this book close beside as you work.
    Note: "Covers J2EE 1.4 & JWSDP"--Cover. - Includes bibliographical references (p. xi-xii) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Language: English
    Pages: xxix, 954 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.8
    Keywords: UNIX (Computer file) ; Computer security ; Internet ; Congresses ; Operating systems (Computers) ; Electronic books ; local
    Abstract: When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more. Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.
    Note: Includes bibliographical references (p. 873-895) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 853 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Keywords: Computer programming ; Unicode (Computer character set) ; Standards ; Electronic books ; local
    Abstract: "Rich has a clear, colloquial style that allows him to make even complex Unicode matters understandable. People dealing with Unicode will find this book a valuable resource." --Dr. Mark Davis, President, The Unicode Consortium As the software marketplace becomes more global in scope, programmers are recognizing the importance of the Unicode standard for engineering robust software that works across multiple regions, countries, languages, alphabets, and scripts. Unicode Demystified offers an in-depth introduction to the encoding standard and provides the tools and techniques necessary to create today's globally interoperable software systems. An ideal complement to specifics found in The Unicode Standard, Version 3.0 (Addison-Wesley, 2000), this practical guidebook brings the "big picture" of Unicode into practical focus for the day-to-day programmer and the internationalization specialist alike. Beginning with a structural overview of the standard and a discussion of its heritage and motivations, the book then shifts focus to the various writing systems represented by Unicode--along with the challenges associated with each. From there, the book looks at Unicode in action and presents strategies for implementing various aspects of the standard. Topics covered include: The basics of Unicode--what it is and what it isn't The history and development of character encoding The architecture and salient features of Unicode, including character properties, normalization forms, and storage and serialization formats The character repertoire: scripts of Europe, the Middle East, Africa, Asia, and more, plus numbers, punctuation, symbols, and special characters Implementation techniques: conversions, searching and sorting, rendering, and editing Using Unicode with the Internet, programming languages, and operating systems With this book as a guide, programmers now have the tools necessary to understand, create, and deploy dynamic software systems across today's increasingly global marketplace. 0201700522B08092002
    Note: Includes bibliographical references (p. 811-816) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: iv, 60 p. ; , 18 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Handbooks, manuals, etc ; Electronic data processing ; Handbooks, manuals, etc ; Text processing (Computer science) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Support for regular expressions in SQL and PL/SQL is one of the most exciting features of Oracle Database 10G. Oracle has long supported the ANSI-standard LIKE predicate for rudimentary pattern matching, but regular expressions take pattern matching to a new level. They provide a powerful way to select data that matches a pattern, as well as to manipulate, rearrange, and change that data.This concise pocket guide is part tutorial and part quick-reference. It's suitable for those who have never used regular expressions before, as well as those who have experience with Perl and other languages supporting regular expressions. The book describes Oracle Database 10G's support for regular expressions, including globalization support and differences between Perl's syntax and the POSIX syntax supported by Oracle 10G. It also provides a comprehensive reference, including examples, to all supported regular expression operators, functions, and error messages.O'Reilly's Pocket References have become a favorite among developers and database administrators everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. Whether you're using regular expressions for the first time or applying your skills from other languages to the latest version of Oracle, the Oracle Regular Expressions Pocket Reference is the book to have close by.
    Note: "New in Oracle database 10g"--Cover. - "Tutorial & quick reference"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxi, 254 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 006.7
    Keywords: Digital media ; Home entertainment systems ; Interactive multimedia ; Electronic books ; local
    Abstract: TiVo Hacks helps you get the most out of your TiVo personal video recorder. Armed with just a screwdriver and basic understanding of PC hardware (or willingness to learn), preeminent hackability awaits. This book includes hacks for changing the order of recorded programs, activating the 30-second skip to blaze through commercials, upgrading TiVo's hard drive for more hours of recording, use of TiVo's Home Media Option to remotely schedule a recording via the Web, log in to the serial port for command-line access to programming data, log files, closed-captioning data, display graphics on the TiVo screen, and even play MP3s.Readers who use advanced hacks to put TiVo on their home network via the serial port, Ethernet, USB, or wireless (with 802.11b WiFi) will watch a whole new world open up. By installing various open source software packages, you can use TiVo for mail, instant messaging, caller-ID, and more. It's also easy to run a web server on TiVo to schedule recordings, access lists of recorded shows, and even display them on a web site. While TiVo gives viewers personalized control of their TVs, TiVo Hacks gives users personalized control of TiVo. Note: Not all TiVos are the same. The original TiVo, the Series 1, is the most hackable TiVo out there; it's a box thrown together with commodity parts and the TiVo code is running on open hardware. The Series 2 TiVo, the most commonly sold TiVo today, is not open. You won't see hacks in this book that involve modifying Series 2 software.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 392 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/469
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Windows XP is the latest, most reliable, and best-looking version of the Windows operating system to emerge yet. As the result of the unification of Microsoft's corporate series (Windows NT and 200) with the home series (Windows 95, 98, and Me), Windows XP offers much that is pleasing to its users: rock-solid stability and a fresh new look. But power users who want to take command of their operating systems will find the same old frustrations: it's never been easy to get under the hood of a Windows system and Windows XP is no exception. Now power users can rejoice! Windows XP Hacks offers tips, tools, and know-how to bend Windows XP to your will. The book delves into XP topics such as controlling the control panel, changing unchangeable icons, removing uninstallable XP components, stopping pop-up ads, taking a bite out of cookies, speeding up file downloads, protecting yourself with firewalls and proxy servers, and more. Users of both Windows XP Home Edition and Windows XP Pro Edition will find smart, timesaving, fun, and useful hacks for virtually every feature in their operating system. Even if you're not a power user yet, this book will have you well on your way. Each Hack in the book can be read easily in a few minutes, saving countless hours of searching for the right answer. Windows XP Hacks provides direct, hands-on solutions that can be applied to the challenges facing both those meeting Windows XP for the first time as well as long-time users who know what they want from their operating system and just wants tips on how to get it. Windows XP Hacks is the latest in O'Reilly's new Hacks Series which aims to begin reclaiming the term "hacking" for the good guys. In recent years, the term has come to be associated with those nefarious black hats who break into computers to snoop, steal information or disrupt Internet traffic. But the term originally had a more benign meaning, and you'll still hear it used this way whenever developers get together. Our new Hacks books are written in the spirit of the true hackers -- the people who drive innovation.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Language: English
    Pages: xxiii, 897 p. , ill. ; , 23 cm. +
    Edition: 2nd ed.
    Series Statement: In a nutshell
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Electronic books ; local
    Abstract: C# in a Nutshell provides C# programmers with a concise and thorough reference to the language in one straightforward and accessible volume. Designed as a handbook for daily use, this book is an essential guide to the C# language and the base class APIs of the .NET Framework. Programmers will want to keep this book next to their keyboards for years to come. The heart of the book is a succinct but detailed reference to the C# language and the .NET types most essential to C# programmers. Each chapter in the API reference begins with an overview of a .NET namespace and a diagram of its types, including a quick-reference entry for each type, with name, assembly, category, description, member availability, class hierarchy, and other relevant information, such as whether the type is part o the ECMA CLI specification. Newly updated for .NET Framework version 1.1, the second edition also adds a CD that allows you to integrate the book's API Quick Reference directly into the help files of Visual Studio .NET 2002 & 2003, giving you direct access to this valuable information via your computer. In addition to the API reference section, this book includes: An accelerated introduction to the C# language and the .NET Common Language Runtime A tutorial section on using C# with the core classes of the .NET Framework Class Library to perform common tasks such as manipulating strings, I/O, and interacting with legacy components Comprehensive language and tool reference chapters, including a C# syntax summary, a list of XML documentation tags, and a guide to command-line tools that ship with Visual Studio .NET and the .NET Framework Appendixes with reference tables for regular expression syntax, format specifiers, a C# keyword glossary, namespace/assembly cross-reference, and a type and member index for determining in which type a method or field is defined. Every once in a while, a book becomes the de-facto standard for a technology, operating system, or programming language--which is exactly what C# in a Nutshell has done in a single straightforward and easy to use volume. There is no more complete, up-to-date reference to the C# Language available.
    Note: Includes indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 928 p. , ill. ; , 23 cm
    Edition: 4th ed.
