Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (440)
  • English  (440)
  • 2005-2009  (440)
  • 1970-1974
  • Boston, MA :Safari,  (440)
Datasource
  • MPI Ethno. Forsch.  (440)
Material
Language
  • English  (440)
Years
Year
Subjects(RVK)
  • 101
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: Your complete guide to building your information technology career in any economy The IT Career Builder's Toolkit features market-focused skills and proven methods you can use to jump-start and advance your career. While other books cover just the mechanics of preparing your résumé, writing a cover letter, and interviewing, this book provides all that plus additional insight from IT career development expert, Matt Moran, to help you plan and create a rewarding IT career over the long term. The toolkit approach allows you to use this book to suit your unique needs: Are you new to the IT field? Benefit by reading the book cover to cover. Just need to fine-tune your IT career? Choose a topic and dive in. Understand and prepare for the various and changing factors that affect your career in both positive and negative ways. Learn how to Present the value of your technical skills in the job market Position yourself as the primary commodity of your career Remove the guesswork out of job searches Highlight on-the-job skills and gain meaningful professional exposure The companion CD-ROM includes career management tools such as résumé and cover letter templates, forms to track important contacts, and self-assessment tools. Start or further your consulting career with sample proposals, opportunity tracking forms, and a time-tracking and billing database. Financial tools, including budget and cash-flow summary worksheets, help you gain financial well-being. Use the Value-Added Technologist presentation to gain a clear understanding of the career-building process and how to use the toolkit to build a dynamic career. Most of all, have fun! Every year, people advance along the path to career stardom. Let Matt help you to be one of them through his career philosophy "Do not accept mediocrity as a career objective-demand more of yourself." "I want you to see the [toolkit] techniques as one more set of skills to adopt in your overall career development program. They are skills, just like your technical skills, that you will use daily during your career. Just as you adopt new technical skills, use the toolkit to define those soft skills that you must learn and put to use. The result will be a more well-rounded and complete professional skill-set." ~ Matthew Moran, from the Introduction Companion CD-ROM The CD-ROM contains valuable tools, forms, spreadsheets, and documents that work with the Toolkit to help you master key areas of your career development.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 102
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The all-in-one practical guide to supporting your Cisco network Provides detailed tips for using freeware and open-source tools readily available from the Internet, including the reasons behind choosing a particular tool Refer to a single source for common Cisco network administration issues Dedicated section for network security aids administrators in effectively dealing with security issues Deploy fully functional RADIUS and TACACS+ for servers for controlling access to Cisco devices Deploy Linux- and Windows-based syslog servers to centrally collect syslog information generated by Cisco devices Deploy Linux- and Windows-based network monitoring systems to monitor interface traffic through Cisco devices including routers, switches, VPN concentrators, and Cisco PIX® firewalls Use the trending feature of network monitoring systems for long-term network analysis and capacity planning Automatically detect and report configuration changes on Cisco IOS® Software-based devices and Cisco PIX firewalls Deploy Cisco-based VPNs in mixed environments using Linux- and Windows-based VPN servers Network Administrators Survival Guide solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco® networks using freeware tools. It is a single reference source that explains particular issues, their significance for administrators, and the installation and configuration process for the tools. The solutions are Cisco centric and provide detail not available in generic online information. Network Administrators Survival Guide emphasizes solutions for network managers and administrators of small to medium-sized businesses and enterprises. Each chapter is broadly based on a network administration function, starting with an overview of the topic, followed by the methodology involved to accomplish that function. This includes the tools available, why they are the right choice, and their installation, configuration, and usage methods. For any given function, Network Administrators Survival Guide covers both Windows- and Linux-based tools as appropriate. Most of the Windows-based tools offer the advantage of GUI for ease of use, whereas the Linux-based tools are command-line based and can be used in automated scripts. Both are significant for network administrators. Based on author Anand Deveriya's extensive field experience, this practical guide to maintaining Cisco networks will save you signifi...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 103
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xiv, 282 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: "Every programming language has its quirks. This lively book reveals oddities of the Java programming language through entertaining and thought-provoking programming puzzles." --Guy Steele, Sun Fellow and coauthor of The Java™ Language Specification "I laughed, I cried, I threw up (my hands in admiration)." --Tim Peierls, president, Prior Artisans LLC, and member of the JSR 166 Expert Group How well do you really know Java? Are you a code sleuth? Have you ever spent days chasing a bug caused by a trap or pitfall in Java or its libraries? Do you like brainteasers? Then this is the book for you! In the tradition of Effective Java™ , Bloch and Gafter dive deep into the subtleties of the Java programming language and its core libraries. Illustrated with visually stunning optical illusions, Java™ Puzzlers features 95 diabolical puzzles that educate and entertain. Anyone with a working knowledge of Java will understand the puzzles, but even the most seasoned veteran will find them challenging. Most of the puzzles take the form of a short program whose behavior isn't what it seems. Can you figure out what it does? Puzzles are grouped loosely according to the features they use, and detailed solutions follow each puzzle. The solutions go well beyond a simple explanation of the program's behavior--they show you how to avoid the underlying traps and pitfalls for good. A handy catalog of traps and pitfalls at the back of the book provides a concise taxonomy for future reference. Solve these puzzles and you'll never again fall prey to the counterintuitive or obscure behaviors that can fool even the most experienced programmers.
    Note: Includes bibliographical references (p. 265-269) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 104
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network. Securing Your Business with Cis...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 105
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A complete configuration manual for MPLS, MPLS VPNs, MPLS TE, QoS, Any Transport over MPLS (AToM), and VPLS Understand the crucial Cisco commands for various MPLS scenarios Understand fundamentals of MPLS operation and learn to configure basic MPLS in Frame Relay and ATM-based environments Master fundamentals of MPLS VPN operation including Multiprotocol BGP (MBGP) operation, VPNv4 route exchange, and basic MPLS VPN configuration in the provider network Understand and configure various PE-CE routing protocols in MPLS VPN networks Understand MPLS VPN provisioning in an Inter-provider VPN (Inter-AS) and Carrier Supporting Carrier (CSC) environment Learn MPLS TE and its advanced features Examine AToM with configuration examples for like-to-like and any-to-any L2 VPN implementations and VPLS components and operation, VPLS configuration and verification, and VPLS topologies Learn about MPLS QoS, including configuration and implementation of uniform and short pipe modes MPLS Configuration on Cisco IOS Software is a complete and detailed resource to the configuration of Multiprotocol Label Switching (MPLS) networks and associated features. Through its practical, hands-on approach, you'll become familiar with MPLS technologies and their configurations using Cisco IOS® Software. MPLS Configuration on Cisco IOS Software covers basic-to-advanced MPLS concepts and configuration. Beyond its emphasis on MPLS, you'll learn about applications and deployments associated with MPLS, such as traffic engineering (TE), Layer 2 virtual private networks (VPN), and Virtual Private LAN Service (VPLS). You'll receive practical guidance and deployment scenarios that can be enhanced by re-creation of the setups and configurations demonstrated within this book. You'll move quickly from a brief overview of MPLS technology and basic MPLS configuration on Cisco® routers to more advanced topics. Several chapters provide instruction on VPN connectivity options, including implementing Border Gateway Protocol (BGP) in MPLS VPNs. You'll receive configuration guidelines for advanced MPLS implementations such as MPLS TE, quality of service (QoS), and extranet VPNs. You'll learn about implementation of Layer 2 VPNs versus Layer 3 VPNs with Cisco Any Transport over MPLS (AToM). And you'll see demonstrations of implementing VPLS on Cisco routers complete with the configurations and platform support. "I highly recommend MPLS Configuration on Cisco IOS Software as required reading for th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 106
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: 418 p. ; , 24 cm. +
    DDC: 794.816693
    Keywords: Computer games ; Programming ; Three-dimensional display systems ; Electronic books ; local
    Abstract: There are many programming hobbyists who write 2D games but there are far fewer that grasp the concepts of 3D programming. Although there are also quite a few ¿game development¿ books on the market, few deal with 3D game development. Those that do are mainly aimed at advanced readers. This book will provide a practical, example driven approach to learning the unique art of 3D Game Development that even the beginner can grasp. It won¿t get bogged down in page after page of boring theory but instead will teach through many interesting hands on examples. Tom Miller brings years and years of 3D game programming to the table and couples that with an engaging writing style to mentor readers in the intricacies of game development. The book starts out with a crash course in game programming concepts and then progresses into developing 3 different types of games with many useful tips, notes, and cautions along the way. This title will serve as a useful guide to either current 2D game developers or programmers that want to learn to program games.
    Note: Includes CD-ROM
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 107
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 670 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.7585
    Keywords: Microsoft Windows server ; Client/server computing ; Operating systems (Computers) ; Electronic books ; local
    Abstract: This practical reference guide offers hundreds of useful tasks for managing Windows 2000 and Windows Server 2003, Microsoft's latest and greatest server. Through concise, on-the-job solutions to common problems, Windows Server Cookbook for Windows Server 2003 & Windows 2000 is certain to save you hours of time searching for answers.Now, instead of dredging reams of Microsoft documentation or browsing its unstructured knowledge base to figure out a particular issue--such as how to compare registry values between two hosts--you can simply reference the index of Windows Server Cookbook for Windows Server 2003 & Windows 2000 . From there, you'll be directed to the exact trouble-shooting recipe they need.As the newest title in O'Reilly's popular Cookbook series, this book covers a wide range of issues that you are likely to face in your daily management of the Windows Server operating system. This includes how to deal with: files event logs DNS DHCP security the registry backup/restore One of the book's key benefits is the presentation of solutions in three different recipe formats. Depending on preference, you can solve most problems with the graphical user interface, the command line, or by using scripts. Where appropriate, all three solutions are presented for each recipe in this book. Each recipe also includes a detailed discussion that explains how and why it works. Windows Server Cookbook for Windows Server 2003 & Windows 2000 is written for all levels of system administrators on Windows servers. If you're a relatively new user with only a rudimentary understanding of the job, the book can open your eyes to the many possibilities that await. And if you're an advanced user, it can serve as a useful reference and memory-jogger.Download the code examples from this book. The complete set of examples isavailable at: http://www.rallenhome.com/books/​winsckbk/code.html .
    Note: "Step-by-step procedures and scripts for every occasion"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 108
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Build Powerful, Cross-Platform Rich Client Applications Eclipse is more than a state-of-the-art IDE: its Rich Client Platform (RCP) plug-ins form an outstanding foundation for any desktop application, from chat applications to enterprise software front-ends. In Eclipse Rich Client Platform , two leaders of the Eclipse RCP project show exactly how to leverage Eclipse for rapid, efficient, cross-platform desktop development. In addition to explaining the power of Eclipse as a desktop application development platform, the authors walk step-by-step through developing a fully featured, branded RCP application. They introduce a wide range of techniques, including developing pluggable and dynamically extensible systems, using third-party code libraries, and packaging applications for diverse environments. You'll build, refine, and refactor a complete prototype; customize the user interface; add Help and Update features; and build, brand, and ship the finished software. For every Java developer, regardless of previous Eclipse experience Thoroughly covers Eclipse 3.1's new RCP features and its extensive new tools for designing, coding, and packaging RCP applications Presents techniques for branding and customizing the look and feel of RCP applications Shows how to overcome the challenges and "rough edges" of RCP development Discusses the similarities and differences between RCP and conventional plug-in development Includes an overview of OSGi, the base execution framework for Eclipse If you want to develop and deploy world-class Java applications with rich, native GUIs, and use Eclipse RCP- get this book . CD-ROM contains the Eclipse 3.1 SDK, Eclipse 3.1 RCP SDK, and Eclipse 3.1 RCP Delta Pack appropriate for Windows, Linux, and Mac OS X. It also contains all the code samples developed in the book. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 109
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Eclipse Distilled David Carlson Foreword by Grady Booch Series Editors Erich Gamma Lee Nackman John Wiegand A Concise Introduction to Eclipse for the Productive Programmer Organized for rapid access, focused on productivity, Eclipse Distilled brings together all the answers you need to make the most of today's most powerful Java development environment. David Carlson introduces proven best practices for working with Eclipse, and shows exactly how to integrate Eclipse into any Agile development process. Part I shows how to customize workspaces, projects, perspectives, and views for optimal efficiency-and how to leverage Eclipse's rapid development, navigation, and debugging features to maximize both productivity and code quality. Part II focuses entirely on Agile development, demonstrating how Eclipse can simplify team ownership, refactoring, continuous testing, continuousintegration, and other Agile practices. Coverage includes Managing Eclipse projects from start to finish: handling both content and complexity Using perspectives, views, and editors to work more efficiently Setting preferences to fit your own unique needs-or your team's Leveraging Eclipse's powerful local and remote debugging tools Understanding how Eclipse fits into contemporary iterative development processes Performing continuous testing with JUnit in the Eclipse environment Using Eclipse's wizard-assisted refactoring tools Implementing continuous integration with Ant-based automated project builders Employing best practices for code sharing with CVS and other repositories By focusing on need-to-know information and providing best practices and methodologies, this book is designed to get you working with Eclipse quickly. Whether you're building enterprise systems, Eclipse plug-ins, or anything else, this concise book will help you write better code-and do it faster. About the Author David Carlson is a developer, researcher, author, instructor, and consultant who thrives on innovative technology. He started using Java in 1995 and Eclipse in 2001. David has a Ph.D. in Information Systems from the University of Arizona and is a frequent speaker at conferences and a contributor to technical journals. He is creator of the hyperModel plug-in for Eclipse, and author of Modeling XML Applications with UML (Addison-Wesley, 2001). Cover photo: © archivberlin Fotoagentur GmbH / Alamy Addison-Wesley www.awprofessional.com/series/eclipse ISBN 0-321-28815-7 $34.99 US $48.99 CANADA © Copyr...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 110
    Online Resource
    Online Resource
    Indianapolis, IN : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 248 p. , ill. ; , 24 cm
    Keywords: UML (Computer science) ; Electronic books ; local
    Abstract: "There are many books that shine light on the darkest corners of the UML, but Eric and Bob present just the essentials needed to make you effective in modeling all the important aspects of a software-intensive system." -Grady Booch "Bob and Eric have managed to capture key system and software design techniques in a style that is refreshingly straightforward to understand and apply, and to distill their ideas and insight from more than a decade of practical use of UML into a book that will increase your appreciation for UML and make you more effective." -Dr. Alan W. Brown, Distinguished Engineer, IBM Rational "A practical introduction to designing real-world business systems using UML, explained from first principles. A great book for anyone who wants to start learning the industry's standard modeling language." -Andrew Watson, Vice President and Technical Director, Object Management Group Need to get results with UML...without unnecessary complexity or mind-numbing jargon? You need UML for Mere Mortals®. This easy-to-read introduction is perfect for technical professionals and business stakeholders alike: anyone who needs to create, understand, or review UML models, without becoming a hard-core modeler. There's nothing theoretical about this book. It explains UML in the context of your real-world challenges. It's organized around the activities you'll need to perform. It focuses on the UML elements you'll find most useful. And it offers specific answers for the problems you're most likely to face. Drawing on extensive experience, the authors offer pragmatic explanations and guidance on core techniques ranging from use cases to component diagrams, architectural patterns to application and database modeling. You'll find practical coverage for using UML to support testing, as well as discussion of UML 2.0 and its implications. Whether you're a manager, programmer, architect, database designer, or documentation specialist, UML for Mere Mortals is the handy resource you need to help you achieve your goals with UML...simply, quickly, painlessly. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 111
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxi, 384 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Software engineering ; Electronic books ; local
    Abstract: Extend RUP to Drive Improvements Across the Entire IT Lifecycle The Rational Unified Process is a powerful tool for improving software development -- but it doesn't go nearly far enough. Today's development organizations need to extend RUP to cover the entire IT lifecycle, including the cross-project and enterprise issues it largely ignores. The Enterprise Unified Process (EUP) does precisely that, enabling you to deliver systems that meet all the needs of today's businesses. Now, EUP's creator and architects present the definitive introduction to EUP, and demonstrate how to use it in your environment. The Enterprise Unified Process systematically identifies the business and technical problems that RUP fails to address, and shows how EUP fills those gaps. Using actual examples and case studies, the authors introduce processes and disciplines for producing new software, implementing strategic reuse, "sunsetting" obsolete code and systems, managing software portfolios, and much more. Their independent, "tool agnostic" coverage will be indispensable no matter which RUP products or platforms you've invested in. Coverage includes Practical, step-by-step guidance for adopting EUP in midsized-to-large organizations Proven processes for optimizing ongoing IT operations and support Enterprise business modeling and architecture with EUP EUP disciplines for enterprise administration, people management, and software process improvement Using the new EUP plug-in for IBM's RUP platform Workflow diagrams fully consistent with RUP for easy understanding Detailed appendices covering EUP roles, artifacts, and terminology EUP is the missing link that can help IT professionals achieve the full benefits of RUP in the enterprise. This book will help you discover it, master it, implement it, and succeed with it. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 361-369) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 112
    Online Resource
    Online Resource
    Upper Saddle River, NJ : IBM Press | Boston, MA :Safari,
    Language: English
    Pages: xxx, 895 p. , ill. ; , 24 cm. +
    DDC: 005.75/65
    Keywords: IBM Database 2 ; Relational databases ; Electronic books ; local
    Abstract: The Easy, Visual Guide to IBM DB2 V8.2 IBM DB2 Universal Database™ V8.2 for Linux®, UNIX®, and Windows® is a flexible, scalable, cost-effective, and easy-to-use enterprise database. Now, one book makes DB2 even easier. Understanding DB2 teaches DB2 V8.2 visually, step by step, with dozens of examples and case studies drawn from the authors' unsurpassed experience as DB2 consultants at IBM. Understanding DB2 doesn't just present the big picture. It thoroughly introduces every DB2 concept, procedure, and tool you'll need to get results as an administrator, user, or developer. You'll find authoritative coverage of installation, configuration, objects, database instances, storage, connectivity, security, performance, backup and recovery, SQL fundamentals, and much more. Virtually every new concept is explained with screenshots, diagrams, or tables, all designed to help you learn faster and remember more. For those preparing for certification, this book also contains over a hundred sample questions crafted by the authors to reflect the content and format of the IBM DB2 UDB Database Administration Certification exams, with answers and detailed explanations. Coverage includes Understanding the DB2 product family, DB2 commands, and the DB2 environment Configuring client and server connectivity: walkthroughs of four typical scenarios Managing DB2 storage: partitions, tablespaces, buffer pools, and more Leveraging the power of SQL: queries, inserts, deletes, and updates Implementing security: encryption, authentication, and authorization Administering and maintaining data, from LOAD and EXPORT to backup/recovery Providing high availability with online split mirroring and suspended I/O DB2 architecture: process and memory models Managing database performance and troubleshooting
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 113
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: 360 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The fastest route to true Linux mastery! You know your way around Windows (or maybe a Mac, or even UNIX). Now, you're ready for Linux. And you don't have a minute to waste. Welcome. This book's for you . Janet Valade has spent thirteen years helping new users master Linux and related technologies. She knows the "magic words" that'll help you get the job done, fast. (And she knows exactly how to keep you out of trouble, too!) You'll learn Linux through dozens of focused, bite-size examples, each one carefully designed to build on what you've learned before. Need specific solutions? This book's carefully crafted, high-efficiency format delivers them... instantly . Working on Fedora? Mandrake? SuSE? No matter. This book is for you. No other introduction to Linux covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with Linux- without the hassles! Choose the best Linux distribution for your personal or business needs Get Linux installed quickly and running reliably Handle your day-to-day tasks and efficiently manage your files Master KDE, GNOME, and the Linux command line Write documents and build spreadsheets with OpenOffice.org Set up Web access, email, and instant messaging Work with powerful Linux multimedia and graphics software Find, install, and run new Linux software Set up your printer to work with Linux Supercharge Linux with shell scripts and customized configuration files Includes concise Linux command reference and quick guide to building powerful Regular Expressions Spring Into ... is a new series of fast-paced tutorials from Addison-Wesley Professional Publishers. Each book in the series is designed to bring you up-to-speed quickly. Complex technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working... now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 114
    Online Resource
    Online Resource
    Santa Clara, Calif. : Sun Microsystems Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 762 p. , ill. ; , 24 cm
    Edition: 7th ed.
