Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (1,704)
  • 2000-2004  (1,704)
  • 1960-1964
  • Safari Tech Books Online  (1,555)
  • Nuclear Energy Agency  (149)
Datasource
  • MPI Ethno. Forsch.  (1,704)
  • BSZ  (6)
  • GBV  (6)
Material
Years
Year
  • 1
    ISBN: 9264008799
    Language: English
    Pages: Online-Ressource
    Series Statement: Radioactive waste management
    Series Statement: SourceOECD
    Parallel Title: Druckausg. u.d.T. Management of uncertainty in safety cases and the role of risk
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9264108246
    Language: English
    Pages: Online-Ressource
    Series Statement: SourceOECD
    Parallel Title: Druckausg. u.d.T. Computing radiation dosimetry - CRD 2002
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9789264016729
    Language: English
    Pages: Online-Ressource (272 p.) , ill.
    Series Statement: Radioactive Waste Management
    Keywords: Nuclear Energy ; Spain
    Abstract: As modern nuclear power programmes mature and large, commercial nuclear power plants and fuel cycle facilities approach the end of their useful life by reason of age, economics or change of policy on the use of nuclear power, new challenges associated with decommissioning and dismantling come to the fore. Politicians and the public may expect there to be a “right answer” to the choice of strategy for a particular type of facility, or even all facilities. Both this seminar and wider experience show that this is not the case. Local factors and national political positions have a significant input and often result in widely differing strategy approaches to broadly similar decommissioning projects. All facility owners represented at the seminar were able to demonstrate a rational process for strategy selection and compelling arguments for the choices made. In addition to the papers that were presented, these proceedings include a summary of the discussions that took place.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9789264017344
    Language: English
    Pages: Online-Ressource (450 p.)
    Series Statement: Nuclear Science
    Keywords: Nuclear Energy
    Abstract: Particle accelerators are used today for an increasing range of scientific and technological applications. They are very powerful tools for investigating the origin and structure of matter, and for improving understanding of the interaction of radiation with materials, including the transmutation of nuclides and the beneficial or harmful effects of radiation. Particle accelerators are used to identify properties of molecules that can be used in pharmacy, for medical diagnosis and therapy, and for biophysics studies. Particle accelerators must be operated in safe ways that protect the operators, the population and the environment. New technological and research applications give rise to new issues in radiation shielding. These workshop proceedings review the state of the art in radiation shielding of accelerator facilities and irradiated targets. They also evaluate advancements and discuss the additional developments required to meet radiation protection needs.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9789264015937
    Language: English
    Pages: Online-Ressource (179 p.)
    Series Statement: Radioactive Waste Management
    Keywords: Nuclear Energy ; Switzerland
    Abstract: When preparing the safety case for a deep geological repository of radioactive waste, the integration of wide-ranging information from multidisciplinary sources is a complex task. This has provided the motivation for establishing AMIGO, an OECD/NEA international project on “Approaches and Methods for Integrating Geological Information in the Safety Case”. AMIGO is structured as a series of biannual topical workshops involving site characterisation and safety assessment practitioners with experience in both sedimentary and crystalline rock settings. The first AMIGO workshop was organised in Yverdon-les-Bains, Switzerland on 3-5 June 2003. The main objective of the workshop was to exchange views on building confidence in analyses and arguments that support the safety case using multiple lines of evidence and integrating the work of geoscientists and safety assessors. These proceedings present the outcomes of this workshop.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Paris : OECD Publishing and Nuclear Energy Agency
    ISBN: 9789264108530
    Language: French
    Pages: Online-Ressource (116 p.)
    Series Statement: Développement de l'énergie nucléaire
    Parallel Title: Druckausg.
    Parallel Title: Parallelausg. Nuclear Competence Building
    Keywords: Nuclear Energy ; Kernenergiewirtschaft ; Qualifikationsanforderung ; Forschung und Entwicklung ; Internationale Kooperation
    Abstract: Dans de nombreux pays, le financement public de la R & D dans le domaine de l’énergie nucléaire a décru considérablement ou a même complètement disparu. Dans le même temps, les bénéfices des compagnies d’électricité se sont sévèrement réduits. Cette évolution a conduit à moins d’innovation technique et risque d’entraîner une perte de compétences et de savoir-faire dans le domaine électronucléaire. Cependant, tous les pays ne se trouvant pas au même stade du cycle de vie de la technologie nucléaire, ils ne sont pas affectés de la même façon ni dans les mêmes proportions. Une compétence qui aura décliné ou disparu dans un pays pourra occuper une position solide dans un autre. L’une des solutions aux problèmes auxquels le secteur est confronté est donc la collaboration internationale. Cette publication présente les résultats d’une enquête internationale sur les initiatives lancées ces dernières années en matière d’éducation et de formation dans le domaine de l’énergie nucléaire. Elle aborde les questions clés qui se posent en matière de ressources humaines et identifie de nombreuses bonnes pratiques en terme de coopération internationale. Le rapport comporte un exposé de synthèse dont les conclusions et les recommandations sont destinées aux décideurs et aux autres parties prenantes. Il contient également une analyse approfondie des informations factuelles recueillies dans le cadre de l’étude.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9789264015456
    Language: French
    Pages: Online-Ressource (228 p.) , ill.
    Parallel Title: Parallelausg. Nuclear legislation in Central and Eastern Europe and the NIS; 2003 0verview
    Parallel Title: Parallelausg. Nuclear legislation in Central and Eastern Europe and the NIS: 2003 0verview
    Keywords: Nuclear Energy
    Abstract: Cette publication analyse la législation et la réglementation régissant les utilisations pacifiques de l'énergie nucléaire en Europe de l'Est. Elle couvre 11 pays d'Europe centrale et orientale et 12 pays des Nouveaux États indépendants.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9264006672 , 9789264006676
    Language: English
    Pages: Online-Ressource
    Series Statement: Nuclear Safety
    Series Statement: Nuclear safety
    Parallel Title: Druckausg. u.d.T. Debris impact on emergency coolant recirculation
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9789264107717
    Language: English
    Pages: Online-Ressource (316 p.)
    Series Statement: Nuclear Science
    Parallel Title: Druckausg. u.d.T. Information Exchange Meeting on the Nuclear Production of Hydrogen (2 : 2003 : Argonne, Ill.) Nuclear production of hydrogen
    Keywords: Wasserstofftechnologie ; Kernenergie ; Erneuerbare Energie ; Welt ; OECD-Staaten ; Nuclear Energy ; Konferenzschrift ; Wasserstofferzeugung ; Kernreaktion
    Abstract: Hydrogen has the potential to play an important role as a sustainable and environmentally acceptable source of energy in the 21st century. Present methods for producing hydrogen are mainly based on the reforming of fossil fuels with subsequent release of greenhouse gases. To avoid producing greenhouse gases, the possibility to use heat and surplus electricity from nuclear power plants to produce hydrogen by water cracking is being investigated. This report presents the state of the art in the nuclear production of hydrogen and describes the scientific and technical challenges associated with it.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9264107711
    Language: English
    Pages: Online-Ressource
    Series Statement: Nuclear science
    Series Statement: SourceOECD
    Parallel Title: Druckausg. u.d.T. Information Exchange Meeting on the Nuclear Production of Hydrogen (2 : 2003 : Argonne, Ill.) Nuclear production of hydrogen
    Keywords: Wasserstofftechnologie ; Kernenergie ; Erneuerbare Energie ; Welt ; OECD-Staaten ; Konferenzschrift ; Wasserstofferzeugung ; Kernreaktion
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9264017348
    Language: English
    Pages: Online-Ressource
    Series Statement: Nuclear Science
    Series Statement: Nuclear science
    Parallel Title: Druckausg. u.d.T. Stanford Linear Accelerator Center (SLAC), Menlo Park, CA, USA, 10 - 12 April 2002
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9264016023 , 9789264016026
    Language: English
    Pages: Online-Ressource
    Series Statement: Nuclear Science
    Series Statement: Nuclear science
    Parallel Title: Druckausg. u.d.T. Ibaraki-ken, Japan, 11 - 12 September 2003
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 299 p. ; , 23 cm
    Edition: 1st ed.
    DDC: 302.23/0973
    Keywords: Facts and Comparisons electronic resources ; Digital media ; United States ; Internet ; Political aspects ; United States ; Internet ; Social aspects ; United States ; Mass media and technology ; United States ; Online journalism ; United States ; Web publishing ; United States ; Electronic books ; local
    Abstract: " We the Media , has become something of a bible for those who believe the online medium will change journalism for the better." -Financial Times Big Media has lost its monopoly on the news, thanks to the Internet. Now that it's possible to publish in real time to a worldwide audience, a new breed of grassroots journalists are taking the news into their own hands. Armed with laptops, cell phones, and digital cameras, these readers-turned-reporters are transforming the news from a lecture into a conversation. In We the Media , nationally acclaimed newspaper columnist and blogger Dan Gillmor tells the story of this emerging phenomenon and sheds light on this deep shift in how we make--and consume--the news. Gillmor shows how anyone can produce the news, using personal blogs, Internet chat groups, email, and a host of other tools. He sends a wake-up call tonewsmakers-politicians, business executives, celebrities-and the marketers and PR flacks who promote them. He explains how to successfully play by the rules of this new era and shift from "control" to "engagement." And he makes a strong case to his fell journalists that, in the face of a plethora of Internet-fueled news vehicles, they must change or become irrelevant. Journalism in the 21st century will be fundamentally different from the Big Media oligarchy that prevails today. We the Media casts light on the future of journalism, and invites us all to be part of it. Dan Gillmor is founder of Grassroots Media Inc., a project aimed at enabling grassroots journalism and expanding its reach. The company's first launch is Bayosphere.com, a site "of, by, and for the San Francisco Bay Area." Dan Gillmor is the founder of the Center for Citizen Media, a project to enable and expand reach of grassroots media. From 1994-2004, Gillmor was a columnist at the San Jose Mercury News , Silicon Valley's daily newspaper, and wrote a weblog for SiliconValley.com. He joined the Mercury News after six years with the Detroit Free Press . Before that, he was with the Kansas City Times and several newspapers in Vermont. He has won or shared in several regional and national journalism awards. Before becoming a journalist he played music professionally for seven years.
    Note: "Web site directory": p. 251-257. - Includes bibliographical references (p. 261-279) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Paris : OECD Publishing and Nuclear Energy Agency
    ISBN: 9789264104341
    Language: French
    Pages: Online-Ressource (112 p.)
    Series Statement: Développement de l'énergie nucléaire
    Parallel Title: Druckausg.
    Parallel Title: Parallelausg. Decommissioning Nuclear Power Plants; Policies, Strategies and Costs
    Parallel Title: Parallelausg. Decommissioning Nuclear Power Plants: Policies, Strategies and Costs
    Keywords: Environment ; Nuclear Energy ; Kernkraftwerk ; Bemessung ; Stilllegung
    Abstract: Le démantèlement des centrales nucléaires est un sujet qui suscite un intérêt grandissant de la part des pouvoirs publics et de l’industrie à mesure que les unités en exploitation arrivent en fin de vie. Ce rapport, qui s’appuie sur des données fournies par 26 pays et analysées par des experts d’agences gouvernementales et de l’industrie, porte sur des réacteurs de types et de tailles très variés. Les enseignements tirés de l’étude sur les éléments de coût du démantèlement et les facteurs qui expliquent la variabilité de ces coûts intéresseront les analystes et les décideurs dans le domaine de l’énergie nucléaire.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Paris : OECD Publishing and Nuclear Energy Agency
    ISBN: 9789264023734
    Language: French
    Pages: Online-Ressource (222 p.)
    Series Statement: Gestion des déchets radioactifs
    Parallel Title: Druckausg.
    Parallel Title: Parallelausg. The Regulatory Control of Radioactive Waste Management; Overview of 15 NEA Member Countries
    Parallel Title: Parallelausg. The Regulatory Control of Radioactive Waste Management: Overview of 15 NEA Member Countries
    Keywords: Nuclear Energy ; Mitgliedsstaaten ; Radioaktiver Abfall ; Entsorgung ; Gesetzgebung ; Recht ; Lizenzvergabe
    Abstract: Ce rapport décrit les premiers résultats des travaux du Forum des régulateurs du Comité de l’AEN de la gestion des déchets radioactifs (RWMC). Il offre une synthèse de la situation dans 15 pays membres de l’AEN. Il présente des informations sur les politiques nationales en matière de gestion des déchets radioactifs, les contextes institutionnels, les cadres législatifs et réglementaires, les orientations existantes, et les catégories et sources de déchets. Il fait également le point sur la gestion des déchets, les questions en suspens, ainsi que les programmes de R-D connexes.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9264108262
    Language: English
    Pages: Online-Ressource
    Series Statement: Radiation protection
    Series Statement: SourceOECD
    Parallel Title: Druckausg. u.d.T. Stakeholder participation in radiological decision making
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9264016724
    Language: English
    Pages: Online-Ressource
    Series Statement: Radioactive waste management
    Series Statement: SourceOECD
    Parallel Title: Druckausg. u.d.T. Strategy selection for the decommissioning of nuclear facilities
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9264015930
    Language: English
    Pages: 1 Online-Ressource (199 Seiten) , Illustrationen, Diagramme, Karten
    Series Statement: Radioactive Waste Management
    Series Statement: Radioactive waste management
    Parallel Title: Druckausg. u.d.T. Geological disposal
    Keywords: Konferenzschrift 2003 ; Schweizer Jura ; Opalinuston ; Endlager ; Mont Terri ; Ton ; Tonstein ; Gesteinskunde ; Sedimentologie ; Endlagerung ; Radioaktiver Abfall ; Hochradioaktiver Abfall ; Unterirdische Lagerung ; Kongress
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Greensboro, N.C. : Center For Creative Leadership | Boston, MA :Safari,
    Language: English
    Pages: 31 p. , ill. ; , 23 cm
    Keywords: Complex organizations ; Cross-functional teams ; Intergroup relations ; Interorganizational relations ; Organizational effectiveness ; Teams in the workplace ; Electronic books ; local
    Abstract: Dispersed teams have members in different countries, cultures, and time zones. Such teams share some important characteristics with local teams, but they also present unique challenges. Organizations need to prepare for and support them properly to realize their full potential.