    Series Statement: In a nutshell
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux in a Nutshell , now in its fourth edition, has won awards in the Linux community as the most indispensable book about Linux. It is an essential desktop reference for the commands that users of Linux utilize every day, with the depth of information and the practical, succinct "In a Nutshell" format that made the previous editions so popular. Comprehensive but concise, Linux in a Nutshell covers all substantial user, programming, administration, and networking commands for the most common Linux distributions. It's several quick references rolled into one: sed, gawk, RCS, CVS, vi, Emacs, bash, tcsh, regular expressions, package management, bootloaders, and desktop environments are all covered in this clear, to-the-point volume, along with core command-line utilities. The fourth edition continues to track the major changes in bootloaders, the GNOME and KDE desktops, and general Unix commands. Several commands related to CDs and music reflect the evolution of multimedia on Linux. Coverage has been added for GRUB, which has become the default bootloader on several Linux distributions, and for vim, the popular and feature-loaded extension to vi. The addition of several new options to the iptables firewall command and new commands related to DNSSEC and ssh show the book's value as a security tool. With this book, you no longer have to grope through long manpages and info documents for the information you need; you'll find it here in clear language and an easy-to-read format. Contents include: Programming, system administration, networking, and user commands with complete lists of options GRUB, LILO, and Loadlin bootloaders Shell syntax and variables for the bash, csh, and tcsh shells Pattern matching Emacs, vi, and vim editing commands sed and gawk commands The GNOME and KDE desktops and the fvwm2 window manager Red Hat and Debian package managers
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 850 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    DDC: 621.39/16
    Keywords: Microcomputers ; Equipment and supplies ; Microcomputers ; Maintenance and repair ; Microcomputers ; Purchasing ; Microcomputers ; Upgrading ; Electronic books ; local
    Abstract: PC Hardware in a Nutshell is the practical guide to buying, building, upgrading, and repairing Intel-based PCs. A longtime favorite among PC users, the third edition of the book now contains useful information for people running either Windows or Linux operating systems. Written for novices and seasoned professionals alike, the book is packed with useful and unbiased information, including how-to advice for specific components, ample reference material, and a comprehensive case study on building a PC.In addition to coverage of the fundamentals and general tips about working on PCs, the book includes chapters focusing on motherboards, processors, memory, floppies, hard drives, optical drives, tape devices, video devices, input devices, audio components, communications, power supplies, and maintenance. Special emphasis is given to upgrading and troubleshooting existing equipment so you can get the most from your existing investments.This new edition is expanded to include: Detailed information about the latest motherboards and chipsets from AMD, Intel, SiS, and VIA Extensive coverage of the Pentium 4 and the latest AMD processors, including the Athlon XP/MP Full details about new hard drive standards, including the latest SCSI standards, ATA/133, Serial ATA, and the new 48-bit "Big Drive" ATA interface Extended coverage of DVD drives, including DVD-RAM, DVD-R/RW, and DVD+R/RW Details about Flat Panel Displays, including how to choose one (and why you might not want to) New chapters on serial communications, parallel communications, and USB communications (including USB 2.0) Enhanced troubleshooting coverage PC Hardware in a Nutshell , 3rd Edition provides independent, useful and practical information in a no-nonsense manner with specific recommendations on components. Based on real-world testing over time, it will help you make intelligent, informed decisions about buying, building, upgrading, and repairing PCs in a cost effective manner that will help you maximize new or existing computer hardware systems. It's loaded with real-world advice presented in a concise style that clearly delivers just the information you want, without your having to hunt for it.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 665 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.268
    Keywords: Microsoft Windows (Computer file) ; Directory services (Computer network technology) ; Local area networks (Computer networks) ; Management ; Operating systems (Computers) ; Electronic books ; local
    Abstract: When Microsoft introduced Windows 2000, the most important change was the inclusion of Active Directory. With many great benefits, it continues to be a huge headache for network and system administrators to design, implement and support. The first edition of this book, O'Reilly's best-selling Windows 2000 Active Directory , eased their pain considerably. Now titled Active Directory , 2nd Edition, this book provides system and network administrators, IT professionals, technical project managers, and programmers with a clear, detailed look at Active Directory for both Windows 2000 and Windows Server 2003. The upgraded Active Directory that ships with Windows Server 2003 has over 100 new and enhanced features and once again, O'Reilly has the answers to puzzling questions. While Microsoft's documentation serves as an important reference, Active Directory , 2nd Edition is a guide to help the curious (and weary) understand the big picture. In addition to the technical details for implementing Active Directory, several new and significantly enhanced chapters describe the numerous features that have been updated or added in Windows Server 2003 along with coverage of new programmatic interfaces that are available to manage it. After reading the book you will be familiar with the Lightweight Directory Access Protocol (LDAP), multi-master replication, Domain Name System (DNS), Group Policy, and the Active Directory Schema, among many other topics. Authors Robbie Allen and Alistair G. Lowe-Norris are experienced veterans with real-world experience. Robbie is a Senior Systems Architect in the Advanced Services Technology Group at Cisco Systems. He was instrumental in the deployment and automation of Active Directory, DNS and DHCP at Cisco, and is now working on network automation tools. Alistair is an enterprise program manager for Microsoft U.K. and previously worked for Leicester University as the project manager and technical lead of the Rapid Deployment Program for Windows 2000. Active Directory , 2nd Edition will guide you through the maze of concepts, design issues and scripting options enabling you to get the most out of your deployment.
    Note: "Covers Windows 2000 & Windows Server 2003"--Cover. - "Design and deployment of Microsoft's Active Directory"--Cover. - Earlier ed. published under title: Windows 2000 Active Directory. 2000. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 205 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Perl is a versatile, powerful programming language used in a variety of disciplines, ranging from system administration to web programming to database manipulation. One slogan of Perl is that it makes easy things easy and hard things possible. This book is about making the leap from the easy things to the hard ones. Learning Perl Objects, References & Modules offers a gentle but thorough introduction to advanced programming in Perl. Written by the authors of the best-selling Learning Perl , this book picks up where that book left off. Topics include: Packages and namespaces References and scoping Manipulating complex data structures Object-oriented programming Writing and using modules Contributing to CPAN Following the successful format of Learning Perl , each chapter in the book is designed to be small enough to be read in just an hour or two, ending with a series of exercises to help you practice what you've learned. To use the book, you just need to be familiar with the material in Learning Perl and have ambition to go further.Perl is a different language to different people. It is a quick scripting tool for some, and a fully-featured object-oriented language for others. It is used for everything from performing quick global replacements on text files, to crunching huge, complex sets of scientific data that take weeks to process. Perl is what you make of it. But regardless of what you use Perl for, this book helps you do it more effectively, efficiently, and elegantly. Learning Perl Objects, References & Modules is about learning to use Perl as a programming language, and not just a scripting language. This is the book that separates the Perl dabbler from the Perl programmer.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 190 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.6/2
    Keywords: Computer networks ; Access control ; Computer networks ; Remote access ; RADIUS (Computer network protocol) ; Electronic books ; local
    Abstract: The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS , or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. Originally developed for dial-up remote access, RADIUS is now used by virtual private network (VPN) servers, wireless access points, authenticating Ethernet switches, Digital Subscriber Line (DSL) access, and other network access types. Extensible, easy to implement, supported, and actively developed, RADIUS is currently the de facto standard for remote authentication. RADIUS provides a complete, detailed guide to the underpinnings of the RADIUS protocol, with particular emphasis on the utility of user accounting. Author Jonathan Hassell draws from his extensive experience in Internet service provider operations to bring practical suggestions and advice for implementing RADIUS. He also provides instructions for using an open-source variation called FreeRADIUS."RADIUS is an extensible protocol that enjoys the support of a wide range of vendors," says Jonathan Hassell. "Coupled with the amazing efforts of the open source development community to extend RADIUS's capabilities to other applications-Web, calling card security, physical device security, such as RSA's SecureID-RADIUS is possibly the best protocol with which to ensure only the people that need access to a resource indeed gain that access."This unique book covers RADIUS completely, from the history and theory of the architecture around which it was designed, to how the protocol and its ancillaries function on a day-to-day basis, to implementing RADIUS-based security in a variety of corporate and service provider environments. If you are an ISP owner or administrator, corporate IT professional responsible for maintaining mobile user connectivity, or a web presence provider responsible for providing multiple communications resources, you'll want this book to help you master this widely implemented but little understood protocol.
    Note: Includes index. - RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. RADIUS provides a complete, detailed guide to the underpinnings of the RADIUS protocol. Author Jonathan Hassell brings practical suggestions and advice for implementing RADIUS and provides instructions for using an open-source variation called FreeRADIUS
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 331 p. , ill. ; , 24 cm
    DDC: 006.7/4
    Keywords: Cataloging of computer network resources ; Metadata ; RDF (Document markup language) ; Semantic Web ; Electronic books ; local
    Abstract: The Resource Description Framework (RDF) is a structure for describing and interchanging metadata on the Web--anything from library catalogs and worldwide directories to bioinformatics, Mozilla internal data structures, and knowledge bases for artificial intelligence projects. RDF provides a consistent framework and syntax for describing and querying data, making it possible to share website descriptions more easily. RDF's capabilities, however, have long been shrouded by its reputation for complexity and a difficult family of specifications. Practical RDF breaks through this reputation with immediate and solvable problems to help you understand, master, and implement RDF solutions. Practical RDF explains RDF from the ground up, providing real-world examples and descriptions of how the technology is being used in applications like Mozilla, FOAF, and Chandler, as well as infrastructure you can use to build your own applications. This book cuts to the heart of the W3C's often obscure specifications, giving you tools to apply RDF successfully in your own projects.The first part of the book focuses on the RDF specifications. After an introduction to RDF, the book covers the RDF specification documents themselves, including RDF Semantics and Concepts and Abstract Model specifications, RDF constructs, and the RDF Schema. The second section focuses on programming language support, and the tools and utilities that allow developers to review, edit, parse, store, and manipulate RDF/XML. Subsequent sections focus on RDF's data roots, programming and framework support, and practical implementation and use of RDF and RDF/XML.If you want to know how to apply RDF to information processing, Practical RDF is for you. Whether your interests lie in large-scale information aggregation and analysis or in smaller-scale projects like weblog syndication, this book will provide you with a solid foundation for working with RDF.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 765 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: To thoroughly understand what makes Linux tick and why it's so efficient, you need to delve deep into the heart of the operating system--into the Linux kernel itself. The kernel is Linux--in the case of the Linux operating system, it's the only bit of software to which the term "Linux" applies. The kernel handles all the requests or completed I/O operations and determines which programs will share its processing time, and in what order. Responsible for the sophisticated memory management of the whole system, the Linux kernel is the force behind the legendary Linux efficiency. The new edition of Understanding the Linux Kernel takes you on a guided tour through the most significant data structures, many algorithms, and programming tricks used in the kernel. Probing beyond the superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Relevant segments of code are dissected and discussed line by line. The book covers more than just the functioning of the code, it explains the theoretical underpinnings for why Linux does things the way it does. The new edition of the book has been updated to cover version 2.4 of the kernel, which is quite different from version 2.2: the virtual memory system is entirely new, support for multiprocessor systems is improved, and whole new classes of hardware devices have been added. The authors explore each new feature in detail. Other topics in the book include: Memory management including file buffering, process swapping, and Direct memory Access (DMA) The Virtual Filesystem and the Second Extended Filesystem Process creation and scheduling Signals, interrupts, and the essential interfaces to device drivers Timing Synchronization in the kernel Interprocess Communication (IPC) Program execution Understanding the Linux Kernel , Second Edition will acquaint you with all the inner workings of Linux, but is more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. If knowledge is power, then this book will help you make the most of your Linux system.