    DDC: 005.133
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Completely revised and up-to-date coverage of Generic programming, restrictions and limitations, type bounds, wilcard types, and generic reflection Swing GUI development, including input validation and other enhancements Exception handling and debugging, including chained exceptions, stack frames, assertions, and logging Streams and files, the new I/O API, memory-mapped files, file locking, and character set encoders/decoders Regular expressions using the powerful java.util.regex package Inner classes, reflection, and dynamic proxies Application packaging and the Preferences API The seventh edition of Core Java™ 2, Volume I, covers the fundamentals of the Java 2 Platform, Standard Edition (J2SE™). A no-nonsense tutorial and reliable reference, this book features thoroughly tested real-world examples. The most important language and library features are demonstrated with deliberately simple sample programs, but they aren't fake and they don't cut corners. More importantly, all of the programs have been updated for J2SE 5.0 and should make good starting points for your own code. You won't find any toy examples here. This is a book for programmers who want to write real code to solve real problems. Volume I concentrates on the fundamental concepts of the Java language, along with the basics of user-interface programming and provides detailed coverage of Object-oriented programming Reflection and proxies Interfaces and inner classes The event listener model Graphical user-interface design with the Swing UI toolkit Exception handling Stream input/output and object serialization Generic programming For the same real-world treatment of enterprise features and advanced user-interface programming, look for the forthcoming new edition of Core Java™ 2, Volume II-Advanced Features. It includes new sections on metadata and other J2SE 5.0 enhancements along with complete coverage of: Multithreading • Distributed objects • Databases • Advanced GUI components • Native methods • XML Processing • Network programming • Collection classes • Advanced graphics • Internationalization • JavaBeans
    Note: "J2SE 5.0"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 115
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "This welcome addition to the Linux bookshelf provides real insight into the black-art of debugging. All too often debugging books concentrate solely on the tools but this book avoids that pitfall by concentrating on examples. The authors dissect and discuss each example in detail; in so doing they give invaluable insight into the Linux environment." - Richard J Moore , IBM Advanced Linux Response Team-Linux Technology Centre "A plethora of Linux books exist but this guide offers a definitive overview of practical hints and tips for Linux users. Written by experts in the field, it will be extremely useful for system administrators and Linux enthusiasts." - Markus Rex , VP and General Manager, SUSE LINUX The indispensable troubleshooting resource for every Linux administrator, developer, support professional, and power user! Systematically resolve errors, crashes, hangs, performance slowdowns, unexpected behavior, and unexpected outputs Master essential Linux troubleshooting tools, including strace, gdb, kdb, SysRq, /proc, and more The indispensable start-to-finish troubleshooting guide for every Linux professional Now, there's a systematic, practical guide to Linux troubleshooting for every power user, administrator, and developer. In Self-Service Linux® , two of IBM's leading Linux experts introduce a four-step methodology for identifying and resolving every type of Linux-related system or application problem: errors, crashes, hangs, performance slowdowns, unexpected behavior, and unexpected outputs. You'll learn exactly how to use Linux's key troubleshooting tools to solve problems on your own- and how to make effective use of the Linux community's knowledge. If you use Linux professionally, this book can dramatically increase your efficiency, productivity, and marketability. If you're involved with deploying or managing Linux in the enterprise, it can help you significantly reduce operation costs, enhance availability, and improve ROI. Discover proven best practices for diagnosing problems in Linux environments Leverage troubleshooting skills you've developed with other platforms Learn to identify problems with strace -the most frequently used Linux troubleshooting tool Use /proc to uncover crucial information about hardware, kernels, and processes Recompile open source applications with debug information Debug applications with gdb , including C++ and threaded applications Debug kernel crashes and hangs, one step at a time Understand the E...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 116
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 651 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Where has this book been all my professional life? It is about time someone wrote this book. The author covers many basic, practical issues that other authors omit in a format that makes for a great troubleshooting reference and for casual perusing. There are a lot of books available that give a broad overview of system and network administration, and there are a lot of detailed books on each specific topic covered in this book, but I don't know of any other place where I can get so much useful, practical information on such a wide range of topics in such a concise and readable form. I will highly recommend it to my friends and colleagues who are trying to manage their own systems. I am anxious to show it to our instructors who teach data communications and networks as a possible text or lab manual." -Ron McCarty, instructor and program chair, Computer Science, Penn State Erie "This book takes a very unique approach and is very flexible. It offers a great deal to the home user, students, small businesses-all the way to any Linux sys admin that needs a handy reference. I found it very refreshing in terms of style, stated goals, presentation, ease of use, direction, and the "present and future" value of the content. In other words the author is very current and knowledgeable. I would recommend this book to every level from programmer to manager." -Joe Brazeal, Information Technician III, Southwest Power Pool "This book is an excellent resource for new Linux administrators. I was impressed with the comprehensive set of 35 topic chapters, making this book a very useful reference. I know of no other work like this." -George Vish II, Linux curriculum program manager and senior education consultant, Hewlett-Packard Education "I would recommend this book to novice Linux users and administrators. It covers a lot of topics, and makes it easy for readers to follow along." -Bret Strong, education consultant, Hewlett-Packard Company "Linux Quick Fix Notebook is a well-written guide to designing, installing, and maintaining Linux servers. Many Linux reference texts are just simple rewrites of Linux ¨man¨ and ¨info¨ pages, but this book addresses the real issues that systems administrators encounter when working with Linux. The author provides a pedagogical guide to learning Linux server administration. In addition, the book includes step-by-step information so that users can quickly take advantage of the best that open source software has to offer today. I...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 117
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Pearson Education/PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 337 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: BEA WebLogic server ; BEA WebLogic workshop ; Client/server computing ; Java (Computer program language) ; Web services ; Electronic books ; local
    Abstract: "Very impressive work. This book is valuable for beginning and intermediate technologists." Dwight Mamanteo, Technical Manager, BEA Systems "Provides explanations of Web services, tuning tips, and discussions on security that will likely be of benefit to developers as they create their Web services." Robert W. Husted, Member, Technical Staff, Requisite Software Build Web services infrastructure based on service-oriented architecture (SOA) Implement enterprise-class Web services using WebLogic and J2EE Complete lifecycle coverage with best practices: design, prototyping, development, testing, deployment, and management Real-world enterprise Web services implementation with J2EE and WebLogic You've seen plenty of theory about Web services. This book is about the reality: what it takes to successfully implement J2EE Web services with BEA WebLogic in complex enterprise environments. Anjali Anagol-Subbarao, one of the world's leading Web services experts, offers powerful insights for every stage of the Web services lifecycle: design, prototyping, development, testing, deployment, and management. Anagol-Subbarao draws on her experience architecting and building Web services infrastructure for HP's worldwide operations and takes on the challenges that face every enterprise implementer. She demonstrates how to design robust Web services that align with business processes, smoothly integrate with existing infrastructure, deliver superior performance and security, and can be managed effectively. Coverage includes Primers on WebLogic Workshop, WebLogic Server, WLI, and J2EE Web services technology Building effective service-oriented architectural (SOA) frameworks Translating designs into working code Designing for end-to-end security and tuning for high performance Testing Web services and deploying them to production environments Addressing the unique challenges associated with managing distributed Web services © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 118
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxi, 434 p. , ill. ; , 24 cm
    Series Statement: Robert C. Martin series
    DDC: 005.1
    Keywords: Application software ; Development ; Electronic books ; local
    Abstract: Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your development efforts. In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases. This book draws on material Michael created for his renowned Object Mentor seminars: techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include Understanding the mechanics of software change: adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platformwith examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structure This book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 119
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 397 p. , ill. ; , 25 cm
    DDC: 005.1/068/5
    Keywords: Capability maturity model (Computer software) ; Electronic books ; local
    Abstract: Use Assessments to Drive Process Improvements in Software, Systems, Human Resources, and Beyond Pioneered by the world's leading innovators in software engineering, assessments have evolved into a remarkably powerful tool for process improvement in areas ranging from systems to services, hardware to human resources. Unlike audits, assessments are conducted from the inside. When handled correctly, assessments can help transform technical and managerial culture, dramatically improving both quality and profitability. In CMMI Assessments: Motivating Positive Change , two of the field's most respected leaders show exactly how to use them for maximum business advantage. Writing for executives, managers, technical professionals, and assessors themselves, Marilyn Bush and Donna Dunaway illuminate every phase of the assessment process-from planning through post-assessment follow-up. The authors begin with an expert overview of what assessments entail, when they make sense, how to set achievable goals for them, and how to lead them to success. Next, they "drill down" into each stage of the process, presenting step-by-step instructions and defining the roles and responsibilities of every participant. Coverage includes creating and training assessment teams; identifying assessment products; consolidating interview data and other onsite activities; presenting results; and using those results productively. Drawing on their unsurpassed experience leading assessments and mentoring assessors, they offer deep insights into the real-world challenges and obstacles you'll face-and proven solutions. They also present an extended case study showing how a real software development organization drove continuous improvement through four years of iterative assessments-moving from CMM Level 2 to elite Level 5 status, and driving dramatic business benefits along the way. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 375-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 120
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Sun Microsystems Pr | Boston, MA :Safari,
    Language: English
    Keywords: Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0132354799 ISBN-13: 9780132354790 Completely revised and up-to-date coverage of Multithreading -including the java.util.concurrent library, locks, condition objects, futures, thread pools, thread-safe collections, threads and Swing Collection classes -collections framework, concrete collections, and generic utility methods Annotations and metadata -using annotations to automate programming tasks, JDK™ 5.0 standard annotations, the apt tool for source-level annotation processing, and bytecode engineering Advanced Swing and AWT -lists, trees, tables, and other advanced components; image processing and printing JavaBeans™ -including property editors, customizers, and long-term persistence XML -DOM and SAX parsers, XPath, and XSL transformations The seventh edition of Core Java™ 2, Volume II, covers advanced user-interface programming and the enterprise features of the Java 2 Platform, Standard Edition (J2SE™). Like Volume I (which covers the most important language and library features), this book has been completely updated and revised for J2SE 5.0. All of the sample programs have been updated and carefully crafted to illustrate practical solutions to the type of real-world problems professional developers encounter. Volume II includes new sections on annotations and other J2SE 5.0 enhancements, along with complete coverage of Multithreading Distributed objects Databases JNDI and LDAP Advanced GUI components Native methods XML processing Network programming Collection classes Advanced graphics Internationalization JavaBeans Annotations
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 121
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Exposes the inner workings of Cisco CallManager to help you maximize your Cisco IP Communications solution Read new content on QSIG, SIP trunks, video support, hunt lists and line groups, time-of-day routing, and new features added in CallManager releases 3.2, 3.3, 3.4, 4.0, and 4.1 Review content from the first edition that has been fully revised and updated to CallManager release 4.1 Learn how to deploy and manage a CallManager solution Understand the components that make up CallManager call routing through the use of basic to advanced examples that solve enterprise call routing problems Gain a full understanding of how CallManager manages media resources and processes information for conferencing, transcoding, annunciation, and more Learn detailed information about North American and international dial plans, trunk and station devices, media resources, and much more Cisco CallManager Fundamentals , Second Edition, provides examples and reference information about Cisco® CallManager, the call-processing component of the Cisco IP Communications solution. Cisco CallManager Fundamentals uses examples and architectural descriptions to explain how CallManager processes calls. This book details the inner workings of CallManager so that those responsible for designing and maintaining a Voice over IP (VoIP) solution from Cisco Systems® can understand the role each component plays and how they interrelate. This book is the perfect resource to supplement your understanding of CallManager. You'll learn detailed information about dial plan management and call routing, hardware and software components, media processing, call detail records, system management and monitoring, and the history of CallManager. The authors, all members of the original team that developed and implemented the CallManager software and documentation from its early stages, also provide a list of features and Cisco solutions that integrate with CallManager. This second edition of Cisco CallManager Fundamentals covers software releases through release 4.1. With this book, you will gain a deeper understanding of the system and find answers to questions not available in any other source. This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 122
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 419 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Wireless LANs ; Security measures ; Electronic books ; local
    Abstract: Expert guidance for securing your 802.11 networks Learn best practices for securely managing, operating, and scaling WLANs Comprehend the security-related technological underpinnings of WLANs Explore new security protocols in 802.11i and WPA and learn how they prevent attacks Review centralized deployment models for wired/wireless integration Deepen your knowledge of defense by understanding the tools that attackers use to perform reconnaissance and to attack authentication and encryption mechanisms Understand how to design secure WLANs to support enterprise applications with the new standards and practices detailed in this book Reference the next generation authentication standards and protocols Find out about mobility, hotspots, and campus wireless networks Grasp Open Authentication, MAC-based authentication, shared key authentication, EAP authentication protocols, WEP, WPA, and 802.11i Cisco Wireless LAN Security is an in-depth guide to wireless LAN technology and security, introducing the key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect the entire network. Because a WLAN is less effective as an isolated piece of the network, this book emphasizes how to effectively integrate WLAN devices into the wired network while maintaining maximum security. Cisco Wireless LAN Security covers the spectrum of WLAN security, including protocols and specifications, vulnerabilities and threats, and, especially, deployment patterns and design guidelines. With a unique combination of theory and practice, this book addresses fundamental wireless concepts, such as WEP, and innovations, such as EAP, switching, and management. Each chapter includes detailed illustrations, checklists, design templates, and other resources. You will also find generic wireless deployment patterns based on real-world customer installations and functional examples of architecture, design, and best practices. Whether you currently design, configure, implement, and maintain WLANs or simply want to explore wireless security issues, Cisco Wireless LAN Security has everything you need to understand how to create a seamlessly secure, impenetrable 802.11 network. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references (p. [399]-402) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 123
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 624 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Keywords: Internet programming ; Microsoft .NET ; Electronic books ; local
    Abstract: Brilliantly compiled by author Juval Lowy, Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover .NET 2.0. It remains one of the few practical books available on this topic. This invaluable resource is targeted at anyone who develops complex or enterprise-level applications with the .NET platform--an ever-widening market. In fact, nearly two million Microsoft developers worldwide now work on such systems. Programming .NET Components , Second Edition begins with a look at the fundamentals of component-oriented programming and then progresses from there. It takes the time to carefully examine how components can simplify and add flexibility to complex applications by allowing users to extend their capabilities. Next, the book introduces a variety of .NET essentials, as well as .NET development techniques. Within this discussion on component development, a separate chapter is devoted to each critical development feature, including asynchronous calls, serialization, remoting, security, and more. All the while, hazardous programming pitfalls are pointed out, saving the reader from experiencing them the hard way.A .NET expert and noted authority on component-oriented programming, Lowy uses his unique access to Microsoft technical teams to the best possible advantage, conveying detailed, insider information in easy-to-grasp, activity-filled language. This hands-on approach is designed to allow individuals to learn by doing rather than just reading. Indeed, after digesting Programming .NET Components , Second Edition, readers should be able to start developing .NET components immediately. Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover...
