Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (29)
  • 2005-2009  (29)
  • 2006  (29)
  • Safari, an O'Reilly Media Company.  (29)
  • Human Relations Area Files, Inc
Datasource
Material
Language
  • English  (29)
Years
  • 2005-2009  (29)
Year
  • 1
    ISBN: 0738497320
    Language: English
    Pages: 1 online resource (724 pages)
    DDC: 658.8/00285
    Keywords: WebSphere ; Business enterprises Data processing ; Electronic commerce Computer programs ; Software patterns ; Electronic books ; local ; WebSphere ; Commerce électronique ; Logiciels ; Logiciels ; Modèles de conception ; Entreprises ; Informatique ; Business enterprises ; Data processing ; Electronic commerce ; Computer programs ; Software patterns
    Abstract: IBM WebSphere Process Server, and the accompanying IBM WebSphere Integration Developer development tool, provide a vast array of powerful features for building business process solutions. But how can you use those features for your organization? This IBM Redbooks publication takes a scenario-based approach to demonstrate these product features and employs the IBM Patterns for e-business to illustrate proven business process patterns. Part 1 of this book introduces the Patterns for e-business. The Patterns for e-business are a group of proven, reusable assets that can be used to increase the speed of developing and deploying On Demand Business applications. This book focuses on the Serial and Parallel Process patterns from the asset catalog. Part 2 describes the business scenario used in this book. It also explains the key technologies that are relevant to the scenarios. Part 3 guides you through the building of business process solutions in WebSphere Integration Developer for deployment to WebSphere Process Server. It includes the use of Web Services Business Process Execution Language (WS-BPEL) business processes, business state machines, and other product features. Four solutions are described, each adhering to a separate pattern. Each solution includes architectural considerations for designing the solution and step-by-step instructions for building the scenario. Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed April 23, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Language: English
    Pages: 1 online resource (560 pages)
    Keywords: Electronic books ; local
    Abstract: Service-oriented architecture (SOA) promotes the ability to communicate with external enterprises. But what are the issues in creating these Extended Enterprise communications? This IBM IBM Redbooks publication addresses these issues for Web services implementations of SOA, using the Patterns for e-business. The Patterns for e-business are a group of proven, reusable assets that can be used to increase the speed of developing and deploying e-business applications. This book focuses on building Extended Enterprise SOA solutions using WebSphere Application Server V6, WebSphere Partner Gateway V6, the Web services gateway component of WebSphere Application Server Network Deployment V6, and WebSphere Business Integration Server Foundation V5.1. Part 1 introduces the Patterns for e-business, and describes the patterns and product mappings within this framework for building Extended Enterprise solutions. Part 2 describes the business scenario used throughout this book, and describes the technologies for implementing an SOA solution. Part 3 provides a set of Extended Enterprise scenarios that include simple as well as more complex SOA solutions that use an Enterprise Service Bus. Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed January 19, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Adobe Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (624 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Ready to discover not just the how, but also the why behind some of the most powerful features in Premiere Pro? In Adobe Premiere Pro 2.0 Studio Techniques, author Jacob Rosenberg goes beyond conventional stepby- step instruction to give you a real-world perspective on editing with Premiere Pro. Using Jacob's fi lm footage or your own, you'll learn to deliver professional-quality results. Whether you're looking for advice on editing, effects, titles, or working with audio, this easy-to-read guide will help you add more punch to your productions. • New features in Premiere Pro 2.0: Native HD support, native HDV editing, 24P/24PA support, DVD authoring from the timeline, expedited reviewing with Adobe Clip Notes-it's all here. Find out how Premiere Pro has been improved, what's been added, and how to use new features. • Working fundamentals: From capturing video to assembling your project to the new, panel-based user interface, get an under-the-hood understanding of this powerful application. • Advanced techniques: Through hands-on lessons, learn the ins and outs of color correction, color matching, multiple-camera editing, dynamic photomontages, titling, audio and video effects, sound mixing, professional workflows for feature films and HD productions, and more. • Companion DVD: You'll fi nd extra chapters and bonus reference material to read, video tutorials to watch, media fi les to use with the book's lessons, tryout versions of Adobe Premiere Pro 2.0 and Adobe Audition 2.0, and indispensable plug-ins to install. Jacob Rosenberg is a Los Angeles-based independent filmmaker who has directed nationally broadcast commercials, music videos for such groups as the Baha Men, and several short films. Recently, Jacob has worked as a post-production supervisor on a number of feature films that used high-definition video as their digital intermediate format. A current member of the Adobe Premiere development team, and the featured instructor for Premiere Pro on the highly acclaimed Total Training Instructional DVD series, Jacob continues to raise the bar by creating new workflows and educating others about them. From IBC in Amsterdam to NAB in Las Vegas, Jacob teaches classes around the world on using Premiere Pro and other Adobe products. "With this book and Adobe Premiere Pro, you'll have all the tools you need to create your own professional-quality movies and videos. Jacob shows you how to think like a filmmaker, get the job done, and understand th...
