Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (382)
  • 2005-2009  (382)
  • 2008  (1)
  • 2005  (381)
  • Safari Tech Books Online  (382)
Datasource
Material
Language
  • English  (382)
Years
  • 2005-2009  (382)
Year
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School Publishing | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 185 p. ; , 19 cm
    DDC: 174/.4
    Keywords: Huntsman, Jon M ; Business ethics ; Businessmen ; United States ; Biography ; Executives ; Conduct of life ; Success in business ; Moral and ethical aspects ; Electronic books ; local
    Abstract: Next time someone tells you business can't be done ethically -- corners must be cut, negotiations can't be honest -- hand them Jon Huntsman's new book. He started with practically nothing, and made it to Forbes'list of America's Top 100 richest people. Huntsman's generous about sharing the credit, but in the 21st century, he's the nearest thing to a self-made multi-billionaire. Now, he presents the lessons of a lifetime: a passionate, inspirational manifesto for returning to the days when your word was your bond, a handshake was sacred, and swarms of lawyers weren't needed to back it up. This is no mere exhortation: it's a practical business book about how to listen to your moral compass, even as others ignore theirs. It's about how you build teams with the highest values, share success, take responsibility, and earn the rewards that only come with giving back. Huntsman's built his career and fortune on these principles. You don't live these principles just to 'succeed': you live them because they're right. But in an age of non-stop business scandal, Huntsman's life proves honesty is more than right: it's the biggest competitive differentiator.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 670 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.7585
    Keywords: Microsoft Windows server ; Client/server computing ; Operating systems (Computers) ; Electronic books ; local
    Abstract: This practical reference guide offers hundreds of useful tasks for managing Windows 2000 and Windows Server 2003, Microsoft's latest and greatest server. Through concise, on-the-job solutions to common problems, Windows Server Cookbook for Windows Server 2003 & Windows 2000 is certain to save you hours of time searching for answers.Now, instead of dredging reams of Microsoft documentation or browsing its unstructured knowledge base to figure out a particular issue--such as how to compare registry values between two hosts--you can simply reference the index of Windows Server Cookbook for Windows Server 2003 & Windows 2000 . From there, you'll be directed to the exact trouble-shooting recipe they need.As the newest title in O'Reilly's popular Cookbook series, this book covers a wide range of issues that you are likely to face in your daily management of the Windows Server operating system. This includes how to deal with: files event logs DNS DHCP security the registry backup/restore One of the book's key benefits is the presentation of solutions in three different recipe formats. Depending on preference, you can solve most problems with the graphical user interface, the command line, or by using scripts. Where appropriate, all three solutions are presented for each recipe in this book. Each recipe also includes a detailed discussion that explains how and why it works. Windows Server Cookbook for Windows Server 2003 & Windows 2000 is written for all levels of system administrators on Windows servers. If you're a relatively new user with only a rudimentary understanding of the job, the book can open your eyes to the many possibilities that await. And if you're an advanced user, it can serve as a useful reference and memory-jogger.Download the code examples from this book. The complete set of examples isavailable at: http://www.rallenhome.com/books/​winsckbk/code.html .