    Note: "Covers .NET 2.0 & Visual Studio 2005"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 124
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 713 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." -Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code-and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 125
    Online Resource
    Online Resource
    Boston, Mass. ; : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 651 p. ; , 24 cm
    Edition: 3rd ed.
    Series Statement: The Java series
    DDC: 005.71262
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Written by the inventors of the technology, The Java™ Language Specification, Third Edition , is the definitive technical reference for the Java™ programming language. If you want to know the precise meaning of the language's constructs, this is the source for you. The book provides complete, accurate, and detailed coverage of the Java programming language. It provides full coverage of all new features added since the previous edition, including generics, annotations, asserts, autoboxing, enums, for-each loops, variable arity methods, and static import clauses.
    Note: Previous ed.: 2000
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 126
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Introducing the Boost libraries: the next breakthrough in C++ programming Boost takes you far beyond the C++ Standard Library, making C++ programming more elegant, robust, and productive. Now, for the first time, a leading Boost expert systematically introduces the broad set of Boost libraries and teaches best practices for their use. Writing for intermediate-to-advanced C++ developers, Björn Karlsson briefly outlines all 58 Boost libraries, and then presents comprehensive coverage of 12 libraries you're likely to find especially useful. Karlsson's topics range from smart pointers and conversions to containers and data structures, explaining exactly how using each library can improve your code. He offers detailed coverage of higher-order function objects that enable you to write code that is more concise, expressive, and readable. He even takes you "behind the scenes" with Boost, revealing tools and techniques for creating your own generic libraries. Coverage includes Smart pointers that provide automatic lifetime management of objects and simplify resource sharing Consistent, best-practice solutions for performing type conversions and lexical conversions Utility classes that make programming simpler and clearer Flexible container libraries that solve common problems not covered by the C++ Standard Library Powerful support for regular expressions with Boost.Regex Function objects defined at the call site with Boost.Bind and Boost.Lambda More flexible callbacks with Boost.Function Managed signals and slots (a.k.a. the Observer pattern) with Boost.Signals The Boost libraries are proving so useful that many of them are planned for inclusion in the next version of the C++ Standard Library. Get your head start now , with Beyond the C++ Standard Library.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 127
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 4th ed.
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: " C++ Primer is well known as one of the best books for learning C++ and is useful for C++ programmers of all skill levels. This Fourth Edition not only keeps this tradition alive, it actually improves on it." --Steve Vinoski, Chief Engineer, Product Innovation, IONA Technologies " The Primer really brings this large and complex language down to size." --Justin Shaw, Senior Member of Technical Staff, Electronic Programs Division, The Aerospace Corporation "It not only gets novices up and running early, but gets them to do so using good programming practices." --Nevin ":-)" Liber, Senior Principal Engineer (C++ developer since 1988) This popular tutorial introduction to standard C++ has been completely updated, reorganized, and rewritten to help programmers learn the language faster and use it in a more modern, effective way. Just as C++ has evolved since the last edition, so has the authors' approach to teaching it. They now introduce the C++ standard library from the beginning, giving readers the means to write useful programs without first having to master every language detail. Highlighting today's best practices, they show how to write programs that are safe, can be built quickly, and yet offer outstanding performance. Examples that take advantage of the library, and explain the features of C++, also show how to make the best use of the language. As in its previous editions, the book's authoritative discussion of fundamental C++ concepts and techniques makes it a valuable resource even for more experienced programmers. Program Faster and More Effectively with This Rewritten Classic Restructured for quicker learning, using the C++ standard library Updated to teach the most current programming styles and program design techniques Filled with new learning aids that emphasize important points, warn about common pitfalls, suggest good programming practices, and provide general usage tips Complete with exercises that reinforce skills learned Authoritative and comprehensive in its coverage The source code for the book's extended examples is available on the Web at the address below. www.awprofessional.com/cpp_primer
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 128
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Praise for Mark Sobell's Books "I keep searching for books that collect everything you want to know about a subject in one place, and keep getting disappointed. Usually the books leave out some important topic, while others go too deep in some areas and must skim lightly over the others. A Practical Guide to Red Hat® Linux® is one of those rare books that actually pulls it off. Mark G. Sobell has created a single reference for Red Hat Linux that cannot be beat! This marvelous text (with a 4-CD set of Linux Fedora Core 2 included) is well worth the price. This is as close to an 'everything you ever needed to know' book that I've seen. It's just that good and rates 5 out of 5." -Ray Lodato, Slashdot contributor "Mark Sobell has written a book as approachable as it is authoritative." -Jeffrey Bianchine, Advocate, Author, Journalist "Excellent reference book, well suited for the sysadmin of a linux cluster, or the owner of a PC contemplating installing a recent stable linux. Don't be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs." -Wes Boudville, Inventor " A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you Mark Sobell." -C. Pozrikidis, University of California at San Diego "This book presents the best overview of the Linux operating system that I have found. . . . It should be very helpful and understandable no matter what the reader's background is: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready." -Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group FRUUG, Boulder, Colorado "Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There's no other book that discusses so many different topics and in such depth." -Eugenia Loli-Queru, Editor in Chief, OSNews.com The Most Useful Linux Tutorial and Reference Ever, with Hundreds of High-Quality Examples Covering Every Linux Distribution! To be truly productive with Linux, you need to thoroughly mast...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 129
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 1090 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.26/8
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The best just became BETTER! Completely revised to meet all your Red Hat Linux needs! Fedora Core and Red Hat Enterprise Linux are advanced operating systems. You need a book that's just as advanced. This book explains Linux clearly and effectively--with a focus on the features you care about, including system security, Internet server setup, and sharing files and printers with Windows systems. Best-selling Linux author Mark Sobell starts at the beginning and walks you through everything that matters, from installing Fedora Core using the included CDs to GNOME, KDE, Samba 3, sendmail, Apache, DNS, NIS, and iptables. Along the way, you learn the "hows" and the "whys." Whether you are a user, an administrator, or a programmer, this book gives you all you need and more. Mark Sobell knows every Linux nook and cranny, has taught hundreds of thousands of readers, and never forgets what it's like to be new to Linux. Don't settle for yesterday's Linux book...get the ONLY book that meets today's challenges and tomorrow's! Compared with the other Linux books out there, A Practical Guide to Red Hat® Linux®, Second Edition, delivers... The full Fedora Core operating system on 4 CDs (not the truncated "Publisher's Edition") AND complete coverage of Fedora Core and the 2.6 Linux kernel, PLUS coverage of Red Hat Enterprise Linux Deeper coverage of GNOME and KDE, including customization More practical coverage of file sharing with Samba, NFS, and FTP Easier-to-follow coverage of Internet server configuration including Apache, sendmail, NFS, and DNS More up-to-date coverage of security, including SELinux (Security Enhanced Linux), OpenSSH, and firewall setup using iptables Better coverage of "meat-and-potatoes" system/network administration tasks A more practical introduction to writing bash shell scripts More complete coverage of configuring local and network printers using CUPS And much more...including a 500+ word glossary and a comprehensive index to help you find what you need fast! Includes 4 CDs! Get the full version of Red Hat's Fedora Core 2 release!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 130
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 1664 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: HP-UX ; Hewlett-Packard computers ; Programming ; Examinations ; Study guides ; Operating systems (Computers) ; Electronic books ; local
    Abstract: HP-UX CSE: Official Study Guide and Desk Reference The definitive HP-UX CSE exam preparation guide and reference HP-approved coverage of all three CSE exams: CSE HP-UX Advanced System Administration, CSE High Availability Using HP-UX Serviceguard, and CSE HP-UX Networking and Security Comprehensive study resources: exam objectives, sample questions, and summaries for last-minute review More than a great study guide: an outstanding reference for working system engineers This book delivers comprehensive preparation for all three HP-UX CSE exams, the core exam: CSE HP-UX Advanced System Administration, and specialty exams, CSE High Availability Using HP-UX Serviceguard and CSE HP-UX Networking and Security . Coverage includes: Implementing HP-UX in technology-rich enterprise environments Maximizing the performance and availability of HP-UX systems and applications Partitioning: node and virtual partitions Disks, volumes, file systems: RAID, LVM, VxVM, HFS, VxFS, VFS layer, swap/dump space, and more Monitoring system resources, activities, events, and kernels Processes, threads, and bottlenecks: priorities, run queues, multi-processor environments, memory requirements, bottlenecks, and more Installation, patching, and recovery, including Software Distributor and Ignite-UX Emergency recovery with HP-UX installation media Broad networking coverage: IPv6, ndd, DHCP, DNS, NTP, CIFS/9000, LDAP, sendmail, Automatic Port Aggregation, VPNs, VLANs, and more Planning, implementing, and managing high availability clustering with Serviceguard Other HP-UX cluster solutions: Extended Serviceguard Cluster, Metrocluster, Continentalclusters, and more Infrastructure for remote access to HA clusters: SANs, DWDM, dark fiber HP-UX security administration: Trusted systems, SSH, HIDS, IPSec, IPFilter, and Bastille Operating Systems/HP-UX Sample questions, last-minute review tips, and other study resources This isn't just an outstanding prep guide, it's the definitive day-to-day reference for working professionals in high availability environments. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 131
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 525 p. , ill. ; , 24 cm
    DDC: 005.2'765
    Keywords: Lotus Notes ; WebSphere ; Software configuration management ; Web servers ; Computer programs ; Electronic books ; local
    Abstract: Straight from IBM, this is the first comprehensive guide to building collaborative solutions that integrate WebSphere and Lotus to drive maximum business value. Writing for experienced Web developers, three leading IBM consultants show how to design and deploy WebSphere and Domino together in any environment, no matter how large or complex. The authors address architecture, security, performance, availability, development, and much more. Using their techniques, you can implement cutting-edge collaboration, drive productivity improvements, streamline business processes, accelerate response times-and build your On Demand enterprise. Coverage includes Architecting WebSphere and Lotus collaboration for maximum effectiveness Establishing a common platform that reduces administrative costs and increases ROI Choosing what to deploy on WebSphere and what to deploy on Domino Optimizing new Lotus collaborative applications for existing WebSphere environments Managing integrated WebSphere and Domino systems Using WebSphere and Domino development tools to extend and customize your system Accessing J2EE from Domino-and vice versa Detailed appendices on WebSphere Application Server, Domino, WebSphere Portal, Lotus Workplace, and much more... © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 501-504) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 132
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxi, 370 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Broadband communication systems ; Extranets (Computer networks) ; MPLS standard ; Electronic books ; local
    Abstract: Implement the design principles and configurations behind MPLS-based VPNs for broadband access networks The book discusses how MPLS and its VPN service are best used in a broadband environment, concentrating on key design issues and solutions, including How to manage tens of thousands of interfaces and host routes and hundreds of dynamic VPNs When a Virtual Home Gateway is necessary Why use dynamic address assignment How routes should be summarized into the core Deploy MPLS VPNs successfully in broadband networks with Building MPLS-Based Broadband Access VPNs . This book helps you understand why and how today's broadband networks function, covering the principal access technologies: DSL, Ethernet, and cable. The book also examines the different tunneling protocols used for VPN solutions today, namely GRE, IPSec, and L2TP, with examples of how these solutions are deployed and a discussion of their strengths and weaknesses. Building MPLS-Based Broadband Access VPNs also includes an in-depth description of the IOS VRF Lite, which helps you use VRF-aware features with an IP core. Detailed descriptions of the technologies, design principles, network configurations, and case studies are provided throughout the book, helping you develop a pragmatic understanding of MPLS-based broadband access VPNs. Obtain a realistic understanding of large-scale broadband access network design requirements Recognize the business impact of using MPLS to provide access VPN services, including the advantages of QoS, availability, and provisioning Use MPLS in access VPN and transport networks and deal with the unique scalability problems that such networks pose Leverage VRF-aware features to deploy IP-based VPNs Includes detailed Cisco IOS configuration examples based on real-world scenarios This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references (p. [341]-355) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 133
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit | Boston, MA :Safari,
    Language: English
    Pages: 290 p. ; , 23 cm
    Keywords: Flash (Computer file) ; Computer animation ; Electronic books ; local
    Abstract: This guide allows you to learn specific Flash skills step-by-step at your own pace. Choose from among several tutorials to develop the skills that are most appropriate to the Flash projects you are working on at any given time. Each lesson leads you through the workflow for implementing a specific real-world feature or effect in your Flash applications. In Macromedia Flash 8: A Tutorial Guide, learn how to: • Navigate the Flash workspace and use common document types • Use the Flash drawing tools and create engaging graphic effects • Use ActionScript to add interactivity and custom functionality to your documents • Connect your Flash projects to external data sources to create data-driven applications Powerful development and design tools require thorough and authoritative technical advice and documentation. When it comes to Macromedia Flash, no one is more authoritative than Macromedia's own development and writing teams. Now their official documentation is available to you in printed book form. As you work, keep this guide by your side for ready access to valuable information on using Flash. We've designed it so that it's easy to annotate as you progress.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 134
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution A complete resource for understanding VPN components and VPN design issues Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients Discover troubleshooting tips and techniques from real-world scenarios based on the author's vast field experience Filled with relevant configurations you can use immediately in your own network With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs. Part I, "VPNs," introduces the topic of VPNs and discusses today's main technologies, including IPsec. It also spends an entire chapter on SSL VPNs, the newest VPN technology and one that Cisco has placed particular emphasis on since 2003. Part II, "Concentrators," provides detail on today's concentrator products and covers site-to-site and remote-access connection types with attention on IPsec and WebVPN. Part III covers the Cisco VPN Client versions 3.x and 4.x along with the Cisco3002 Hardware Client. Cisco IOS® routers are the topic of Part IV, covering scalable VPNs with Dynamic Multipoint VPN, router certificate authorities, and router remote access solutions. Part V explains Cisco PIX and Cisco ASA security appliances and their roles in VPN connectivity, including remote access and site-to-site connections. In Part VI, a case study shows how a VPN solution is best implemented in the real world using a variety of Cisco VPN products in a sample network. This security book is part of the Cisco Press® Networking Technology Serie...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 135
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 1587055740 ISBN-13: 9781587055744 Cisco authorized self-study book for CCDP® 642-871 architectures foundation learning Prepare for the CCDP ARCH exam 642-871 with the Cisco authorized self-study guide. This book teaches you how to: Understand the composition and deployment of the Cisco AVVID framework in network design Understand the composition and role of the Enterprise Composite Network Model in enterprise network design Design enterprise campus networks and their edge network connectivity to the Internet Understand and implement network management solutions in the network Integrate new technologies designed to enhance network performance and availability in the enterprise, such as high availability, QoS, multicasting, and storage and content networking Design and implement appropriate security solutions for enterprise networks Deploy wireless technologies within the enterprise Implement and design IP telephony solutions for the enterprise network CCDP Self-Study: Designing Cisco Network Architectures (ARCH) is a Cisco® authorized self-paced learning tool. By presenting a structured format for the conceptual and intermediate design of AVVID network infrastructures, this book teaches you how to design solutions that scale from small to large enterprise networks and take advantage of the latest technologies. Whether you are preparing for the CCDP® certification or simply want to gain a better understanding of how to architect network solutions over intelligent network services to achieve effective performance, scalability, and availability, you will benefit from the foundation information presented in this book. This comprehensive book provides detailed information and easy-to-grasp tutorials on a broad range of topics related to architecture and design, including security, fine-tuning routing protocols, switching structures, and IP multicasting. To keep pace with the Cisco technological developments and new product offerings, this study guide includes coverage of wireless networking, the SAFE Blueprint, content networking, storage networking, quality of service (QoS), IP telephony, network management, and high availability networks. Design examples and sample verification output demonstrate implementation techniques. Configuration exercises, which appear in every chapter, provide a practical review of key concepts to discuss critical issues surrounding network operation. Chapter-ending revie...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 136
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 369 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Linux ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: Covers Red Hat and SUSE When something goes wrong with your Linux firewall, you need to fix it-right now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes: Troubleshooting Linux® Firewalls . Authors Michael Shinn and Scott Shinn are among the world's leading firewall experts; they've even been hired to protect computer security at the White House. In this book, they cover every area where Linux firewalls can go wrong: rules and filtering problems, Layer 2/3/4 issues, trouble with individual services, DNS/DHCP failures, even misconfigured VPNs. They also present an easy, start-to-finish troubleshooting methodology that'll help you identify even the newest or most obscure firewall problem fast-and solve it! Inside, you will find in-depth information on the following areas: What you must know about iptables and netfilter to troubleshoot and avoid problems Using loggers, sniffers, and other tools to diagnose even the most obscure firewall problems Making sure your firewall rules work the way they're supposed to Resolving problems with Network Address Translation and IP Forwarding Troubleshooting SMTP, Apache, Squid, NFS, FTP, instant messaging, and other Web-based services Finding and fixing common problems with IPsec VPN configuration Making your firewalls more failure-resistant: recommendations from the experts If you depend on a Linux firewall, what will you do if it goes down? With Troubleshooting Linux® Firewalls , you can be confident that the solutions are right at hand-so you can sleep at night! © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 137
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 312 p. , ill., facsims. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: "The best thinking in the agile development community brought to street-level in the form of implementable strategy and tactics. Essential reading for anyone who shares the passion for creating quality software." -Eric Olafson, CEO Tomax "Crystal Clear is beyond agile. This book leads you from software process hell to successful software development by practical examples and useful samples." -Basaki Satoshi, Schlumberger "A very powerful message, delivered in a variety of ways to touch the motivation and understanding of many points of view." -Laurie Williams, Assistant Professor, North Carolina State University "A broad, rich understanding of small-team software development based on observations of what actually works." -John Rusk "A superb synthesis of underlying principles and a clear description of strategies and techniques." -Géry Derbier, Project Manager, Solistic "Alistair Cockburn shows how small teams can be highly effective at developing fit-for-purpose software by following a few basic software development practices and by creating proper team dynamics. These small teams can be much more effective and predictable than much larger teams that follow overly bureaucratic and prescriptive development processes." - Todd Little, Sr. Development Manager, Landmark Graphics "I find Cockburn's writings on agile methods enlightening: He describes 'how to do,' of course, but also how to tell whether you're doing it right, to reach into the feeling of the project. This particular book's value is that actual project experiences leading to and confirming the principles and practices are so...well...clearly presented." - Scott Duncan, ASQ Software Division Standards Chair and representative to the US SC7 TAG and IEEE S2ESC Executive Committee and Management Board and Chair of IEEE Working Group 1648 on agile methods " Crystal Clear identifies principles that work not only for software development, but also for any results-centric activities. Dr. Cockburn follows these principles with concrete, practical examples of how to apply the principles to real situations and roles and to resolve real issues." - Niel Nickolaisen, COO, Deseret Book "All the successful projects I've been involved with or have observed over the past 19 or so years have had many of the same characteristics as described in Crystal Clear (even the big projects). And many of the failed projects failed because they missed something-such as expert end-user involvement or accessibility ...