    Note: Online resource; Title from title page (viewed June 20, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 0738495603
    Language: English
    Pages: 1 online resource (356 pages)
    Series Statement: IBM redbooks
    Parallel Title: Erscheint auch als
    Keywords: Business Forms ; Computer programs ; Forms management Computer programs ; IBM software ; Electronic books ; local ; Gestion des formulaires ; Logiciels ; Logiciels IBM ; Gestion des formulaires ; Logiciels ; Business ; Forms ; Computer programs ; Forms management ; Computer programs ; IBM software ; Commerce ; Business & Economics ; Local Commerce
    Abstract: This IBM Redbooks publication describes the features and functionality of Workplace Forms and each of its component products. After introducing the products and providing an overview of features and functionality, we discuss the underlying product architecture and address the concept of integration. To help potential users, architects, and developers better understand how to develop and implement a forms application, we introduce a specific scenario based on a "Sales Quotation Approval" application. Using this base scenario as a foundation, we describe in detail how to build an application that captures data in a form, then applies specific business logic and workflow to gain approval for a specific product sales quotation. Throughout the scenario, we build upon the complexity of the application and introduce increasing integration points with other data systems. Ultimately, we demonstrate how an IBM Workplace Forms application can integrate with WebSphere Portal, IBM DB2 Content Manager, and Lotus Domino. Note: The code used for building this sample scenario application is available for download. For specific information about how to download the sample code, please refer to Appendix A. Additional material". Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed July 12, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    ISBN: 9780750679701
    Language: English
    Pages: 1 online resource (528 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The design of Switching Power Supplies has become one of the most crucial aspects of power electronics, particularly in the explosive market for portable devices. Unfortunately, this seemingly simple mechanism is actually one of the most complex and under-estimated processes in Power Electronics. Switching power conversion involves several engineering disciplines: Semiconductor Physics, Thermal Management, Control Loop theory, Magnetics etc, and all these come into play eventually, in ways hard for non-experts to grasp. This book grows out of decades of the author's experience designing commercial power supplies. Although his formal education was in physics, he learned the hard way what it took to succeed in designing power supplies for companies like Siemens and National Semiconductor. His passion for power supplies and his empathy for the practicing or aspiring power conversion engineer is evident on every page. * The most comprehensive study available of the theoretical and practical aspects of controlling and measuring Electromagnetic Interference in switching power supplies, including input filter instability considerations. * Step-by-step and iterative approach for calculating high-frequency losses in forward converter transformers, including Proximity losses based on Dowell's equations. * Thorough, yet uniquely simple design flow-chart for building DC-DC converters and their magnetic components under typical wide-input supply conditions * Step-by-step, solved examples for stabilizing control loops of all three major topologies, using either transconductance or conventional operational amplifiers, and either current-mode or voltage-mode control.