    Note: "Step-by-step procedures and scripts for every occasion"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Upper Saddle River, NJ : IBM Press | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 278 p. ; , 24 cm
    DDC: 658/.05
    Keywords: Information technology ; Economic aspects ; Information technology ; Social aspects ; Information technology ; Technological innovations ; Electronic books ; local
    Abstract: How "data everywhere" transforms business, technology, and the way you live A pioneering look at grand, new efficiencies forthcoming As communications, computing, and data storage converge, data is becoming utterly ubiquitous...and that changes everything. In this book, two leading data management visionaries reveal how data transforms the way you do business, the technologies you use, the investments you make, the life you live, and the world you live in. Chris Stakutis and John Webster draw on interviews with nearly 50 leading experts: technologists, sociologists, entrepreneurs, consultants, researchers, media leaders, and futurists alike. You'll discover how today's "primordial soup" of wired and wireless gadgetry is quickly coalescing into something immensely more powerful, driving applications you thought were pure science fiction. You'll also gain deep insight into the profound implications of ubiquitous data capture: implications that touch everything from your bedroom to the battlefield: The emerging "Connectivity Divide." Which side of the chasm are you on? Inescapable data's technical components: Async communications, pervasive computing devices, wireless, and XML Global calendars, momentary enterprises: Transforming your life and business Uncontrolled information availability: Its risks to your security and well-being The future of technical infrastructure, grids, smart storage, and beyond Radical, new modes of information delivery: Nonnumeric, nontextual, unobtrusive Future tech: From holographic displays to fertility "wall clocks" Your DNA on a chip: The heart of your personal health and wellness program © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 338 p. , ill. ; , 24 cm
    DDC: 005.2762
    Keywords: Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Easy-to-follow coverage of twelve indispensable Jakarta Commons packages Code examples that show innovative uses of Commons components, including using HttpClient to access Web resources, FileUpload for handling HTTP file uploads, and BeanUtils for easy form generation Detailed instructions for combining the Commons project libraries with the popular Eclipse IDE Save time and money with reusable open source Java™ components Master the Jakarta Commons Library of Open Source JavaTM Components Using the Apache Jakarta Commons reusable Java™ components, you can leverage the work of the global open-source community to solve common programming problems reliably, quickly, and inexpensively. But, to use the Commons libraries effectively, you need far more guidance than the official documentation offers. In Apache Jakarta Commons: Reusable Java™ Components, Will Iverson covers what Java developers need to know to take full advantage of Jakarta Commons-starting right now. Iverson begins with a definitive overview of the Commons project: goals, installation, and getting started with Commons components. Next, he presents example-rich chapters on the twelve most useful Commons packages, covering topics ranging from HTTP FileUpload to database connectivity. Iverson provides detailed code samples for every component he describes. After you've mastered the core Jakarta Commons packages, you'll constantly rely on this book's handy seventy-five page quick-reference. Iverson's coverage includes Downloading Commons project libraries and installing them into Eclipse Programmatically accessing resources via HTTP, FTP, NNTP, and other Internet protocols Using the Jakarta Commons suite of configurable object pools Managing database connectivity in Swing applications-and anywhere containers aren't doing it for you Using BeanUtils to generate forms and gain runtime access to information provided by JavaBeans-style objects Traversing complex object graphs with JXPath Using Jakarta Commons' advanced collections tools to establish richer object relationships Extending java.lang with better methods for manipulating core classes Implementing conversion routines, configurable logging, command-line help, and more Exploring the newest packages, including emerging "sandbox" packages Whether you're building code for front-end Web applications, client-side software, or back-end servers, learning Jakarta Commons will make you far more efficient. Apache Jakarta Commons is the faste...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 689 p. , ill. ; , 24 cm
    DDC: 005.2'762
    Keywords: PHP (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: "This book, written by my colleague, Andi Gutmans, and two very prominent PHP developers, Stig Bakken and Derick Rethans, holds the key to unlocking the riches of PHP 5. It thoroughly covers all of the features of this new version, and is a must have for all PHP developers interested in exploring PHP 5's advanced features" -Zeev Suraski, Co-Designer of PHP 5 and Co-Creator of the Zend Engine Expert PHP 5 programming techniques, direct from PHP 5 co-creator and key developers Definitive coverage of the PHP object model, design patterns, XML/SOAP integration, and more Solid introduction and expert insights into performance tuning, PEAR, extensions, and database access The definitive introduction to PHP 5's advanced features! The definitive introduction for today's most powerful PHP 5 techniques In this book, PHP 5's co-creator and two leading PHP developers show you how to make the most of PHP 5's industrial-strength enhancements in any project-no matter how large or complex. Their unique insights and realistic examples illuminate PHP 5's new object model, powerful design patterns, improved XML Web services support, and much