    Note: "Linux 2.4"--p. ix. - Includes bibliographical references (p. 707-709) and indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 646 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Computer programming ; Java (Computer program language) ; Electronic books ; local
    Abstract: As the Java programming language has increased in both functionality and complexity, developers have demanded more of their program editors. Gone are the days when a simple visual editor is sufficient for even small programming projects. While there are numerous IDEs available today for use by Java developers, one stands above the rest, not only for its functionality, but for its extensibility: NetBeans.In NetBeans: The Definitive Guide , you'll find out how to use this IDE to its fullest, making your Java programming more efficient and productive than ever before. You'll understand the basics of the IDE, and quickly be utilizing the various editor and explorer windows. You'll also master many of NetBeans advanced features, and be working with XML documents, CVS repositories, Javadoc trees, and web applications, all within the NetBeans framework.In addition to teaching you how to use the existing features of NetBeans, this work goes on to cover developing additional modules for NetBeans. Through this instructional portion of the book, you will master the NetBeans APIs, and learn how to enhance NetBeans for your own specific needs. Whether you need to add customized behavior to handle your proprietary file formats, or want to redistribute NetBeans as a proprietary product, NetBeans: The Definitive Guide will allow you to master this open source IDE and all of its advanced features. Whether you are an enterprise developer looking for an IDE that can handle your complex program tasks, an open source developer looking to integrate NetBeans into your own visual projects, or a manager trying to maximize your team's development potential, NetBeans: The Definitive Guide is the book for you.
    Note: "Developing, debugging, and deploying Java code"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: 539 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.4/4682
    Keywords: Samba (Computer file) ; UNIX (Computer file) ; Client/server computing ; Electronic books ; local
    Abstract: This book, which has been officially adopted by the Samba Team and is under the GNU Free Documentation License (FDL), is a comprehensive guide to Samba administration. The 2nd edition focuses on Samba 2.2 and covers the most important features of 3.0, which was under development as this book went to print. Samba is a cross-platform triumph: it turns a Unix or Linux system into a file and print server for Microsoft Windows network clients. Samba is so robust, flexible, fast, and secure that many people are choosing it over Windows NT/2000/XP for their file and print services. Samba is also free software, licensed under the GNU General Public License. This book will help you make file and print sharing as robust, powerful, and efficient as possible. The authors delve into the internals of the Windows activities and protocols to an unprecedented degree, explaining the strengths and weaknesses of each feature in Windows domains and in Samba itself. Using Samba takes you from basic installation and configuration--on both the client and server side, for a wide range of systems--to subtle details of security, cross-platform compatibility, and resource discovery that make the difference between whether a user sees the folder they expect or a cryptic error message. The range of this book knows few bounds. Wondering how to integrate Samba's authentication with that of a Windows PDC? How to get Samba to serve Microsoft Dfs shares? How to share files on Mac OS X? These and a dozen other issues of interest to system administrators are covered. A whole chapter is dedicated to troubleshooting. Whether you're playing on one note or a full three-octave range, on your personal computer or an enterprise network, Using Samba will give you an efficient and secure server.
    Note: Eckstein's name appears first on the earlier edition. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 636 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Electronic books ; local
    Abstract: Ask any Python aficionado and you'll hear that Python programmers have it all: an elegant language that offers object-oriented programming support, a readable, maintainable syntax, integration with C components, and an enormous collection of precoded standard library and extension modules. Moreover, Python is easy to learn but powerful enough to take on the most ambitious programming challenges. But what Python programmers have lacked is one concise and clear reference resource, with the appropriate measure of guidance in how best to use Python's great power. Now Python in a Nutshell fills this need. In the tradition of O'Reilly's "In a Nutshell" series, this book offers Python programmers one place to look when they need help remembering or deciphering the syntax of this open source language and its many modules. This comprehensive reference guide makes it easy to look up all the most frequently needed information--not just about the Python language itself, but also the most frequently used parts of the standard library and the most important third-party extensions. Python in a Nutshell focuses on Python 2.2 (and all its point releases), currently the most stable and widespread Python release. This book includes: A fast-paced tutorial on the syntax of the Python language itself An explanation of object-oriented programming in Python, covering both the classic and new-style object models Coverage of other core topics, including exceptions, modules, strings, and regular expressions A quick reference for Python's built-in types and functions, as well as the key modules in the Python standard library, including sys, os, time, thread, math, and socket, among many others Reference material on important third-party extensions, such as Numeric and Tkinter Information about extending Python and embedding it into other applications Python in a Nutshell provides a solid, no-nonsense quick reference to information that programmers rely on the most. This latest addition to the best-selling "In a Nutshell" series will immediately earn its place in any Python programmer's library.
    Note: "Covers Python 2.2"--Cover. - Includes bibliographical references (p. 10-11) index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 925 p. , ill. ; , 25 cm. +
    Edition: 2nd ed.
    Series Statement: IBM Press series-information management
    DDC: 005.71262
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Enterprise Java Programming with IBM WebSphere, Second Edition by Kyle Brown, Gary Craig, Greg Hester, Russell Stinehour, W. David Pitt, Mark Weitzel, JimAmsden, Peter M. Jakab, Daniel Berg Foreword by Martin Fowler Enterprise Java Programming with IBM WebSphere, Second Edition is the definitive guide tobuilding mission-critical enterprise systems with J2EE, WebSphere, and WebSphere StudioApplication Developer. Fully updated for Versions 5.x of WebSphere Application Server andWebSphere Studio Application Developer, it combines expert architectural best practices with acase study that walks you through constructing an entire system. The authors are an extraordinary team of WebSphere insiders: developers, consultants,instructors, and IBM WebSphere development team members. Together, they offer unprecedentedinsight into the use and behavior of WebSphere's APIs in real-world environments-andsystematic guidance for delivering systems of exceptional performance, robustness, and businessvalue. Coverage includes- Practical introductions to J2EE, WebSphere Application Server 5.0, and Web application architecture Detailed coverage of Web application construction, including MVC partitioning with Struts, servlets/JSP, and session management Step-by-step guidance for building and testing application business models, including JUnit testing In-depth insight into EJB architecture, including transactions, security, and advanced object relational mapping Web services: examples and best practices leveraging WebSphere Application Server 5.x's latest enhancements CD-ROMs Included The CD-ROMs contain trial copies of IBM WebSphere Studio Application Developer (Version 5.0.2),IBM WebSphere Application Server (Version 5.02), and DB2 Universal Database, Personal Edition(Version 8.1.2) for Microsoft Windows 2000/XP. The CD-ROMs also include source code for thecase study examples used in the book.