    Note: CCL no. 423
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Your first step into the world of routing No routing experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding routing begins here! Learn routing basics simply and easily Explore how network traffic gets from here to there Understand routing tools and technologies Reinforce your understanding with chapter review questions Welcome to the world of routing! Routing is the technology that enables worldwide Internet communication. Many people involved with networking technologies or companies need to know how routing works. But learning about routing tends to involve a complex web of terms and acronyms-a language that can be difficult and unfamiliar. No routing experience needed! Routing First-Step explains the basics of Internet routing in language all of us can understand. This book takes you on a guided tour of routing, starting with systems you are familiar with: the postal system, the telephone system, and the interstate highway system. From there, you'll learn routing simply and easily. Whether you are looking to take your first step into a career in networking or are interested only in gaining knowledge of the technology, this book is for you!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 820 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Examinations ; Study guides ; Telecommunications engineers ; Certification ; Study guides ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. In addition to acting as a key study aid for the CCSP SECUR 642-501 exam, this book will be an invaluable theory and configuration guide for years to come. CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a Cisco authorized, self-paced learning tool that helps you gain mastery over all security techniques and technologies, including newer topics such as Cisco Easy VPN and Security Device Manager (SDM). Chapter overviews bring you quickly up to speed on technologies you can use to secure your network. Configuration examples are designed to show you how to make Cisco IOS devices secure, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with Cisco IOS security or a study guide for the 642-501 exam, CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is the reference you are looking for. CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is part of a recommended learning path from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products fro...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 828 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. The Cisco Intrusion Detection Sensors and Management options work as a united system to provide detection, notification, and aggressive lockdown to malicious network breaches. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS), Second Edition , offers in-depth configuration and deployment information for the reliable and intensive intrusion detection solutions from Cisco Systems. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over the use of both the host-based and network-based IDS options (as well as the Cisco Threat Response functionality) by presenting a consolidated all-inclusive reference on all of the current Cisco IDS sensor platforms and management platforms. Chapter overviews bring you quickly up to speed and help you get to work right away. Configuration examples are designed to show you how to make the most of your IDS system, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with the CIDS sensor and management platforms or a study guide for the 642-531 exam, CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, supports your effective use of the Cisco IDS. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, an...
    Note: Includes index. - Rev. ed. of: Cisco secure intrusion detection system. c2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 517 p. , ill. ; , 24 cm. +
    DDC: 004.6
    Keywords: Computer networks ; Security measures ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Internetworking (Telecommunication) ; Examinations ; Study guides ; Electronic books ; local
    Abstract: Seven comprehensive CCIE security labs to hone configuration and troubleshooting skills Prepare for the CCIE Security lab exam and hone your security configuration and troubleshooting skills with seven complete practice scenarios that cover: Basic device configuration Routing configuration ISDN configuration Cisco PIX Firewall configuration VPN configuration, including IPSec, GRE, L2TP, and PPTP VPN-3000 Concentrator configuration Intrusion Detection System (IDS) 42xx Appliance configuration Cisco IOS Firewall configuration AAA configuration Advanced security issues IP services and protocol-independent features Security violations The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. Today's network administrators and managers are under big pressure to satisfy ever-increasing demands from customers, suppliers, and employees for 100 percent network resource availability and access to applications and data. The end result is that the cost of a network security breach has never been higher. Accordingly, the demand for networking professionals with expert-level network security configuration and troubleshooting skills is also great. The Cisco Systems CCIE Security certification is a prestigious program that sets the professional benchmark for internetworking expertise, validating proficiency with advanced technical skills required to design, configure, and maintain a wide range of network security technologies. CCIE Security Practice Labs provides a series of complete practice labs that mirror the difficult hands-on lab exam. Written by a CCIE Security engineer and Cisco Systems CCIE proctor, this book lays out seven end-to-end scenarios that are both complex and realistic, providing you with the practice needed to prepare for your lab examination and develop critical-thinking skills that are essential for resolving complex, real-world security problems. While many engineers are able to configure single technologies in standalone environments, most will struggle when dealing with integrated technologies in heterogeneous environments. CCIE Security Practice Labs consists of seven full-blown labs. The book does not waste time covering conceptual knowledge found in other security manuals, but focuses exclusively on these complex scenarios. The structure of each chapter is the same, covering a broad range of sec...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 745 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 808 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Extranets (Computer networks) ; Electronic books ; local
    Abstract: Master advanced troubleshooting techniques for IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Learn the step-by-step, end-to-end methodology essential for troubleshooting virtual private networks (VPNs) Gain the in-depth knowledge necessary for fast and efficient troubleshooting of IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Master advanced troubleshooting tools and techniques for all applicable VPN types Debug and fix IPSec site-to-site and remote access VPN issues, such as IKE (ISAKMP) phase 1 and phase 2 negotiation failure, ESP and AH traffic drops, certificate enrollment failures, and maximum transmission unit (MTU) problems Locate and resolve MPLS Layer-3 VPN problems, such as those involving route exchange and label switched path (LSP) failure, MPLS VPN over traffic engineering tunnels, and Multicast VPNs (MVPN) Discover solutions for issues in AToM and L2TPv3-based Layer-2 VPNs, including pseudowire setup failures, attachment circuit problems, and MTU issues Obtain answers for L2TPv2, PPTP, and L2F control connection establishment, session setup, PPP negotiation, and VPN performance issues Refer to specially designed flowcharts to identify issues and find solutions fast Consolidate VPN troubleshooting knowledge through bonus hands-on labs Read and understand detailed analysis of all relevant VPN show and debug command output Troubleshooting Virtual Private Networks presents a systematic troubleshooting methodology for network engineers, administrators, and architects tasked with managing and deploying Cisco IOS VPNs. With eight self-contained chapters designed to facilitate rapid and straightforward troubleshooting, this book provides detailed information on addressing all common and not-so-common issues with IPSec VPNs, MPLS Layer-3 VPNs, Any Transport over MPLS (AToM)-based Layer-2 VPNs, L2TP Version 3 (L2TPv3)-based Layer-2 VPNs, L2TP Version 2 (L2TPv2) VPNs, PPTP VPNs, and L2F VPNs. This book not only shows you how to correct problems but also how to avoid them in the first place with expert VPN configuration guidance and optimization tips. Each chapter in Troubleshooting Virtual Private Networks includes a step-by-step, end-to-end troubleshooting approach to a different VPN technology. In-depth technical discussions and configuration reviews orient you to the VPN technology and get you ready to work. To help you access the answers you need, you'll find flowcharts in ea...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "Whether you're a Techie, Architect, or a Project Manager, this masterpiece of tricks and traps will help you plan, test, and implement your Citrix environment." -Chris Walter, Senior Consultant, CGI "Whether you are a terminal services veteran or entirely new to the world of remote desktop, Mathers makes it easy to understand everything from the initial Terminal Services project planning to the complete network and management implementation. This book is definitely something a Terminal Services administrator is going to want to have handy." -Matthew Harris, Microsoft Windows Server MVP - Terminal Server This book brings together all the insights, knowledge, and step-by-step guidance you need to deliver robust, scalable, and stable server-based computing solutions with Microsoft Windows Terminal Services and Citrix MetaFrame Presentation Server 3.0. Building on two best-selling previous editions, expert consultant Todd W. Mathers has fully updated this book to cover both Windows Server 2003 and Windows 2000 Server environments. Drawing on nearly a decade of experience, Mathers addresses the entire project lifecycle, from needs assessment through planning, testing, deployment, and support. He covers the full spectrum of deployments, from Terminal Services for small businesses through enterprise-class Terminal Services/Citrix server farms. Along the way, Mathers presents proven examples and best practices for virtually every challenge, from server security to group policies, patch management to automated client deployment. Coverage includes Terminal Services and Citrix MetaFrame: how they relate, and how to determine what you need Common implementation traps and "gotchas"-and how to avoid them Planning client hardware/software, server hardware, networking, hotfix distribution, and more Step-by-step installation, including service-pack integration and answer files Detailed checklists and tuning techniques for optimizing performance and stability New Windows Server 2003 licensing requirements: overcoming the misinterpretations Expanded coverage of security in both Terminal Services and Citrix environments New and improved solutions for client drive and printer mapping Interoperability between MetaFrame 1.8 and MetaFrame Presentation Server 3.0 User profile and account creation, configuration, and management RDP and ICA client configuration, in detail Application compatibility: using Terminal Services' application support features Using Session Dir...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 234 p. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.692
    Keywords: Qmail ; Electronic mail systems ; Electronic books ; local
    Abstract: qmail has quietly become one of the most widely used applications on the Internet today. It's powerful enough to handle mail for systems with millions of users--Like Yahoo! Mail and Hotmail, while remaining compact and manageable enough for the smallest Unix- and Linux-based PC systems. Its component design makes it easy to extend and customize while keeping its key functions secure, so it's no wonder that adoption of qmail continues at a rapid pace.The downside? Apparently none. Except that qmail's unique design can be disorienting to those familiar with other popular MTAs (Mail Transfer Agents). If you're coming from sendmail, for instance, you might have trouble recasting your problems and solutions in qmail terms. qmail first helps you establish a "qmail frame of mind," then explores the installation, configuration, administration, and extension of this powerful MTA. Whether you're installing from scratch or managing mailing lists with thousands of users, qmail provides detailed information about how to make qmail do precisely what you wantqmail concentrates on common tasks like moving a sendmail setup to qmail, or setting up a "POP toaster," a system that provides mail service to a large number of users on other computers sending and retrieving mail remotely. The book also fills crucial gaps in existing documentation, detailing exactly what the core qmail software does.Topics covered include: Installation and configuration, including patching qmail Moving from sendmail to qmail Handling locally and remotely originated messages Managing virtual domains Logging qmail activity Tuning qmail performance Running multiple copies of qmail on the same computer Mailing list setup and management Integrating the qmail MTA with POP and IMAP delivery Filtering out spam and viruses If you need to manage mailing lists, large volumes of mail, or simply find sendmail and other MTAs too complicated, qmail may be exactly what's called for. Our new guide, qmail, will provide the guidance you need to build an email infrastructure that performs well, makes sense, and is easy to maintain.
    Note: "Managing Unix-based mail systems"--Cover. - Includes bibliographical references (p. 220-221) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 3rd ed.
    Keywords: Electronic books ; local
    Abstract: This updated edition covers all of the updates to Windows XP since it was released, including Service Packs 1 and 2, and Reloaded. From-the-trenches advice on upgrading to Windows XP Pro - including detailed rollout advice for IT managers. Plan and manage deployment of Windows easily and efficiently - whether you're upgrading just a handful of computers, or an entire corporation! Includes hands-on coverage of installing, configuring and surviving on a Windows XP-based network. We not only show you how to set up Windows networking features, we show you how to install and set up basic networking hardware.Sharing files with other platforms, such as Novell Netware, Unix and Linux, Macintosh and other Windows flavors.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Do you find yourself singing in the shower, pretending your shampoo bottle is your microphone and your towel is your guitar? Do you tap out drum rhythms with your pen at work? Now you can channel your musical energy using The MacAddict Guide to Making Music with GarageBand , the Mac software program that can turn you into a virtual recording star. MacAddict's focused, no-olds-barred approach is evident in this musical tutorial. Learn about pre-recorded loops that enable you to sound like you're singing with a symphony orchestra even if you can't actually play a single instrument. Or, if you are instrumentally-inclined, you will also learn how to hook up your instruments to record your own sound and later use GarageBand to edit and mix it for truly professional results. MacAddict is the authoritative voice in the Mac community and The MacAddict Guide to Making Music with GarageBand is the only book they endorse. It is sure to become the only book you'll need to learn how to unleash your inner rock star.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Special Edition Using Crystal Reports 10 is a reference guide designed to provide hands-on experience with the latest release of the product suite. The latest version of the Crystal Reporting Suite, delivers vast enhancements that drive upgrades from licensees who'll seek a reference to help them migrate. As Crystal Decisions insiders, the authors bring unique and valuable real-world perspectives on implementations and use of the Crystal Reports product. The book includes content, tutorials and samples for reporting within the Microsoft Visual Studio.NET environment and on the SAP Business Information Warehouse. New content on report distribution, and integration into the secured managed reporting solution known as Crystal Enterprise, is also now included in this definitive user guide.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xix, 380 p. , ill. ; , 24 cm
    Keywords: Microsoft FrontPage ; Web publishing ; Web sites ; Design ; Electronic books ; local
    Abstract: Absolute Beginner's Guide to Microsoft FrontPage is written for beginning users of the software. The book assumes the reader has no prior knowledge, and teaches the reader everything from planning a site to working with text to adding graphics. By the end of this book, the reader has the confidence and knowledge to create, edit, and publish Web sites of their own.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Research Triangle Park, N.C.] : IBM | Boston, MA :Safari,
    Language: English
    Edition: 1st ed.