more. Whether you're creating web applications, extensions, packages, or shell scripts-or migrating PHP 4 code-here are high-powered solutions you won't find anywhere else. Review PHP's syntax and master its object-oriented capabilities-from properties and methods to polymorphism, interfaces, and reflection Master the four most important design patterns for PHP development Write powerful web applications: handle input, cookies, session extension, and more Integrate with MySQL, SQLite, and other database engines Provide efficient error handling that's transparent to your users Leverage PHP 5's improved XML support-including parsing, XSLT conversions, and more Build XML-based web services with XML-RPC and SOAP Make the most of PEAR: work with the repository, use key packages, and create your own Upgrade PHP 4 code to PHP 5-compatibility issues, techniques, and practical workarounds Improve script performance: tips and tools for PHP optimization Use PHP extensions to handle files/streams, regular expressions, dates/times, and graphics Create original extensions and shell scripts If you're a software developer new to PHP, you'll leap quickly into PHP and its new object-oriented capabilities. If you're an experienced PHP programmer, you already recognize PHP's convenience and simplicity. Now, discover all of its extraordinary pow...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Pearson Education/PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 337 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: BEA WebLogic server ; BEA WebLogic workshop ; Client/server computing ; Java (Computer program language) ; Web services ; Electronic books ; local
    Abstract: "Very impressive work. This book is valuable for beginning and intermediate technologists." Dwight Mamanteo, Technical Manager, BEA Systems "Provides explanations of Web services, tuning tips, and discussions on security that will likely be of benefit to developers as they create their Web services." Robert W. Husted, Member, Technical Staff, Requisite Software Build Web services infrastructure based on service-oriented architecture (SOA) Implement enterprise-class Web services using WebLogic and J2EE Complete lifecycle coverage with best practices: design, prototyping, development, testing, deployment, and management Real-world enterprise Web services implementation with J2EE and WebLogic You've seen plenty of theory about Web services. This book is about the reality: what it takes to successfully implement J2EE Web services with BEA WebLogic in complex enterprise environments. Anjali Anagol-Subbarao, one of the world's leading Web services experts, offers powerful insights for every stage of the Web services lifecycle: design, prototyping, development, testing, deployment, and management. Anagol-Subbarao draws on her experience architecting and building Web services infrastructure for HP's worldwide operations and takes on the challenges that face every enterprise implementer. She demonstrates how to design robust Web services that align with business processes, smoothly integrate with existing infrastructure, deliver superior performance and security, and can be managed effectively. Coverage includes Primers on WebLogic Workshop, WebLogic Server, WLI, and J2EE Web services technology Building effective service-oriented architectural (SOA) frameworks Translating designs into working code Designing for end-to-end security and tuning for high performance Testing Web services and deploying them to production environments Addressing the unique challenges associated with managing distributed Web services © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 396 p. , ill. ; , 23 cm
    DDC: 004.692
    Keywords: Spam (Electronic mail) ; Spam filtering (Electronic mail) ; Electronic books ; local
    Abstract: Real Anti-Spam Help for System Administrators In Slamming Spam , two spam fighters show you how to fight back-and win. Unlike most spam books, this one is written specifically for in-the-trenches system administrators: professionals who need hands-on solutions for detecting, managing, and deterring spam in Unix/Linux and/or Microsoft Windows environments. The authors offer deep, administrator-focused coverage of the most valuable open-source tools for reducing spam's impact in the enterprise-especially SpamAssassin. Drawing on their extensive experience in developing and implementing anti-spam tools, the authors present expert insights into every leading approach to fighting spam, including Bayesian filtering, distributed checksum filtering, and email client filtering. Coverage includes Step-by-step junk mail filtering with Procmail Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse McAfee SpamKiller for Lotus Domino McAfee SpamKiller for Microsoft Exchange Implementing and managing SpamAssassin Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords Sender verification techniques, including challenge/response, special use addresses, and sender compute Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs-IT staff time, network/computing resources, and user productivity. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 363-374) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Indianapolis, MA : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Proven techniques for optimizing web, file, print, database, and application servers Practical introductions to open source performance management tools Easy-to-understand examples based on Red Hat Enterprise Linux and Novell SUSE Linux Enterprise Server An indispensable guide to maximizing Linux system and application performance From Wall Street to Hollywood, Linux runs many of the world's most businesscritical systems. Linux performance now impacts the entire enterprise. In Performance Tuning for Linux Servers, a team of IBM's most-experienced Linux performance specialists shows you how to find bottlenecks, measure performance, and identify effective optimizations. This book doesn't just cover kernel tuning: it shows