    Note: Online resource; Title from title page (viewed June 22, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Academic Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (840 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This book is a comprehensive contributed volume that aims to describe and explain the design, fabrication, operating characteristics, and specific applications of the most popular and useful types of specialty optical fibers. These "specialty fibers? include any kind of optical fiber that has been architecturally manipulated to diverge from a conventional structure. For instance, metal-coated fibers can be utilized for bandwidth improvement, and hollow core fibers offer more controllable dispersion for sensitive medical procedures. Applications for these specialty fibers abound in the biomedical, sensors, and industrial fields, as well as in more traditional communications capacities. This book will act as a specialty fiber "guided tour,? hosted by the top names in the discipline. The globally renowned editors, Drs. Mendez and Morse, have extensive experience in research, academia, and industry. *Completely covers biomedical and industrial sensor technology with emphasis on real world applications *Comparative studies of pros and cons of all fiber types with relation to test and measurement, mechanical properties and strength, and reliability *Easy to access essential facts and details at the begining of each chapter
    Note: Online resource; Title from title page (viewed December 15, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Language: English
    Pages: 1 online resource (1588 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: ASP.NET allows web sites to display unique pages for each visitor rather than show the same static HTML pages. The release of ASP.NET 2.0 is a revolutionary leap forward in the area of web application development. It brings with it a wealth of new and exciting built-in functions that reduce the amount of code you'll need to write for even the most common applications. With more than 50 new server controls, the number of classes inside ASP.NET 2.0 has more than doubled, and in many cases, the changes in this new version are dramatic. This book will alert you to every new feature and capability that ASP.NET 2.0 provides so that you'll be prepared to put these new technologies into action. Greatly expanded from the original best-selling Professional ASP.NET 2.0, this new special edition adds hundreds of pages of new coverage of advanced and new techniques relating to data and data sources, the provider model, personalization, membership, role management, localization, configuration, migration, and Altas. Bonus CD-ROM and DVD The bonus DVD includes a 180-day trial of Microsoft Visual Studio 2005 Professional The accompanying CD-ROM features a valuable library of chapters from other key Wrox books. It contains more than 1,000 pages from more than 15 Wrox ASP.NET 2.0, C# 2005, VB 2005, .NET 2.0, and SQL Server 2005 books. What you will learn from this book The idea of the server control and its pivotal role in ASP.NET development How to create templated ASP.NET pages using the new master page feature Techniques for debugging and handling errors How to work with data from enterprise databases including SQL Server 2005 and Oracle(r) Ways to package and deploy ASP.NET applications How to retrieve, update, and delete data quickly and logically How to implement the cultures and regions features to localize your web site into multiple languages for different visitors How to use the new "Altas" add-in for ASP.NET 2.0 to add Ajax-style capabilities to your ASP.NET applications An understanding of how to use and extend the new pro?vider model for accessing data stores, processes, and more How to keep track of your application's performance and health with new monitoring tools When and how to migrate your ASP.NET 1.x applications to 2.0 Who this book is for This book is for experienced programmers and developers who are looking to make the transition to ASP.NET 2.0. Wrox Professional guides are planned and written by working programmers to meet the real-world...
    Note: Online resource; Title from title page (viewed October 16, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Language: English
    Pages: 1 online resource (634 pages)
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks publication helps you install, tailor, and configure Copy Services in open systems environments on the IBM System Storage DS6000 storage server series. It should be read in conjunction with the IBM System Storage DS6000 Series: Architecture and Implementation, SG24-6781. This book gives you the details necessary to configure each of the Copy Services functions in an open systems environment. There is a companion book that supports the configuration of the Copy Services functions in a z/OS environment, IBM System Storage DS6000 Series: Copy Services with System z servers, SG24-6782. This book helps you design and create the storage map and install Copy Services in an open systems environment. This book helps you design and create a new Copy Services installation or to migrate from an existing installation, as well as addresses design functions and changes in terminology from other IBM Copy Services products. We include hints and tips to maximize the effective installation. It also includes a section on System i and an overview of the TotalStorage Productivity Center for Replication.