    Series Statement: Redbooks
    Keywords: Rational Clearcase ; Software configuration management ; Electronic books ; local
    Abstract: This IBM Redbook describes configuration management in general and how it is implemented in the Rational products ClearCase and ClearQuest. The target audience for this redbook is anyone considering a software configuration management (SCM) solution, and in particular, project managers and configuration management leaders responsible for medium and large UCM deployments. In Part 1 we introduce the general concept of software configuration management (SCM), and why software asset and lifecycle management is good business. We describe an SCM strategy that leads to the ClearCase and ClearQuest products. In Part 2 we provide the details for planning and implementing SCM using a ClearCase environment, focusing on the test environment, network, servers, and clients. In Part 3 we introduce ClearQuest, its terminology, the roles and responsibilities of the different types of users, and the infrastructure required for a UCM environment. We also provide the details for planning and implementing ClearQuest. In Part 4 we introduce unified change management (UCM) using ClearCase UCM and ClearQuest, including design considerations for an effective UCM implementation, and how UCM is used to manage complexity by raising the level of abstraction. In Part 5 we describe how to do parallel development in multiple geographical locations using ClearCase and ClearQuest MultiSite, including detailed procedures for planning and implementing MultiSite for a UCM environment.
    Note: "December 2004.". - "This edition applies to IBM Rational ClearCase and MultiSite Version 2003.06.00 and IBM Rational ClearQuest and MultiSite Version 2003.06.00. Some information about Version 06.13 is included.". - Text enhanced by pdf downloads. - Title from title screen. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xl, 275 p. , ill. ; , 24 cm. +
    DDC: 006.6/8
    Keywords: Microsoft Visio ; Business ; Data processing ; Computer graphics ; Electronic books ; local
    Abstract: Teach yourself how to diagram business and technical information using Visio 2003-one step at a time! Build exactly the skills you need by working at your own pace through easy-to-follow lessons and hands-on practice files on CD.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xii, 242 p. , col. ill. ; , 24 cm
    DDC: 778.5/35/02855369
    Keywords: Microsoft Windows Movie Maker ; Motion pictures ; Editing ; Data processing ; Electronic books ; local
    Abstract: Express your creativity and share home movies with this fun and focused guide to Microsoft Windows Movie Maker 2. Discover how to create and edit great footage; create special effects; add music and narration; and more!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft Exchange server ; Client/server computing ; Electronic books ; local
    Abstract: This comprehensive, daily-operations guide provides the hands-on information you need to install, configure, and manage Microsoft Exchange Server 2003.
    Note: Includes index. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft Project ; Project management ; Computer programs ; Electronic books ; local
    Abstract: Take your Microsoft Project experience to the next level! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and handy workarounds for Project 2003 in concise, fast-answer format.
    Note: "Body Part No. X10-00045.". - Includes index and link to CD content. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Java (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Bridge the gap between the Microsoft .NET Framework and Java 2 Enterprise Edition (J2EE) by implementing the best interoperability solutions available today-and by learning to build compatible solutions and workarounds of your own.
    Note: Includes index. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft Office ; Business ; Computer programs ; Electronic books ; local
    Abstract: The definitive reference for deploying and supporting Microsoft Office 2003 Editions straight from the source. Get detailed technical guidance plus essential tools on CD, all designed to help save time and reduce ownership and support costs.
    Note: Includes index and link to CD content. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: lxxviii, 908 p. , ill. ; , 24 cm. +
    Edition: 2003 ed.
    Series Statement: Step by step
    DDC: 005.369
    Keywords: Microsoft Office ; Business ; Computer programs ; Electronic books ; local
    Abstract: Build exactly the skills you need to succeed with Microsoft Office 2003-one step at a time! Self-paced lessons and exercises teach you to easily create great documents, spreadsheets, e-mail messages, slide presentations, databases, Web sites, and more.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft Outlook ; Business ; Computer programs ; Electronic mail systems ; Computer programs ; Personal information management ; Computer programs ; Time management ; Computer programs ; Electronic books ; local
    Abstract: Take your Microsoft Outlook experience to the next level! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and handy workarounds for Microsoft Office Outlook 2003 in concise, fast-answers format.
    Note: Includes index and link to CD content. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Indianapolis, IN : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xiv, 490 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/32
    Keywords: Linux ; Electronic data processing personnel ; Certification ; Operating systems (Computers) ; Certification ; Study guides ; Electronic books ; local
    Abstract: This official Novell Press Study Guide is your key to reviewing the fundamentals of installing, running, and administering SUSE LINUX so that you can pass Novell Practicum: 050-069, Novell's Certified Linux Professional exam, and become a Novell CLP. Expert trainer and curriculum developer Emmett Dulaney brings you the practical knowledge, tested techniques, real-world scenarios, and hands-on lab exercises you need to help you get the CLP certification from Novell.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxii, 1094 p. , ill. (some col.) ; , 23 cm. +
    DDC: 006.6/86
    Keywords: Adobe Photoshop ; Computer graphics ; Electronic books ; local
    Abstract: Gary Bouton has made Inside Photoshop CS a perennial best-seller due to the loyalty of his audience. A lot of people simply love the way Gary explains what Photoshop is all about. In this revised edition, Gary truly puts the outsider "inside", demystifying such intangibles as pixels, color wheel, resolution, line screens, and more of vital information for the hobbyists and professional. He covers all the new features and adds expert tips and tricks for the digital photographer. Critics and readers alike have noted that Bouton's writing style makes difficult, technical topics easy to understand -- as if they were being guided by a close friend or mentor.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: x, 268 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering . These techniques will show you how to better understand and work with third-party applications. Each chapter focuses on a technique to solve a specific problem, such as obfuscation in code or scalability vulnerabilities, outlining the issue and demonstrating possible solutions. Summaries at the end of each chapter will help you double check that you understood the crucial points of each lesson. You will also be able to download all code examples and sample applications for future reference from the publisher's website. Let Covert Java help you crack open mysterious codes!
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Indianapolis, IN : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxi, 1002 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.13/3
    Keywords: Business ; Data processing ; Java (Computer program language) ; Electronic books ; local
    Abstract: J2EE has become required knowledge for any serious Java developer, but learning this large and complex specification requires a substantial investment of time and energy. Sams Teach Yourself J2EE in 21 Days, 2/E presents the enterprise Java architecture in accessible, easy-to-comprehend lessons, describing how each J2EE tool solves the challenges of n-Tier development. Using the architecture as a roadmap, chapters describe Enterprise JavaBeans (EJB), JavaServer Pages (JSP), Java Servlets, and more, giving readers a full understanding of J2EE development. Further chapters cover the role of XML, custom JSP tags, creating J2EE Web Services, and how Java Connectors allow J2EE applications to interact with legacy and non-Java systems. The book finishes with sample applications which put all the pieces together, including an example using J2EE to create Web Services. Along the way, every concept is illustrated with practical, real-world examples to ensure understanding by Java students as well as experts.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxxv, 536 p. , ill. ; , 24 cm
    Edition: Panther ed (2nd ed).
    Keywords: Mac OS ; Macintosh (Computer) ; Programming ; Electronic books ; local
    Abstract: Mac OS X has captured the attention of consumers and programmers alike with its ability to run existing Mac programs along with Unix and Open Source software. The latest version, Panther, includes more than a hundred new features and improves many of the technologies underlying Mac OS X, including graphics and the Unix-based core. With more than 500 power tips and tricks for Mac aficionados like yourself, Mac OS X Power Hound , Panther Edition helps you unleash the power of Panther. Mac OS X Panther is a complex and powerful operating system with a personality all its own. To make your computing experience with Panther as efficient and enjoyable as possible, you need to learn its secrets, appreciate its idiosyncrasies, and be able to customize it to your needs and wants. Author Rob Griffiths shows you how. Creator and editor of the extremely popular Mac OS X Hints Web site ( www.macosxhints.com ), Griffiths knows Panther inside and out. His Mac OS X Power Hound lifts the hood on the sleek and elegant, Formula-One-powered operating system and delivers over 500 high-octane secrets in every conceivable category, including the Desktop and Finder, iApps, Mac OS X programs, Mastering the system and Terminal, and much more. Consider this book your pit crew, helping you find easier, faster, and better ways of using the Finder, the Dock, the assortment of programs that come with Mac OS X, and a bunch of programs that don't. And if you want to become your own master mechanic, it also includes two rich chapters on Unix, the engine under Mac OS X's hood. With this collection of stand-alone hints, notes, tips, and tricks--every one of them organized, indexed, tested for compatibility with the latest version of Mac OS X 10.3, and, in many cases, illustrated--you'll rapidly progress from an anybody-can-do-this user to a power user.
    Note: "Originally published by Pogue Press, LLC., under the title, Mac OS hints: Jaguar edition.". - "Revised edition of Mac OS X Hints" -- Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Sebastopol, CA. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 294 p. , ill. ; , 24 cm
    DDC: 005.36
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Electronic books ; local
    Abstract: On the surface, it doesn't appear as if much in Excel 2003 has changed. There are a handful of new objects and the user interface is largely the same. But beyond a superficial glance, you'll see that there are fundamental shifts implied by the new features: Lists, XML, web services, .NET, and InfoPath build a framework for entirely new ways to exchange data with Excel. In fact, that's much of what Excel 2003 is all about--solving problems that deal with teamwork-- collecting and sharing data, programming across applications, and maintaining security. The latest in our Developer's Notebook series, this guide introduces intermediate to advanced Excel VBA programmers to the newest programming features of Excel 2003,--focusing just on what's new--so you can get up to speed quickly. Light on theory and long on practical application, the book takes you directly to the topics you'll want to master through a series of hands-on projects. With dozens of practical labs, you'll be able to decide for yourself which new aspects of Excel will be useful or not in your own work. And best of all, you won't have to buy an expensive revision of a legacy Excel programming tutorial to learn about the new features--if they're covered there at all. Excel 2003 Programming: A Developer's Notebook shows you how to work with lists and XML data, secure Excel applications, use Visual Studio Tools for Office, consume Web Services, and collect data with Infopath. Each chapter is organized into a collection of labs, each of which addresses a specific programming problem. You can follow along to complete the lab on your own, or jump ahead and use the samples the author has built for you. The new Developer's Notebooks series from O'Reilly covers important new tools for software developers. Emphasizing example over explanation and practice over theory, they focus on learning by doing--you'll get the goods straight from the masters, in an informal and code-intensive style that suits developers. If you've been curious about Excel 2003, but haven't known where to start, this no-fluff, lab-style guide is the solution.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 177 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Series Statement: The developer's notebook series
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Java 5.0, code-named "Tiger", promises to be the most significant new version of Java since the introduction of the language. With over a hundred substantial changes to the core language, as well as numerous library and API additions, developers have a variety of new features, facilities, and techniques available. But with so many changes, where do you start? You could read through the lengthy, often boring language specification; you could wait for the latest 500 page tome on concepts and theory; you could even play around with the new JDK, hoping you figure things out--or you can get straight to work with Java 5.0 Tiger: A Developer's Notebook . This no-nonsense, down-and-dirty guide by bestselling Java authors Brett McLaughlin and David Flanagan skips all the boring prose and lecture, and jumps right into Tiger. You'll have a handle on the important new features of the language by the end of the first chapter, and be neck-deep in code before you hit the halfway point. Using the task-oriented format of this new series, you'll get complete practical coverage of generics, learn how boxing and unboxing affects your type conversions, understand the power of varargs, learn how to write enumerated types and annotations, master Java's new formatting methods and the for/in loop, and even get a grip on concurrency in the JVM. Light on theory and long on practical application, Java 5.0 Tiger: A Developer's Notebook allows you to cut to the chase, getting straight to work with Tiger's new features. The new Developer's Notebooks series from O'Reilly covers important new tools for software developers. Emphasizing example over explanation and practice over theory, they focus on learning by doing--you'll get the goods straight from the masters, in an informal and code-intensive style that suits developers. If you've been curious about Tiger, but haven't known where to start, this no-fluff, lab-style guide is the solution.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 343 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: You've probably heard the buzz about Eclipse, the powerful open source platform that gives Java developers a new way to approach development projects. It's like a shiny new car--no longer content to just admire Eclipse, you're now itching to get in and drive. Eclipse is to Java developers what Visual Studio is to .NET developers--it's an integrated development environment (IDE) that combines a code editor, compiler, debugger, text editor, graphical user interface (GUI) builder, and other components into a single, user-friendly application. It provides a solid foundation that enables Java developers to construct and run integrated software-development tools for web development, application design, modeling, performance, testing, and much more. As with any extensive programming tool, however, there's a lot to learn. And there s no better guy than well-known Java expert Steve Holzner to teach you. An award-winning and best-selling author who has been writing about Java topics since the language first appeared, Holzner delivers just the kind of targeted, practical, everyday knowledge you need to hone your mastery of Eclipse. Perfect as a companion to an Eclipse programming tutorial (such as Holzner's own Eclipse , O'Reilly, April 2004) or an ideal stand-alone for all those developers who either don't want or don't need the tutorial approach, the Eclipse Cookbook contains task-oriented recipes for more than 800 situations you may encounter while using this new Java platform--from deploying a web application automatically to reverse engineering compiled code, from re-naming all references to a class across multiple packages to initializing the SWT JNI libraries. Each recipe in the ever-popular and utterly practical problem-solution-discussion format for O'Reilly cookbooks contains a clear and thorough description of the problem, a brief but complete discussion of a solution, and in-action examples illustrating that solution. The Eclipse Cookbook will satiate Java programmers at all levels who are ready to go beyond tutorials--far beyond writing plug-ins and extensions--and actually use the powerful and convenient Eclipse day to day.