    Note: Previous ed.: 2001. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1/17
    Keywords: Object-oriented methods (Computer science) ; UML (Computer science) ; Electronic books ; local
    Abstract: Praise for The Object Constraint Language, Second Edition "MDA promises a revolution in the way we develop software. This book is essential reading for anyone intending to adopt MDA technology." - Tony Clark , PhD King's College, London "Through examples, Jos and Anneke demonstrate the power and intuitiveness of OCL, and the key role that this language plays in implementing and promoting MDA. The theme, structure, contents, and, not lastly, the clarity of explanations recommend this book as the best advocate for learning, using, and promoting OCL, UML, and MDA. I am sure that this work will contribute in a significant manner to the development and widespread use of new software technologies." - Dan Chiorean Head of the Computer Science Research Laboratory Babes-Bolyai University, Cluj "In this thoroughly revised edition, Jos and Anneke offer a concise, pragmatic, and pedagogic explanation of the Object Constraint Language (OCL) and its different applications. Their discussion of OCL's potential role in Model Driven Architecture (MDA) is timely and offers great insight into the way that UML can be taken to the next level of automated software development practice. I highly recommend this book to anyone who is looking to get the most out of UML." -Shane Sendall, PhD, Senior Researcher, Swiss Federal Institute of Technology in Lausanne The release of Unified Modeling Language (UML) 2.0 places renewed emphasis on the Object Constraint Language (OCL). Within UML, OCL is the standard for specifying expressions that add vital information to object-oriented models and other object-modeling artifacts. Model Driven Architecture (MDA) relies on OCL to add the level of programming detail necessary to enable platform-specific models (PSM) to communicate with platform-independent models (PIM). This book is a practical, accessible guide to OCL for software architects, designers, and developers. Much care has been taken during the redesign of OCL to ensure that the syntax remains readable and writable by the average software modeler. The Object Constraint Language, Second Edition , utilizes a case study to show how to exercise these compact but powerful expressions for maximum effect. This newly updated edition Explains why OCL is critical to MDA--and why UML alone is not enough Introduces an SQL-like syntax to OCL Defines the new language constructs of OCL 2.0 Demonstrates how OCL can be incorporated into code Shares tips and tricks for applying OCL to real-...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvi, 184 p. ; , 24 cm
    DDC: 384.6/4
    Keywords: Automatic speech recognition ; Electronic books ; local
    Abstract: Most people have experienced an automated speech-recognition system when calling a company. Instead of prompting callers to choose an option by entering numbers, the system asks questions and understands spoken responses. With a more advanced application, callers may feel as if they're having a conversation with another person. Not only will the system respond intelligently, its voice even has personality. The Art and Business of Speech Recognition examines both the rapid emergence and broad potential of speech-recognition applications. By explaining the nature, design, development, and use of such applications, this book addresses two particular needs: Business managers must understand the competitive advantage that speech-recognition applications provide: a more effective way to engage, serve, and retain customers over the phone. Application designers must know how to meet their most critical business goal: a satisfying customer experience. Author Blade Kotelly illuminates these needs from the perspective of an experienced, business-focused practitioner. Among the diverse applications he's worked on, perhaps his most influential design is the flight-information system developed for United Airlines, about which Julie Vallone wrote in Investor's Business Daily : "By the end of the conversation, you might want to take the voice to dinner." If dinner is the analogy, this concise book is an ideal first course. Managers will learn the potential of speech-recognition applications to reduce costs, increase customer satisfaction, enhance the company brand, and even grow revenues. Designers, especially those just beginning to work in the voice domain, will learn user-interface design principles and techniques needed to develop and deploy successful applications. The examples in the book are real, the writing is accessible and lucid, and the solutions presented are attainable today. 0321154924B12242002
    Note: Includes bibliographical references (p. 175-176) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 323 p. ; , 24 cm
    DDC: 005.2/76
    Keywords: Computer network architectures ; Microsoft.net ; Web site development ; Electronic books ; local
    Abstract: Praise for .NET Web Services "Keith Ballinger has been 'Mr. Web Services' at Microsoft for as long as there were Web services. Anyone doing work on the Microsoft Web Services platform would do themselves a favor by reading this book, as Keith's insights are unique." - Bob Beauchemin , DevelopMentor "This book is a very good introduction to Web services, providing enough specific information for a person to fully understand the principles and implementation issues of Web services . . . Ballinger clearly outlines the fundamental architectural topics that any organization looking to implement XML Web services should consider." - Colin Bowern , Consultant, Microsoft Corporation "This book provides information about all principal components of Webservices: transport protocol, interface definition and services discovery mechanisms, security and messaging infrastructure, as well as underlying technologies (XML, TCP/IP, HTTP). Description of each subject is comprehensive and complete; examples provide good illustration from the content." - Max Loukianov , Solomio Corp. .NET Web Services is the authoritative guide to designing and architecting better Web services using Microsoft technologies. Written by Keith Ballinger, a Program Manager for XML Web Services at Microsoft, this book explains what Web services are, why they exist, and how they work in .NET. Readers will gain a thorough understanding of the technologies that allows them to take full advantage of .NET. The book opens with an introduction to Web services and Web services standards. It then explores .NET technologies and examines how the .NET Framework gives developers the tools they need to build Web service applications. The core of the book focuses on the key specifications that make up the Web services architecture, from HTTP to SOAP to WS-Security. .NET Web Services concludes with the author's expert advice on architecting and designing Web service applications. Topics covered include: The features and pitfalls of Web services Web services standards Creating Web Services with ASP.NET Creating Web service clients XML serialization with .NET Extending Web services Transport protocols for Web services XML and XML Schemas SOAP Describing Web services Discovering Web services Messaging with Web services Securing Web services Advanced messaging Best practices are illustrated throughout with full working examples as well as code samples using C# and ASP.NET Web services. A companion Web site a...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 495 p. , ill. ; , 24 cm
    DDC: 005.75/6
    Keywords: Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: SQL Performance Tuning is a handbook of practical solutions for busy database professionals charged with managing an organization's critically important data. Covering today's most popular and widely installed database environments, this book is an indispensable resource for managing and tuning SQL across multiple platforms. Packed with tips, techniques, and best practices, this hands-on guide covers SQL commands and queries over a wide range of conditions and environments. Every facet of the SQL environment is covered, from concurrency control to optimization-and every issue in between. The book includes an overview of each of the most widely used database management systems (DBMS) and provides tuning tips for common day-to-day situations. Topics covered include: General and specific tuning General sort considerations and options Joins and subqueries Columns and tables Indexes, including B-trees and bitmaps Constraints and stored procedures ODBC and JDBC Data changes and concurrency control (locking) Clients, servers, and middleware Whether you are a programmer, consultant, or user, you will find SQL Performance Tuning an indispensable guide to optimizing SQL performance across today's popular database environments. Throughout SQL Performance Tuning , ideas and techniques are tested on a variety of popular SQL environments, including IBM DB2, Informix, Ingres, InterBase, Microsoft SQL Server, MySQL, Oracle, and Sybase ASE. The book's practical examples are written in ANSI/ISO Standard SQL: 1999. 0201791692B08082002
    Note: Includes bibliographical references (p. 453-454) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 789 p. , ill. ; , 24 cm
    DDC: 005.4/469
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Craig and Gwyn bring their insight and experience with WMI to explain how easy it is to write powerful management applications through WMI on the .NET platform." -Andy Cheung, Microsoft WMI Test Engineer Windows Management Instrumentation (WMI) is an impressive technology that provides, for the first time, an integrated approach to hardware and software management for the Windows operating system. Developing WMI Solutions gives administrators and developers the skills necessary to take advantage of the power of WMI with Windows 2000, XP, and .NET Server. Developing WMI Solutions starts with an overview of the concepts behind systems management. The authors then provide a synopsis of existing management architectures, as well as an explanation of the architectural components of WMI and the tools provided by Microsoft for their use. Also included is a WMI scripting boot camp for administrators using samples in VBScript, plus a series of best practices that give scripts a professional edge. You will find thorough coverage of such topics as: The Common Information Model (CIM) Developing CIM extended schemas Management-application development using C++ and COM for WMI MMC snap-in development using C++ and COM, presented as a tutorial WMI providers and the necessary C++ and COM skills needed to expose class schema Developing management applications using the .NET Framework-the first comprehensive guide to the WMI classes in the System.Management namespace Finally, developers will learn about the often undersold but extremely powerful high-performance event-tracing mechanism available in Windows, which allows developers to expose detailed information about operations in an application. The companion Web site, located at http://www.wbem.co.uk, includes the complete set of code examples found in the book, as well as updates and related articles. Both a tutorial and a reference, Developing WMI Solutions is an essential companion for network administrators, software developers, and team leaders looking to become proficient with WMI. 0201616130B10072002
    Note: Includes bibliographical references (p. 767) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 286 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 004.68
    Keywords: Computer networks ; Security measures ; Wireless communication systems ; Security measures ; Wireless communication systems ; Standards ; Electronic books ; local
    Abstract: It's an increasingly wired world, but many people are finding that the best way to get connected is to do away with wires entirely. From cable replacement to universal Internet connectivity, wireless technology is changing the way we connect to our machines and to each other. As with any new technology, buying your gear is only the first step. Understanding how to make the best use of it is another story. Wireless Hacks offers 100 industrial-strength tips about wireless networking, contributed by experts who apply what they know in the real world every day. Each Hack can be read in just a few minutes, but can save you hours of research. Inside, you will find a wealth of useful techniques for making the most out of wireless technology, including: Making sense of the alphabet soup of the 802.11 standards, and understanding which technology makes sense for your solving particular problem Using Bluetooth, mobile radios, mobile data networks, and other exotic methods to keep you connected, no matter where you are Practical methods for detecting, analyzing, and monitoring wireless networks Extending the range of your network, and making the best possible use of the available radio spectrum Designing and building your own antennas Engineering long distance network links that span several miles Understanding the security issues of wireless networking, and protecting yourself and your users from unauthorized access and eavesdropping Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 979 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 006.7/882
    Keywords: Active server pages ; Internet programming ; Microsoft .NET ; Web site development ; Electronic books ; local