    Note: Online resource; Title from title page (viewed November 28, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Butterworth-Heinemann | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (416 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organization's assets, giving decision makers the foundation needed to climb the next step up the corporate ladder. Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures. Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald. * Provides clear direction on how to meet new business demands on the security professional * Guides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the program * Covers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each
    Note: Online resource; Title from title page (viewed October 12, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Language: English
    Pages: 1 online resource (538 pages)
    Keywords: Electronic books ; local
    Abstract: IBM Information Management System (IMS) is the IBM premier transaction and hierarchical database management system. Connectivity has always been a priority with IMS. IMS exploits the latest technologies to address customers' requirements for accessing IMS transactions and data. This IBM Redbooks publication is about IMS connectivity. This book provides a general overview of the IMS Open Transaction Manager Access (OTMA) function and extensive information about IMS Connect and its usage, including a chapter that describes the IMS Connect Extensions product and how you can enhance the IMS Connect operating environment with it. This book provides a broad understanding of IMS Connector for Java. We cover some special considerations, such as using the conversational transactions, rerouting, and timeout support, as well as programming roll-your-own clients without using IMS Connector for Java. We also introduce Open Database Access and provide examples of using it with stored procedures and with IMS Remote Database Services. As for future directions, we also include a chapter about the IMS SOAP Gateway. This book updates and adds to the information in the previous book "IMS e-business Connectors: A Guide to IMS Connectivity," SG24-6514. Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed February 2, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9781597490580
    Language: English
    Pages: 1 online resource (500 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority. The book will start off by teaching readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements. Next, readers will create the logical design for an Active Directory infrastructure. Here the book starts to drill deeper and focus on aspects such as group policy design. Finally, readers will learn to create the physical design for an active directory and network Infrastructure including DNS server placement; DC and GC placements and Flexible Single Master Operations (FSMO) role placement. The next book in our best selling and critically acclaimed How to Cheat series. This is the perfect book for users who have already purchased How to Cheat at Managing Windows 2003 Small Business Server. * Active Directory is the market leader in the directory services space, and 57% of all Microsoft corporate customers have deployed AD * Follows Syngress's proven "How To Cheat" methodology * Companion Web site offers dozens of templates, "Cheat Sheets", and checklists for readers
    Note: Online resource; Title from title page (viewed February 8, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : McGraw-Hill | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (776 pages)
    Edition: 1st edition
    Keywords: SQL server ; Database management ; Electronic books ; local
    Abstract: Transform disparate enterprise data into actionable business intelligence Put timely, mission-critical information in the hands of employees across your organization using Microsoft SQL Server 2005 and the comprehensive information in this unique resource. Delivering Business Intelligence with Microsoft SQL Server 2005 shows you, step-by-step, how to author, customize, and distribute information that will give your company the competitive edge. It's all right here--from data mining, warehousing, and scripting techniques to MDX queries, KPI analysis, and the all-new Unified Dimensional Model. Real-world examples, start-to-finish exercises, and downloadable code throughout illustrate all of the integration, analysis, and reporting capabilities of SQL Server 2005.