    Note: Includes bibliographical references (p. 304-307) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 138
    Online Resource
    Online Resource
    Upper Saddle River, NJ. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations of UNIX and UNIX-like environments. And yet, it does all this while retaining the style and taste of the original classic." --Mukesh Kacker, cofounder and former CTO of Pronto Networks, Inc. "One of the essential classics of UNIX programming." --Eric S. Raymond, author of The Art of UNIX Programming "This is the definitive reference book for any serious or professional UNIX systems programmer. Rago has updated and extended the classic Stevens text while keeping true to the original. The APIs are illuminated by clear examples of their use. He also mentions many of the pitfalls to look out for when programming across different UNIX system implementations and points out how to avoid these pitfalls using relevant standards such as POSIX 1003.1, 2004 edition and the Single UNIX Specification, Version 3." --Andrew Josey, Director, Certification, The Open Group, and Chair of the POSIX 1003.1 Working Group " Advanced Programming in the UNIX® Environment, Second Edition, is an essential reference for anyone writing programs for a UNIX system. It's the first book I turn to when I want to understand or re-learn any of the various system interfaces. Stephen Rago has successfully revised this book to incorporate newer operating systems such as GNU/Linux and Apple's OS X while keeping true to the first edition in terms of both readability and usefulness. It will always have a place right next to my computer." --Dr. Benjamin Kuperman, Swarthmore College Praise for the First Edition " Advanced Programming in the UNIX® Environment is a must-have for any serious C programmer who works under UNIX. Its depth, thoroughness, and clarity of explana-tion are unmatched." -- UniForum Monthly "Numerous readers recommended Advanced Programming in the UNIX® Environment by W. Richard Stevens (Addison-Wesley), and I'm glad they did; I hadn't even heard of this book, and it's been out since 1992. I just got my hands on a copy, and the first few chapters have been fascinating." -- Open Systems Today "A much more readable and detailed treatment of UNIX internals can be found in Advanced Programming in the UNIX® Environment by W. Richard Steven...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 139
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 695 p. , ill. ; , 24 cm
    Series Statement: IBM Press series--information management
    Keywords: WebSphere ; Application software ; Development ; Java (Computer program language) ; Web servers ; Computer programs ; Web site development ; Electronic books ; local
    Abstract: The expert guide to deploying and managing any WebSphere Application Server V5.x application and environment If you're a WebSphere Application Server administrator or developer, this is your advanced guide for delivering applications rapidly, running them smoothly, and administering them efficiently. Four leading IBM consultants draw on their years of experience to illuminate the key steps involved in taking WebSphere Application Server applications from development to production. They focus on the areas most crucial to success, including application assembly and build, application and infrastructure configuration and administration, and application testing and verification. Along the way, they show how to implement automated deployment processes that can be executed frequently, reliably, and quickly-so you can get your applications to market fast. The focus is on WebSphere Application Server Version 5.1, but much of the information applies to other versions. Coverage includes Installing, testing, and managing WebSphere Application Server environments: clustering, security, messaging, integration, and more Deploying and managing key J2EE technologies: JDBC, Connectors, EJB, container managed and message driven beans, transactions, JMS, JavaMail, and more Deploying highly available, scalable multi-node WebSphere Application Server environments: clustering, distributed session management, and edge components Advanced considerations: working with Java Management Extensions, caching, and much more Performance-tuning tools Troubleshooting Leveraging key WebSphere deployment and administration tools: ANT, wsadmin, Admin Console, and the Application Server Toolkit Advanced discussions of J2EE and architectural concepts you need to deploy successfully-with practical examples © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 140
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Direct from the creators of the Java™ programming language, the completely revised fourth edition of The Java™ Programming Language is an indispensable resource for novice and advanced programmers alike. Developers around the world have used previous editions to quickly gain a deep understanding of the Java programming language, its design goals, and how to use it most effectively in real-world development. Now, Ken Arnold, James Gosling, and David Holmes have updated this classic to reflect the major enhancements in Java™ 2 Standard Edition 5.0 (J2SE™ 5.0). The authors systematically cover most classes in Java's main packages, java.lang.* , java.util, and java.io, presenting in-depth explanations of why these classes work as they do, with informative examples. Several new chapters and major sections have been added, and every chapter has been updated to reflect today's best practices for building robust, efficient, and maintainable Java software. Key changes in this edition include New chapters on generics, enums, and annotations, the most powerful new language features introduced in J2SE 5.0 Changes to classes and methods throughout to reflect the addition of generics Major new sections on assertions and regular expressions Coverage of all the new language features, from autoboxing and variable argument methods to the enhanced for-loop and covariant return types Coverage of key new classes, such as Formatter and Scanner The Java™ Programming Language, Fourth Edition, is the definitive tutorial introduction to the Java language and essential libraries and an indispensable reference for all programmers, including those with extensive experience. It brings together insights you can only get from the creators of Java: insights that will help you write software of exceptional quality.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 141
    Online Resource
    Online Resource
    San Jose, Calif. : Adobe ; | Boston, MA :Safari,
    Language: English
    Pages: 600 p. ; , 24 cm
    DDC: 005.72
    Keywords: Adobe Acrobat (Computer file) ; Electronic books ; local
    Abstract: Ready to learn the visual effects secrets used at such leading-edge studios as Industrial Light + Magic and The Orphanage? Adobe After Effects 6.5 Studio Techniques inspires you to take your work to the next level with realworld examples and insider techniques. Get blockbuster results without the big budget as you delve deep into the essence of visual effects. This book goes beyond conventional step-by-step instruction, teaching you bread-and-butter effects that you can adapt and combine for countless projects. • Real solutions from real professionals: Nobody does it better, and now they'll show you how. Discover the keys to analyzing your shots from Stu Maschwitz, Visual Effects Supervisor for Star Wars, Episode One and Sin City . Unlock the mysteries of linear color space with Brendan Bolles, co-creator of the eLin plug-ins. Master fundamental effects techniques with Mark Christiansen, After Effects specialist for The Orphanage on The Day After Tomorrow . • Compositing essentials: No matter how sophisticated the effect, they all start from the same building blocks. Find out what you've been missing about color and light matching, keying, motion tracking, rotoscoping, working with film, and more. • Advanced techniques: Your goal should be effects so good that no one notices them. From sky replacement to explosions, from smoke to fire, learn to bring your shots to life and enhance scenes without anyone ever knowing what they're seeing isn't 100% real. • Companion CD-ROM: Professional tools produce professional results. Demo versions of plug-ins from Andersson Technologies, Red Giant Software, Frischluft, and Trapcode will enhance your work. Stop relying on ready-made solutions and pre-built effects. Learn how to build up and customize your own effects with the tools at hand-you'll be amazed at how much better the results look!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 142
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "I have had the good fortune to be involved with mobile Java from the very beginning, and I know what it takes to be successful in this marketplace. This book will help you be successful with mobile Java application design and development. If you take the information inside and sprinkle it with some imaginative application ideas, you will have a winning combination." - Jon Bostrom, Senior Director, CTO Java Technology Platforms, Nokia The First Official End-To-End Solutions Guide for Every Nokia Series 40 Developer Nokia's Series 40 Developer Platform gives Java developers access to the world's highest-volume, fastest-growing, and most exciting mobile markets. Nokia sells close to 100 million units within their Developer Platform families every year, and the Series 40 Developer Platform is the highest-volume platform in the family. Success on this platform is crucial for the commercial success of any mobile application. Knowledge of the Series 40 Developer Platform can be applied to the Java environment on all Nokia Developer Platform devices, including Series 60 devices. Fully reviewed by Nokia's subject matter experts, this book covers the entire development process-from design and coding through testing and deployment. The authors walk you through eleven complete example applications, presenting downloadable client and server source code that you can use to jump-start virtually any project. Along the way, the authors illuminate the technical underpinnings of Series 40, review crucial architectural issues, introduce key mobile design patterns, discuss scalability and device optimization strategies, and offer dozens of best practices and tips-many of which have never before been published. Coverage includes Identifying your best opportunities and killer applications for mobile development Building effective MIDP 2.0 user interfaces for devices built on the Series 40 Developer Platform Building animated mobile games Handling persistent and networking data Proven techniques for scaling and optimizing applications across devices © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 143
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 396 p. , ill. ; , 23 cm
    DDC: 004.692
    Keywords: Spam (Electronic mail) ; Spam filtering (Electronic mail) ; Electronic books ; local
    Abstract: Real Anti-Spam Help for System Administrators In Slamming Spam , two spam fighters show you how to fight back-and win. Unlike most spam books, this one is written specifically for in-the-trenches system administrators: professionals who need hands-on solutions for detecting, managing, and deterring spam in Unix/Linux and/or Microsoft Windows environments. The authors offer deep, administrator-focused coverage of the most valuable open-source tools for reducing spam's impact in the enterprise-especially SpamAssassin. Drawing on their extensive experience in developing and implementing anti-spam tools, the authors present expert insights into every leading approach to fighting spam, including Bayesian filtering, distributed checksum filtering, and email client filtering. Coverage includes Step-by-step junk mail filtering with Procmail Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse McAfee SpamKiller for Lotus Domino McAfee SpamKiller for Microsoft Exchange Implementing and managing SpamAssassin Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords Sender verification techniques, including challenge/response, special use addresses, and sender compute Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs-IT staff time, network/computing resources, and user productivity. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 363-374) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 144
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 306 p. ; , 24 cm
    DDC: 005.1/4
    Keywords: Debugging in computer science ; Electronic books ; local
    Abstract: 50 exercises to help you find bugs faster -- with less aggravation! Bug hunting is an art, and you need to be a master . Get Find the Bug , and you'll become one. Long-time Microsoft programmer Adam Barr presents 50 programs, each with exactly one bug. Your assignment: find it. As you do, Barr will teach you how to "think like your processor"... anticipating exactly how code will behave, even without running it. You'll learn better ways to read code, understand it -- and above all, improve it. Whether you're building new systems or maintaining someone else's, you'll find bugs earlier, faster, with less frustration... and write cleaner code to begin with. Presents "bugged" programs in C, Java, Python, Perl, and x86 assembly language, with carefully explained solutions Includes language overviews to help you debug all 50 examples, even if you don't know the language Shows how to look past the "surface" of code to uncover its hidden internal logic Offers practical guidance on analyzing programs, including specific inputs to test Presents a wide range of realistic bugs, with no phony "gotchas" Draws on the types of coding and debugging challenges Microsoft uses to interview new programmers An indispensable resource for working programmers, maintainers, testers, quality specialists, and everyone involved in code reviews © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 295-298) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 145
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 434 p. , ill. ; , 24 cm
    DDC: 004.6/2
    Keywords: BGP (Computer network protocol) ; Electronic books ; local
    Abstract: PRACTICAL BGP "I would recommend this book to network engineers, Internet service providers, network software developers, and IT staff who need to deal with network planning and routing." -Enke Chen, Redback Networks Hands-on guidance for deploying and optimizing BGP networks-enterprise and ISP Now there's a practical guide to deploying and managing BGPv4 in any environment-from small enterprises to the largest Tier 2 and Tier 3 service providers. A team of the world's leading BGP experts brings together powerful insights into network design, configuration, and deployment with the latest version of BGP-including hands-on guidance for leveraging its key enhancements. Coverage includes • Best practices and diverse real-world scenarios for applying BGPv4 • Understanding the impact of BGP design on local networks and the global Internet backbone • Building effective BGP policies: aggregation, propagation, accounting, and more • Maximizing scalability and performance in BGPv4 networks • BGP and network security, including Secure Origin BGP • Deploying BGP/MPLS Layer 3 VPNs • Extensive troubleshooting guidance unavailable in any other book If you're a network engineer or administrator looking to drive maximum reliability and performance from BGP-based networks, Practical BGP will help you get the job done-from start to finish. RUSS WHITE is a Network Protocols Deployment Engineer in Cisco Systems Routing DNA Team specializing in routing protocols. A widely recognized expert in networking, he co-chairs the IETF Routing Protocols Security working group, and co-authored Advanced IP Network Design, IS-IS for IP Networks, and Inside Cisco IOS Software Architecture. DANNY McPHERSON is a member of the Architecture Team at Arbor Networks. He has held technical leadership positions with several global ISPs, is active within the IETF, and is an acknowledged expert in Internet architecture and security. He co-authored Internet Routing Architectures, Second Edition. SRIHARI SANGLI , Senior Manager for MPLS and routing development at Procket Networks, was formerly Senior Technical Leader in Cisco's IOS Routing Protocols group. He, along with others at Cisco, coded the industry-first implementation of BGP/MPLS based Layer-3 VPN.