    Abstract: ASP.NET in a Nutshell is a concise, one-volume reference to everything you need to make effective use of ASP.NET. An invaluable resource that goes beyond the published documentation to highlight little-known details, stress practical uses for particular features, and provide real-world examples that show how features can be used in a working application, ASP.NET in a Nutshell is the definitive guide for developers of both applications and web services. Updated for Visual Studio .NET 2003, the 2nd edition of this book includes fresh information on application and web service development, custom controls, data access, security, deployment, and error handling, new material on web application development for mobile devices, plus an overview of the class libraries. For developers who still use Microsoft's older ASP technology, this book also provides information for migrating to ASP.NET. The material in ASP.NET in a Nutshell is presented in three sections: A fast-paced introduction to ASP.NET that examines topics such as building ASP.NET applications, developing web services, creating custom controls and user controls for maximum code reuse, debugging and handling errors, understanding ASP.NET security, and configuring and deploying an ASP.NET application A detailed reference to the properties, methods, and events of the most frequently used ASP.NET classes which include the Page class and the new .NET classes, such as HttpApplicationState and HttpSessionState, which correspond to the intrinsic objects in classic ASP. Configuration settings in web.config are also documented A Quick Reference to the types (the classes, structures, interfaces, delegates, events, and enumerations) found in web-related namespaces to the .NET Framework Class Library. Like other books in the "In a Nutshell" series, ASP.NET in a Nutshell , 2nd Edition, offers the facts, including critical background information, in a no-nonsense manner that users will refer to again and again. With its wealth of up-to-date information, ASP.NET in a Nutshell is a book that web developers will refer to again and again.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 363 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    DDC: 005.2/76
    Keywords: Computer software ; Development ; Internet programming ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Fully updated for version 1.1 of the .NET Framework, .NET Framework Essentials , 3rd Edition is an objective, concise, no-nonsense overview of the Microsoft .NET Framework for developing web applications and services. Written for intermediate to advanced VB, C/C++, Java, and Delphi developers, .NET Framework Essentials , 3rd Edition is also useful to system architects and leaders who are assessing tools for future projects. .NET Framework Essentials touches all the bases--from the Common Language Run-Time (CLR) and key class libraries to the specialized packages for ASP.NET, Windows Forms, XML Web Services, and data access (ADO.NET). The authors survey each major .NET language, including VB.NET, C#, J#, and Managed C++, as well as MSIL, clearing away the noise and hype, and presenting a clear, practical look at the underlying technologies. .NET Framework Essentials also provides a handy reference to the most commonly used features of .NET Framework. Written by two veteran web applications developers, .NET Framework Essentials , 3rd Edition is one of the most complete, concise, and ultimately useful books to describe the breadth of technology represented by .NET. Compact and free of fluff or proprietary hype, .NET Framework Essentials is an outstanding value for experienced programmers and architects who need to get up to speed quickly.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 168 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 004.67
    Keywords: Local area networks (Computer networks) ; Metropolitan area networks (Computer networks) ; Metropolitan area networks (Computer networks) ; Standards ; Wireless communication systems ; Electronic books ; local
    Abstract: Building Wireless Community Networks is about getting people online using wireless network technology. The 802.11b standard (also known as WiFi) makes it possible to network towns, schools, neighborhoods, small business, and almost any kind of organization. All that's required is a willingness to cooperate and share resources. The first edition of this book helped thousands of people engage in community networking activities. At the time, it was impossible to predict how quickly and thoroughly WiFi would penetrate the marketplace. Today, with WiFi-enabled computers almost as common as Ethernet, it makes even more sense to take the next step and network your community using nothing but freely available radio spectrum. This book has showed many people how to make their network available, even from the park bench, how to extend high-speed Internet access into the many areas not served by DSL and cable providers, and how to build working communities and a shared though intangible network. All that's required to create an access point for high-speed Internet connection is a gateway or base station. Once that is set up, any computer with a wireless card can log onto the network and share its resources. Rob Flickenger built such a network in northern California, and continues to participate in network-building efforts. His nuts-and-bolts guide covers: Selecting the appropriate equipment Finding antenna sites, and building and installing antennas Protecting your network from inappropriate access New network monitoring tools and techniques (new) Regulations affecting wireless deployment (new) IP network administration, including DNS and IP Tunneling (new) His expertise, as well as his sense of humor and enthusiasm for the topic, makes Building Wireless Community Networks a very useful and readable book for anyone interested in wireless connectivity.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 541 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Programming Visual Basic .NET , Second Edition is the complete guide to application development using Visual Basic .NET. Entirely rewritten by .NET expert Jesse Liberty, the new edition of this tutorial will be essential reading for the millions of Visual Basic programmers looking to make the change to Microsoft's .NET programming environment. Thorough, entertaining, and easy to follow, this book provides a comprehensive and detailed overview of the language, object-oriented programming, and the .NET Framework, and goes even further--you'll learn how to create Windows and Web applications, as well as Web services. A comprehensive introduction to the Visual Basic .NET language, this new edition covers topics of greatest concern to VB6 programmers who wish to make the transition from traditional Visual Basic 6 programming to the new object-oriented, component-based world of .NET. Loaded with practical examples for intermediate and advanced programmers, Programming Visual Basic .NET focuses on turning you into a proficient .NET developer. Some of the topics in the book include: Visual Basic .NET and the .NET Framework Object-Oriented Programming Building Windows Applications Accessing Data with ADO.NET ASP.NET Web Services and much more Jesse Liberty's books have successfully guided thousands of new and experienced programmers alike into the world of .NET programming and Programming Visual Basic .NET , Second Edition will be no exception. This book is sure to become a key component of developers' .NET libraries.
    Note: Includes index. - Rev. ed. of: Programming Visual Basic .NET / Dave Grundgeiger. 1st ed., 2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 275 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; eXtreme programming ; Electronic books ; local
    Abstract: Extreme Programming does not mean programming naked while rollerblading down the side of the Grand Canyon. It does mean a new approach to software development that is both radical and common-sense. Unlike many software development methodologies, XP has been accepted quickly because its core practices--particularly code sharing, test-first development, and continuous integration--resonated immediately with software developers everywhere. Instead of impressing developers with a body of theory, XP got programmers to say, "Yeah, that's how I'd like to work." Oddly enough, although most developers turn to Extreme Programming methods in order to code real, hands-on, and extensible projects quickly ("Code comes first"), most books on Extreme Programming insist on focusing on the theory and not the practice. Not the Java Extreme Programming Cookbook . Brimming with over 100 "recipes" for getting down to business and actually doing XP, the Java Extreme Programming Cookbook doesn't try to "sell" you on XP; it succinctly documents the most important features of popular open source tools for XP in Java--including Ant, Junit, HttpUnit, Cactus, Tomcat, XDoclet--and then digs right in, providing recipes for implementing the tools in real-world environments. Each recipe offers solutions that help you put an extreme programming environment together: then provides code for automating the build process and testing. Although the time saved using any one of these solutions will more than pay for the book, Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each recipe also includes explanations of how and why the approach works, so you can adapt the techniques to similar situations. One of the biggest challenges facing developers today is sorting through the wide variety of tools available form various source and figuring out how to them effectively. The recipes in Java Extreme Programming Cookbook showcase how to use the most important features of these XP tools. Many of these tools are geared towards unit testing, while others are invaluable for continuous integration; with these practical examples, you'll be able to choose the most effective tools to accomplish your goals, then implement them in a cohesive development environment quickly. If you want to set up a test-driven development environment that allows you to focus on writing testable code--now--this book will prove invaluable.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 400 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 006.74
    Keywords: XML (Document markup language) ; Electronic books ; local
    Abstract: This second edition of the bestselling Learning XML provides web developers with a concise but grounded understanding of XML (the Extensible Markup Language) and its potential-- not just a whirlwind tour of XML.The author explains the important and relevant XML technologies and their capabilities clearly and succinctly with plenty of real-life projects and useful examples. He outlines the elements of markup--demystifying concepts such as attributes, entities, and namespaces--and provides enough depth and examples to get started. Learning XML is a reliable source for anyone who needs to know XML, but doesn't want to waste time wading through hundreds of web sites or 800 pages of bloated text.For writers producing XML documents, this book clarifies files and the process of creating them with the appropriate structure and format. Designers will learn what parts of XML are most helpful to their team and will get started on creating Document Type Definitions. For programmers, the book makes syntax and structures clear. Learning XML also discusses the stylesheets needed for viewing documents in the next generation of browsers, databases, and other devices. Learning XML illustrates the core XML concepts and language syntax, in addition to important related tools such as the CSS and XSL styling languages and the XLink and XPointer specifications for creating rich link structures. It includes information about three schema languages for validation: W3C Schema, Schematron, and RELAX-NG, which are gaining widespread support from people who need to validate documents but aren't satisfied with DTDs. Also new in this edition is a chapter on XSL-FO, a powerful formatting language for XML. If you need to wade through the acronym soup of XML and start to really use this powerful tool, Learning XML , will give you the roadmap you need.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 253 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Access control ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need.Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting.In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations.If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
    Note: "Covers Unix and Windows"--Cover. - "Cross-platform authentication & single-sign-on"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 215 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.7/2
    Keywords: Application software ; Development ; HTML (Document markup language) ; Internet programming ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Abstract: The use of forms on the web is so commonplace that most user interactions involve some type of form. XForms--a combination of XML and forms--offers a powerful alternative to HTML-based forms. By providing excellent XML integration, including XML Schema, XForms allows developers to create flexible, web-based user-input forms for a wide variety of platforms, including desktop computers, handhelds, information appliances, and more. XForms Essentials is an introduction and practical guide to the new XForms specification. Written by Micah Dubinko, a member of the W3C XForms working group and an editor of the specification, the book explains the how and why of XForms, showing readers how to take advantage of them without having to write their own code. You'll learn how to integrate XForms with both HTML and XML vocabularies, and how XForms can simplify the connection between client-based user input and server-based processing. XForms Essentials begins with a general introduction to web forms, including information on history and basic construction of forms. The second part of the book serves as a reference manual to the XForms specification. The third section offers additional hints, guidelines, and techniques for working with XForms. Topics covered in the book include: creating XForms files in a text or XML editor converting existing forms (electronic or paper) to XForms collecting XML data from users in a user-friendly way reducing the amount of JavaScript needed within browser interfaces increasing the security and reliability of your current forms system by combining client-side and server-side checks into a common code base creating interactive websites using the latest standard technology XForms Essentials focuses on the practical application of XForms technology. If you work with forms, HTML, or XML information, XForms Essentials will provide you with a much simpler route to more sophisticated interactions with users.