    Note: Online resource; Title from title page (viewed February 14, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597490641
    Language: English
    Pages: 1 online resource (448 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware. * A recent survey published by Information Security Magazine stated that "combating spyare" was the #2 priority for security professionals in 2005 * Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market * Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors
    Note: Online resource; Title from title page (viewed August 4, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Academic Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (360 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Awarded by the International Calabria's Prize! This multidisciplinary volume originates from lectures presented at a short course on wireless communications in Capri, Italy. This globally attended conference has produced an exceptional book written by pioneers in the field. Lecturers at Capri included pillars in the fields of electromagnetics, communications, information technology and mathematics. As communications technology becomes increasingly wireless, an interdisciplinary viewpoint is necessary for professionals to correct problems and avoid others before they occur. Wireless Networks covers critical technology within WLAN, ad hoc networks, data distribution, TV, radio, and personal mobile devices. As networks become wireless, engineers face increased difficulty securing its malleable boundaries. This book discusses security solutions such as sensor technology that prevent unwanted intrusion. Connectivity is also addressed, featuring chapters on antennas, bandwidth and frequencies. Editors Franceschetti and Stornelli have done a great service to the wireless communications community in creating a compendium that delivers this spectrum of essential information in one reference. *Presents a uniquely panoramic view of wireless networks with viewpoints from engineering, computing, and mathematics *The technology is discussed in theory as well as in practice to help engineers design and modify networks *Globally recognized experts share their critical insight on sensor technology, transfering protocol, ad-hoc networks, and more
    Note: Online resource; Title from title page (viewed April 28, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    ISBN: 9780750678933
    Language: English
    Pages: 1 online resource (344 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Ultra wideband technology turns the radio spectrum available to wireless applications from a country road into a high-speed ten lane super freeway, and the destination is the future of wireless technology. UWB is a huge leap forward because it offers wide bandwidth with little interference, allowing multiple UWB signals to share a single channel. This multi-author volume, compiled under the guidance of Dr. Roberto Aiello, introduces the theory and concepts behind ultra wideband (UWB) systems as well as their applications. Authors include those involved in creating the UWB standards, researchers, and applications specialists. This book has been broken down into three parts: introduction to UWB, different techniques available, and applications. Within these sections topics covered are UWB spectrum and regulations, UWB channels, modulation techniques, antennas, signal propagation, and UWB transceiver architectures. This book has all the information RF/wireless engineers will need to understand this burgeoning technology. *An all-star list of contributors covers the subject more authoritatively than any single author could *Discusses U.S. and international ultra wideband regulations *Includes material on antenna systems and signal propagation at ultra wideband frequencies
    Note: Online resource; Title from title page (viewed June 12, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Language: English
    Pages: 1 online resource (720 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks publication serves as a reference for system programmers and administrators who will be installing IBM Tivoli Workload Scheduler for z/OS in mainframe and end-to-end scheduling environments. Installing IBM Tivoli Workload Scheduler for z/OS requires an understanding of the started tasks, the communication protocols and how they apply to the installation, how the exits work, how to set up various IBM Tivoli Workload Scheduler for z/OS parameters and their functions, how to customize the audit function and the security, and many other similar topics. In this book, we have attempted to cover all of these topics with practical examples to help IBM Tivoli Workload Scheduler for z/OS installation run more smoothly. We explain the concepts, then give practical examples and a working set of common parameters that we have tested in our environment.
    Note: Online resource; Title from title page (viewed May 16, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (486 pages)
    Keywords: Electronic books ; local
    Abstract: IBM communication controllers have reliably carried the bulk of the world's business traffic for more than 30 years. Over the years, IBM controllers have been enhanced to the point that the functional capabilities of the current products, the 3745 Communication Controller and the 3746 Nways Multiprotocol Controller , surpass the capabilities of any other data networking equipment ever developed. Beyond the SNA architecture PU Type 4, beyond APPN, even beyond IP routing, these controllers support an extraordinary set of functions and protocols. Because of their long history and their functional richness, IBM controllers continue to play a critical role in the networks of most of the largest companies in the world. Over the past decade, however, focus has shifted from SNA networks and applications to TCP/IP and Internet technologies. In some cases, SNA application traffic now runs over IP-based networks using technologies such as TN3270 and Data Link Switching (DLSw). In other cases, applications have been changed, or business processes reengineered, using TCP/IP rather than SNA. Consequently, for some organizations, the network traffic that traverses IBM communication controllers has declined to the point where it is in the organization's best interest to find functional alternatives for the remaining uses of their controllers so they can consolidate and possibly eliminate controllers from their environments. This IBM Redbooks publication provides you with a starting point to help in your efforts to optimize your communication controller environment, whether simply consolidating them or migrating from them altogether. We discuss alternative means to provide the communication controller functions that you use or ways to eliminate the need for those functions outright. Where multiple options exist, we discuss the relative advantages and disadvantages of each.