    Note: "Covers Eclipse 3.0"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Beijing ; : Pogue Press/O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 646 p. , ill. ; , 24 cm
    Keywords: iLife ; Interactive multimedia ; Macintosh (Computer) ; Electronic books ; local
    Abstract: iLife '04: The Missing Manual gives you everything you need to unleash your creative genius with iLife '04, a suite of five programs (available at the Apple store and preinstalled on all new Macs) that is revolutionizing the way we work--and play. Everybody's talking about Apple's unparalleled software package for digital music, photography, video, and DVD creation: iTunes 4.6 is digital jukebox software for Mac (and even Windows!) that rips songs from your music CDs onto your hard drive, organizes and plays your music collection, lets you buy songs from the iTunes Music Store, and syncs all your music with your iPod. iPhoto 4 pulls photos from your digital camera and then helps you organize and present them--as a slideshow, Desktop picture, screen saver, email attachment, Web page, DVD, printout, or hardbound photo book. iMovie 4 turns those old, seemingly endless home movies that bore everyone to tears into short, fun, tightly edited highlight reels that friends and family actually beg to watch. iDVD 4 transforms your iMovie productions and digital slideshows into Hollywood-style DVDs that play on everyday DVD players. GarageBand is the all-new program that turns your Mac into a digital music-recording studio. David Pogue, computer columnist for the New York Times and creator of our Missing Manual series (you know, those indispensable books that should have been in the box), wants to make sure there's nothing standing between you and professional-caliber music, photos, movies, and more. His authoritative, witty, all-inclusive iLife '04: The Missing Manual gives you the essentials of every program in the iLife '04 suite. Pogue highlights the newest features and improvements, covers the capabilities and limitations of each program, and delivers, in one volume, countless goodies you won't find anywhere else: undocumented tips, tricks, and secrets for getting the very best performance out of each and all of these life-changing new applications. iLife '04: The Missing Manual : it's your guide to livin the iLife!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 426 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Microsoft Windows server ; Security measures ; Handbooks, manuals, etc ; Computer networks ; Security measures ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: With the success of computer viruses like Slammer, security issues are now a top priority for Windows system administrators, right alongside day-to-day tasks such as setting up accounts and managing performance. If you use Windows 2003 Server at a small to medium-sized organization, or use Microsoft's Small Business Server, this thorough yet concise tutorial offers the hands-on advice you need for securing your network. Modern network operating systems include bundled services that range from traditional file and print sharing and Internet services to authentication, directory and remote access services each a potential security vulnerability as well as a capability. Securing Windows Server 2003 shows you how to put Windows security tools to work, and how to run the server's subsystems to protect users and resources. But that's just the beginning. Network security needs to be well thought-out, not treated as a fire drill when a threat occurs. This book focuses primarily on ways to plan and implement a secure operating environment. Microsoft security veteran Mike Danseglio uses real-world examples to show you how various security concepts relate to your own system, including: File System Security Group Policy and security templates Running secure code Authentication IP security Public Key Certificates and Public Key Infrastructure Smart Card technology DHCP and DNS security Internet Information Services security Active Directory security Remote access security Security audits Sending secure email, and more Many chapters include a debate, in which fictional protagonists discuss the pros and cons of a particular strategy or solution. These debates provide an objective look at competing methodologies, so you can select the solutions that best fit your network. Read this book cover to cover to create and implement a security plan, or use individual chapters as stand-alone lessons. Either way, Securing Windows Server 2003 will guide you safely through the morass of security threats.
    Note: "Hands-on advice for securing and implementing Windows server 2003"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xx, 309 p. , ill. (chiefly col.) ; , 23 cm
    Edition: 1st ed.
    DDC: 775
    Keywords: Photography ; Digital techniques ; Electronic books ; local
    Abstract: Your digital camera is more than new incarnation of your old film camera. Yes, it still produces photos, but it also offers new outlets for creativity, including instant gratification of seeing your photos now, the ability to experiment without worrying about expense, the technology to fine-tune your photos with advanced professional techniques, and the means to share your work instantaneously with anyone, anyplace in the world. It's no wonder that digital cameras are outselling traditional cameras for the first time ever. But the question most digital camera users ask is this, "How do I get from taking 'decent' photos to doing the things I'd really like to do? How do I tap into that potential?" Digital Photography Hacks is your passport to taking the kind of digital photos you've always aspired to. Written by Derrick Story, photographer and author of Digital Photography Pocket Guide and other books, it goes beyond the standard fare of most digital photography books--such as camera basics, understanding memory cards, and when to use a flash--to the things that professional photographers have learned through thousands of shots' worth of experience, years of experimentation, and fiddling and hacking. The book includes a foreword by photographer Rick Smolan, author of America 24/7. With exquisite, full-color photos throughout, the book presents a collection of tips, tricks, and techniques for photographers ready to move beyond the basics. And if you don't have the latest in digital camera photography, this book will show you how to extend the life and functionality of your existing camera. All the hacks in the book are platform-agnostic, designed for use on both Mac on Windows-based computers. You'll find 100 proven techniques in the areas of: Daytime and nighttime photo secrets Flash magic Digital camera attachments The computer connection Photoshop magic Fun photo projects Camera phone tricks This book is for the photographer you are now, and the one you want to be. Digital Photography Hacks is for the creative adventurer who resides in each of us.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Sebastopol, CA : Pogue Press/O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: x, 349 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 006.5
    Keywords: iTunes ; iPod (Digital music player) ; Electronic books ; local
    Abstract: The iPod is the world's bestselling music player. But if you think that it's just a music player, then you must think Clark Kent is just a newspaperman. In this freshly updated edition, New York Times tech columnist J. D. Biersdorfer blows open the secret doors of this gleaming, chrome-and-white beauty. With humor and authority, she lays bare an astonishing collection of useful tips, tricks, and shortcuts like these: iPod as PalmPilot . The iPod can suck in your calendar, address book, to-do list, and notes from a Mac or PC, and then display them at the touch of a button. It also doubles as an alarm clock and stopwatch. iPod as hard drive . You can use your iPod to carry gigantic files from place to place. iPod as e-book . The iPod makes an excellent book reader, capable of scrolling through recipes, driving directions, and even Web pages. iPod as GameBoy . The iPod's games are perfect time-killers for waiting rooms, bus rides, and the Department of Motor Vehicles. iPod & iTunes: The Missing Manual , 2nd Edition is much more than it seems, too. It not only covers all iPod models for both Mac and Windows, including the iPod Mini, it's also the ultimate guide to the iTunes software, MusicMatch Jukebox, and the new iTunes Music Store for both Mac and Windows. No matter what kind of music moves you, iPod & iTunes: The Missing Manual , 2nd Edition will help you get much more out of your iPod--and much more into it.
    Note: "Covers iTunes Music Store (Mac & PC) and the iPod Mini"--Cover. - "Juiciest secrets of Apple's pocket virtuoso"--Cover. - Includes index. - Rev. ed. of: iPod : the missing manual / J.D. Biersdorfer. 2003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 450 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.3
    Keywords: Apache (Computer file : Apache Group) ; JavaServer pages ; Application software ; Development ; Internet programming ; Struts framework ; Web site development ; Electronic books ; local
    Abstract: While the look and feel of an enterprise web application is certainly important, developers usually find themselves spending far too much time on the front-end presentation before they can get to coding the good stuff--the business logic at the heart of the program. Jakarta Struts addresses this issue by combining Java Servlets, Java ServerPages (JSP), custom tags, and messaging resources (like Java Message Service) into a unified, re-usable framework. The result is a cooperative, synergistic platform that's efficient and suitable for independent developers, large development teams, and everyone in between. The Struts Framework has become a highly popular open source project, but there's still woefully little documentation on the technology. What does exist is far too basic and lacks critical information for developers like you writing today's complex web applications. The revised and expanded Programming Jakarta Struts , 2nd Edition covers everything the successful earlier edition did--including an overview of the concepts involved in writing web applications; installation and configuration instructions for getting Struts up and running; a thorough discussion of how Struts implements the Model-View-Controller (MVC) design paradigm (known as the Model 2 approach) and how to interface with that pattern in your own applications; Logging, Validation, and Exception Handling with Struts; using Tiles; writing internationalization and localization code using Struts; and practical, real-world best practices for web applications--as well as plenty more: now fully up to date with Struts 1.1, this edition covers the latest material on tag libraries and the new JavaServerFaces (JSF) APIs and even includes all-new chapters on JSF, JSTL/EL, and security. With each enterprise system he s developed, author Chuck Cavaness has spent many grueling hours learning invaluable lessons about Struts and figuring out the dos and the don'ts of building web applications. He saves you time and headaches by sharing that invaluable real-world experience here, with his realistic, practical, here's how to do it approach to using the Struts Framework to its fullest potential.
    Note: "Building Web applications with servlets and JSPs"--cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 472 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: The vast majority of Oracle SQL books discuss some syntax, provide the barest rudiments of using Oracle SQL, and perhaps include a few simple examples. It might be enough to pass a survey course, or give you some buzz words to drop in conversation with real Oracle DBAs. But if you use Oracle SQL on a regular basis, you want much more. You want to access the full power of SQL to write queries in an Oracle environment. You want a solid understanding of what's possible with Oracle SQL, creative techniques for writing effective and accurate queries, and the practical, hands-on information that leads to true mastery of the language. Simply put, you want useful, expert best practices that can be put to work immediately, not just non-vendor specific overview or theory.Updated to cover the latest version of Oracle, Oracle 10g, this edition of the highly regarded Mastering Oracle SQL has a stronger focus on technique and on Oracle's implementation of SQL than any other book on the market. It covers Oracle s vast library of built-in functions, the full range of Oracle SQL query-writing features, regular expression support, new aggregate and analytic functions, subqueries in the SELECT and WITH clauses, multiset union operators, enhanced support for hierarchical queries: leaf and loop detection, and the CONNECT_BY_ROOT operator, new partitioning methods (some introduced in Oracle9i Release 2), and the native XML datatype, XMLType. Mastering Oracle SQL , 2nd Edition fills the gap between the sometimes spotty vendor documentation, and other books on SQL that just don't explore the full depth of what is possible with Oracle-specific SQL. For those who want to harness the untapped (and often overlooked) power of Oracle SQL, this essential guide for putting Oracle SQL to work will prove invaluable.
    Note: "Covers Oracle database 10g"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xi, 321 p. , col. ill. ; , 25 cm
    DDC: 778.5'93'0285536
    Keywords: Adobe Encore (Computer file) ; DVDs ; Interactive multimedia ; Authoring programs ; Electronic books ; local
    Abstract: If you're looking for an easy and stimulating way to master Adobe Encore DVD and fine-tune your moviemaking skills at the same time, look no further than Adobe Encore DVD: In the Studio . This full-color tutorial will help you push the limits of Adobe Encore DVD by helping you to create highly imaginative designs and projects. Designed primarily for Adobe Creative Suite developers, particularly those using Adobe Premiere and AfterEffects, as well as filmmakers who wish to transfer their projects to DVDs, the book combines practical learning materials and project-based lessons. But Adobe Encore DVD: In the Studio is not your average tutorial. The book draws on the experience of author Doug Dixon--an expert on Adobe Encore DVD, the author of other books on DVD development, and a core member of the product's alpha and beta programs. Well-versed in both the use and design of Adobe Encore DVD, Dixon imbues this O'Reilly Media digital book with the unique perspective of an insider who really knows his pixels. Adobe Encore DVD: In the Studio discusses the protocols involved with DVD files and file systems; pixel aspect ratio issues; common gotchas using both still and motion media; and a plethora of tips and tricks to using dynamic buttons. You'll get up to speed on importing from Photoshop and AfterEffects, making motion video menus available, and looping video and audio. You'll also learn about adding multilingual menus and subtitles, encoding rules, scripting, and even placing Easter eggs in a DVD! By studying this comprehensive, hands-on tutorial, you will be able to quickly and efficiently develop professional-looking DVDs studded with special effects worthy of a Hollywood studio.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: 371 s. ; , 24 cm
    DDC: 006.3'0247948
    Keywords: Artificial intelligence ; Artificial intelligence ; Computer games ; Design ; Computer games ; Programming ; Computer programming ; Electronic books ; local
    Abstract: Advances in 3D visualization and physics-based simulation technology make it possible for game developers to create compelling, visually immersive gaming environments that were only dreamed of years ago. But today's game players have grown in sophistication along with the games they play. It's no longer enough to wow your players with dazzling graphics; the next step in creating even more immersive games is improved artificial intelligence, or AI.Fortunately, advanced AI game techniques are within the grasp of every game developer--not just those who dedicate their careers to AI. If you're new to game programming or if you're an experienced game programmer who needs to get up to speed quickly on AI techniques, you'll find AI for Game Developers to be the perfect starting point for understanding and applying AI techniques to your games.Written for the novice AI programmer, AI for Game Developers introduces you to techniques such as finite state machines, fuzzy logic, neural networks, and many others, in straightforward, easy-to-understand language, supported with code samples throughout the entire book (written in C/C++). From basic techniques such as chasing and evading, pattern movement, and flocking to genetic algorithms, the book presents a mix of deterministic (traditional) and non-deterministic (newer) AI techniques aimed squarely at beginners AI developers. Other topics covered in the book include: Potential function based movements: a technique that handles chasing, evading swarming, and collision avoidance simultaneously Basic pathfinding and waypoints, including an entire chapter devoted to the A* pathfinding algorithm AI scripting Rule-based AI: learn about variants other than fuzzy logic and finite state machines Basic probability Bayesian techniques Unlike other books on the subject, AI for Game Developers doesn't attempt to cover every aspect of game AI, but to provide you with usable, advanced techniques you can apply to your games right now. If you've wanted to use AI to extend the play-life of your games, make them more challenging, and most importantly, make them more fun, then this book is for you.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 691 s
    Edition: 2. ed.