    Note: "Gathering and managing XML information"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 303 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Most Visual Basic .NET books are written for experienced object-oriented programmers, but many programmers jumping on the .NET bandwagon are coming from non-object-oriented languages, such as Visual Basic 6.0 or from script programming, such as JavaScript. These programmers, and those who are adopting VB.NET as their first programming language, have been out of luck when it comes to finding a high-quality introduction to the language that helps them get started.That's why Jesse Liberty, author of the best-selling books Programming C# and Programming ASP.NET , has written an entry-level guide to Visual Basic .NET. Written in a warm and friendly manner, this book assumes no prior programming experience, and provides an easy introduction to Microsoft's most popular .NET language. Learning Visual Basic .NET is a complete introduction to VB.NET and object-oriented programming. This book will help you build a solid foundation in .NET, and show how to apply your skills by using hundreds of examples to help you become productive quickly. Learning Visual Basic .NET introduces fundamentals like Visual Studio .NET, a tool set for building Windows and Web applications. You'll learn about the syntax and structure of the Visual Basic .NET language, including operators, classes and interfaces, structs, arrays, and strings. Liberty then demonstrates how to develop various kinds of applications--including those that work with databases--and web services.By the time you've finished Learning Visual Basic .NET , you'll be ready to move on to a more advanced programming guide that will help you create large-scale web and Windows applications.Whether you have a little object-oriented programming experience or you are new to programming altogether, Visual Basic .NET will set you firmly on your way to mastering the essentials of the VB.NET language.
    Note: "Introducing the language, .NET programming & object-oriented software development"--Cover. - Includes bibliographical references (p. 289-292) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 658 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Windows XP is the latest, most reliable, and best-looking version of the world's most widely used operating system, combining the extremely stable engine of Windows NT and 2000 with the user-friendliness of the Windows 98 and Me consumer models. In its first year, XP became the fastest-selling Windows OS ever. But one major failing remains unaddressed: XP Pro comes without a single page of printed instructions. This superbly written guide fills the gap. Coauthored by David Pogue, New York Times technology columnist and Missing Manuals creator, Windows XP Pro: The Missing Manual uses wit, technical insight, and scrupulous objectivity to light the way for first-time and intermediate PC fans. The book reveals which features work well and which don't, such as the Remote Desktop software that enables people to connect to the office from home, the encryption file system that protects sensitive information, and the Windows Messenger that enables real-time text, voice and video communication. Contents include: Getting started. The book's early chapters cover using menus, finding lost files, reducing window clutter, and taming the new, multi-column Start menu. Mastering the network. Special chapters help you navigate the corporate network, dial in from the road, and even set up your own small-office (peer-to-peer) network, step by step. Understanding security. User accounts, file encryption, and the NTFS file system keep your private files private, while still offering network access to coworkers you specify. Flying the Net. This book demystifies Outlook Express 6 for email, Internet Explorer 6 for Web browsing, and the new Windows Messenger for voice, chat, and video conferencing. Windows XP Pro: The Missing Manual isn't for system administrators or OS theory geeks; it's for the novice or budding power user who wants to master the machine and get down to work. Yet, anyone who uses XP Pro (including hardcore techies) will find this new system much easier -- and more fun -- to digest with this new Missing Manual. This is the crystal-clear, jargon-free book that should have been in the box.
    Note: "Covers service release 1"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 927 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.13/3
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Find a Perl programmer, and you'll find a copy of Perl Cookbook nearby. Perl Cookbook is a comprehensive collection of problems, solutions, and practical examples for anyone programming in Perl. The book contains hundreds of rigorously reviewed Perl "recipes" and thousands of examples ranging from brief one-liners to complete applications.The second edition of Perl Cookbook has been fully updated for Perl 5.8, with extensive changes for Unicode support, I/O layers, mod_perl, and new technologies that have emerged since the previous edition of the book. Recipes have been updated to include the latest modules. New recipes have been added to every chapter of the book, and some chapters have almost doubled in size.Covered topic areas include: Manipulating strings, numbers, dates, arrays, and hashes Pattern matching and text substitutions References, data structures, objects, and classes Signals and exceptions Screen addressing, menus, and graphical applications Managing other processes Writing secure scripts Client-server programming Internet applications programming with mail, news, ftp, and telnet CGI and mod_perl programming Web programming Since its first release in 1998, Perl Cookbook has earned its place in the libraries of serious Perl users of all levels of expertise by providing practical answers, code examples, and mini-tutorials addressing the challenges that programmers face. Now the second edition of this bestselling book is ready to earn its place among the ranks of favorite Perl books as well.Whether you're a novice or veteran Perl programmer, you'll find Perl Cookbook , 2nd Edition to be one of the most useful books on Perl available. Its comfortable discussion style and accurate attention to detail cover just about any topic you'd want to know about. You can get by without having this book in your library, but once you've tried a few of the recipes, you won't want to.
    Note: Includes bibliographical references (p. xxvi-xxviii) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xx, 202 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable government and military computers --at an alarming rate. Despite their myriad manifestations and different targets, nearly all attacks have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding , by Mark G. Graff and Ken vanWyk, looks at the problem of bad code in a new way. Packed with advice based on the authors' decades of experience in the computer security field, this concise and highly readable book explains why so much code today is filled with vulnerabilities, and tells readers what they must do to avoid writing code that can be exploited by attackers. Writing secure code isn't easy, and there are no quick fixes to bad code. To build code that repels attack, readers need to be vigilant through each stage of the entire code lifecycle: Architecture: during this stage, applying security principles such as "least privilege" will help limit even the impact of successful attempts to subvert software. Design: during this stage, designers must determine how programs will behave when confronted with fatally flawed input data. The book also offers advice about performing security retrofitting when you don't have the source code -- ways of protecting software from being exploited even if bugs can't be fixed. Implementation: during this stage, programmers must sanitize all program input (the character streams representing a programs' entire interface with its environment -- not just the command lines and environment variables that are the focus of most security analysis). Testing: during this stage, programs must be checked using both static code checkers and runtime testing methods -- for example, the fault injection systems now available to check for the presence of such flaws as buffer overflow. Operations: during this stage, patch updates must be installed in a timely fashion. In early 2003, sites that had diligently applied Microsoft SQL Server updates were spared the impact of the Slammer worm that did serious damage to thousands of systems. Beyond the technical, Secure Coding sheds new light on the economic, psychological, and sheer practical reasons why...
    Note: Includes bibliographical references (p. 185-194) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 291 p. , ill. ; , 24 cm
    Keywords: Microsoft Visual BASIC ; Microsoft .NET Framework ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: One of the most significant features of Visual Basic .NET is the full support of object-oriented programming. For years, developers have been asking for it, but you may not be quite sure how it can help to create and maintain scalable .NET applications. VB.NET is a language that facilitates object-oriented programming, but does not guarantee good object-oriented code. That's where Object-Oriented Programming with Visual Basic .NET comes in. It will show you how to think about similarities in your application logic and how to design and create objects that maximize the benefit and power the .NET Framework enables. The concept of separating the interface from the implementation has been around for years, but with Object-Oriented Programming with Visual Basic .NET you'll put it all into practice and you'll never willingly go back to those old ways. With chapters on object fundamentals and class anatomy, you'll lay a foundation that will prepare you to think and apply code reuse principles. Following that, you'll be ready to dive deep into code and the dynamic ecology that it interacts with. Inheritance, containment, polymorphism, overloading, and overriding are just the beginning of this adventure. From there, you'll discover exception handling, reflection, serialization, and I/O. Packed with examples that will guide you through every step, Object-Oriented Programming with Visual Basic .NET is a guide for those with some programming experience. This book is for those who know Visual Basic 6.0 and are ready or have started the process of developing with Visual Basic .NET. It is an essential tool that will build your skills, as you become a master of Visual Basic .NET. It is one thing to know how to write object-oriented code. Knowing the when and the why is what makes good programmers. That's exactly what you'll know after reading this book.