    Note: Includes index. - The author's name Sangli Srihari is listed as Srihari Sangli on cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 146
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Mac OS ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The Most Useful UNIX Guide for Mac OS X Users Ever, with Hundreds of High-Quality Examples! Beneath Mac OS ® X's stunning graphical user interface (GUI) is the most powerful operating system ever created: UNIX ® . With unmatched clarity and insight, this book explains UNIX for the Mac OS X user-giving you total control over your system, so you can get more done, faster. Building on Mark Sobell's highly praised A Practical Guide to the UNIX System, it delivers comprehensive guidance on the UNIX command line tools every user, administrator, and developer needs to master-together with the world's best day-to-day UNIX reference. This book is packed with hundreds of high-quality examples. From networking and system utilities to shells and programming, this is UNIX from the ground up-both the "whys" and the "hows"-for every Mac user. You'll understand the relationships between GUI tools and their command line counterparts. Need instant answers? Don't bother with confusing online "manual pages": rely on this book's example-rich, quick-access, 236-page command reference! Don't settle for just any UNIX guidebook. Get one focused on your specific needs as a Mac user! A Practical Guide to UNIX ® for Mac OS ® X Users is the most useful, comprehensive UNIX tutorial and reference for Mac OS X and is the only book that delivers Better, more realistic examples covering tasks you'll actually need to perform Deeper insight, based on the authors' immense knowledge of every UNIX and OS X nook and cranny Practical guidance for experienced UNIX users moving to Mac OS X Exclusive discussions of Mac-only utilities, including plutil , ditto , nidump , otool , launchctl , diskutil , GetFileInfo , and SetFile Techniques for implementing secure communications with ssh and scp -plus dozens of tips for making your OS X system more secure Expert guidance on basic and advanced shell programming with bash and tcsh Tips and tricks for using the shell interactively from the command line Thorough guides to vi and emacs designed to help you get productive fast, and maximize your editing efficiency In-depth coverage of the Mac OS X filesystem and access permissions, including extended attributes and Access Control Lists (ACLs) A comprehensive UNIX glossary Dozens of exercises to help you practice and gain confidence And much more, including a superior introduction to UNIX programming tools such as awk , sed , otool , make , gcc , gdb , and CVS
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 147
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 658.4/038
    Keywords: Chief information officers ; Information resources management ; Information technology ; Management ; Management ; Electronic books ; local
    Abstract: World-class IT leadership solutions from working CIOs: detailed, realistic, proven Every year, IT leadership becomes more challenging. Don't go it alone. Get practical help from the people who know what you're up against, and know what works: your most successful peers . In CIO Wisdom II, more than a dozen of today's leading CIOs share specific, realistic, up-to-the-minute techniques for maximizing agility, cost-effectiveness, and business value . You'll find solutions for managing both the internal and external forces impacting IT, and for dealing with more than 20 of your toughest issues -- business, technical, and human . You'll find specific, realistic approaches to everything from architecture to outsourcing, new technology selection to governance. CIO Wisdom II: it's more valuable than your last consultant -- and a whole lot more cost-effective. Anticipating the next transformation in your role as CIO -- and getting ahead of the curve Delivering real-time, mission-critical business intelligence: lessons from the military Integrating the enterprise: New best practices and cost-effective technical options Quantifying and maximizing software return on investment Mastering five crucial lessons for successful IT outsourcing Managing outsourced environments for maximum responsiveness, flexibility, and efficiency Leveraging the value of open source -- and minimizing its risks Using IT to improve business processes -- and improving your own internal processes, including procurement Systematically securing your IT facilities Achieving compliance -- and leveraging those investments for competitive advantage Previewing tomorrow's key trends in information management © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 148
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 352 p. , ill. ; , 23 cm. +
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Enter your Linux Desktop Garage Don't just survive with Linux: thrive Find tools & info to do practically everything , such as: Ripping your CDs (&DVDs) De-Spam-ifying your email Capturing, editing, organizing your digital photos Chatting with your Linux-deficient IM pals Tracking your contacts, appointments, life Transforming Firefox into easy blogware Finding great substitutes for your Windows apps Diving into a veritable plethora of games Where you get the truth (unvarnished) Where you get productive (quick) Where Linux is fun (honest) Your guide: Susan Matteson , real user, real expert She reveals the fun stuff (from MP3s to desktop wallpaper) Demystifies the essentials (from file management to passwords) Simplifies the tasks they said were easy, but weren't (until now) Where there's even more (plenty) Step-by-step instructions for both Mandrake & Fedora Linux Zero-hassle tips for managing & personalizing your PC Gnoppix Linux on CD-ROM (run Linux without touching Windows) © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 149
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 282 p. , ill., maps ; , 24 cm
    Keywords: Economic forecasting ; Globalization ; Economic aspects ; Industrial management ; International business enterprises ; International economic integration ; Electronic books ; local
    Abstract: Globalization is a fact. You can't stop it; it has already happened; it is here to stay. And we are moving into a new global stage. A radically new world is taking shape from the ashes of yesterday's nation-based economic world. To succeed, you must act on the global stage, leveraging radically new drivers of economic power and growth. Legendary business strategist Kenichi Ohmae-who in The Borderless World , published in 1990, predicted the rise and success of globalization, coining the very word-synthesizes today's emerging trends into the first coherent view of tomorrow's global economy-and its implications for politics, business, and personal success. Ohmae explores the dynamics of the new "region state," tomorrow's most potent economic institution, and demonstrates how China is rapidly becoming the exemplar of this new economic paradigm. The Next Global Stage offers a practical blueprint for businesses, governments, and individuals who intend to thrive in this new environment. Ohmae concludes with a detailed look at strategy in an era where it's tougher to define competitors, companies, and customers than ever before. As important as Huntington's The Clash of Civilizations , as fascinating as Friedman's The Lexus and the Olive Tree , this book doesn't just explain what's already happened: It offers a roadmap for action in the world that's beginning to emerge. Why Keynes' and Milton Friedman's economics are -and what might replace them New economics for a borderless world history From Windows to English to your global brand Leveraging today's most powerful platforms for growth Anticipating technological obsolescence-and jumping ahead of it Technology: driving business death-and rebirth What government can do when nation-states don't matter Government in the post-national era Honing your global vision and global leadership skills Leadership and strategy on the global stage
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 150
    Online Resource
    Online Resource
    Boston : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 665 p. , ill. ; , 24 cm. +
    Keywords: Linux ; Business ; Data processing ; Computer networks ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Switch your business to Linux: proven techniques for working IT Professionals This is the complete technical resource for migrating your business desktops to Linux, administering them efficiently, and using them to drive cost savings throughout your organization. Respected Linux Journal columnist Marcel Gagné walks you step-by-step through planning and managing the transition, getting users up and running, and keeping them happy. Gagné covers hardware, productivity applications, messaging, coexistence with Windows environments, support, and much more. This is also the first book with in-depth coverage of using Linux Terminal Server Project (LTSP) thin clients to dramatically reduce the cost and complexity of computing. Deploy Linux with your existing PCs, printers, and IT/network infrastructure Centrally manage users and security through Webmin's convenient Web interface Deliver reliable email services with Postfix, or integrate Linux mail clients with Microsoft Exchange servers Configure Windows file sharing with Samba, and Linux file sharing with NFS Secure network communications with Linux firewalls and OpenSSH Plan and deploy LTSP thin clients and diskless workstations and the server support for them Provide LDAP directory services to all your clients Support users by "remote control"-without leaving your desk From network security to spam reduction, automated backup/restore to collaboration groupware, Gagné offers specific solutions and proven techniques for leveraging the full power of Linux in your business. Say goodbye to the expense, hassle, and insecurity of Windows desktops! Say hello to business computing the way it's supposed to be-with Linux! About the Author Marcel Gagné is best known as the author of the Linux Journal's "Cooking with Linux" series, winner of the Readers' Choice award for favorite column for three straight years. He has written two highly acclaimed Addison-Wesley books: Moving to Linux and Linux System Administration: A User's Guide. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 151
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 643 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: HP-UX ; Operating systems (Computers) ; Electronic books ; local
    Abstract: This is the definitive guide to installing and administering HP-UX 11i Version 2 in any environment, on both HP 9000 and HP Integrity server families. Drawing on 18 years of on-site HP-UX consulting experience, Marty Poniatowski offers unparalleled practical insight into running HP-UX 11i efficiently and reliably, illuminating features even experienced HP-UX sysadmins find confusing. Poniatowski organizes this book around your day-to-day needs and your system's lifecycle. He begins with in-depth coverage of installation and bootup, then walks through everything from LVM and kernel configuration through networking. He especially focuses on the capabilities and tools that make HP-UX unique-and how you can use them to save time and money. Coverage includes Partitioning from start to finish-including vPars and nPartitions installation, creation, and modification Booting HP Integrity systems with EFI, and HP 9000 systems with PDC, ISL, or hpux Mastering the Management Processor (MP): console, virtual front panel, and command menu Using HP-UX's new kernel-building commands: kcconfig, kcusage, kctune, kcmodule, and more Working with HP-UX's new web-based tools: pd (devices), parmgr (partitions), and kcweb (kernel) Mapping LBA to slot numbers: clear explanations of a non-intuitive technique Using Ignite-UX to boot and recover systems across the network Managing disks, devices, backup, users/groups, and much more © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 152
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR ; | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 353 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The first comprehensive, expert guide for end-to-end Linux application optimization Learn to choose the right tools-and use them together to solve real problems in real production environments Superior application performance is more crucial than ever-and in today's complex production environments, it's tougher to ensure, too. If you use Linux, you have extraordinary advantages: complete source code access, plus an exceptional array of optimization tools. But the tools are scattered across the Internet. Many are poorly documented. And few experts know how to use them together to solve real problems. Now, one of those experts has written the definitive Linux tuning primer for every professional: Optimizing Linux® Performance. Renowned Linux benchmarking specialist Phillip Ezolt introduces each of today's most important Linux optimization tools, showing how they fit into a proven methodology for perfecting overall application performance. Using realistic examples, Ezolt shows developers how to pinpoint exact lines of source code that are impacting performance. He teaches sysadmins and application developers how to rapidly drill down to specific bottlenecks, so they can implement solutions more quickly. You'll discover how to: Identify bottlenecks even if you're not familiar with the underlying system Find and choose the right performance tools for any problem Recognize the meaning of the events you're measuring Optimize system CPU, user CPU, memory, network I/O, and disk I/O-and understand their interrelationships Fix CPU-bound, latency-sensitive, and I/O-bound applications, through case studies you can easily adapt to your own environment Install and use oprofile, the advanced systemwide profiler for Linux systems If you're new to tuning, Ezolt gives you a clear and practical introduction to all the principles and strategies you'll need. If you're migrating to Linux, you'll quickly master Linux equivalents to the tools and techniques you already know. Whatever your background or environment, this book can help you improve the performance of all your Linux applications-increasingbusiness value and user satisfaction at the same time. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 153
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A comprehensive guide to analyzing the business rationale for WLANs Evaluate the business rationale behind the deployment of WLANs, including return on investment (ROI), net present value, payback period, and total cost of ownership Develop a robust execution plan to deploy and operate the WLAN Understand the high-level technical issues of deploying and managing your WLAN from a business decision-maker's perspective Maximize the positive impact of supplementary and complementary services such as voice, video, and guest WLAN access Identify potential security threats and develop strategies to mitigate attacks Learn methodological and technical best practices from WLAN deployment case studies featuring real-world, enterprise-class businesses and institutions Gather information easily by referring to quick reference sheets and appendixes covering an antenna overview, a high-level sample project plan, checklists, and flowcharts Businesses today are increasingly adopting wireless LANs (WLANs) as a primary data transport mechanism. To determine when and how to effectively deploy WLANs, business managers, project managers, and IT executives need a clear, holistic evaluation of the business benefits and risks behind this complex technology solution. The Business Case for Enterprise-Class Wireless LANs helps you make the right decisions by explaining the business value and cost of investing in a WLAN-from security and architecture to deployment and application. Using a lifecycle perspective, this guide covers the value proposition, cost justification, and alignment of security, design, and operational components within the business. Written in an approachable style, The Business Case for Enterprise-Class Wireless LANs provides a baseline analysis of WLAN technologies for a large-scale deployment and includes concise real-world case studies with checklists and flowcharts that you can adapt for your needs. By recognizing the obstacles and advantages of implementing a WLAN from a strategic and justified business perspective, you can apply the economic benefits to your organization and ensure a timely and efficient deployment of your organization's WLAN. This volume is in the Network Business Series offered by Cisco Press®. Books in this series provide IT executives, decision makers, and networking professionals with pertinent information about today's most important technologies and business strategies.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 154
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The all-in-one guide to modern routed and switched campus network design Understand the network design process and network design models Learn how switches are used in network design Design an IP addressing plan and select appropriate IP routing protocols Apply network security design principles to boost network security Enable WLANs to improve workforce mobility Examine QoS design requirements and tools Unleash the power of voice transport over data networks, including VoIP and IP telephony Use content networking to provide content to users quickly and efficiently Learn how to integrate network management protocols and tools into network designs Understand how to effectively integrate IP multicast, high availability, storage networking, and IPv6 into your network designs Over the past decade, campus network design has evolved many times as new technologies have emerged and business needs have changed. For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and content networking, their core infrastructures must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step. Campus Network Design Fundamentals is an all-in-one guide to key technologies that can be integrated into network design. The book provides insight into why each technology is important and how to apply this knowledge to create a campus network that includes as many or as few of today's productivity-enhancing applications as are needed in your environment. Topics covered throughout the book include network design process and models, switching, IP routing, quality of service (QoS), security, wireless LANs (WLANs), voice transport, content networking, network management, IPv6, IP multicast, increasing network availability, and storage networking. Sample network designs are included through-out, and the book concludes with a comprehensive case study that illustrates the design process and solutions for headquarters, branch offices, and home office/remote users. Whether you need an overview of modern campus technologies or seek advice on how to design switched and routed networks that securely support these technologies, this book is your comprehensive resource to the foundations upon which all modern-day campus networks are based. This book is part of the Cisco Press® Fundament...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 155
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Identify, mitigate, and respond to network attacks Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI) Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM) Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network. This new family of adaptive security appliances also controls network activity and application traffic and delivers flexible VPN connectivity. The result is a powerful multifunction network security device that provides the security breadth and depth for protecting your entire network, while reducing the high deployment and operations costs and complexities associated with managing multiple point products. Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a practitioner's guide to planning, deploying, and troubleshooting a comprehensive security plan with Cisco ASA. The book provides valuable insight and deployment examples and demonstrates how adaptive identification and mitigation services on Cisco ASA provide a sophisticated security solution for both large and small network environments. The book contains many useful sample configurations, proven design scenarios, and discussions of debugs that help you understand how to get the most out of Cisco ASA in your own network. "I have found this book really highlights the practical aspects needed for building real-world security. It offers the insider's guidance needed to plan, implement, configure, and troubleshoot the Cisco ASA in customer environments and demonstrates the potential and power of Self-Defending Networks." -Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems® This security book is part of th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 156
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Identify, analyze, and resolve current and potential network security problems Learn diagnostic commands, common problems and resolutions, best practices, and case studies covering a wide array of Cisco network security troubleshooting scenarios and products Refer to common problems and resolutions in each chapter to identify and solve chronic issues or expedite escalation of problems to the Cisco TAC/HTTS Flip directly to the techniques you need by following the modular chapter organization Isolate the components of a complex network problem in sequence Master the troubleshooting techniques used by TAC/HTTS security support engineers to isolate problems and resolve them on all four security domains: IDS/IPS, AAA, VPNs, and firewalls With the myriad Cisco® security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. Cisco Network Security Troubleshooting Handbook can single-handedly help you analyze current and potential network security problems and identify viable solutions, detailing each step until you reach the best resolution. Through its modular design, the book allows you to move between chapters and sections to find just the information you need. Chapters open with an in-depth architectural look at numerous popular Cisco security products and their packet flows, while also discussing potential third-party compatibility issues. By following the presentation of troubleshooting techniques and tips, you can observe and analyze problems through the eyes of an experienced Cisco TAC or High-Touch Technical Support (HTTS) engineer or determine how to escalate your case to a TAC/HTTS engineer. Part I starts with a solid overview of troubleshooting tools and methodologies. In Part II, the author explains the features of Cisco ASA and Cisco PIX® version 7.0 security platforms, Firewall Services Module (FWSM), and Cisco IOS® firewalls. Part III covers troubleshooting IPsec Virtual Private Networks (IPsec VPN) on Cisco IOS routers, Cisco PIX firewalls with embedded VPN functionalities, and the Cisco 3000 Concentrator. Troubleshooting tools and techniques on the Authentication, Authorization, and Accounting (AAA) framework are discussed thoroughly on routers, Cisco PIX firewalls, and Cisco VPN 3000 concentrators in Part IV. Part IV also covers troubleshooting Cisco Secure ACS on Windows, the server-side component of the AAA framework. IDS/IPS troubleshooting...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 157
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 3rd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco IPS exam 642-532 The official study guide helps you master all the topics on the IPS exam, including: IPS concepts Command-line interface (CLI) and IPS Device Manager (IDM) configuration modes Basic sensor and IPS signature configuration IPS signature engines Sensor tuning IPS event monitoring Sensor maintenance Verifying system configuration Using the Cisco IDS Module (IDSM) and Cisco IDS Network Module Capturing network traffic CCSP IPS Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the IPS exam. Cisco Security Test Engineer Earl Carter shares preparation hints and test-taking tips, helping you identify areas of weakness and improve your Intrusion Prevention System (IPS) knowledge. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCSP IPS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary materials make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP IPS Exam Certification Guide is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains an electronic copy of the book and more than 200 practice questions for the IPS ex...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 158