    Keywords: Database management ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: SQL in a Nutshell applies the eminently useful "Nutshell" format to Structured Query Language (SQL), the elegant--but complex--descriptive language that is used to create and manipulate large stores of data. For SQL programmers, analysts, and database administrators, the new second edition of SQL in a Nutshell is the essential date language reference for the world's top SQL database products. SQL in a Nutshell is a lean, focused, and thoroughly comprehensive reference for those who live in a deadline-driven world.This invaluable desktop quick reference drills down and documents every SQL command and how to use it in both commercial (Oracle, DB2, and Microsoft SQL Server) and open source implementations (PostgreSQL, and MySQL). It describes every command and reference and includes the command syntax (by vendor, if the syntax differs across implementations), a clear description, and practical examples that illustrate important concepts and uses. And it also explains how the leading commercial and open sources database product implement SQL. This wealth of information is packed into a succinct, comprehensive, and extraordinarily easy-to-use format that covers the SQL syntax of no less than 4 different databases.When you need fast, accurate, detailed, and up-to-date SQL information, SQL in a Nutshell , Second Edition will be the quick reference you'll reach for every time. SQL in a Nutshell is small enough to keep by your keyboard, and concise (as well as clearly organized) enough that you can look up the syntax you need quickly without having to wade through a lot of useless fluff. You won't want to work on a project involving SQL without it.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Language: English
    Pages: xxx, 337 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 004.36
    Keywords: Computer architecture ; Information technology ; Middleware ; Electronic books ; local
    Abstract: The challenges of designing, building, and maintaining large-scale, distributed enterprise systems are truly daunting. Written by and for IT professionals, IT Architectures and Middleware, Second Edition, will help you rise above the conflicts of new business objectives, new technologies, and vendor wars, allowing you to think clearly and productively about the particular challenges you face. This book focuses on the essential principles and priorities of system design and emphasizes the new requirements emerging from the rise of e-commerce and distributed, integrated systems. It offers a concise overview of middleware technology alternatives and distributed systems. Numerous increasingly complex examples are incorporated throughout, and the book concludes with some short case studies. Topics covered include: Middleware technology review Key principles of distributed systems: resiliency, performance and scalability, security, and systems management Information access requirements and data consistency Application integration design Recasting existing applications as services In this new edition, with updates throughout, coverage has been expanded to include: Service-oriented architecture concepts Web services and .NET technology A more structured approach to system integration design
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 510 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 778.59
    Keywords: Digital cinematography ; Handbooks, manuals, etc ; Digital video ; Editing ; Handbooks, manuals, etc ; Video recordings ; Production and direction ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: You never thought you'd be shooting a corporate training video as part of your job as HR manager, but, well here you are--with a camcorder, a directive, and not a clue how to begin! You--and the many people who find themselves in similar situations--need this volume! Realizing that you're expected to provide professional results regardless, the authors of this volume dig deep into every phase of the DV production process: from capturing images and sound to editing, post-processing, adding special effects, and distributing the final product. Special emphasis is placed on the industrial-strength techniques that will get you up to speed quickly on the hardware and software advances that have occurred since the last edition. You'll find new sections on shooting and post-processing film-look (24p) and HDTV video, as well as special coverage of the latest eye-popping special effects. A companion DVD includes demo video clips, award-winning short films, interviews with DV pros, and lots more goodies.
    Note: Includes bibliographical references (p. 479-488) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Note: Includes bibliographical references (p. 321-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: Consistent, high-quality coding standards improve software quality, reduce time-to-market, promote teamwork, eliminate time wasted on inconsequential matters, and simplify maintenance. Now, two of the world's most respected C++ experts distill the rich collective experience of the global C++ community into a set of coding standards that every developer and development team can understand and use as a basis for their own coding standards. The authors cover virtually every facet of C++ programming: design and coding style, functions, operators, class design, inheritance, construction/destruction, copying, assignment, namespaces, modules, templates, genericity, exceptions, STL containers and algorithms, and more. Each standard is described concisely, with practical examples. From type definition to error handling, this book presents C++ best practices, including some that have only recently been identified and standardized-techniques you may not know even if you've used C++ for years. Along the way, you'll find answers to questions like What's worth standardizing--and what isn't? What are the best ways to code for scalability? What are the elements of a rational error handling policy? How (and why) do you avoid unnecessary initialization, cyclic, and definitional dependencies? When (and how) should you use static and dynamic polymorphism together? How do you practice "safe" overriding? When should you provide a no-fail swap? Why and how should you prevent exceptions from propagating across module boundaries? Why shouldn't you write namespace declarations or directives in a header file? Why should you use STL vector and string instead of arrays? How do you choose the right STL search or sort algorithm? What rules should you follow to ensure type-safe code? Whether you're working alone or with others, C++ Coding Standards will help you write cleaner code--and write it faster, with fewer hassles and less frustration.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 236 p. , ill. ; , 24 cm
    DDC: 025.04
    Keywords: Internet addresses ; Internet searching ; Search engines ; Web search engines ; Web sites ; Electronic books ; local
    Abstract: Best-selling author and research expert Tara Calishain offers her insider tips and tricks for web searching in this title from Prentice Hall PTR's Garage Series. The book begins with an in-depth look at search engines and other online tools such as browsers. It describes several principles of web searching to help you leverage the scope of the Internet to discover information. The book also covers specific topic areas of Internet searching, both domestically and internationally. Finally, Web Search Garage includes a special technical support section to teach you how to find the support solutions you need on the Internet. Specific topics covered include Search engines Browsers The principles of web searching Searching for news, jobs, and local information Finding images and audio on the web Searching for people Genealogy research Consumer help Drugs and medical information Kid-safe searching Whether you're a newbie or an Internet search guru, Web Search Garage is a valuable resource for using the Internet wisely to find the information you're looking for. Calishain's thorough explanations and examples, combined with her entertaining wit will help you fine-tune your skills and search the Internet to find convenient solutions.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxii, 550 p. , ill. ; , 25 cm. +
    Edition: 2nd ed.
    DDC: 005.75/85
    Keywords: IBM Database 2 ; Database management ; SQL (Computer program language) ; Electronic books ; local
    Abstract: IBM's definitive guide to writing DB2 SQL PL stored procedures, triggers, UDFs, and dynamic compound SQL Fully updated to reflect the entire DB2 UDB product family, and new SQL PL improvements for Windows, UNIX, Linux, iSeries, and zSeries Presents expert tips and best practices drawn from extensive experience in real customer environments Covers everything from basic program structure through advanced techniques Includes up-to-the-minute coverage of optimization and troubleshooting Using the IBM DB2 SQL Procedural Language (SQL PL), programmers can drive major improvements in database performance, manageability, and time-to-market. Now, IBM's own experts present the definitive guide to DB2 SQL PL development on any platform: Windows, UNIX, Linux, iSeries, or zSeries. DB2 SQL PL, Second Edition shows developers how to take advantage of every facet of the SQL PL language and development environment. The authors offer up-to-the-minute coverage, best practices, and tips for building basic SQL procedures, writing flow-of-control statements, creating cursors, handling conditions, and much more. Along the way, they illuminate advanced features ranging from stored procedures and triggers to user-defined functions. The only book to combine practical SQL PL tutorials and a detailed syntax reference, DB2 SQL PL, Second Edition draws on the authors' unparalleled expertise with SQL PL in real business environments. Coverage includes Using SQL PL to improve manageability and performance, while clearly separating DBA and development roles Writing more efficient stored procedures, triggers, user-defined functions (UDFs), and dynamic compound SQL Identifying SQL PL performance bottlenecks--and resolving them Leveraging new language enhancements for Windows, UNIX, and Linux: improved table function support, session based locking, nested save points, new prepare options, and more Using new features for iSeries V5R3: built-in string and date/time manipulation functions, SEQUENCE objects, and more Utilizing zSeries Version 8's integrated stored procedures debugging and improved SQL Conditions support Mastering DB2 Development Center, the unified development environment for creating DB2 stored procedures Whether you're developing new SQL PL applications, migrating or tuning existing applications, or administering DB2, you'll find this book indispensable.
    Note: "DB2. Information management software.". - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    ISBN: 0131433490
    Language: English
    Pages: xxvi, 530 p. , ill. ; , 24 cm
    DDC: 005.4/3
    Keywords: HP-UX ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Maximize the performance and value of any HP-UX 11i system HP-UX 11i Tuning and Performance takes the guesswork out of maximizing HP-UX 11i performance-so you can quickly maximize the value of any HP-UX system in any environment. Leading HP experts introduce a comprehensive, systematic performance management methodology that addresses every stage in the lifecycle of an HP-UX system. You'll find specific metrics, symptoms and solutions for every key element of an HP-UX 11i system, including hardware, the OS platform, and application development. From start to finish, the emphasis is on practical results-and on understanding the real-world cost/benefit tradeoffs that are central to every tuning project. Coverage includes: A comprehensive optimization methodology, direct from HP's performance labs New optimization opportunities and techniques made possible by HP-UX 11i All-new chapters on network performance and Java performance Rules of thumb for more cost-effective performance management Instrumenting HP-UX 11i systems to accurately reflect reality Choosing the right performance metrics, and using them correctly Key performance tradeoffs in both uniprocessor and SMP environments Practical techniques for resolving CPU, memory, and disk bottlenecks How to make the most of HP-UX specific and generic UNIX performance tools Performance enhancements available through compiler optimization and application profiling Extensive examples from actual HP performance consulting assignments Whether you're an HP-UX 11i sysadmin, netadmin, developer, capacity planner, or performance specialist, this is your complete guide to getting all the performance you paid for!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Pearson Education | Boston, MA :Safari,
    Language: English
    Pages: xxii, 340 p. , ill. ; , 24 cm
    DDC: 621.3845/6
    Keywords: Mobile communication systems ; Design and construction ; Electronic books ; local
    Abstract: Delivering high-value mobile applications-from start to finish This is the definitive guide to building successful mobile applications. It covers every facet of development and deployment, including business issues, architectural design, integration with existing web and legacy applications, and the management of mobile application development projects. It also presents three application case studies that demonstrate best practices at work in real projects. Coverage includes: Requirements, design, development, integration, testing, release, and maintenance "Mobilizing" existing application architectures Building effective user interfaces for mobile applications Fat-client and thin-client scenarios Managing client-server data transfer Securing mobile applications: authentication, encryption, and data self-destruction Full Microsoft .NET code examples for cell phones, Pocket PCs, and Tablet PCs Mobile Applications is indispensable for everyone who needs to deliver robust, high-value mobile solutions: project managers, technical leaders, architects, and experienced developers alike.
    Note: "Hewlett Packard.". - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Upper Saddle River, NJ. : Financial Times/Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xviii, 250 p. , ill. ; , 24 cm
    Keywords: Capital investments ; Risk management ; Success in business ; Electronic books ; local
    Abstract: Minding the Corporate Checkbook: A Manager's Guide for ExecutingSuccessful Business Investments Steven R. Kursh, Ph.D. "I agree strongly with the author that Return on Investment (ROI) is notby itself a sufficient justification for most of today's businessinvestments, particularly those that involve a large amount of'gut-based' emotional decisions. This book provides a defensible,repeatable, and transferable decision-making process that will help thereader become more effective when spending his company's money." -Michael Hoch, Research Director, Aberdeen Group "This book does a great job laying out the importance of consideringmore than just the pure 'ROI numbers' of an investment, and forces youto think about the implementation and follow-up needed. It should beread by anyone who has the opportunity or ability to change the waycapital is invested." -Jim Connelly, Regional Vice President of Finance, MariottInternational, Inc. " Minding the Corporate Checkbook reaffirms the notion that businessvalue is brought about by successful execution and continuedsupervision, and not solely determined by preliminary due diligence. Thescope of this book is applicable to internal corporate endeavors, aswell as a variety of other investments. After reading this book, I findmyself applying these execution and post-investment managementtechniques to a variety of my venture capital deals, as well as betterassessing new investment opportunities through more pragmatic exitstrategy evaluations." -Rudolph J. Morando Jr., Associate, Rex Capital Advisors, LLC "This is a very lucidly written book that provides a new qualitativeframework for business decision-making.The primary contribution is toprovide a decision-maker with a process that can be used to complementexisting (and often abused) financial-number-driven analysis.The authorhas provided a very helpful and effective resource for practitioners-both managers and consultants-and people who are regularly inundated bynumbers but may not have the time to put these numbers in the context ofa particular capital decision-making process." -Dr. Atreya Chakraborty, Senior Consultant,The Brattle Group "Through consulting, I have witnessed far too many failedinvestments-and even worse, failing companies!-that could have beenavoided by applying the lessons contained in this book. Anyone can readthis book and apply the tools his type of investment analysis." -Jack Mazur, Senior Financial Consultant, Parson Consulting "Projec...
    Note: Includes bibliographical references (p. 235-238) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Language: English
    Pages: xxx, 654 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: OpenView ; Client/server computing ; Computer networks ; Management ; Electronic books ; local
    Abstract: OpenView System Administration Handbook: Network Node Manager, Customer Views, Service Information Portal, OpenView Operations Tammy Zitello Deborah Williams Paul Weber Use OpenView tools to improve network performance, availability, and value Planning, installation, customization, security, optimization, scalability, troubleshooting, and more "I would recommend this book to my students." --Emil Velez, Technical Consultant - Education, HP The comprehensive, authoritative guide to OpenView administration This is the first comprehensive, hands-on guide to using OpenView administration tools to maximize network performance, availability, and value. You'll find expert guidance on planning, customization, automation, security, optimization, troubleshooting, and a whole lot more. After a practical review of network management and SNMP, three HP consultants walk you through using Network Node Manager (NNM) to monitor network connectivity -- and adapting NNM to your unique requirements. Next, you'll discover how to use Customer Views (CV) containers to manage your most important resources, from customers to Internet sites. The authors offer realistic guidance on managing networks across the Web using HP's Service Information Portal, and on monitoring computers and software with OpenView Operations (OVO). Coverage includes: Overcoming obstacles to successful network and system management Planning for deployment: a best-practices checklist Running NNM: discovery, symbols, objects, alarms, and queries Customizing NNM: submaps, application integration, custom symbols/fields, and more CV: providing a logical view of devices based on customer ownership SIP: making management information Web-accessible, step-by-step Managing data collection and event configuration Scalability and distribution: remote consoles, filters, and Distributed Internet Monitoring Roles, service levels, installation, configuration, agents, policies, and day-to-day administration Taking full advantage of Smart Plug-Ins (SPI) Improving flexibility by adding Multiple Management Servers Includes OpenView Command Quick Reference Guide If you're a network/system administrator running OpenView under HP-UX, Unix, or Windows, OpenView System Administration Handbook will make you more productive, more effective, and more valuable. COMPANION WEB SITE Contains scripts and files to simplify and automate OpenView administration PRENTICE HALL Upper Saddle River, NJ 07458 http://www.phptr.com ISBN: 0...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xv, 339 p. , ill. ; , 24 cm
    DDC: 658.8/7
    Keywords: eBay (Firm) ; Electronic commerce ; Management ; Internet auctions ; Electronic books ; local
    Abstract: A real-world business book for the explosion of eBay entrepreneurs! Absolute Beginner's Guide to Launching an eBay Business guides you step-by-step through the process of setting up an eBay business, and offers real-world advice on how to run that business on a day-to-day basis and maximize financial success. This book covers determining what kind of business to run, writing an action-oriented business plan, establishing an effective accounting system, setting up a home office, obtaining starting inventory, arranging initial funding, establishing an eBay presence, and arranging for automated post-auction management.