    Note: Includes bibliographical references (p. 283-284) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 004.67/8/068
    Keywords: Application software ; Development ; Business ; Data processing ; Web services ; Electronic books ; local
    Abstract: "This book performs a valuable service for managers seeking to harness the business potential of Web services technology. Bringing a real practitioner's experience to the task, Anne carefully walks managers through the fundamentals of Web services technology. She does a superb job of helping managers understand this technology so that they can move with sure footing and avoid potentially harmful stumbles along the way." --From the Foreword by John Hagel III and John Seely Brown Written for business and technology managers, Web Services: A Manager's Guide illuminates the potential of Web services for application integration. It describes the essentials of supporting technologies and shows how they can be built into a Web services infrastructure that is high-performance, robust, and cost-effective. Realistic in approach, this book offers a readable definition of Web services and non-technical explanations of key technologies and standards. The author explores the scenarios and applications that would benefit most from Web services and offers guidelines for making an informed decision about which Web services products are right for your company's needs. You will find detailed coverage of the following topics: The advantages of Web services over other middleware technologies Various Web services business models, including those used by Google, Kinko's, Amazon, UPS, and T-Mobile The basics of XML, XSLT, SOA, WSDL, UDDI, and SOAP How W3C, OASIS, and WS-I are standardizing technologies and defining guidelines for interoperability Web services standards for security, transactions, and portlets Powerful features of Web services, including dynamic discovery and dynamic binding Using Web services for heterogeneous integration, managing legacy assets, and B2B electronic procurement Web services core products and platforms Evaluating Web services offerings based on such requirements as scalability, extensibility, and security With this book in hand, you will have a clear understanding of Web services, what the technology can do for your organization, and the direction in which you should be heading. Margin content summaries enable time-constrained managers to locate and absorb needed information quickly. Case studies illustrate the benefits of adopting Web services and also reveal pitfalls to avoid. 0321185773B06042003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 495 p. ; , 24 cm. +
    DDC: 005.1
    Keywords: Coding theory ; Computer programming ; Electronic books ; local
    Abstract: If you are a programmer, you need this book. You've got a day to add a new feature in a 34,000-line program: Where do you start? Page 333 How can you understand and simplify an inscrutable piece of code? Page 39 Where do you start when disentangling a complicated build process? Page 167 How do you comprehend code that appears to be doing five things in parallel? Page 132 You may read code because you have to--to fix it, inspect it, or improve it. You may read code the way an engineer examines a machine--to discover what makes it tick. Or you may read code because you are scavenging--looking for material to reuse. Code-reading requires its own set of skills, and the ability to determine which technique you use when is crucial. In this indispensable book, Diomidis Spinellis uses more than 600 real-world examples to show you how to identify good (and bad) code: how to read it, what to look for, and how to use this knowledge to improve your own code. Fact: If you make a habit of reading good code, you will write better code yourself. 0201799405B02032003
    Note: Includes bibliographical references (p. 445-457) and indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: lxvii, 1208 p. , ill. ; , 24 cm
    DDC: 621.39/8
    Keywords: Computer architecture ; Computer input-output equipment ; Standards ; InfiniBand (Standard) ; Electronic books ; local
    Abstract: InfiniBand is a new networking specification that revolutionizes the interconnect between processor and IO subsystems in the datacenter environment. InfiniBand delivers better performance, flexibility, and scalability than alternative network architectures. Copper wire and fiber optic InfiniBand links offer data rates ranging from 2.5 Gb/s to 30 Gb/s. This technology easily surpasses the performance of competing network infrastructures by providing kernel bypass and memory-to-memory transfer capabilities. InfiniBand Network Architecture is a comprehensive guide to InfiniBand technology. It describes all hardware and software operational aspects of InfiniBand networking. Using the same building-block approach found in all of the books in the PC System Architecture Series, this book details important concepts relating to the design and implementation of data networks using this emerging standard. A broad overview of the InfiniBand specification is provided, as well as detailed descriptions of all the architecture's operational characteristics. Specific topics of interest include: Packet addressing, channel adapters, and the role of switches, routers, and repeaters Queue Pair (QP) creation and operation Transfer types, including connected, datagram, and raw datagram service Send/receive operations, such as Send, RDMA Read and Write, and atomic Read/Modify/Write (RMW) operations Link and physical layer descriptions Subnet-local and global addressing The Subnet Manager (SM) and the Subnet Administrator (SA) Performance, communication, device, and baseboard managers Created for hardware and software engineers and developers, InfiniBand Network Architecture is a critical resource for understanding and implementing this revolutionary technology. 0321117654B11042002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Language: English
    Pages: xxxvi, 641 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Keywords: Database management ; XML (Document markup language) ; Electronic books ; local
    Abstract: "This is an excellent book that combines a practical and analytical look at the subject." -Leo Korman, Principal Software Engineer, KANA Software As organizations begin to employ XML within their information-management and exchange strategies, data management issues pertaining to storage, retrieval, querying, indexing, and manipulation increasingly arise. Moreover, new information-modeling challenges also appear. XML Data Management -with its contributions from experts at the forefront of the XML field-addresses these key issues and challenges, offering insights into the advantages and drawbacks of various XML solutions, best practices for modeling information with XML, and developing custom, in-house solutions. In this book, you will find discussions on the newest native XML databases, along with information on working with XML-enabled relational database systems. In addition, XML Data Management thoroughly examines benchmarks and analysis techniques for performance of XML databases. Topics covered include: The power of good grammar and style in modeling information to alleviate the need for redundant domain knowledge Tamino's XML storage, indexing, querying, and data access features The features and APIs of open source eXist Berkeley DB XML's ability to store XML documents natively IBM's DB2 Universal Database and its support for XML applications Xperanto's method of addressing information integration requirements Oracle's XMLType for managing document centric XML documents Microsoft SQL Server 2000's support for exporting and importing XML data A generic architecture for storing XML documents in a relational database X007, XMach-1, XMark, and other benchmarks for evaluating XML database performance Numerous case studies demonstrate real-world problems, industry-tested solutions, and creative applications of XML data management solutions. Written for both XML and relational database professionals, XML Data Management provides a promising new approach to data management, one that is sure to positively impact the way organizations manage and exchange information. 0201844524B01302003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 314 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.75/65
    Keywords: (Computer program language) ; Electronic books ; local
    Abstract: A poorly performing database application not only costs users time, but also has an impact on other applications running on the same computer or the same network. SQL Tuning provides an essential next step for SQL developers and database administrators who want to extend their SQL tuning expertise and get the most from their database applications.There are two basic issues to focus on when tuning SQL: how to find and interpret the execution plan of an SQL statement and how to change SQL to get a specific alternate execution plan. SQL Tuning provides answers to these questions and addresses a third issue that's even more important: how to find the optimal execution plan for the query to use.Author Dan Tow outlines a timesaving method he's developed for finding the optimum execution plan--rapidly and systematically--regardless of the complexity of the SQL or the database platform being used. You'll learn how to understand and control SQL execution plans and how to diagram SQL queries to deduce the best execution plan for a query. Key chapters in the book include exercises to reinforce the concepts you've learned. SQL Tuning concludes by addressing special concerns and unique solutions to "unsolvable problems."Whether you are a programmer who develops SQL-based applications or a database administrator or other who troubleshoots poorly tuned applications, SQL Tuning will arm you with a reliable and deterministic method for tuning your SQL queries to gain optimal performance.
    Note: "Covers Oracle, DB2 & SQL server"--Cover. - "Generating optimal execution plans"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 453 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Mac OS ; AppleScript (Computer program language) ; Macintosh (Computer) ; Programming ; Electronic books ; local
    Abstract: If you want to know all about AppleScript--the how, where, and why of using it--dig into AppleScript: The Definitive Guide . It doesn't make the mistake that other books do: it isn't about scripting this or that particular application, and it doesn't assume that learning AppleScript is easy or obvious. Instead, the book teaches and documents the language in a clear and rigorous manner, just as you'd expect with any programming or scripting language. AppleScript is a dynamic, object-oriented scripting system that allows Mac users--even novices who know nothing about programming--to directly control Macintosh applications, including the Mac OS itself. You can write scripts to automate repetitive tasks, customize applications, and even control complex workflows. AppleScript has always been useful, but with Mac OS X it's even more so. Nearly every application that comes with Mac OS X is scriptable. Even non-scriptable applications can often be driven with AppleScript, thanks to the new Accessibility API and GUI Scripting technologies. And now AppleScripters can put a true Aqua interface around their scripts! There's never been a more exciting time for AppleScript users. AppleScript: The Definitive Guide explores and teaches the language from the ground up. If you're a beginner and want to learn how to write your first script or just understand what the excitement is all about, you'll be able to do so after reading this book. AppleScript: The Definitive Guide is the quintessential guide to this important Mac tool. Regardless of their level of experience, AppleScripters everywhere will turn to this book again and again.