how to maximize the end-to-end performance of real-world applications and databases running on Linux. Throughout, the authors present realistic examples based on today's most popular enterprise Linux platforms, Intel-based Red Hat Enterprise Linux, and Novell SUSE Linux Enterprise Server. These examples are designed for simplicity, clarity, and easy adaptation to any contemporary Linux environment. You'll discover how to Install and configure Linux for maximum performance from the outset Evaluate and choose the right hardware architecture for your Linux environment Understand Linux kernels 2.4 through 2.6: components, performance issues, and optimization opportunities Master core Linux performance tuning principles and strategies Utilize free, open source tools for measurement, monitoring, system tracing, and benchmarking Interpret performance data to analyze your Linux server's real-world behavior Optimize Linux system schedulers, memory, I/O, file systems, and networking Tune web, file, database, and application servers running commercial workloads Predict the impact of changes in tuning parameters or configurations Tune Linux code: optimize design, timing, sockets, threads, synchronization, and more Architect for maximum performance: SMP scaling, clustering, and topology Integrate kernel and application tuning in end-to-end system optimization projects Whether you're an administrator, developer, integrator, or consultant, Performance Tuning for Linux Serverswill help you maximize the performance and value of every Linux system and application you run. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxi, 370 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Broadband communication systems ; Extranets (Computer networks) ; MPLS standard ; Electronic books ; local
    Abstract: Implement the design principles and configurations behind MPLS-based VPNs for broadband access networks The book discusses how MPLS and its VPN service are best used in a broadband environment, concentrating on key design issues and solutions, including How to manage tens of thousands of interfaces and host routes and hundreds of dynamic VPNs When a Virtual Home Gateway is necessary Why use dynamic address assignment How routes should be summarized into the core Deploy MPLS VPNs successfully in broadband networks with Building MPLS-Based Broadband Access VPNs . This book helps you understand why and how today's broadband networks function, covering the principal access technologies: DSL, Ethernet, and cable. The book also examines the different tunneling protocols used for VPN solutions today, namely GRE, IPSec, and L2TP, with examples of how these solutions are deployed and a discussion of their strengths and weaknesses. Building MPLS-Based Broadband Access VPNs also includes an in-depth description of the IOS VRF Lite, which helps you use VRF-aware features with an IP core. Detailed descriptions of the technologies, design principles, network configurations, and case studies are provided throughout the book, helping you develop a pragmatic understanding of MPLS-based broadband access VPNs. Obtain a realistic understanding of large-scale broadband access network design requirements Recognize the business impact of using MPLS to provide access VPN services, including the advantages of QoS, availability, and provisioning Use MPLS in access VPN and transport networks and deal with the unique scalability problems that such networks pose Leverage VRF-aware features to deploy IP-based VPNs Includes detailed Cisco IOS configuration examples based on real-world scenarios This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references (p. [341]-355) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 651 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Where has this book been all my professional life? It is about time someone wrote this book. The author covers many basic, practical issues that other authors omit in a format that makes for a great troubleshooting reference and for casual perusing. There are a lot of books available that give a broad overview of system and network administration, and there are a lot of detailed books on each specific topic covered in this book, but I don't know of any other place where I can get so much useful, practical information on such a wide range of topics in such a concise and readable form. I will highly recommend it to my friends and colleagues who are trying to manage their own systems. I am anxious to show it to our instructors who teach data communications and networks as a possible text or lab manual." -Ron McCarty, instructor and program chair, Computer Science, Penn State Erie "This book takes a very unique approach and is very flexible. It offers a great deal to the home user, students, small businesses-all the way to any Linux sys admin that needs a handy reference. I found it very refreshing in terms of style, stated goals, presentation, ease of use, direction, and the "present and future" value of the content. In other words the author is very current and knowledgeable. I would recommend this book to every level from programmer to manager." -Joe Brazeal, Information Technician III, Southwest Power Pool "This book is an excellent resource for new Linux administrators. I was impressed with the comprehensive set of 35 topic chapters, making this book a very useful reference. I know of no other work like this." -George Vish II, Linux curriculum program manager and senior education consultant, Hewlett-Packard Education "I would recommend this book to novice Linux users and administrators. It covers a lot of topics, and makes it easy for readers to follow along." -Bret Strong, education consultant, Hewlett-Packard Company "Linux Quick Fix Notebook is a well-written guide to designing, installing, and maintaining Linux servers. Many Linux reference texts are just simple rewrites of Linux ¨man¨ and ¨info¨ pages, but this book addresses the real issues that systems administrators encounter when working with Linux. The author provides a pedagogical guide to learning Linux server administration. In addition, the book includes step-by-step information so that users can quickly take advantage of the best that open source software has to offer today. I...