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The practical guide to building resilient and highly available IP networks Learn from an all-in-one introduction to new features and developments in building a resilient IP network Enable your organization to meet internal service-level agreements (SLAs) for mission-critical resources Understand how a resilient IP network can help in delivering mission-critical information such as video and voice services Work with configuration examples that are based on real-world issues and customer requirements Get tips and best practices from field personnel who have worked on some of the largest networks with stringent uptime requirements and SLAs More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is of utmost importance to companies and their service providers. The challenges for the professionals responsible for these networks include ensuring that the network remains up all the time, keeping abreast of the latest technologies that help maintain uptime, and reacting to ever-increasing denial-of-service (DoS) attacks. Building Resilient IP Networks helps you meet those challenges. This practical guide to building highly available IP networks captures the essence of technologies that contribute to the uptime of networks. You gain a clear understanding of how to achieve network availability through the use of tools, design strategy, and Cisco IOS® Software. With Building Resilient IP Networks , you examine misconceptions about five-nines availability and learn to focus your attention on the real issues: appreciating the limitations of the protocols, understanding what has been done to improve them, and keeping abreast of those changes. Building Resilient IP Networks highlights the importance of having a modular approach to building an IP network and, most important, illustrates how a modular design contributes to a resilient network. You learn how an IP network can be broken down to various modules and how these modules interconnect with one another. Then you explore new network resiliency features that have been developed recently, categorized with respect to the design modules. Building Resilient IP Networks is relevant to both enterprise and service provider customers of all sizes. Regardless of whether the network connects to the Internet, fortifying IP networks for maximum uptime and prevention of attacks is mandatory for anyone's b...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 159
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xvii, 254 p. , col. ill. ; , 23 cm
    DDC: 659.144
    Keywords: Internet advertising ; Web search engines ; Web site development ; Electronic books ; local
    Abstract: Get your Web site to "show you the money" by using Google to draw more eyes--and wallets--to your content. In this friendly, four-color guide from veteran author and Web developer Eric Giguere , you'll learn all about Google's AdSense program and how you can use it to make your Web site or blog more profitable. Written in an easy-to-read, non-technical style, this book follows three average people--Claude, Stef, and Anita--as they learn to create money-making blogs and Web sites. Through their experiences, you'll learn: basic Web terminology; the Google Adsense nuts and bolts; how to host, build, and publish targeted ads and Google search boxes to your Web site; filter out inappropriate ads; track page performance; drive traffic to your site; and more. A four-part companion Web site features a blog, includes reader resources, and details the techniques discussed in the book. Online marketers agree that AdSense is one of the best tools you can use to draw dollars to your site. Let Giguere show you how to make the most of Google and have fun doing it!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 160
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xx, 268 p. , ill. ; , 24 cm
    DDC: 686.2/2544536
    Keywords: Adobe InDesign ; Desktop publishing ; Electronic books ; local
    Abstract: Costs less. Does more. Is easier to use: If this is the conclusion you've reached when comparing InDesign CS with its two long-time rivals (QuarkXPress and PageMaker), you're ready to make the switch. This guide shows you how! Throughout this compact guide, the focus is on leveraging your skill in the other leading desktop publishing packages to get up to speed fast in the new leading publishing package! As the perfect companion to the more comprehensive Real World InDesign CS , this tightly focused guide details the most common tasks and techniques you need to know to get your job done in InDesign CS. Clear, concise instructions enhanced by plenty of screen shots and sample layouts show you how to create and navigate documents, import and style text and objects, manage long projects, work with color, and more. You¿ll also find good coverage of all of InDesign's newest and most unique features: the Story Editor, a Separation Preview palette, nested styles, the Package for GoLive command, and more.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 161
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvi, 316 p. , ill. ; , 24 cm
    DDC: 006.74
    Keywords: HTML (Document markup language) ; Electronic books ; local
    Abstract: The fastest route to true HTML/CSS mastery! Need to build a web site? Or update one? Or just create some effective new web content? Maybe you just need to update your skills, do the job better. Welcome. This book's for you. We'll leverage what you already know about the web, so you'll go further, faster than you ever expected. You'll master today's best practices: the real nuts and bolts, not theory or hooey. You'll learn through dozens of focused HTML, XHTML, and CSS examples: crafted for simplicity and easy to adapt for your own projects. Need specific solutions? This book's modular, visual, high-efficiency format delivers them instantly . Molly E. Holzschlag draws on her unparalleled experience teaching Web design and development. No other HTML/CSS guide covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with HTML, XHTML, and CSS in real-world projects Learn how to build web pages that'll work in any environment, on virtually any contemporary browser Construct templates that simplify every page you develop Structure and tag text so it's easy to work with and manage Add images, media, and scripts-quickly and reliably Discover the right ways to use HTML tables Build easy-to-use forms and validate your users' input Use CSS to take total control over your site's look and feel Master core CSS techniques: color, images, text styles, link effects, lists, navigation, and more Control margins, borders, padding, positioning, floats, even Z-index Design efficient, compatible, easy-to-manage CSS layouts Includes concise XHTML and CSS annotated references: quick help for every language element Spring Into... is a new series of fast-paced tutorials from Addison-Wesley. Each book in the series is designed to bring you up to speed quickly. Complex topics and technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working...now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 162
    Online Resource
    Online Resource
    Upper Saddle River, NJ : IBM Press | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 278 p. ; , 24 cm
    DDC: 658/.05
    Keywords: Information technology ; Economic aspects ; Information technology ; Social aspects ; Information technology ; Technological innovations ; Electronic books ; local
    Abstract: How "data everywhere" transforms business, technology, and the way you live A pioneering look at grand, new efficiencies forthcoming As communications, computing, and data storage converge, data is becoming utterly ubiquitous...and that changes everything. In this book, two leading data management visionaries reveal how data transforms the way you do business, the technologies you use, the investments you make, the life you live, and the world you live in. Chris Stakutis and John Webster draw on interviews with nearly 50 leading experts: technologists, sociologists, entrepreneurs, consultants, researchers, media leaders, and futurists alike. You'll discover how today's "primordial soup" of wired and wireless gadgetry is quickly coalescing into something immensely more powerful, driving applications you thought were pure science fiction. You'll also gain deep insight into the profound implications of ubiquitous data capture: implications that touch everything from your bedroom to the battlefield: The emerging "Connectivity Divide." Which side of the chasm are you on? Inescapable data's technical components: Async communications, pervasive computing devices, wireless, and XML Global calendars, momentary enterprises: Transforming your life and business Uncontrolled information availability: Its risks to your security and well-being The future of technical infrastructure, grids, smart storage, and beyond Radical, new modes of information delivery: Nonnumeric, nontextual, unobtrusive Future tech: From holographic displays to fertility "wall clocks" Your DNA on a chip: The heart of your personal health and wellness program © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 163
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 338 p. , ill. ; , 24 cm
    DDC: 005.2762
    Keywords: Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Easy-to-follow coverage of twelve indispensable Jakarta Commons packages Code examples that show innovative uses of Commons components, including using HttpClient to access Web resources, FileUpload for handling HTTP file uploads, and BeanUtils for easy form generation Detailed instructions for combining the Commons project libraries with the popular Eclipse IDE Save time and money with reusable open source Java™ components Master the Jakarta Commons Library of Open Source JavaTM Components Using the Apache Jakarta Commons reusable Java™ components, you can leverage the work of the global open-source community to solve common programming problems reliably, quickly, and inexpensively. But, to use the Commons libraries effectively, you need far more guidance than the official documentation offers. In Apache Jakarta Commons: Reusable Java™ Components, Will Iverson covers what Java developers need to know to take full advantage of Jakarta Commons-starting right now. Iverson begins with a definitive overview of the Commons project: goals, installation, and getting started with Commons components. Next, he presents example-rich chapters on the twelve most useful Commons packages, covering topics ranging from HTTP FileUpload to database connectivity. Iverson provides detailed code samples for every component he describes. After you've mastered the core Jakarta Commons packages, you'll constantly rely on this book's handy seventy-five page quick-reference. Iverson's coverage includes Downloading Commons project libraries and installing them into Eclipse Programmatically accessing resources via HTTP, FTP, NNTP, and other Internet protocols Using the Jakarta Commons suite of configurable object pools Managing database connectivity in Swing applications-and anywhere containers aren't doing it for you Using BeanUtils to generate forms and gain runtime access to information provided by JavaBeans-style objects Traversing complex object graphs with JXPath Using Jakarta Commons' advanced collections tools to establish richer object relationships Extending java.lang with better methods for manipulating core classes Implementing conversion routines, configurable logging, command-line help, and more Exploring the newest packages, including emerging "sandbox" packages Whether you're building code for front-end Web applications, client-side software, or back-end servers, learning Jakarta Commons will make you far more efficient. Apache Jakarta Commons is the faste...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 164
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 689 p. , ill. ; , 24 cm
    DDC: 005.2'762
    Keywords: PHP (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: "This book, written by my colleague, Andi Gutmans, and two very prominent PHP developers, Stig Bakken and Derick Rethans, holds the key to unlocking the riches of PHP 5. It thoroughly covers all of the features of this new version, and is a must have for all PHP developers interested in exploring PHP 5's advanced features" -Zeev Suraski, Co-Designer of PHP 5 and Co-Creator of the Zend Engine Expert PHP 5 programming techniques, direct from PHP 5 co-creator and key developers Definitive coverage of the PHP object model, design patterns, XML/SOAP integration, and more Solid introduction and expert insights into performance tuning, PEAR, extensions, and database access The definitive introduction to PHP 5's advanced features! The definitive introduction for today's most powerful PHP 5 techniques In this book, PHP 5's co-creator and two leading PHP developers show you how to make the most of PHP 5's industrial-strength enhancements in any project-no matter how large or complex. Their unique insights and realistic examples illuminate PHP 5's new object model, powerful design patterns, improved XML Web services support, and much more. Whether you're creating web applications, extensions, packages, or shell scripts-or migrating PHP 4 code-here are high-powered solutions you won't find anywhere else. Review PHP's syntax and master its object-oriented capabilities-from properties and methods to polymorphism, interfaces, and reflection Master the four most important design patterns for PHP development Write powerful web applications: handle input, cookies, session extension, and more Integrate with MySQL, SQLite, and other database engines Provide efficient error handling that's transparent to your users Leverage PHP 5's improved XML support-including parsing, XSLT conversions, and more Build XML-based web services with XML-RPC and SOAP Make the most of PEAR: work with the repository, use key packages, and create your own Upgrade PHP 4 code to PHP 5-compatibility issues, techniques, and practical workarounds Improve script performance: tips and tools for PHP optimization Use PHP extensions to handle files/streams, regular expressions, dates/times, and graphics Create original extensions and shell scripts If you're a software developer new to PHP, you'll leap quickly into PHP and its new object-oriented capabilities. If you're an experienced PHP programmer, you already recognize PHP's convenience and simplicity. Now, discover all of its extraordinary pow...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 165
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 342 p. , ill. ; , 24 cm
    DDC: 005.74/068
    Keywords: Business ; Data processing ; Data warehousing ; Database management ; Electronic books ; local
    Abstract: The definitive best-practices guide to enterprise data-management strategy. You can no longer manage enterprise data "piecemeal." To maximize the business value of your data assets, you must define a coherent, enterprise-wide data strategy that reflects all the ways you capture, store, manage, and use information. In this book, three renowned data management experts walk you through creating the optimal data strategy for your organization. Using their proven techniques, you can reduce hardware and maintenance costs, and rein in out-of-control data spending. You can build new systems with less risk, higher quality, and improve data access. Best of all, you can learn how to integrate new applications that support your key business objectives. Drawing on real enterprise case studies and proven best practices, the author team covers everything from goal-setting through managing security and performance. You'll learn how to: Identify the real risks and bottlenecks you face in delivering data-and the right solutions Integrate enterprise data and improve its quality, so it can be used more widely and effectively Systematically secure enterprise data and protect customer privacy Model data more effectively and take full advantage of metadata Choose the DBMS and data storage products that fit best into your overall plan Smoothly accommodate new Business Intelligence (BI) and unstructured data applications Improve the performance of your enterprise database applications Revamp your organization to streamline day-to-day data management and reduce cost Data Strategy is indispensable for everyone who needs to manage enterprise data more efficiently-from database architects to DBAs, technical staff to senior IT decision-makers. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. [317]-321) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 166
    Online Resource
    Online Resource
    Indianapolis, MA : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Proven techniques for optimizing web, file, print, database, and application servers Practical introductions to open source performance management tools Easy-to-understand examples based on Red Hat Enterprise Linux and Novell SUSE Linux Enterprise Server An indispensable guide to maximizing Linux system and application performance From Wall Street to Hollywood, Linux runs many of the world's most businesscritical systems. Linux performance now impacts the entire enterprise. In Performance Tuning for Linux Servers, a team of IBM's most-experienced Linux performance specialists shows you how to find bottlenecks, measure performance, and identify effective optimizations. This book doesn't just cover kernel tuning: it shows how to maximize the end-to-end performance of real-world applications and databases running on Linux. Throughout, the authors present realistic examples based on today's most popular enterprise Linux platforms, Intel-based Red Hat Enterprise Linux, and Novell SUSE Linux Enterprise Server. These examples are designed for simplicity, clarity, and easy adaptation to any contemporary Linux environment. You'll discover how to Install and configure Linux for maximum performance from the outset Evaluate and choose the right hardware architecture for your Linux environment Understand Linux kernels 2.4 through 2.6: components, performance issues, and optimization opportunities Master core Linux performance tuning principles and strategies Utilize free, open source tools for measurement, monitoring, system tracing, and benchmarking Interpret performance data to analyze your Linux server's real-world behavior Optimize Linux system schedulers, memory, I/O, file systems, and networking Tune web, file, database, and application servers running commercial workloads Predict the impact of changes in tuning parameters or configurations Tune Linux code: optimize design, timing, sockets, threads, synchronization, and more Architect for maximum performance: SMP scaling, clustering, and topology Integrate kernel and application tuning in end-to-end system optimization projects Whether you're an administrator, developer, integrator, or consultant, Performance Tuning for Linux Serverswill help you maximize the performance and value of every Linux system and application you run. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 167
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "This book is the best way for beginning developers to learn wxWidgets programming in C++. It is a must-have for programmers thinking of using wxWidgets and those already using it." -Mitch Kapor, founder of Lotus Software and the Open Source Applications Foundation Build advanced cross-platform applications that support native look-and-feel on Windows, Linux, Unix, Mac OS X, and even Pocket PC Master wxWidgets from start to finish-even if you've never built GUI applications before Leverage advanced wxWidgets capabilities: networking, multithreading, streaming, and more CD-ROM: library of development tools, source code, and sample applications Foreword by Mitch Kapor, founder, Lotus Development and Open Source Application Foundation wxWidgets is an easy-to-use, open source C++ API for writing GUI applications that run on Windows, Linux, Unix, Mac OS X, and even Pocket PC-supporting each platform's native look and feel with virtually no additional coding. Now, its creator and two leading developers teach you all you need to know to write robust cross-platform software with wxWidgets. This book covers everything from dialog boxes to drag-and-drop, from networking to multithreading. It includes all the tools and code you need to get great results, fast. From AMD to AOL, Lockheed Martin to Xerox, world-class developers are using wxWidgets to save money, increase efficiency, and reach new markets. With this book, you can, too. wxWidgets quickstart: event/input handling, window layouts, drawing, printing, dialogs, and more Working with window classes, from simple to advanced Memory management, debugging, error checking, internationalization, and other advanced topics Includes extensive code samples for Windows, Linux (GTK+), and Mac OS X About the CD-ROM The CD-ROM contains all of the source code from the book; wxWidgets distributions for Windows, Linux, Unix, Mac OS X, and other platforms; the wxWidgets reference guide; and development tools including the OpenWatcom C++ compiler, the poEdit translation helper, and the DialogBlocks user interface builder. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 168
    Language: English
    Pages: xxii, 232 p. , ill. ; , 23 cm
    DDC: 364.16/3
    Keywords: Consumer credit ; United States ; Handbooks, manuals, etc ; Credit ratings ; United States ; Handbooks, manuals, etc ; Identity theft ; United States ; Prevention ; Handbooks, manuals, etc ; Privacy, Right of ; United States ; Handbooks, manuals, etc ; Records ; Access control ; United States ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Everything You Need to Know About Identity Theft, Credit Cards, Credit Repair, and Credit Reports "The author substitutes straight talk for legal mumbo-jumbo in 50 Ways to Protect Your Identity and Your Credit. Reading this book is like getting a black belt in consumer self-defense." -Jim Bohannon, host of The Jim Bohannon Show "Identity theft is among the fastest-growing problems facing Americans today. This book will help you learn all you need to know to protect your lives, money, and security. Consider it your first stop in your quest for knowledge and guidance to prevent ID theft." -Robert Powell, Editor of CBS MarketWatch "As one who has lived through some of the nightmare scenarios discussed by the author, I believe "Steve's Rules" (Chapter 14) need to be placed in a prominent place so you can see them any time you think you are safe. They may be the new practical commandments for financial survival." -Doug Stephan, host of the Good Day nationally syndicated radio show "Detecting and stopping identity thieves is imperative to protecting your finances and financial reputation. Steve Weisman shows you how to protect yourself and what steps to take if you are victimized. This is a must-read for anyone with a bank account and a credit card!" -Bonnie Bleidt, Boston Stock Exchange Reporter, CBS4 Boston, Host of Early Exchange , WBIX Don't be a victim! Save your identity, save your credit-and save a fortune! 10,000,000 Americans had their identities stolen last year-don't be the next! Discover easy steps you can take now to reduce your vulnerability. Recognize "phishing" and other identity scams-online and off. Learn what you must do immediately if you've been attacked. Defend yourself against credit rip-offs, and stop paying more than you have to! It's all here: simple rules, handy checklists, even easy-to-use form letters! © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 169
    Online Resource
    Online Resource
    Indianapolis, Ind. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 434 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Software patterns ; Electronic books ; local
    Abstract: "Gunnar and Karin have not only defined a large collection of use-case patterns and examples of how specific usages are to be modeled in a use-case model, they have also provided an accurate, complete, and comprehensible description of the constructs used in use-case modeling... I am impressed by this book." -From the Foreword by Ivar Jacobson Employ the proven concept of design patterns to build more accurate, usable, and maintainable use-case models This book brings together dozens of proven patterns for creating use cases that more accurately reflect real requirements, are easier to translate into working systems, and are simpler to maintain. Utilizing these patterns, architects, analysts, engineers, and managers can leverage decades of hard-earned knowledge to achieve far better results, far more quickly. The authors carefully describe how each pattern works, what problems it is intended to solve, and the consequences associated with using it. All patterns are supported with detailed examples and platform-independent class models that demonstrate how they may be realized. All constructs and diagrams reflect the current UML 2.0 standard. This book also includes an insightful use-case primer that will be indispensable both to novices and veteran modelers seeking to become more effective. Coverage includes Modeling rules that lead to more comprehensible, maintainable, and correct models Patterns for structuring, layering, mapping, sequencing, and viewing use cases more effectively Blueprints for security, legacy integration, data input/ output, task scheduling, and reporting Constructing use cases that separate mandatory elements from optional parts that can be delivered separately Incorporating business rules in use-case modeling Practical techniques for documenting use cases more effectively When to use multiple patterns and blueprints together Identifying and avoiding eight common mistakes in use-case modeling: guidance for designers and reviewers Examples from a wide range of application domains Rely on this book as the world's #1 reference to reusable use-case solutions- and as a catalyst for inspiration in all your use-case modeling projects. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 423-424) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 170
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Become a savvy Microsoft Excel user. Pivot tables are a great feature in Excel that help you organize and analyze data, but not many Excel users know how to use pivot tables. Pivot Table Data Crunching offers a comprehensive review of all the functionalities of Pivot Tables from author Bill Jelen , otherwise known as Mr. Excel from www.mrexcel.com, and Michael Alexander , a Microsoft Certified Application Developer. The authors' practical scenarios and real-world advice demonstrate the benefits of Pivot Tables and how to avoid the common pitfalls of every day data crunching. Each solution presented in the book can be accomplished with resources available in the Excel interface, making Pivot Table Data Crunching a beneficial resource for all levels of Excel users.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 171
    Online Resource
    Online Resource
    [Indianapolis, Ind.] : QUE | Boston, MA :Safari,
    Language: English
    Pages: xvii, 238 p. ; , 23 cm. +
    Edition: 2nd ed.