    Note: Online resource; Title from title page (viewed January 11, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781420005684
    Language: English
    Pages: 1 online resource (232 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Our fascination with new technologies is based on the assumption that more powerful automation will overcome human limitations and make our systems 'faster, better, cheaper,' resulting in simple, easy tasks for people. But how does new technology and more powerful automation change our work? Research in Cognitive Systems Engineering (CSE) l
    Note: Online resource; Title from title page (viewed March 27, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    ISBN: 9781597491150
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful. IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification candidates for security specializations like CISSP and Security+ will also find this a valuable resource. * Your one stop shop coverage of malware, wireless technologies, and phishing *An easy to use tol featuring the ability to cross references makeing navigation easy * Includes special coverage of military and government terms for the latest hot topics
    Note: Online resource; Title from title page (viewed August 18, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Academic Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (680 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Ultrashort Laser Pulse Phenomena serves as an introduction to the phenomena of ultrashort laser pulses and describes how this technology can be applied in areas such as spectroscopy, medical imaging, electromagnetism, optics, and quantum physics. Combining the principles with experimental techniques, the book serves as a guide to designing and constructing femtosecond systems. The second edition has updated and expanded its content, and includes more examples of ultrashort sources and a more comprehensive fundamentals chapter. Diagnostic techniques and applications involving sensors, mode-locked lasers, and imaging have been fully revised to include current technologies. Written in a tutorial style, this book is suitable for senior undergraduate and graduate students as well as engineers and scientists working in the areas of optics, spectroscopy, optical imaging, photochemistry, and ultrafast science and engineering. *Provides an easy to follow guide through "faster than electronics" probing and detection methods *THE manual on designing and constructing femtosecond systems and experiments *Discusses essential technology for applications in micro-machining, femtochemistry, and medical imaging
    Note: Online resource; Title from title page (viewed September 21, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (500 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats Today This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the "best of this year's top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future.. * From Practical VoIP Security, Thomas Porter, Ph.D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security. * From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents the latest information on phishing and spam. * From Combating Spyware in the Enterprise, Brian Baskin, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and removal of spyware. * Also from Combating Spyware in the Enterprise, About.com's security expert Tony Bradley covers the transformation of spyware. * From Inside the SPAM Cartel, Spammer-X shows how spam is created and why it works so well. * From Securing IM and P2P Applications for the Enterprise, Paul Piccard, former manager of Internet Security Systems' Global Threat Operations Center, covers Skype security. * Also from Securing IM and P2P Applications for the Enterprise, Craig Edwards, creator of the IRC security software IRC Defender, discusses global IRC security. * From RFID Security, Brad "Renderman Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application attacks. * Also from RFID Security, Frank Thornton, owner of Blackthorn Systems and an expert in wireless networks, discusses management of RFID security. * From Hack the Stack, security expert Michael Gregg covers attacking the people layer. * Bonus coverage includes exclusive material on device driver attacks by Dave Maynor, Senior Researcher at SecureWorks. * The "best of this year: Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats * Complete Coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more * Covers secure enterprise-wide deployment of hottest technologies including Voice Over IP, Pocket PCs, smart phones, and more
    Note: Online resource; Title from title page (viewed November 8, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (512 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This book describes, analyzes, and recommends traffic engineering (TE) and quality of service (QoS) optimization methods for integrated voice/data dynamic routing networks. These functions control a network's response to traffic demands and other stimuli, such as link failures or node failures. TE and QoS optimization is concerned with measurement, modeling, characterization, and control of network traffic, and the application of techniques to achieve specific performance objectives. The scope of the analysis and recommendations include dimensioning, call/flow and connection routing, QoS resource management, routing table management, dynamic transport routing, and operational requirements. Case studies are included which provide the reader with a concrete way into the technical details and highlight why and how to use the techniques described in the book. Includes Case Studies of MPLS and GMPLS Network Optimization Presents state-of-the-art traffic engineering and quality of service optimization methods and illustrates the tradeoffs between the various methods discussed Contains practical Case Studies based on large-scale service provider implementations and architecture plans Written by a highly respected and well known active expert in traffic engineering and quality of service
    Note: Online resource; Title from title page (viewed November 3, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Peachpit Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (624 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Need to take your Adobe Premiere Pro skills to the next level? Learn Premiere Pro 2 the fast, efficient way! This Visual QuickPro Guide uses illustrations and in-depth explanations. You'll be a master in time! • Takes a visual, task-based approach to teaching Premiere Pro, using pictures to guide you through the software and show you what to do. • Works like a reference book-you look up what you need and then get straight to work. • Concise, straightforward steps and explanations offer the fastest way to learn tasks and concepts. • Affordably priced, because buying a computer book shouldn't be an investment in itself.