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A comprehensive guide to analyzing the business rationale for WLANs Evaluate the business rationale behind the deployment of WLANs, including return on investment (ROI), net present value, payback period, and total cost of ownership Develop a robust execution plan to deploy and operate the WLAN Understand the high-level technical issues of deploying and managing your WLAN from a business decision-maker's perspective Maximize the positive impact of supplementary and complementary services such as voice, video, and guest WLAN access Identify potential security threats and develop strategies to mitigate attacks Learn methodological and technical best practices from WLAN deployment case studies featuring real-world, enterprise-class businesses and institutions Gather information easily by referring to quick reference sheets and appendixes covering an antenna overview, a high-level sample project plan, checklists, and flowcharts Businesses today are increasingly adopting wireless LANs (WLANs) as a primary data transport mechanism. To determine when and how to effectively deploy WLANs, business managers, project managers, and IT executives need a clear, holistic evaluation of the business benefits and risks behind this complex technology solution. The Business Case for Enterprise-Class Wireless LANs helps you make the right decisions by explaining the business value and cost of investing in a WLAN-from security and architecture to deployment and application. Using a lifecycle perspective, this guide covers the value proposition, cost justification, and alignment of security, design, and operational components within the business. Written in an approachable style, The Business Case for Enterprise-Class Wireless LANs provides a baseline analysis of WLAN technologies for a large-scale deployment and includes concise real-world case studies with checklists and flowcharts that you can adapt for your needs. By recognizing the obstacles and advantages of implementing a WLAN from a strategic and justified business perspective, you can apply the economic benefits to your organization and ensure a timely and efficient deployment of your organization's WLAN. This volume is in the Network Business Series offered by Cisco Press®. Books in this series provide IT executives, decision makers, and networking professionals with pertinent information about today's most important technologies and business strategies.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: Your complete guide to building your information technology career in any economy The IT Career Builder's Toolkit features market-focused skills and proven methods you can use to jump-start and advance your career. While other books cover just the mechanics of preparing your résumé, writing a cover letter, and interviewing, this book provides all that plus additional insight from IT career development expert, Matt Moran, to help you plan and create a rewarding IT career over the long term. The toolkit approach allows you to use this book to suit your unique needs: Are you new to the IT field? Benefit by reading the book cover to cover. Just need to fine-tune your IT career? Choose a topic and dive in. Understand and prepare for the various and changing factors that affect your career in both positive and negative ways. Learn how to Present the value of your technical skills in the job market Position yourself as the primary commodity of your career Remove the guesswork out of job searches Highlight on-the-job skills and gain meaningful professional exposure The companion CD-ROM includes career management tools such as résumé and cover letter templates, forms to track important contacts, and self-assessment tools. Start or further your consulting career with sample proposals, opportunity tracking forms, and a time-tracking and billing database. Financial tools, including budget and cash-flow summary worksheets, help you gain financial well-being. Use the Value-Added Technologist presentation to gain a clear understanding of the career-building process and how to use the toolkit to build a dynamic career. Most of all, have fun! Every year, people advance along the path to career stardom. Let Matt help you to be one of them through his career philosophy "Do not accept mediocrity as a career objective-demand more of yourself." "I want you to see the [toolkit] techniques as one more set of skills to adopt in your overall career development program. They are skills, just like your technical skills, that you will use daily during your career. Just as you adopt new technical skills, use the toolkit to define those soft skills that you must learn and put to use. The result will be a more well-rounded and complete professional skill-set." ~ Matthew Moran, from the Introduction Companion CD-ROM The CD-ROM contains valuable tools, forms, spreadsheets, and documents that work with the Toolkit to help you master key areas of your career development.