    DDC: 004.6
    Keywords: Computer networks ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Electronic books ; local
    Abstract: Attention Network + Candidates: Do your last minute studying with us! Network+ Exam Cram 2 Practice Questions provides you with more than 500 practice test questions for Exam N10-003. We will also provide you with complete answer explanations and the "Cram Sheet" tear card that makes this the perfect complementary study tool to your other books or classes. Make sure that you have the full understanding of the information covered in this exam with Network + Exam Cram 2 Practice Questions .
    Note: "CD featuress all 650+ questions on test engine powered by measureup"!--cover. - "Exam N10-003"-Spine. - "Updated for new exam"-Spine
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 172
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 414 p., [2] p. of folded plates , ill. ; , 23 cm. +
    DDC: 005.7585
    Keywords: Oracle (Computer file) ; Examinations ; Database management ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Study guides ; SQL (Computer program language) ; Electronic books ; local
    Abstract: Whether you're studying for the Oracle 9i SQL exam or just need to take the New Features update exam, Oracle 9i: SQL Exam Cram 2 can help you get certified. This efficient study guide follows the exam objectives clearly and concisely. New Features materials are also included in the book, as well as a full-customizable practice test engine on CD. Oracle 9i: SQL Exam Cram 2 is your smartest way to get certified.
    Note: "Exam 1Z0-007"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 173
    Online Resource
    Online Resource
    Redmond, WA : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xlvii, 350 p. , col. ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The smart way to learn Windows XP-one step at a time! This fully updated edition makes it easy to teach yourself how to personalize and manage your system, use the new service pack, enjoy digital media technologies, troubleshoot problems, and more.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 174
    Online Resource
    Online Resource
    Redmond, WA : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Get advanced programming techniques and guidelines to exploit the flexibility and customizability of the common language runtime for a variety of applications, from databases to cell phones.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 175
    Online Resource
    Online Resource
    Indianapolis, IN : Que | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: Novell ZENworks 7 Suite Administrator's Handbook is the official administrator's handbook to the ZENworks 7 Suite, written by Novell insiders and reviewed by its developers. With added coverage of the new features in ZENworks 7, this book provides you with the knowledge to install, efficiently use, and troubleshoot ZENworks in the enterprise environment. You'll also find coverage on ZENworks Desktop Registry Keys, which have never been presented to customers and will allow you to customize their ZENworks. By the end of the book you will understand all of the features and elements of the ZENworks 7 Suite, all with the insight from the ZENworks 7 Suite team.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 176
    Online Resource
    Online Resource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: As businesses attempt to maximize every employee hour, knowledge management and collaboration tools like SharePoint 2003 have become more popular. Now businesses turn their attention to maximize this tool. Microsoft SharePoint 2003 Unleashed, Second Edition can show you how to do this. Revised based on reader feedback, this new edition delves into the power of SharePoint 2003 by going deep inside topics that include: Migrating to SharePoint 2003 Planning and Implementing a SharePoint 2003 Environment Managing a SharePoint 2003 Environment Extending the SharePoint 2003 Environment SharePoint 2003 technologies are designed to make it easier for everyone on a network to find and manage information. Microsoft SharePoint 2003 Unleashed, Second Edition makes it easier to get there.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 177
    Online Resource
    Online Resource
    Indianapolis, Ind. : MySQL Press | Boston, MA :Safari,
    Language: English
    Pages: xvii, 414 p. , ill. ; , 23 cm
    DDC: 005.7585
    Keywords: MySQL (Electronic resource) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: The authoritative, hands-on guide to advanced MySQL programming and administration techniques for high performance is here. MySQL Database Design and Tuning is the only guide with coverage of both the basics and advanced topics, including reliability, performance, optimization and tuning for MySQL. This clear, concise and unique source for the most reliable MySQL performance information will show you how to: Deploy the right MySQL product for your performance needs. Set up a performance management and monitoring environment using tools from MySQL. Implement the right indexing strategy Apply good performance strategy when developing software to work with the MySQL database. Configure dozens of variable to correctly tune the MySQL engine. If you deal with the intricacies and challenges of advanced MySQL functionality on a daily basis, you will be able to build on your knowledge with author Robert Schneider's real-world experiences in MySQL Database Design and Tuning .
    Note: "The official guide to designing and tuning MySQL databases for optimal performance" --Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 178
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvii, 555 p. , ill. ; , 24 cm
    DDC: 006.76
    Keywords: Web site development ; Web sites ; Authoring programs ; Electronic books ; local
    Abstract: PostNuke Content Management is a practical, application-oriented guide to building content-driven websites and portals with the PostNuke package. Website developers will find that this guide will help you get your website up and running quickly. You'll learn how to install and setup PostNuke and use it to build fully-customizeable content-focused websites. Each section will take you to a new level of site development and will teach you tips, tricks and hacks to customize the function and interface exactly for your specific needs. Author Kevin Hatch maintains a popular PHP and PostNuke online tutorial and is an experienced PostNuke user, so you are sure to get thorough PostNuke information through this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 179
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 185 p. , ill. ; , 23 cm
    Keywords: Computer programming ; Java (Computer program language) ; Electronic books ; local
    Abstract: Bruce Tate, author of the Jolt Award-winning Better, Faster, Lighter Java has an intriguing notion about the future of Java, and it's causing some agitation among Java developers. Bruce believes Java is abandoning its base, and conditions are ripe for an alternative to emerge. In Beyond Java , Bruce chronicles the rise of the most successful language of all time, and then lays out, in painstaking detail, the compromises the founders had to make to establish success. Then, he describes the characteristics of likely successors to Java. He builds to a rapid and heady climax, presenting alternative languages and frameworks with productivity and innovation unmatched in Java. He closes with an evaluation of the most popular and important programming languages, and their future role in a world beyond Java. If you are agree with the book's premise--that Java's reign is coming to an end--then this book will help you start to build your skills accordingly. You can download some of the frameworks discussed and learn a few new languages. This book will teach you what a new language needs to succeed, so when things do change, you'll be more prepared. And even if you think Java is here to stay, you can use the best techniques from frameworks introduced in this book to improve what you're doing in Java today.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 180
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 498 p. ; , 23 cm
    Edition: 3rd ed.
    DDC: 005.446
    Keywords: Mac OS ; Electronic books ; local
    Abstract: Following the common-sense O'Reilly style, Mac OS X Tiger in a Nutshell cuts through the chaff and gives you practical details you can use every day. Everything you need to know about the Unix side of Mac OS X has been systematically documented in this book. Mac OS X Tiger in a Nutshell offers a complete overview of Mac OS X Tiger (Version 10.4), focusing on the BSD Unix layer. This book familiarizes you with over 300 of Tiger's Unix commands, the Terminal application, file management, system and network administration issues, and more. Completely revised for Mac OS X Tiger, this book offers: The most complete and thorough coverage of Mac OS X's Unix commands you'll find anywhere (even in the system) An overview of basic system and network administration features, including coverage of NetInfo and Directory Services An introduction to using Mac OS X's Unix command-line interface, the Terminal application An overview of Mac OS X's Unix text editors, including vi and Emacs Information on shell syntax variables for Tiger's default Unix shell, bash Each command and option in this book's Unix Command Reference has been painstakingly tested and checked against Tiger; even the manpages that ship with Mac OS X can't compete in accuracy. Mac OS X Tiger in a Nutshell is the most comprehensive quick reference on the market and is a must for any serious Mac user.
    Note: Previous ed. published as: Mac OS X Panther in a nutshell / Chuck Toporek, Chris Stone, and Jason McIntosh. 2004
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 181
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xvi, 349 p. , ill. (some col.), maps ; , 24 cm
    Edition: 1st ed.
    DDC: 526.0285
    Keywords: Digital mapping ; Geodatabases ; Design and construction ; Web site development ; Electronic books ; local
    Abstract: With the help of the Internet and accompanying tools, creating and publishing online maps has become easier and rich with options. A city guide web site can use maps to show the location of restaurants, museums, and art venues. A business can post a map for reaching its offices. The state government can present a map showing average income by area.Developers who want to publish maps on the web often discover that commercial tools cost too much and hunting down the free tools scattered across Internet can use up too much of your time and resources. Web Mapping Illustrated shows you how to create maps, even interactive maps, with free tools, including MapServer, OpenEV, GDAL/OGR, and PostGIS. It also explains how to find, collect, understand, use, and share mapping data, both over the traditional Web and using OGC-standard services like WFS and WMS.Mapping is a growing field that goes beyond collecting and analyzing GIS data. Web Mapping Illustrated shows how to combine free geographic data, GPS, and data management tools into one resource for your mapping information needs so you don't have to lose your way while searching for it.Remember the fun you had exploring the world with maps? Experience the fun again with Web Mapping Illustrated . This book will take you on a direct route to creating valuable maps.
    Note: "Using open source GIS toolkits"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 182
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 554 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.75/65
    Keywords: Oracle (Computer file) ; Database management ; Electronic books ; local
    Abstract: Despite its wide availability and usage, few developers and DBAs have mastered the true power of Oracle SQL Plus. This bestselling book--now updated for Oracle 10g--is the only in-depth guide to this interactive query tool for writing SQL scripts. It's an essential resource for any Oracle user.The new second edition of Oracle SQL Plus: The Definitive Guide clearly describes how to perform, step-by-step, all of the tasks that Oracle developers and DBAs want to perform with SQL Plus--and maybe some you didn't realize you could perform.With Oracle SQL Plus: The Definitive Guide, you'll expertly: write and execute script files generate ad hoc reports extract data from the database query the data dictionary tables customize an SQL Plus environment and much more It also includes a handy quick reference to all of its syntax options and an often-requested chapter on SQL itself, along with a clear, concise, and complete introduction.This book is truly the definitive guide to SQLPlus. It's an indispensable resource for those who are new to SQL*Plus, a task-oriented learning tool for those who are already using it, and an immediately useful quick reference for every user. If you want to leverage the full power and flexibility of this popular Oracle tool, you'll need this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 183
    Language: English
    Pages: xviii, 615 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 004.5/6
    Keywords: Linux device drivers (Computer programs) ; Electronic books ; local
    Abstract: Device drivers literally drive everything you're interested in--disks, monitors, keyboards, modems--everything outside the computer chip and memory. And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic Linux Device Drivers from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.Over the years the book has helped countless programmers learn: how to support computer peripherals under the Linux operating system how to develop and write software for new hardware under Linux the basics of Linux operation even if they are not expecting to write a driver The new edition of Linux Device Drivers is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.
    Note: On t.p. of previous ed. Alessandro Rubini's name appeared first. - Includes bibliographical references (p. 575-577) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 184
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: viii, 249 p. , ill. ; , 23 cm
    Keywords: Home-based businesses ; Handbooks, manuals, etc ; New business enterprises ; Handbooks, manuals, etc ; Self-employed ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Are you ready to find a better way of living and working? Millions of people just like you have found the career satisfaction they have always craved through starting their own business, whether as a full-time job or as a second income. Filled with practical advice, easy-to-follow to-do lists, and step-by-step planning and preparation, Start Your Own Home Business In No Time puts you on the road to small business ownership. Walk through the process of starting a home-based business-from evaluating your readiness to launch your own business, to writing a business plan, finding financing, setting up your office and equipment, getting legal issues and records in order and crafting a marketing plan that will build a strong client base. If you are like the many entrepreneurs who don't have the time to figure it all out on your own, let Start Your Own Home Business In No Time be your first step toward building the business of your dreams.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 185
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: xvi, 486 p. , ill. ; , 24 cm
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Electronic books ; local
    Abstract: The world of mathematical formulas and jargon in Microsoft Excel is complex and can be intimidating for even advanced computer users. Perhaps like you, a majority of users find it difficult to get the most they can out of this very valuable program. Formulas and Functions with Microsoft Excel 2003 strives to break down the complexities by focusing on the four primary technologies to master: ranges, formulas, data analysis tools and lists. Chapters such as "Getting the Most Out of Ranges," "Building Your Own Functions Using VBA," and "Solving Complex Problems with Solver" will teach you practical skills and solutions that you can put to work immediately. Frustration will become a thing of the past as you begin to master the complex world of Excel!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 186
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xv, 462 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Learn Perl programming quickly and easily with 24 one-hour lessons in Sams Teach Yourself Perl in 24 Hours . The book's step-by-step lessons teach you the basics of Perl and how to apply it in web development and system administration. Plus, the third edition has been updated to include five chapters on new technologies, information on the latest version of Perl, and a look ahead to Perl 6. Sams Teach Yourself Perl in 24 Hours focuses on real-world development, teaching you how to: Effectively use Perl for large development projects using Perl modules Use Perl for data processing Utilize Perl as a "glue" language with other programming languages Use Perl as a web development language
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 187
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvii, 238 p. , ill. ; , 22 cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Electronic books ; local
    Abstract: If you're in need of a quick, concise tutorial to learn Unix and get on your way, this is it. Sams Teach Yourself UNIX in 10 Minutes, Second Edition will help you quickly and easily learn UNIX essentials and review UNIX features and functions. You will master components of UNIX programming through clear, concise learning modules and step-by-step instructions without having to wade through a lot of fluff and theory. You will learn to: Get onto the system and use the command line Move about the file system Create, move, rename and delete files and directories Slice and dice command pipe data Use the vi Editor Print in the UNIX environment And more! Whatever your expertise level, Sams Teach Yourself UNIX in 10 Minutes will get you up and running with UNIX in no time.
    Note: Includes index. - Previous ed.: by William Ray. 1999
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 188
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xi, 431 p. , ill. ; , 24 cm
    Keywords: Microsoft SQL Server. (Computer file) ; Client/server computing ; Relational databases ; Electronic books ; local
    Abstract: Offers example-based coverage for various high availability solutions. High availability is becoming an increasingly important topic for database administrators, data architects and system architects. Covers choosing, planning, implementing and administering a high availability solution along with the business justifications. Paul Bertucci has over 20 years of database experience including consulting for numerous Fortune 500 companies.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 189
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: ix, 117 p. , ill. ; , 18 cm
    Edition: 1st ed.
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Eclipse is the world's most popular IDE for Java development. And although there are plenty of large tomes that cover all the nooks and crannies of Eclipse, what you really need is a quick, handy guide to the features that are used over and over again in Java programming. You need answers to basic questions such as: Where was that menu? What does that command do again? And how can I set my classpath on a per-project basis? This practical pocket guide gets you up to speed quickly with Eclipse. It covers basic concepts, including Views and editors, as well as features that are not commonly understood, such as Perspectives and Launch Configurations. You'll learn how to write and debug your Java code--and how to integrate that code with tools such as Ant and JUnit. You'll also get a toolbox full of tips and tricks to handle common--and sometimes unexpected--tasks that you'll run across in your Java development cycle. Additionally, the Eclipse IDE Pocket Guide has a thorough appendix detailing all of Eclipse's important views, menus, and commands. The Eclipse IDE Pocket Guide is just the resource you need for using Eclipse, whether it's on a daily, weekly, or monthly basis. Put it in your back pocket, or just throw it in your backpack. With this guide in hand, you're ready to tackle the Eclipse programming environment.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 190
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 213 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Computer networks ; Design and construction ; Internet programming ; Open source software ; Python (Computer program language) ; Electronic books ; local
    Abstract: Twisted Network Programming Essentials from O'Reilly is a task-oriented look at this new open source, Python-based technology. The book begins with recommendations for various plug-ins and add-ons to enhance the basic package as installed. It then details Twisted's collection simple network protocols, and helper utilities. The book also includes projects that let you try out the Twisted framework for yourself. For example, you'll find examples of using Twisted to build web services applications using the REST architecture, using XML-RPC, and using SOAP. Written for developers who want to start building applications using Twisted, this comprehensive guide presents examples of the most common tasks you'll face when building network applications. It also helps you understand the key concepts and design patterns used in Twisted applications. Here are just some of the topics discussed in Twisted Network Programming Essentials : Installing Twisted How to make TCP connections How to use Twisted to work with the Web Twisted's authentication framework Usenet and SSH clients and servers Along the way, each lesson is supported by thorough notes and explanations to make absolutely certain you're up to speed with this leading-edge Python technology.