    Note: Online resource; Title from title page (viewed September 26, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Language: English
    Pages: 1 online resource (490 pages)
    Keywords: Electronic books ; local
    Abstract: Conducting business via the Web and remaining open for business 24 hours a day, seven days a week is now commonplace. Customers come in with unexpected workloads through the Web and operate in a self-service fashion with mostly context-sensitive metadata to guide them. The strong requirement is availability. However, even with new Web applications, most of the core business systems considerations still apply, and performance is critical. Technology has been accelerating for mainframe systems. They had become adept at providing business resiliency accommodating strategic software that has been around for the last several decades such as IMS™ , DB2® , and CICS® , and they have also become a host for developing and running Web applications built in Java™ accommodating the latest business requirements. Businesses need to leverage, extend and integrate the strategic assets which represent multi-year investments to support leading edge technology. DB2 for z/OS® has come a long way and provides facilities to exploit the latest hardware and software technologies, accommodating a majority of user requirements. However, special considerations are required to build high performance applications. If you want to achieve high performance or high availability, you must use the design, programming, and operational techniques applicable to DB2. In this IBM Redbooks publication we discuss many of these techniques and provide guidelines for database and application design. We expect the best practices described in this book will help DB2 professionals design high-performance and high-availability applications. Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed January 9, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (288 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: China's breakneck industrialization is placing it on a collision course with the entire world. Tomorrow's China Wars will be fought over everything from decent jobs, livable wages, and leading-edge technologies to strategic resources such as oil, copper, and steel...even food, water, and air. In The Coming China Wars, best-selling author Peter Navarro previews all these potential conflicts-and reveals the urgent, radical decisions that must be made to avoid catastrophe. You'll learn how China's thirst for oil is driving nuclear proliferation in Iran, genocide in the Sudan, even Japan's remilitarization. You'll discover China's shocking role in the drug trade and how its reborn flesh trade may help trigger tomorrow's worst AIDS crisis. Navarro also reveals how China has become the world's most ruthless imperialist...how it is promoting global environmental disaster... and, perhaps most terrifying of all, how this nuclear superpower and pirate nation may be spiraling toward internal chaos. The threat is real. We all must come to understand it and then act! Start here and now by arming yourself with the information and insights of The Coming China Wars. The "China Price": Conquering the world's export markets The real story behind China's "weapons of mass production" China versus U.S.: The "blood for oil" flashpoints The coming U.S./China showdown over oil Pirate Nation: China's state-sanctioned thievery How China's counterfeit drugs and products can literally kill you Triggering tomorrow's worst AIDS crisis China's 21st century flesh trade: The seeds of a global health disaster "Peter Navarro has captured the breadth of areas where China and the United States have fundamental conflicts of business, economic and strategic interests. He puts this into a global context demonstrating where China's current development course can lead to conflict. His recommendations for nations to coalesce to respond to the challenges posed by China are practical. This book should be in the hands of every businessperson, economist and policy-maker." -Dr. Larry M. Wortzel, Chairman, US-China Economic and Security Review Commission "The Coming China Wars is a gripping, fact-filled account of the dark side of China's rise that will be of interest to anyone interested in this complex and fascinating country. Navarro makes no pretense toward searching for the middle ground in the China debate. He issues a call to arms for China and the rest of the world to act now t...