    Note: "No prior eBay experience necessary!". - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xiv, 407 p. , ill. ; , 24 cm
    DDC: 006.6
    Keywords: Microsoft PowerPoint (Computer file) ; Presentation graphics software ; Electronic books ; local
    Abstract: The Absolute Beginner's Guide to Microsoft Office PowerPoint 2003 teaches the reader everything they need to know to create exciting personal and business presentations. Readers learn about new features such as Smart Tags and Packages, and how to create a presentation from scratch or using the design wizard. This book will make novices confident in their use of design templates, animations schemes and much more!
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 953 p. , ill. ; , 23 cm. +
    Edition: Special ed.
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Electronic books ; local
    Abstract: Does your life play out in a spreadsheet? Are numbers in columns and rows what make or break you in the work world? If you answered yes to either of these questions, then Special Edition Using Microsoft Office Excel 2003 is the book that will make it all better. Learn quickly and efficiently from a true Excel master using the tried and true Special Edition Using formula for success. Here, you'll find information that's undocumented elsewhere - even in Microsoft's own Help systems. You'll learn from finely crafted, real-life examples built by an author who lives and dies by the integrity of his spreadsheets. Unlike most CDs pasted into the back of computer books, this is one that rivals the book in terms of value. You receive a FREE copy of Woody's Office Power Pack (WOPR) - the #1 enhancement to Office. This software sells for $49.99 and you get it for free here...no strings attached.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: xiii, 522 p. , ill. ; , 24 cm. +
    Edition: Special ed.
    DDC: 658.8/12/028553
    Keywords: Microsoft CRM ; Customer relations ; Data processing ; Relationship marketing ; Electronic books ; local
    Abstract: A sophisticated yet easy-to-use software program, Microsoft CRM handles the full range of Sales and Customer Service functions, and allows the user to access key customer and sales information from Microsoft Outlook and the Web. It is designed for rapid deployment, ease of use, and integration with Microsoft Office and Microsoft Great Plains' back-office solutions, increasing information reliability, employee usage and productivity. Special Edition Using Microsoft CRM shows sales, service, and business development specialists how to manage small businesses with the sophisticated technology that, until now, has been reserved for large corporations. Based on the author's real-world experience building CRM systems, this book provides the expert advice that MS CRM users need. To make the move to customer-centric operations using MS CRM, companies need an in-depth guide to managing the process, using the software, and making the implementation decisions that are required.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    [Indianapolis, Ind.] : Que Certification | Boston, MA :Safari,
    Language: English
    Pages: xi, 416 p. , ill. ; , 23 cm. +
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Study guides ; Electronic books ; local
    Abstract: Your resource to passing the Cisco CCSP SECUR Certification Exam! Join the ranks of readers who have trusted Exam Cram 2 to their certification preparation needs! The CCSP SECUR Exam Cram 2 (Exam 642-501) is focused on what you need to know to pass the CCSP CSI exam. The Exam Cram 2 Method of Study provides you with a concise method to learn the exam topics. The book includes tips, exam notes, acronyms and memory joggers in order to help you pass the exam. Included in the CCSP SECUR Exam Cram 2: A tear-out "Cram Sheet" for last minute test preparation. Covers the current exam objectives for the 642-501 exam. The PrepLogic Practice Tests, test engine to simulate the testing environment and test your knowledge. Trust in the series that has helped many others achieve certification success - Exam Cram 2 .
    Note: "Exam 642-501."--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvii, 315 p. , ill. ; , 23 cm. +
    DDC: 005.13/3
    Keywords: BEA WebLogic workshop ; Client/server computing ; Java (Computer program language) ; Web services ; Electronic books ; local
    Abstract: BEA WebLogic Workshop 8.1 Kick Start shows you how to make J2EE programming easier, providing the fastest path to productivity with BEA WebLogic Workshop 8.1. The authors show how Workshop leverages the power of BEA WebLogic Platform 8.1, including WebLogic Server, WebLogic Portal, and WebLogic Integration. With BEA WebLogic Workshop 8.1 Kick Start , you'll learn to build J2EE applications and see how each concept works within a real-world online casino application developed over the course of the book. You'll see how Workshop 8.1 facilitates every step of the development process, from design to deployment. The authors' expert insights and tips, along with dozens of practical examples that you can put to use immediately, will have you up and running at full speed in nothing flat. The included CD-ROM contains the Developer's Edition of BEA WebLogic Platform 8.1 (including WebLogic Workshop 8.1) and all the sample code and examples, with a complete version of the casino application developed over the course of the book. In addition you can view the entire book in searchable electronic form.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xiii, 271 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.1/17
    Keywords: Java (Computer program language) ; Microsoft .NET ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0672330164 ISBN-13: 9780672330162 The Object-Oriented Thought Process, Second Edition will lay the foundation in object-oriented concepts and then explain how various object technologies are used. Author Matt Weisfeld introduces object-oriented concepts, then covers abstraction, public and private classes, reusing code, and devloping frameworks. Later chapters cover building objects that work with XML, databases, and distributed systems (including EJBs, .NET, Web Services and more).Throughout the book Matt uses UML, the standard language for modeling objects, to provide illustration and examples of each concept.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxx, 638 p. , ill. ; , 23 cm
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Rather than being a traditional planning, design, and implementation guide, this book is a serious resource for Windows experts to find tips, tricks, and best practices for implementing and supporting key Windows Server 2003 technologies. The authors started working with Windows Server 2003 (then codename Whistler) just days after the code for Windows 2000 was locked, when most organizations were getting a first chance to see the Windows 2000 server product. With more than three years of experience working with Whistler in early beta and production implementations, the authors of this book have provided a resource to help you make Windows 2003 technologies work properly. When given a choice of different ways of implementing the technologies, you can turn to this book for the best practices of successful field implementations. This book is organized into eight parts focusing around a core technological solution area, with several chapters making up each part. Sections include security, management, design, migration, business continuity, performance, and business productivity.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvi, 556 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: C (Computer program language) ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0321566157 ISBN-13: 9780321566157 Programming in Objective-C is a concise, carefully written tutorial on the basics of Objective-C and object-oriented programming. The book makes no assumption about prior experience with object-oriented programming languages or with the C language (upon which Objective-C is based). And because of this, both novice and experienced programmers alike can use this book to quickly and effectively learn the fundamentals of Objective-C. Readers can also learn the concepts of object-oriented programming without having to first learn all of the intricacies of the underlying procedural language (C). This approach, combined with many small program examples and exercises at the end of each chapter, makes it ideally suited for either classroom use or self-study. Growth is expected in this language. At the January 2003 MacWorld, it was announced that there are 5 million Mac OS X users and each of their boxes ships with Objective-C built in.
    Note: Includes bibliographical references (p. [533]-536) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: 146 p. , ill. ; , 21 cm
    DDC: 005.52
    Keywords: Text processing (Computer science) ; Electronic books ; local
    Abstract: RegEx is supported in all major development environments (for use in editing and working with code) and will thus appeal to anyone using these tools. In addition, every JavaScript developer should be using RegEx, but most don't as it has never been taught to them properly before. Developers using ASP, C#, ColdFusion, Java JSP, PHP, Perl, Python, and more can (and should) be using RegEx, and so every one of them is a potential reader too. The reader of this book will learn how to: Match characters sets Match repeating characters (using minimums and maximums if needed) Match (or ignore) based on case Build sub-expressions Use all of the special characters Work with excape sequences Use POSIX classes to simplify complex expressions Use back-references Use look-behind operators Sams Teach Yourself Regular Expressions in 10 Minutes is a tutorial book organized into a series of easy-to-follow 10-minute lessons. These well targeted lessons teach you in 10 minutes what other books might take hundreds of pages to cover. Instead of dwelling on syntax, terminology, and arcane examples and scenarios, this book takes a very hands-on approach to solving the needs of the majority of RegEx users who simply need to manipulate data.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xix, 596 p. , ill. ; , 24 cm
    DDC: 005.75/65
    Keywords: Microsoft Access ; Database management ; Electronic books ; local
    Abstract: In just 24 sessions of one hour or less, the reader picks up all the skills needed to increase the effectiveness and reliability of Access applications. Using a straightforward, step-by-step approach, each lesson builds upon the previous one, allowing the reader to quickly learn the essentials of Access programming from the ground up. The book helps the reader to understand the fundamentals of the Access architecture, gain fast knowledge of the new features that Access offers, learn how to effectively use the latest tools and features of Access by following practical, real-world examples, and get expert tips from the best-selling author, Alison Balter. This book is designed for the way readers learn. They can go through each step-by-step chapter or just choose the lessons that interest them the most.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Indianapolis, IN : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 1445 p. , ill. ; , 23 cm. +
    DDC: 005.2762
    Keywords: BEA WebLogic server ; Web servers ; Electronic books ; local
    Abstract: BEA WebLogic Server Unleashed is the definitive reference work for the WebLogic developer, offering an in-depth look at the capabilities provided by WebLogic Server and illustrating the best development practices. The book covers WebLogic's role in every aspect of a J2EE application: from working with Servlets, JavaServer Pages and Enterprise JavaBeans, to managing distributed systems including transactions with JTA, directory services with JNDI, messaging with JMS, and more. The authors pay special attention to testing, optimizing and debugging within WebLogic, to implementing security features, and to administering WebLogic applications.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 298 , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 566 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    Series Statement: In a nutshell
    Series Statement: Java series
    Keywords: Java (Computer program language) ; Object-oriented programming (Computer science) ; Web servers ; Electronic books ; local
    Abstract: The author of the best-selling Java in a Nutshell has created an entire book of real-world Java programming examples that you can learn from. If you learn best "by example," this is the book for you.This third edition covers Java 1.4 and contains 193 complete, practical examples: over 21,900 lines of densely commented, professionally written Java code, covering 20 distinct client-side and server-side APIs. It includes new chapters on the Java Sound API and the New I/O API. The chapters on XML and servlets have been rewritten to cover the latest versions of the specifications and to demonstrate best practices for Java 1.4. New and updated examples throughout the book demonstrate many other new Java features and APIs. Java Examples in a Nutshell is a companion volume to Java in a Nutshell , Java Foundation Classes in a Nutshell , and Java Enterprise in a Nutshell . It picks up where those quick references leave off, providing a wealth of examples for both novices and experts. This book doesn't hold your hand; it simply delivers well-commented working examples with succinct explanations to help you learn and explore Java and its APIs. Java Examples in a Nutshell contains examples that demonstrate: Core APIs, including I/O, New I/O, threads, networking, security, serialization, and reflection Desktop APIs, highlighting Swing GUIs, Java 2D graphics, preferences, printing, drag-and-drop, JavaBeans, applets, and sound Enterprise APIs, including JDBC (database access), JAXP (XML parsing and transformation), Servlets 2.4, JSP 2.0 (JavaServer Pages), and RMI The book begins with introductory examples demonstrating structured and object-oriented programming techniques for new Java programmers. A special index at the end of the book makes it easy to look up examples that use a particular Java class or accomplish a desired task. In between, each chapter includes exercises that challenge readers and suggest further avenues for exploration.
    Note: Covers Java 2, version 1.4 - cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 723 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/762
    Keywords: JavaServer pages ; Java (Computer program language) ; Servlets ; Web site development ; Electronic books ; local
    Abstract: With literally hundreds of examples and thousands of lines of code, the Java Servlet and JSP Cookbook yields tips and techniques that any Java web developer who uses JavaServer Pages or servlets will use every day, along with full-fledged solutions to significant web application development problems that developers can insert directly into their own applications. Java Servlet and JSP Cookbook presents real-world problems, and provides concise, practical solutions to each. Finding even one tested code "recipe" that solves a gnarly problem in this comprehensive collection of solutions and best practices will save hours of frustration--easily justifying the cost of this invaluable book.But "Java Servlet and JSP Cookbook" is more than just a wealth of cut-and-paste code. It also offers clear explanations of how and why the code works, warns of potential pitfalls, and directs you to sources of additional information, so you can learn to adapt the problem-solving techniques to similar situations.These recipes include vital topics like the use of Ant to setup a build environment, extensive coverage of the WAR file format and web.xml deployment descriptor, file-uploading, error-handling, cookies, logging, dealing with non-HTML content, multimedia, request filtering, web services, I18N, web services, and a host of other topics that frustrate even the most seasoned developers.For Java web developers of all levels who are eager to put into practice the theory presented in other API-focused books, the solutions presented in this practical book will prove invaluable over and over again. This is painless way for less experienced developers who prefer to learn by doing to expand their skills and productivity, while accomplishing practical solutions to the pressing problems they face every day. More experienced developers can use these recipes to solve time-consuming problems quickly, freeing up their time for the more creative aspects of their work.