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A complete configuration manual for MPLS, MPLS VPNs, MPLS TE, QoS, Any Transport over MPLS (AToM), and VPLS Understand the crucial Cisco commands for various MPLS scenarios Understand fundamentals of MPLS operation and learn to configure basic MPLS in Frame Relay and ATM-based environments Master fundamentals of MPLS VPN operation including Multiprotocol BGP (MBGP) operation, VPNv4 route exchange, and basic MPLS VPN configuration in the provider network Understand and configure various PE-CE routing protocols in MPLS VPN networks Understand MPLS VPN provisioning in an Inter-provider VPN (Inter-AS) and Carrier Supporting Carrier (CSC) environment Learn MPLS TE and its advanced features Examine AToM with configuration examples for like-to-like and any-to-any L2 VPN implementations and VPLS components and operation, VPLS configuration and verification, and VPLS topologies Learn about MPLS QoS, including configuration and implementation of uniform and short pipe modes MPLS Configuration on Cisco IOS Software is a complete and detailed resource to the configuration of Multiprotocol Label Switching (MPLS) networks and associated features. Through its practical, hands-on approach, you'll become familiar with MPLS technologies and their configurations using Cisco IOS® Software. MPLS Configuration on Cisco IOS Software covers basic-to-advanced MPLS concepts and configuration. Beyond its emphasis on MPLS, you'll learn about applications and deployments associated with MPLS, such as traffic engineering (TE), Layer 2 virtual private networks (VPN), and Virtual Private LAN Service (VPLS). You'll receive practical guidance and deployment scenarios that can be enhanced by re-creation of the setups and configurations demonstrated within this book. You'll move quickly from a brief overview of MPLS technology and basic MPLS configuration on Cisco® routers to more advanced topics. Several chapters provide instruction on VPN connectivity options, including implementing Border Gateway Protocol (BGP) in MPLS VPNs. You'll receive configuration guidelines for advanced MPLS implementations such as MPLS TE, quality of service (QoS), and extranet VPNs. You'll learn about implementation of Layer 2 VPNs versus Layer 3 VPNs with Cisco Any Transport over MPLS (AToM). And you'll see demonstrations of implementing VPLS on Cisco routers complete with the configurations and platform support. "I highly recommend MPLS Configuration on Cisco IOS Software as required reading for th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Exposes the inner workings of Cisco CallManager to help you maximize your Cisco IP Communications solution Read new content on QSIG, SIP trunks, video support, hunt lists and line groups, time-of-day routing, and new features added in CallManager releases 3.2, 3.3, 3.4, 4.0, and 4.1 Review content from the first edition that has been fully revised and updated to CallManager release 4.1 Learn how to deploy and manage a CallManager solution Understand the components that make up CallManager call routing through the use of basic to advanced examples that solve enterprise call routing problems Gain a full understanding of how CallManager manages media resources and processes information for conferencing, transcoding, annunciation, and more Learn detailed information about North American and international dial plans, trunk and station devices, media resources, and much more Cisco CallManager Fundamentals , Second Edition, provides examples and reference information about Cisco® CallManager, the call-processing component of the Cisco IP Communications solution. Cisco CallManager Fundamentals uses examples and architectural descriptions to explain how CallManager processes calls. This book details the inner workings of CallManager so that those responsible for designing and maintaining a Voice over IP (VoIP) solution from Cisco Systems® can understand the role each component plays and how they interrelate. This book is the perfect resource to supplement your understanding of CallManager. You'll learn detailed information about dial plan management and call routing, hardware and software components, media processing, call detail records, system management and monitoring, and the history of CallManager. The authors, all members of the original team that developed and implemented the CallManager software and documentation from its early stages, also provide a list of features and Cisco solutions that integrate with CallManager. This second edition of Cisco CallManager Fundamentals covers software releases through release 4.1. With this book, you will gain a deeper understanding of the system and find answers to questions not available in any other source. This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xx, 268 p. , ill. ; , 24 cm
    DDC: 686.2/2544536
    Keywords: Adobe InDesign ; Desktop publishing ; Electronic books ; local
    Abstract: Costs less. Does more. Is easier to use: If this is the conclusion you've reached when comparing InDesign CS with its two long-time rivals (QuarkXPress and PageMaker), you're ready to make the switch. This guide shows you how! Throughout this compact guide, the focus is on leveraging your skill in the other leading desktop publishing packages to get up to speed fast in the new leading publishing package! As the perfect companion to the more comprehensive Real World InDesign CS , this tightly focused guide details the most common tasks and techniques you need to know to get your job done in InDesign CS. Clear, concise instructions enhanced by plenty of screen shots and sample layouts show you how to create and navigate documents, import and style text and objects, manage long projects, work with color, and more. You¿ll also find good coverage of all of InDesign's newest and most unique features: the Story Editor, a Separation Preview palette, nested styles, the Package for GoLive command, and more.