    Note: "Foreword by Glyph Lefkowitz, creator of Twisted"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 191
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 747 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company. Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. This shorter version of the original work omits much mathematical formalism, making it more accessible for professionals and students who have a less formal mathematical background, or for readers with a more practical than theoretical interest.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 192
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 004.67/8
    Keywords: Extranets (Computer networks) ; IPSec (Computer network protocol) ; Electronic books ; local
    Abstract: Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." By learning to read and interpret various network traces, such as those produced by tcpdump, readers will be able to better understand and troubleshoot VPN and network behavior. Specific topics covered include: Block and stream symmetric ciphers, such as AES and RC4; and asymmetric ciphers, such as RSA and EIGamal Message authentication codes, including HMACs Tunneling technologies based on gtunnel SSL protocol for building network-to-network VPNs SSH protocols as drop-in replacements for telnet, ftp, and the BSD r-commands Lightweight VPNs, including VTun, CIPE, tinc, and OpenVPN IPsec, including its Authentication Header (AH) protocol, Encapsulating Security Payload (ESP), and IKE (the key management protocol) Packed with details, the text can be used as a handbook describing the functions of the protocols and the message formats that they use. Source code is available for download, and an appendix covers publicly available software that can be used to build tunnels and analyze traffic flow. VPNs Illustrated gives you the knowledge of tunneling and VPN technology you need to understand existing VPN implementations and successfully create your own.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 193
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxi, 170 p. ; , 23 cm
    DDC: 005.3/068
    Keywords: Acquisition of computer software ; Management ; Computer software industry ; Computer software ; Management ; Electronic books ; local
    Abstract: Do you know what is the real cost of your software? Before you reach for a calculator, be forewarned that it's a trick question. Even technology industry analysts and seasoned IT executives have difficulty putting a hard figure on the Total Cost of Ownership (TCO) of today's enterprise application solutions. What makes the equation so tricky is the sheer number of variables that must be factored in, many of which cannot be lined up in a neat column and reconciled, such as issues of security, availability, performance, problem resolution and change management. The End of Software: Transforming Your Business for the On Demand Future , by Dr. Timothy Chou , is a groundbreaking book for business managers and executives that challenges conventional approaches to business software and proposes new alternatives to managing and maintaining the systems that companies depend on. Read What Industry Experts Have to Say: "Whether you rely on computer software to run your business, create software solutions, or invest in software companies, you are facing the shift from software as a product to software as a service. In The End of Software , Dr. Timothy Chou makes the case for Software on Demand and shows you who's already out there creating and using this new model." Fred Magner, Chief Information Officer, Unocal Corporation "As a pioneer of the On Demand delivery model, Dr. Chou challenges certain conventions long held by the software industry. The End of Software provokes industry participants to re-think how big software should be packaged, sold and delivered in the future." Stephen Wong, Chairman and Chief Executive Officer of Embarcadero Technologies "Dr. Timothy Chou's book The End of Software presents a logical argument for the shift from selling and buying software, or the promise of the value that software represents, to selling and buying the actual value that software can bring to a user. This is very persuasive, especially when you consider the legacy of software vendors, who are notorious for over-promising and under-delivering. As Dr. Chou so clearly understands (and why shouldn't he-he's lived it), this new delivery method simply makes sense. But the world is often slow to change; as keen observers of the technology industry, we'll be watching closely." John S. DiFucci, Senior Software Analyst, Managing Director, Bear, Stearns & Co. Inc.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 194
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxix, 946 p. , ill. ; , 23 cm. +
    Edition: 3rd ed.
    Keywords: MySQL (Electronic resource) ; PHP (Computer program language) ; SQL (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0672329166 ISBN-13: 9780672329166 We've taken the best and made it even better. The third edition of the best-selling PHP and MySQL Web Development has been updated to include material and code on MySQL 5, PHP 5 and on PHPs object model and validation. Through a clear, practical approach, you will learn to develop secure, dynamic websites by integrating and implementing the PHP scripting language and the MySQL database system. Real-world examples and working sample projects will give you a strong foundation on which to start building your own websites, complete with features such as SSL, shopping carts and payment systems. The accompanying CD includes the source code from each example in the book, the entire book in PDF format, and source code and binaries for PHP 5, MySQL 5 and Apache. Readers have called PHP and MySQL Web Development call it the best technical book they've ever read, but don't take their word for it. Find out for yourself!
    Note: Accompanying CD-ROM includes source code for the book's examples, the entire book in PDF format, and PHP and MySQL for Linux/Unix, Windows, and Mac OS X. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 195
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 620/.5
    Keywords: Nanotechnology ; Social aspects ; Nanotechnology ; Electronic books ; local
    Abstract: Inside the Emerging Multibillion-Dollar Nanotechnology Industry Suddenly, nanotechnology isn't science fiction or mere theory: It's becoming one of the world's fastest-growing, highest-impact industries. In Nanotechnology: Science, Innovation, and Opportunity , the field's leading experts offer an up-to-the-minute briefing on where the industry stands now, how it will unfold over the coming decade, and how it will impact you. Edited by a key industry advisor, this book covers the latest in nanotech science, technology, and applications. You'll meet the key players, and discover nanotech at work in fields ranging from drug delivery to energy efficiency. Here are the opportunities, the challenges, and the implications: all you need to know about today's nanotech business--and tomorrow's. Coverage includes How the convergence of nanoscale science foreshadows revolutionary societal change Technical and business obstacles that still challenge the industry Lessons from the early "gold rush" days of biotech: managing the hype Nanotech as disruptive innovation: implications for investors and venture capitalists The evolving roles of entrepreneurs, universities, and the U.S. government Key application areas: materials, microelectronics, sensors, energy, and beyond Bio-Nano-Information fusion: the potential to transform medicine Relevant patent law and intellectual property issues The ethics of nanotechnology "A fascinating look at the art and science of nanotechnology. Hold on to your hats, the world is about to change big time. . . . A comprehensive look at nanotechnology from the perspective of science, investment, IP, and business development with a healthy dose of vision for good measure. First-rate authors with an excellent presentation of the material. Buy this book." --David Bishop, Ph.D., V.P. of Nanotechnology Research, Bell Labs, Lucent Technologies "An absolute must-read for every technology sector being impacted by nanotechnology. This book presents the true value of these technologies, delivering a comprehensive prospectus on the science to commercialization of nanotechnology." --Matthew Laudon, Ph.D., Executive Director, Nano Science & Technology Institute "This is an excellent book for anyone trying to get a general grasp on the emerging science and technology of nanotechnology in particular for business executives, engineers, or entrepreneurs who are trying to decide what this technology can mean to them." --Charles H. Volk, Ph.D., V.P....
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 196
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: " Samba-3 by Example provides useful, thoroughly documented explanations for all aspects of a Samba deployment. They're the same kind of patient answers I got when my dad taught me how to ride a bike without training wheels. Now, if only dad knew active Directory...." -Will Enestvedt, UNIX System Administrator, Johnson & Wales University "When my colleague and I were first reading John Terpstra's Samba-3 by Example , we were impressed by how easy it was to find the chapter we wanted to implement, and the ease of following his step-by-step approach. We always felt Terpstra was there with us, for every configuration line. It was like having our own personal tutor. I always take his book to every client that uses Samba. Additionally, Terpstra does something most authors don't, he keeps his documentation up to date. When we were doing our first implementation, he just released the update that morning; we downloaded it, printed it, and implemented it. Now, to me, that is cutting-edge technology at its best." -Steven C. Henry "A cook learns to follow a recipe until he has mastered the art. This is your cookbook to successful Windows networks. I followed this recipe to migrate our NT4 domain to Samba-3, and the recipe just worked great. I could not have completed this project without the Samba-3 by Example book-it brings dry, lifeless man-pages down to the reality IT support people face." -Geoff Scott, IT Systems Administrator, Guests Furniture Hire Pty Ltd "I used the book Samba-3 by Example to get started at 8:30 last night. I finished my complete PDC and it was up and running in six hours with Windows 2000 and XP Pro clients ready for work in the morning. That's from someone who is brand new to Linux. This book is awesome!" -Jesse Knudsen, Windows Systems Administrator The Practical, Tested, Step-by-Step Samba-3 Guidebook Has Now Been Fully Updated! The definitive Samba-3 guidebook has been completely updated to reflect the latest Samba releases and migration techniques. This book's complete configuration files, step-by-step implementation instructions, network diagrams, and automated scripts make deployment a breeze-even if you've never worked with Samba before. From small office networks to enterprise environments, here are proven configurations, backed by guidance from one of the world's most respected Samba experts, Samba Team contibutor John H. Terpstra. This edition has added comprehensive diagnostic techniques and validation steps, as w...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 197
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Praise for The HP Virtual Server Environment "This book will educate professionals about the components of a virtual server environment and how to manage them in everyday tasks. It demonstrates how to manage resource utilization in real time and to its full capacity. Bryan and Dan are fully qualified to write this book, having been involved in creating and designing a number of the virtual server environment components." -D'Ann Chorak, Software Engineering Project Manager "Great overviews, technology details, and practical example details." -George Williams, Solution Architect, Hewlett-Packard Co. "From a customer standpoint, almost anyone can make use of the solutions and concepts portrayed in The HP Virtual Server Environment. Some of the solutions are free, so there are ways to take advantage at no cost. No matter what solution is used, the results are a win-win situation for the customer." -Alan Hymes, Solution Architect, Hewlett-Packard Co. "The material is well-written. The book will appeal to high-end enterprise system administrators and architects who are interested in implementing an 'Adaptive Enterprise' environment or in improving an existing environment." -Rob Lucke, Chief Solutions Officer, Vista Solutions Corp. "This book is perfect for those looking for a high level overview of VSE and those investigating the use of VSE technologies in their data center." -Erik Bostrom, Engineering Program Manager, Hewlett-Packard Co. "The HP Virtual Server Environment represents a nearly exhaustive discourse on the basic and common capabilities of the software. The casual user will come away feeling that they understand the purpose and general use of the programs and confident that they can integrate these capabilities within their server environment." -Dave Butenof, Instant Capacity and PPU Software Architect, Hewlett-Packard Co. Use HP virtualization to maximize IT service quality, agility, and value Includes coverage of HP's new Integrity Virtual Machines, Global Workload Manager, Virtualization Manager, and Capacity Advisor Plan, implement, and manage virtualization to drive maximum business value Understand HP's virtualization solutions for partitioning, utility pricing, high availability, and management for HP Integrity and HP 9000 servers Manage your existing resources to drive unprecedented levels of utilization Virtualization offers IT organizations unprecedented opportunities to enhance service quality, improve agility, and reduce cos...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 198
    Online Resource
    Online Resource
    Upper Saddle River, NJ : FT Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 356 p. , ill. ; , 25 cm
    Keywords: Options (Finance) ; Stock options ; Strategic planning ; Electronic books ; local
    Abstract: "Guy Cohen is the master when it comes to taming the complexities of options. From buying calls and puts to iron butterflies and condors, Guy explains these strategies in a clear and concise manner that options traders of any level can understand. His chapter on options and taxes is especially welcomed (and needed). The Bible of Options Strategies is a straightforward, easy-to-use reference work that should occupy a space on any options trader's bookshelf." -Bernie Schaeffer, Chairman and CEO, Schaeffer's Investment Research, Inc. "The author delivers clarity, insight and perception making learning about options a joy, and practicing the art of making money that much easier: truly a bible from a guru." -Alpesh B. Patel, Author and Financial Times Columnist "Guy Cohen truly makes learning about options easy in this fact-filled guide. Bullet points make for a quick and enlightened read, getting to the heart of what you really need to know about each options strategy. This book is a must for any serious trader's library." -Price Headley, Founder, BigTrends.com Pick the right options strategies...implement them step-by-step...maximize your profits! Introducing today's first and only comprehensive reference to contemporary options trading! OptionEasy creator Guy Cohen identifies today's popular strategies...and tells you exactly how and when to use each one and what hazards to look out for! It's all here.... Basic Strategies including Buying and shorting shares, calls, and puts. Income Strategies including Covered Call, Naked Put, Bull Put Spread, Bear Call Spread, Long Iron Butterfly, Long Iron Condor, Calendar Call, Diagonal Call... Vertical Spreads including Bull Call Spread, Bull Put Spread, Bear Call Spread, Bear Put Spread, Ladders... Volatility Strategies including Straddle, Strangle, Guts, Short Butterflies, Short Condors... Sideways Strategies including Short Straddle, Short Strangle, Short Guts, Long Butterflies, Long Condors... Leveraged Strategies including Call Ratio Backspread, Put Ratio Backspread, Ratio Spreads... Synthetic Strategies including Collar, Synthetic Call, Synthetic Put, Synthetic Straddles, Synthetic Futures, Combos, Box Spread... ...and many more strategies... Plus essential tax-saving information, and more! No other book presents this much authoritative, current information on options trading strategies Covers all of today's best income, volatility, leveraged, synthetic, and sideways market strategies Discover why eac...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 199
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: x, 329 p. , ill. ; , 25 cm. +
    Keywords: Digital video ; Editing ; Electronic books ; local
    Abstract: Apple's DVD Studio Pro, released in 2001, provided a low-cost, professional solution for home and small business DVD authoring. Today, the highly sophisticated yet easy-to-use DVD Studio Pro 3 allows independent filmmakers, video producers, trainers, event videographers, and enthusiasts to create professional-grade DVDs on the Macintosh platform. Pair the program with DVD Studio Pro 3: In the Studio , and you've got everything you need to embrace the digital video revolution.This indispensable book gives you the tools and know-how to master DVD Studio Pro 3. Oversized and in full color, the highly visual DVD Studio Pro 3: In the Studio is ideal for Macintosh ProApps developers--those who use Final Cut Pro 4 and Shake 3--as well as for prosumer and professional filmmakers who wish to transfer their projects to DVDs. The book goes well beyond the program's features list to demystify the entire process of DVD design and authoring.Author Marc Loy, who has been using DVD Studio Pro since its inception, goes beyond a simple discussion about the DVD Studio Pro 3 interface and entices readers to experience the program's powerful capabilities as they create eye-catching, innovative DVD designs. He covers the actual protocols involved with the DVD files and filesystems, pixel aspect ratio issues, and common "gotchas" using both still and motion media. He also delivers plenty of tips and tricks for using dynamic buttons. DVD Studio Pro 3: In the Studio explores most everything you need and want to know, including importing from Photoshop and Final Cut Pro, making motion video menus available, effective looping of video and audio, adding multilingual menus and subtitles, encoding rules for DVDs, scripting, and mass duplication hunts. DVD Studio Pro 3: In the Studio is a professional-level book for anyone who's serious about creating high-impact, professional-level DVDs to make your unique vision a digital video reality.
    Note: One DVD inside back cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 200
    Online Resource
    Online Resource
    Sebastopol, CA ; : Pogue Press | Boston, MA :Safari,
    Language: English
    Pages: xvi, 245 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.68
    Keywords: Home computer networks ; Electronic books ; local
    Abstract: Millions of computers around the world today are connected by the Internet, so why is it still so hard to hook up a few PCs in you own home? Whether you want to share an Internet connection, install WiFi, or maybe just cut down on the number of printers you own, home networks are supposed to help make your life easier. Instead, most aspiring home networkers get lost in a confusing maze of terms and technologies: 802.11g, Fast Ethernet, Cat 5 cable (or was it Cat 5e?), Powerline, and on and confusingly on.That's where Home Networking: The Missing Manual comes in. Using clear language, straightforward explanations, and a dash of humor, this book shows you how to do everything you need to set up a home network. Coverage includes:WiFi, Ethernet, or Powerline? There are several kinds of digital pipes that you can use to create your network, and none of them have friendly names. This book tells you what they are, explains the pros and cons of each, and helps you figure out what you need to buy, and how to install it.Windows and Mac info included. Half the battle in home networking takes place after you've bought your gear and plugged it in. That's because the routers, network adapters, and cables that you need get you only part way towards networking nirvana. Whether you've got PCs or Macs or both, you'll need help tweaking your computers' settings if you want to get all your machines talking to each other. This book covers most known operating system flavors, including Windows XP, 2000, Me, and 98, and Mac OS X and OS 9.Fun things to do with your network. The real fun starts once your network is up and running. This book shows you how to do much more than simply share an Internet connection and a printer. You'll learn how to stream music from your PCs to your stereo, how to display pictures on your TV, how to hook up game consoles to your network, and more!Most important, this book helps you understand the difference between what you need to know to create and use your home network and what's best left to those looking for a career as a system administrator. In Home Networking: The Missing Manual you'll find everything you need to get your network running-and nothing more.
    Note: "For Macintosh & Windows"--Cover. - "Link computers, share your Internet connection"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...