    Note: Includes bibliographic references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 740 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.2/762
    Keywords: JavaServer pages ; Web site development ; Web sites ; Design ; Electronic books ; local
    Abstract: JavaServer Pages (JSP) has built a huge following since the release of JSP 1.0 in 1999, providing Enterprise Java developers with a flexible tool for the development of dynamic web sites and web applications. While new point releases over the years, along with the introduction of the JSP Standard Tag Library (JSTL), have incrementally improved the rough areas of the first version of the JSP specification, JSP 2.0 takes this technology to new heights. JavaServer Pages , Third Edition, is completely revised and updated to cover the JSP 2.0 and JSTL 1.1 specifications. It includes detailed coverage of the Expression Language (EL) incorporated into JSP 2.0, the JSTL 1.1 tag libraries and the new function library, the new tag file format that enables custom tag library development without Java code, the simplified Java tag library API, improvements in the JSP XML syntax, and more. Further, it details setup of the Apache Tomcat server, JSP and JSTL syntax and features, error handling and debugging, authentication and personalization, database access, XML processing, and internationalization.This book recognizes the different needs of the two groups of professionals who want to learn JSP: page authors interested in using JSP elements in web pages, and programmers concerned with learning the JSP API and using JSP effectively as a part of an enterprise application. If you're in the first group, you'll learn from the practical web application examples in the second part of the book. If you're in the latter group, you'll appreciate the detailed coverage of advanced topics in the third part, such as how to integrate servlets and JavaBeans components with JSP using the popular Apache Struts MVC framework, and how to develop custom tag libraries using the JSP API, with realistic examples that you can use as a springboard for your own libraries."Hans Bergsten, a JSP expert group veteran and one of our most active contributors, has thoroughly and accurately captured the new features of JSP 2.0 and JSTL 1.1 in a way that is well-organized and easy to understand. With excellent, to-the-point examples, this book is a 'must have' for any serious JSP 2.0 developer."--Mark Roth, JSP 2.0 Specification Lead, Sun Microsystems, Inc.Hans Bergsten is the founder of Gefion Software, a company focused on Java services and products based on J2EE technologies. Hans has been an active participant in the working groups for both the servlet and JSP specifications since their in...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 831 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Electronic books ; local
    Abstract: Easy to learn and use, the C# language is targeted at developers for Microsoft's .NET platform who've worked with a C-like language before, such as C, C++, or Java. There's no shortage of excellent tutorials and documentation to help new developers get a handle on the language, such as O'Reilly's Learning C# or Programming C# . But when you need practical answers to the day-to-day questions you run up against, a tutorial isn't going to do the trick. The C# Cookbook gets straight to the heart of the problem with code recipes collected especially for developers working on the .NET platform. The C# Cookbook offers a definitive collection of solutions and examples for this new programming language. Recipes range from simple tasks to the more complex, and are organized with respect to the types of problems you'll need to solve as you progress in your experience as a C# programmer. Nearly every recipe contains a complete, documented code sample showing you how to solve the specific problem, as well as a discussion of how the underlying technology works and a discussion of alternatives, limitations, and other considerations where appropriate. The recipes in the C# Cookbook are organized into seventeen chapters, each of which focuses on a particular topic in creating C# solutions. Among the topics covered, you'll find: Numeric data types in C# Strings and characters Classes and structures Exception handling Delegates and events Regular expressions Data structures and algorithms Networking Security Unsafe Code You don't need to be an experienced C# or .NET developer to use this book. The C# Cookbook is designed for users of all levels with recipes targeted at the real-world developer who needs to solve problems now, not learn lots of theory first. With this guide, all developers will be able to learn and improve their mastery of both the language and the .NET Framework Class Libraries.
    Note: "The definitive collection of solutions and examples"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 1228 p. , ill. ; , 23 cm
    DDC: 005.2/768
    Keywords: Microsoft Visual studio ; Microsoft Windows (Computer file) ; Application software ; Development ; C# (Computer program language) ; Microsoft .NET Framework ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: For those of you who develop standalone Windows applications for PCs and other devices, Microsoft's .NET Windows Forms provide a much better way to get it done. This new technology gives you more power and flexibility for a fraction of the effort compared to classic Win32 development, with a streamlined programming model that deals automatically with many tedious details that once plagued developers. As with most things .NET, the only hitch is the learning curve. But that's where acclaimed author Jesse Liberty makes the difference with Programming .NET Windows Applications . With this tutorial, you will explore all aspects of using .NET Windows Forms class libraries and the associated programming tools in Visual Studio .NET, enabling you to build applications for the Windows 9x, Windows 2000 and Windows XP desktop platforms. Step-by-step, you'll learn ways to design applications that either function alone on a PC, or work in combination with your web-based application server to take advantage of the richer interface and higher level of security. The book also explains how your new Windows applications can sidestep problems that used to arise from the use of DLLs (known collectively as "DLL hell"), and how .NET Windows Forms can be used as an alternative to ASP.NET and browser-based approaches for building web application clients. Jesse Liberty definitely knows his stuff when it comes to the .NET platform. As the author of O'Reilly's Programming C# and Learning Visual Basic .NET , he's well-known for his clear and concise style that prompted one reviewer to say, "It's as if he knows exactly what questions I'm going to ask ahead of time." Jesse also co-authored Programming ASP.NET with contract programmer Dan Hurwitz, and now the two have teamed up again to bring you this comprehensive tutorial--without a doubt, the best source available for learning how to program with .NET Windows Forms.
    Note: "Covers .NET 1.1 & Visual studio .NET 2003" -- Cover. - "Rich client applications with C# or FB.NET" -- Cover. - Includes index. - Originally published 2003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 006.6
    Keywords: Computer graphics ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: " Graphics Programming with GDI+ explores and exploits a wonderful range of GDI+ programming concepts, techniques, and applications for programmers of beginner to intermediate abilities. Being a prolific contributor to the Internet community of developers, Mahesh Chand is offering what seems to be a natural extension of what he does best-sharing his programming skills with other talented programmers. Each chapter compels to the next." -Jason Hattingh, Director, Greystone Digital FX "Mahesh does a very good job getting .NET developers up to speed using the GDI+ features supported in the .NET Framework. There is good coverage of graphics fundamentals that helps the reader better understand the concepts of graphics programming with GDI+, and there are some excellent sample applications that demonstrate the graphics topics covered to reinforce the concepts presented." -Charles G. Parker, President, Parallel Consulting, Inc. " Graphics Programming with GDI+ is a comprehensive reference for anyone who wants to leverage this technology. It presents a clear discussion of the topics in such a manner that is comprehensible to the beginner, but sufficiently in-depth to challenge seasoned programmers." -Deborah J. Bechtold, MCSD, MCDBA "This is the most comprehensive book about graphics programming using GDI+ so far. This book will be a very useful handbook for everyone who does graphics programming for Windows." -Min Liu, Software Design Engineer of GDI+, Microsoft Corporation Graphics Programming with GDI+ is the .NET developer's guide to writing graphics applications for Windows and the Web. Through the use of detailed examples it provides experienced programmers with a deep understanding of the entire GDI+ API defined in the .NET Framework class library. The book begins with an introduction to GDI+ and the basics of graphics programming in Windows. The core of the book is a hands-on guide to practical topics, including how to use Windows Forms and optimize GDI+ performance. Chapters demonstrate how to develop real-world tools such as GDI+Painter, GDI+Editor, ImageViewer, and ImageAnimator. The author provides extensive reusable sample code in C# throughout, and complete downloadable source code in C# and Visual Basic .NET is available online, as are color versions of screen shots from the book. Key topics include: How GDI+ compares to GDI How GDI+ is defined and used in the .NET Framework How to draw, paint, and fill graphics objects Viewing and manip...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: IEEE 802.11 (Standard) ; Wireless LANs ; Security measures ; Electronic books ; local
    Abstract: " Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards." --Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC "This is certainly the definitive text on the internals of 802.11 security!" --John Viega, founder and chief scientist, Secure Software, Inc. "This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN." --Simon Blake-Wilson, Director of Information Security, BCI Business professionals and advanced home users are captivated by the convenience of working on wireless networks. But how can privacy and security be maintained effectively? Real 802.11 Security describes an entirely new approach to wireless LAN security based on the latest developments in Wi-Fi technology. This is the book that will show you how to establish real security within your Wi-Fi LAN. Recent developments in Wi-Fi security achieve what no amount of reconfiguration can do: They solve the problem at the source. Wi-Fi Protected Access (WPA) repairs weaknesses in existing Wi-Fi systems and is designed to allow software upgrades. The upcoming 802.11i standard will offer a much higher level of security than previously offered and will provide flexible, extremely secure solutions for future products. Real 802.11 Security addresses the theory, implementations, and reality of Wi-Fi security. It provides an overview of security issues, explains how security works in Wi-Fi networks, and explores various security and authentication protocols. The book concludes with an in-depth discussion of real-world security issues and attack tools. Written by two experts in wireless security, Jon Edney and William Arbaugh, this book shows you how to stay informed and aware when making security decisions, and what steps you can take to implement the most effective, proactive wireless security now and in the future. 0321136209B06242003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xliii, 681 p. , ill. (some col.) ; , 24 cm
    DDC: 005.2/762
    Keywords: C# (Computer program language) ; Computer software ; Development ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Praise for Windows Forms Programming in C# "Chris may have a strong affinity for semi-colons, but anybody who's programming Windows Forms needs to read this book." - Brian Randell , Visual Basic Guru and DevelopMentor Instructor "Chris Sells has done it again. This book has everything a developer needs to know to write serious WinForms applications. Chris leaves no stone unturned in explaining the WinForms programming model and arming developers with the knowledge they need to exploit WinForms to the fullest. And, as if that weren't enough, Chris's writing style makes this book a page-turner for geeks. I couldn't put it down! Until John Grisham gets the .NET religion, you won't find a better WinForms book anywhere." - Jeff Prosise , co-founder of Wintellect, author of Programming Microsoft .NET "Chris is clearly *the* expert on web deployment of WinForms. In this book, Chris explains this material clearly and the power of the technology really shows. Unlike other WinForms books, this manuscript takes a more practical approach to the use of programming tools, such as Visual Studio. Sells's book strikes a nice balance between theory and practice. Windows Forms is an important technology that needs more press. Chris Sells' book is in great position to be the definitive work on the emerging technology." - Brian Graff , Sr. SW Engineer, PreEmptive Solutions, Inc. "Chris has written the best WinForms book around. Period." - Pierre Nallet , DevelopMentor Instructor "Chris does a nice job of presenting the core elements of WinForms complete with many concise samples and graphic depictions of UI features in action. Even more compelling, however, is how Chris anticipates how most developers will want to use these features, and presents techniques and paradigms of usage that will be invaluable for any serious WinForms developer. This book is destined to become dog-eared in the hands anyone building WinForms applications." - Fritz Onion , DevelopMentor instructor and author of Essential ASP.NET "I don't want just a description of the WinForms widgets. I can get that online or from other books. What I want is a roadmap for pitfalls to avoid, and innovative solutions for common problems. That is where this book shines." - Johan Ericcson , SW Engineer, Agilent "This is the definitive book for every Windows Programmer." - Fumiaki Yoshimatsu , Sr. Engineer, Intoferia Corporation "After browsing through countless books that introduce me to Windows Forms basics,...