    Note: Online resource; Title from title page (viewed October 19, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Syngress | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (737 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point. One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and services. The last part of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ. The only book published on Network DMZs on the components of securing enterprise networks This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point Provides detailed examples for building Enterprise DMZs from the ground up and retro-fitting existing infrastructures
    Note: Online resource; Title from title page (viewed October 9, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Newnes | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (656 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Cognitive radio technology is a smarter, faster, and more efficient way to transmit information to and from fixed, mobile, other wireless communication devices. Cognitive radio builds upon software-defined radio technology. A cognitive radio system is 'aware' of its operating environment and automatically adjusts itself to maintain desired communications-it's like having a trained operator 'inside' the radio making constant adjustments for maximum performance. Operating frequency, power output, antenna orientation/beamwidth, modulation, and transmitter bandwidth are just a few of the operating parameters that can automatically be adjusted "on the fly in a cognitive radio system. Fette has constructed a cutting-edge volume that hits all of the important issues including research, management, and support. Cognitive techniques will be discussed such as position and network awareness, infrastructure and physical and link layer concerns. Though still a nascent technology, cognitive radio is being pushed by the US military and for mission-critical civilian communications (such as emergency and public safety services). *The first book on a revolutionary technology that will be critical to military, emergency, and public safety communications *A multi-contributed volume written by the leaders in this exciting new area *Describes the location-determination capabilities of cognitive radio (the precise location of all units in a cognitive radio network can be determined in real time)
    Note: Online resource; Title from title page (viewed August 8, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : A K Peters/CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (600 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The author takes readers on an in-depth walkthrough of the Torque Game Engine---one of the most popular, powerful, and easy to use game engines available today. With clear explanations of how to use Torque to create your own games and detailed discussions of the engine's inner workings, this book is a must read for any programmer interested in maki
    Note: Online resource; Title from title page (viewed March 8, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Elsevier Science | Boston, MA : Safari
    ISBN: 0080474772 , 9780080474779 , 1280968176 , 9781280968174 , 9786610968176 , 6610968179
    Language: English
    Pages: 1 online resource (600 pages)
    Series Statement: Morgan Kaufmann series in interactive 3D technology
    Parallel Title: Erscheint auch als
    Keywords: Quaternions ; Electronic books ; local ; MATHEMATICS ; Algebra ; Linear ; Quaternions ; Quaternions ; Quaternions ; Electronic books ; Electronic books
    Abstract: Introduced 160 years ago as an attempt to generalize complex numbers to higher dimensions, quaternions are now recognized as one of the most important concepts in modern computer graphics. They offer a powerful way to represent rotations and compared to rotation matrices they use less memory, compose faster, and are naturally suited for efficient interpolation of rotations. Despite this, many practitioners have avoided quaternions because of the mathematics used to understand them, hoping that some day a more intuitive description will be available. The wait is over. Andrew Hanson's new book is a fresh perspective on quaternions. The first part of the book focuses on visualizing quaternions to provide the intuition necessary to use them, and includes many illustrative examples to motivate why they are important-a beautiful introduction to those wanting to explore quaternions unencumbered by their mathematical aspects. The second part covers the all-important advanced applications, including quaternion curves, surfaces, and volumes. Finally, for those wanting the full story of the mathematics behind quaternions, there is a gentle introduction to their four-dimensional nature and to Clifford Algebras, the all-encompassing framework for vectors and quaternions. * Richly illustrated introduction for the developer, scientist, engineer, or student in computer graphics, visualization, or entertainment computing. * Covers both non-mathematical and mathematical approaches to quaternions. * Companion website with an assortment of quaternion utilities and sample code, data sets for the book's illustrations, and Mathematica notebooks with essential algebraic utilities.
    Note: Online resource; Title from title page (viewed February 6, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...