    Note: "Covers Mac OS X Panther"--Cover. - "Developer connection recommended title"--Cover. - Includes bibliographical references (p. 428-429) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 574 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Perl (Computer program language) ; Web site development ; Electronic books ; local
    Abstract: Among the many different approaches to "templating" with Perl--such as Embperl, Mason, HTML::Template, and hundreds of other lesser known systems--the Template Toolkit is widely recognized as one of the most versatile. Like other templating systems, the Template Toolkit allows programmers to embed Perl code and custom macros into HTML documents in order to create customized documents on the fly. But unlike the others, the Template Toolkit is as facile at producing HTML as it is at producing XML, PDF, or any other output format. And because it has its own simple templating language, templates can be written and edited by people who don't know Perl. In short, the Template Toolkit combines the best features of its competitors, with ease-of-use and flexibility, resulting in a technology that's fast, powerful and extensible, and ideally suited to the production and maintenance of web content and other dynamic document systems.In Perl Template Toolkit you'll find detailed coverage of this increasingly popular technology. Written by core members of the technology's development team, the book guides you through the entire process of installing, configuring, using, and extending the Template Toolkit. It begins with a fast-paced but thorough tutorial on building web content with the Template Toolkit, and then walks you through generating and using data files, particularly with XML. It also provides detailed information on the Template Toolkit's modules, libraries, and tools in addition to a complete reference manual.Topics in the book include: Getting started with the template toolkit The Template language Template directives Filters Plugins Extending the Template Toolkit Accessing databases XML Advanced static web page techniques Dynamic web content and web applications The only book to cover this important tool, Perl Template Toolkit is essential reading for any Perl programmer who wants to create dynamic web content that is remarkably easy to maintain. This book is your surefire guide to implementing this fast, flexible, and powerful templating system.
    Note: "Scalable templating for the Web"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 398 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 004.678
    Keywords: Microsoft Windows server ; Internet addresses ; Internet domain names ; Systems software ; Electronic books ; local
    Abstract: While computers and other devices identify each other on networks or the Internet by using unique addresses made up of numbers, humans rely on the Domain Name System (DNS), the distributed database that allows us to identify machines by name. DNS does the work of translating domain names into numerical IP addresses, routing mail to its proper destination, and many other services, so that users require little or no knowledge of the system. If you're a network or system administrator, however, configuring, implementing, and maintaining DNS zones can be a formidable challenge. And now, with Windows Server 2003, an understanding of the workings of DNS is even more critical. DNS on Windows Server 20003 is a special Windows-oriented edition of the classic DNS and BIND , updated to document the many changes to DNS, large and small, found in Windows Server 2003. Veteran O'Reilly authors, Cricket Liu, Matt Larson, and Robbie Allen explain the whole system in terms of the new Windows Server 2003, from starting and stopping a DNS service to establishing an organization's namespace in the global hierarchy. Besides covering general issues like installing, setting up, and maintaining the server, DNS on Windows Server 2003 tackles the many issues specific to the new Windows environment, including the use of the dnscmd program to manage the Microsoft DNS Server from the command line and development using the WMI DNS provider to manage the name server programmatically. The book also documents new features of the Microsoft DNS Server in Windows Server 2003, including conditional forwarding and zone storage in Active Directory (AD) application partitions. DNS on Windows Server 2003 provides grounding in: Security issues System tuning Caching Zone change notification Troubleshooting Planning for growth If you're a Windows administrator, DNS on Windows Server 2003 is the operations manual you need for working with DNS every day. If you're a Windows user who simply wants to take the mystery out of the Internet, this book is a readable introduction to the Internet's architecture and inner workings.
    Note: "Mastering the Domain Name System"--Cover. - Earlier eds. have titles: DNS on Windows NT, and DNS on Windows 2000. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 406 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/465
    Keywords: Mac OS ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Mac OS X is a marvelous confluence of the user-friendly and highly customizable Macintosh of yesteryear and the power and flexibility of Unix under the hood. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh but they are also plunged into a whole new world. Unix converts to Mac OS X find a familiar FreeBSD-like operating system at the core and many of the command-line applications that they're familiar with. This presents a unique opportunity for combining traditional Unix hacking and Mac OS know-how. Mac OS X Hacks goes beyond the peculiar mix of man pages and not-particularly-helpful Help Center, pulling the best tips, tricks, and tools from the Mac power users and Unix hackers themselves. The collection reflects the real-world know how and experience of those well steeped in Unix history and expertise, sharing their no-nonsense, sometimes quick-and-dirty solutions to administering and taking full advantage of everything a Unix desktop has to offer: Web, Mail, and FTP serving, security services, SSH, Perl and shell scripting, compiling, configuring, scheduling, networking, and hacking. Add to that the experience of die-hard Macintosh users, customizing and modifying their hardware and software to meet their needs: System Preferences, GUI mods and tweaks, hardware tips, vital shareware and freeware, AppleScript, AppleTalk and equivalents, keyboard modifiers, and general Macintosh-style tomfoolery. Each Hack can be read easily in a few minutes, saving countless hours of searching for the right answer. Mac OS X Hacks provides direct, hands-on solutions that can be applied to the challenges facing both those meeting the Mac for the first time and long-time users delving into Mac OS X and its Unix underpinnings. Mac OS X Hacks is the third in O'Reilly's new Hacks Serier which aims to begin reclaiming the term "hacking" for the good guys. In recent years, the term has come to be associated with those nefarious black hats who break into computers to snoop, steal information or disrupt Internet traffic. But the term originally had a more benign meaning, and you'll still hear it used this way whenever developers get together. Our new Hacks books are written in the spirit of the true hackers -- the people who drive innovation.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 988 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.2/76
    Keywords: Active server pages ; Microsoft Visual BASIC ; C# (Computer program language) ; Web sites ; Computer programs ; Web sites ; Design ; Electronic books ; local
    Abstract: ASP.NET, successor to Microsoft's Active Server Pages (ASP), is so complete and flexible that a web developer's main difficulty may lie simply in weaving the pieces together for maximum efficiency. The new edition of Programming ASP.NET shows developers how to do just that. Updated for Version 1.1 of the NET framework and Visual Studio .NET 2003, the second edition of this bestselling .NET title will show you how to create dynamic, data-driven web sites and services using both C# and Visual Basic .NET. In Programming ASP.NET , Second Edition authors Jesse Liberty and Dan Hurwitz cover everything you need to know to be effective with ASP.NET. The book includes a comprehensive tutorial on Web Forms, which, in conjunction with Visual Studio .NET 2003, allow you to apply Rapid Application Development techniques (including drag-and-drop control placement) to web development. Programming ASP.NET includes extensive coverage of each type of server control, including Web server controls, HTML server controls, and custom controls. New material covers creating ASP.NET pages for mobile devices. Since most web applications and web services involve retrieving data and returning it to a client browser, Programming ASP.NET Second Edition also offers extensive coverage of data access issues. These include topics such as using ASP.NET's list-bound controls; accessing data using the ADO.NET object model, and updating data with or without transaction support. Programming ASP.NET also discusses such advanced topics as: Caching and performance Security Configuration and deployment If you're already familiar with Active Server Pages technology, you'll appreciate the in-depth focus and straightforward, easy-to-read approach for developing web pages and web services. Succinct, direct, and loaded with examples, Programming ASP.NET , Second Edition will help users at every level master ASP.NET without getting bogged down in the complexity of its features.
    Note: "Building Web applications and services using C# and VB.NET"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 388 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.692
    Keywords: Sendmail ; UNIX (Computer file) ; Electronic mail systems ; Electronic books ; local
    Abstract: More often than not, the words "sendmail configuration" strikedread in the hearts of sendmail and system administrators--and notwithout reason. sendmail configuration languages are as complex asany other programming languages, but used much moreinfrequently--only when sendmail is installed or configured. Theaverage system administrator doesn't get enough practice to trulymaster this inscrutable technology. Fortunately, there's help. The sendmail Cookbook provides step-by-step solutions for theadministrator who needs to solve configuration problems fast. Sayyou need to configure sendmail to relay mail for your clientswithout creating an open relay that will be abused by spammers. Arecipe in the Cookbook shows you how to do just that. No morewading through pages of dense documentation and tutorials andcreating your own custom solution--just go directly to the recipethat addresses your specific problem. Each recipe in the sendmail Cookbook outlines a configuration problem, presentsthe configuration code that solves that problem, and then explainsthe code in detail. The discussion of the code is critical becauseit provides the insight you need to tweak the code for your owncircumstances. The sendmail Cookbook begins with an overviewof the configuration languages, offering a quick how-to fordownloading and compiling the sendmail distribution. Next, you'llfind a baseline configuration recipe upon which many of thesubsequent configurations, or recipes, in the book are based.Recipes in the following chapters stand on their own and offersolutions for properly configuring important sendmail functionssuch as: Delivering and forwarding mail Relaying Masquerading Routing mail Controlling spam Strong authentication Securing the mail transport Managing the queue Securing sendmail sendmail Cookbook is more than just a new approach todiscussing sendmail configuration. The book also provides lots ofnew material that doesn't get much coverage elsewhere--STARTTLS andAUTH are given entire chapters, and LDAP is covered in recipesthroughout the book. But most of all, this book is about savingtime--something that most system administrators have in shortsupply. Pick up the sendmail Cookbook and say good-bye tosendmail dread.
    Note: "Administering, securing & spam-fighting"--Cover. - "Unix system administration/networking"--P. [4] of cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...