    Note: Includes bibliographical references (p. 659-662) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 488 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Keywords: Application software ; Development ; Business enterprise ; Data processing ; Web services ; Electronic books ; local
    Abstract: "Linthicum provides an insightful overview of the services-integration issues that will enable you to capitalize on current and future integration technologies. He also dives deep into the key Web services technologies for implementing the next generation integration architecture. Highly recommended for those thinking of moving from traditional EAI to Web services." --Dr. Ravi Kalakota, CEO, E-Business Strategies Author of Services Blueprint: Roadmap for Execution For a majority of businesses, application integration is an outright failure. Most companies' computer systems are labyrinthine at best and self-destructive at worst. With the arrival of Web services, the new service-oriented middleware technology standard, and increasingly complex and challenging problem domains, it's time to take application integration to the next level. In Next Generation Application Integration distributed computing and application-integration expert David S. Linthicum describes the effect that this new generation of middleware will have on traditional application-integration efforts. Using key industry examples and case studies, Linthicum reveals the techniques and practices that are necessary to revolutionize data-sharing for any company--from sole-proprietorship to Fortune 500. In this book you'll find a thorough discussion of today's most advanced application-integration concepts, approaches, technologies, and solutions. Written with the technical manager and enterprise architect in mind, this book addresses essential application integration issues such as: Strategies for dealing with complex problem domains Forward-looking approaches to ensure long-term solutions that are right for your company Techniques for implementation of new Web services middleware Introductions to the appropriate technologies for next generation application integration Scenarios for Web services integration Support concepts outlined by case studies and real-world examples Descriptions and analyses of the different types of Web service integration--standards, implementation, and enabling technology Full analysis of Web services and integration, including the relationship between EAI and Web services How to leverage both vertical and horizontal application-integration standards If you're responsible for managing or implementing application-integration middleware, Next Generation Application Integration will prove to be an indispensable resource. 0201844567B07142003
    Note: Includes bibliographical references (p. 463-470) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and respond to such attacks and breaches. The Effective Incident Response Team is the first complete guide to forming and managing a Computer Incident Response Team (CIRT). In this book, system and network administrators and managers will find comprehensive information on establishing a CIRT's focus and scope, complete with organizational and workflow strategies for maximizing available technical resources. The text is also a valuable resource for working teams, thanks to its many examples of day-to-day team operations, communications, forms, and legal references. IT administrators and managers must be prepared for attacks on any platform, exploiting any vulnerability, at any time. The Effective Incident Response Team will guide readers through the critical decisions involved in forming a CIRT and serve as a valuable resource as the team evolves to meet the demands of ever-changing vulnerabilities. Inside, readers will find information on: Formulating reactive or preventative operational strategy Forming, training, and marketing the CIRT Selecting penetration-testing, intrusion-detection, network-monitoring, and forensics tools Recognizing and responding to computer incidents and attacks, including unauthorized access, denial-of-service attacks, port scans, and viruses Tracking, storing, and counting incident reports and assessing the cost of an incident Working with law enforcement and the legal community Benefiting from shared resources Scrutinizing closed incidents to further prevention Offering services such as user-awareness training, vulnerability and risk assessments, penetration testing, and architectural reviews Communicating the CIRT's return on investment through management reporting 0201761750B10062003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Pearson Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xix, 245 p. ; , 24 cm
    DDC: 650.1
    Keywords: Career development ; Office politics ; Success in business ; Electronic books ; local
    Abstract: Joanne has used her extensive business world experiences to put together a very informative primer for those involved in today's workforce. A necessary read.-Dennis Swanson, EVP and COO, Viacom Television Stations Group Finally, a mentor for each of us. This is a wonderful guided tour of life in corporate America, written in complete, sometimes painful, honesty. Joanne Cini is a career counselor without an agenda or conflict of interest. She gives the reader an up close and personal look at the work world, while insisting on a close and honest look in the mirror. Ultimately, Kingmaker is a very personal journey on the road to self-reliance and personal responsibility.-Lisa G. Churchville, President and General Manager, WJAR-TV Providence, Rhode Island Kingmaker is a new twist on an old adage: to thine own self be true. Cini's contention, that you must take control of your own life and career in order to define your value potential in the competitive market of big business, is an important lesson for anyone looking to succeed in today's business world.-Ray Heacox, CEO, MediaOcean, a DDS Company For most of us, empowerment is still a buzz word. Cini, like the mentor you always wanted, guides you to its full meaning in your career-to purposeful, wide-eyed analysis and decisions about what's right for you.-Wendy Tynan, General Manager, Rogen International. Cini's game is strong: high energy, high personal values, a focus and passion for her work. If your career is worth saving or worth upgrading, then Cini's book is a must read. Written with candor and knowledge, Kingmaker is a blueprint on what to expect and how to achieve in a fast paced environment without losing yourself.-Frank Novak, Special Teams Consultant, Green Bay Packers The journey Joanne takes us through is based on her own personal odyssey. That said, anyone who has spent a day in the life of Corporate America will relate to her observations. This is an astute chronicle of pitfalls to avoid, road bumps to maneuver, and challenges to aspire to. ENJOY THE RIDE!-Bill Cella, Chairman, MAGNA Global USA. I intend to buy this book for each of our staff members. It's a clear, concise guide to how employees can achieve excellence, contribute to corporate goals, AND satisfy their personal and professional objectives. In this insightful book, Ms. Cini tells you how to demand more of yourself, your company, and your managers and come out a winner.-Christine Watkins, President and CEO, INVISION I...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Upper Saddle River, N.J. ; : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 670 p. , ill. ; , 24 cm
    DDC: 005.713769
    Keywords: Solaris (Computer file) ; Directory services (Computer network technology) ; LDAP (Computer network protocol) ; Electronic books ; local
    Abstract: LDAP in the Solaris Operating Environment Deploying Secure Directory Services Provides an in-depth discussion of Solaris Operating Environment security methods and how they relate to LDAP as a naming service Covers migration planning tips from NIS/NIS+ to an LDAP-based naming service including capacity planning Presents an overview of LDAP tools and toolkits, and how they are used to administer LDAP as a naming service Discusses performance principles and benchmarking techniques for optimizing directory server performance LDAP in the Solaris Operating Environment is a follow-on to the Sun BluePrints book Solaris and LDAP Naming Services, and describes the significant improvements to the Solaris LDAP client and directory server. Deploying the Solaris Secured LDAP Client is covered in detail. This Sun BluePrints book introduces NIS/NIS+ migration tools and techniques to aid in the transition to an LDAP-based naming service. Troubleshooting tips, examples of extending Solaris authentication methods, and examples of extending Solaris authentication methods using the Pluggable Authentication Module (PAM) framework are provided.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Language: English
    Pages: xxi, 114 p. ; , 24 cm
    DDC: 650.1
    Keywords: Work and family ; Electronic books ; local
    Abstract: Working 24x7? Delaying life until it's too late? You have the ability stop! Having it All ... and Making it Work is a fast-paced, easy-to-use book offering you a new pathway towards managing personal life and professional life--without sacrificing either one of them. This book isn't just more whining and exhortation: it delivers specific, bite-sized, no-fluff solutions for managing your life, including crucial execution steps you can take immediately. Mills teaches you how to identify and balance what's most important to you--and give up what you don't want badly enough. He also shows how to make the balance real, not just talk; how to make career decisions that promote balance; and how to make course corrections that refine your balance over time. Mills also exposes the potentially disastrous myths and rationalizations many people use to avoid the realities of work/life imbalance--fallacies like "I'll devote all my time to work for 15 years, get rich, and then I'll pay attention to family." Mills' breakthrough work/life courses at the Harvard Business School are helping business people find the balance they're searching for. The techniques he's developed will help anyone struggling to get a grasp on the work/life balance challenge.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 313 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Management ; Software engineering ; Electronic books ; local
    Abstract: "This book does a good job of describing the methods employed at Sprintpcs.com ... over 250 people practicing Feature Driven Development and reporting their progress to me at the monthly operations review." --Scott B. Relf, Chief Marketing Officer, Sprint PCS "A tremendous contribution to the literature in the field. This should be required reading for all development teams going forward." --John F. Yuzdepski, VP & GM, Openwave Systems A breakthrough approach to managing agile software development, Agile methods might just be the alternative to outsourcing. However, agile development must scale in scope and discipline to be acceptable in the boardrooms of the Fortune 1000. In Agile Management for Software Engineering, David J. Anderson shows managers how to apply management science to gain the full business benefits of agility through application of the focused approach taught by Eli Goldratt in his Theory of Constraints. Whether you're using XP, Scrum, FDD, or another agile approach, you'll learn how to develop management discipline for all phases of the engineering process, implement realistic financial and production metrics, and focus on building software that delivers maximum customer value and outstanding business results.Coverage includes: Making the business case for agile methods: practical tools and disciplines How to choose an agile method for your next project Breakthrough application of Critical Chain Project Management and constraint-driven control of the flow of value Defines the four new roles for the agile manager in software projects-- and competitive IT organizations Whether you're a development manager, project manager, team leader, or senior IT executive, this book will help you achieve all four of your most urgent challenges: lower cost, faster delivery, improved quality, and focused alignment with the business.
    Note: Includes bibliographical references (p. 301-313) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xiv, 351 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.1
    Keywords: Computer architecture ; Software engineering ; Electronic books ; local
    Abstract: The completely updated "field manual" for becoming a better software architect! The crucial skills you need to survive and thrive as an enterprise software architect! Fully updated for the latest techniques-from lightweight methods and architectural layers to Model-Driven Architecture and UML 2.0! In this book, Raphael Malveau and Thomas J. Mowbray share up-to-the-minute insights and practical solutions for all the key challenges of building enterprise software systems with objects, components, and Internet technologies. You'll master today's best technical and business practices for the entire project lifecycle as you discover how to avoid crucial pitfalls and costly errors. Coverage includes: Choosing the right architectural model for your project Executing heavyweight and lightweight approaches to software architecture Understanding the architectural issues associated with open source development Managing complexity, scalability, reliability, security, latency, and flexibility Making the most of abstraction, refactoring, and architectural prototyping Leveraging proven design patterns and anti-patterns Effective prototyping, business-case development, and project leadership Coordinating smoothly with project managers and teams Managing your own career as a software architect With hands-on exercises, real-life war stories, and a take-no-prisoners attitude, Software Architect Bootcamp, Second Edition, won't just help you become a great software architect: it'll help you become a true technical leader of your organization.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xvi, 792 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: I am more than satisfied (actually impressed) with how much system administration is possible from Webmin. Comprehensive and convenient, just about any administration I've done is covered here, along with several areas that I've hesitated to explore. --Karel Baloun, Sr. Software Engineer, Looksmart, Ltd. Easy, browser-based Linux/UNIX administration with Webmin--step by step Webmin gives you an easy, browser-based solution for virtually any day-to-day Linux/UNIX administration task. Now, there's a definitive Webmin guide for every beginning-to-intermediate sysadmin. Written by Webmin's primary developer, Managing Linux Systems with Webmin delivers authoritative, step-by-step coverage of the latest version of Webmin, from basic installation to centrally managing multiple servers. Coverage includes: How Webmin works--and how to install and secure it Using Webmin to configure basic system services, including filesystems, users/groups, and printing Configuring Apache, Sendmail, Squid, Samba, MySQL, PostgreSQL, FTP services, and more Cluster modules: configuring multiple systems from one master server Webmin modules: configuring Webmin itself Full API documentation and instructions for writing your own Webmin modules and themes Jamie Cameron walks you through more than 50 essential Webmin tasks--offering all the background you need, step-by-step instructions, extensive screen captures, and listings of the underlying configuration files that are being modified. Whether you're new to Linux/UNIX system administration or you simply want an alternative to the command line, Managing Linux Systems with Webmin will be an indispensable resource.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 199 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computers ; Access control ; Wireless LANs ; Security measures ; Electronic books ; local
    Abstract: Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user. Topics covered include-- Why conventional wireless LANs are so insecure--and what you can do about it "Wardriving" software, equipment, and techniques: knowing your enemy 802.11i, WPA, TKIP, and AES: the new wireless security options 802.1x and EAP: enabling port-based authentication on your WLAN Safely connecting WLANs to wired networks Securing home and small office environments, one step at a time Accessing VPNs from wireless devices Integrating firewalls and wireless access points Improving security in public access environments Securing enterprise environments with 802.1x--a start-to-finish walkthrough
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Language: English
    Pages: xxviii, 485 p. ; , 24 cm
    Edition: [Rev. and updated].
    DDC: 332.6/722
    Keywords: Small business ; United States ; Finance ; Handbooks, manuals, etc ; Venture capital ; United States ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: In his classic bestseller Venture Capital Handbook, leading venture capitalist David Gladstone showed thousands of companies how to get funding and work with early stage investors. Now, in his revision of the classic, Venture Capital Investing, he looks at venture capital through the eyes of the investor. Gladstone shows all of you VC investors and angels exactly how to weed through scores of business proposals and find the gem that will deliver outstanding returns, especially in these soft economic times. You will learn what to look for in a business proposition; how to assess entrepreneurs and their management teams; how to evaluate financial statements, market niches, competitive environments, and product innovations; how to investigate a business that's already operating; and how to build effective partnerships with existing portfolio companies.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Pearson Education | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 273 p. , ill. ; , 25 cm
    DDC: 659.1
    Keywords: Brand name products ; Management ; Corporate image ; Corporations ; Public relations ; Electronic books ; local
    Abstract: Companies with strong reputations are better able to attract customers, investors, and quality employees-and to survive crises that would destroy weaker firms. Fame and Fortune shows how to quantitatively measure your company's reputation, estimate its business value, and systematically enhance it over both the short- and long-term. First, you'll learn how to benchmark your firm's reputation against key rivals in six key areas, ranging from product quality to emotional appeal. Next, you'll discover that the winners of global reputation surveys get to the top by following a set of core principles through which they build visibility, distinctiveness, consistency, authenticity, and transparency. Then, starting from where you are now, you'll learn how to implement genuine corporate initiatives that strengthen two-way dialogue with all your stakeholders, and build the "reputational capital" you will need to succeed-and thrive. Why reputations matter: the proof, in cold, hard cash. Quantifying the "unquantifiable": the value of your corporate image. The reputation audit: discovering where you stand. Six key measures of your corporate reputation. Using the "Reputation Value Cycle" to your advantage. Creating a "virtuous circle" in which reputation enhances business corporate value. Making it real: the elements of trustworthiness. Building and communicating authenticity, consistency, and transparency. Standing apart from the crowd. Improving your visibility and your distinctiveness. How FedEx did it: lessons for your organization. Reputational best practices from a company built on trust. Create quantifiable business value by building your company's reputation. The definitive business reputation guide for every corporate officer, strategist, corporate communicator, and marketing professional How to audit your reputation-and benchmark your competitor An integrated approach that cuts across communications, strategy, marketing, and organization Techniques for strengthening your reputation with investors, customers, partners, regulators, citizens, and employees Includes detailed tools from the Reputation Institute's own StellarRep(r) model, the world's #1 reputation management toolkit Companies with great reputations do better on virtually every business metric. Now, you have unprecedented access to a roadmap for building the kind of reputation you need and deserve. Drawing on unsurpassed experience and the field's best research, two leading experts illum...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxi, 215 p. , ill. ; , 24 cm
    Keywords: Corporations ; United States ; Growth ; Entrepreneurship ; United States ; Strategic planning ; United States ; Electronic books ; local
    Abstract: Large, mature companies always become trapped at some point in the declining stages of what has become known as the corporate life cycle. Historically this barrier to continued growth has been, and is still, as unavoidable as death and taxes. In Getting Bigger by Growing Smaller, Joel Shulman, a leading researcher on entrepreneurship, teams up with Thomas T. Stallkamp, one of the world's most effective executives, to introduce a powerful new growth model for corporate America (based on 4 years of research at Babson College and Harvard University) that can enable corporations to break through this barrier to growth by utilizing a new breakthrough business model called the Strategic Entrepreneurial Unit (SEU). Shulman and Stallkamp demonstrate how to build new employee/entrepreneur-led startups within the corporation--entities that can take on new market opportunities and deliver startup-level growth. This is the first book to provide practical methods for actually identifying, creating, and implementing smaller units within large organizations to enable continued, rapid growth beyond the predictable barriers of the corporate life cycle.
    Note: Includes bibliographical references and indx
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...