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Finally, there's a book that treats Excel as the powerful development platform it really is, and covers every facet of developing commercial-quality Excel applications. This is not a book for beginners. Writing for professional developers and true Excel experts, the authors share insider's knowledge they've acquired building Excel applications for many of the world's largest companies-including Microsoft. Professional Excel Development demonstrates how to get the utmost from Excel, addressing everything from application architectures through worksheet and userform design, charting, debugging, error handling and optimizing performance. Along the way, the authors offer best practices for every type of Excel development, from building add-ins through interacting with XML Web services. Coverage includes Building add-ins to provide new Excel functions Designing effective worksheets, userforms and other user interface elements Leveraging Excel's powerful data analysis features Creating sophisticated custom charts Handling errors, debugging applications and optimizing performance Using class modules and interfaces to create custom objects Understanding Windows API calls: when to use them, and how to modify them Adding worksheet functions with C-based XLLs Programming with databases Controlling external applications from Excel Integrating with Visual Basic 6, VB.NET and Visual Studio Tools for Office Using XML to import and export data and communicate with Web services Providing help, securing, packaging and distributing The accompanying CD-ROM contains the book's sample timesheet application at every stage of construction, with detailed code comments. It also includes many examples of the concepts introduced in each chapter and a collection of the authors' Excel development utilities. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 369 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Linux ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: Covers Red Hat and SUSE When something goes wrong with your Linux firewall, you need to fix it-right now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes: Troubleshooting Linux® Firewalls . Authors Michael Shinn and Scott Shinn are among the world's leading firewall experts; they've even been hired to protect computer security at the White House. In this book, they cover every area where Linux firewalls can go wrong: rules and filtering problems, Layer 2/3/4 issues, trouble with individual services, DNS/DHCP failures, even misconfigured VPNs. They also present an easy, start-to-finish troubleshooting methodology that'll help you identify even the newest or most obscure firewall problem fast-and solve it! Inside, you will find in-depth information on the following areas: What you must know about iptables and netfilter to troubleshoot and avoid problems Using loggers, sniffers, and other tools to diagnose even the most obscure firewall problems Making sure your firewall rules work the way they're supposed to Resolving problems with Network Address Translation and IP Forwarding Troubleshooting SMTP, Apache, Squid, NFS, FTP, instant messaging, and other Web-based services Finding and fixing common problems with IPsec VPN configuration Making your firewalls more failure-resistant: recommendations from the experts If you depend on a Linux firewall, what will you do if it goes down? With Troubleshooting Linux® Firewalls , you can be confident that the solutions are right at hand-so you can sleep at night! © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Introducing the Boost libraries: the next breakthrough in C++ programming Boost takes you far beyond the C++ Standard Library, making C++ programming more elegant, robust, and productive. Now, for the first time, a leading Boost expert systematically introduces the broad set of Boost libraries and teaches best practices for their use. Writing for intermediate-to-advanced C++ developers, Björn Karlsson briefly outlines all 58 Boost libraries, and then presents comprehensive coverage of 12 libraries you're likely to find especially useful. Karlsson's topics range from smart pointers and conversions to containers and data structures, explaining exactly how using each library can improve your code. He offers detailed coverage of higher-order function objects that enable you to write code that is more concise, expressive, and readable. He even takes you "behind the scenes" with Boost, revealing tools and techniques for creating your own generic libraries. Coverage includes Smart pointers that provide automatic lifetime management of objects and simplify resource sharing Consistent, best-practice solutions for performing type conversions and lexical conversions Utility classes that make programming simpler and clearer Flexible container libraries that solve common problems not covered by the C++ Standard Library Powerful support for regular expressions with Boost.Regex Function objects defined at the call site with Boost.Bind and Boost.Lambda More flexible callbacks with Boost.Function Managed signals and slots (a.k.a. the Observer pattern) with Boost.Signals The Boost libraries are proving so useful that many of them are planned for inclusion in the next version of the C++ Standard Library. Get your head start now , with Beyond the C++ Standard Library.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Upper Saddle River, NJ. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations of UNIX and UNIX-like environments. And yet, it does all this while retaining the style and taste of the original classic." --Mukesh Kacker, cofounder and former CTO of Pronto Networks, Inc. "One of the essential classics of UNIX programming." --Eric S. Raymond, author of The Art of UNIX Programming "This is the definitive reference book for any serious or professional UNIX systems programmer. Rago has updated and extended the classic Stevens text while keeping true to the original. The APIs are illuminated by clear examples of their use. He also mentions many of the pitfalls to look out for when programming across different UNIX system implementations and points out how to avoid these pitfalls using relevant standards such as POSIX 1003.1, 2004 edition and the Single UNIX Specification, Version 3." --Andrew Josey, Director, Certification, The Open Group, and Chair of the POSIX 1003.1 Working Group " Advanced Programming in the UNIX® Environment, Second Edition, is an essential reference for anyone writing programs for a UNIX system. It's the first book I turn to when I want to understand or re-learn any of the various system interfaces. Stephen Rago has successfully revised this book to incorporate newer operating systems such as GNU/Linux and Apple's OS X while keeping true to the first edition in terms of both readability and usefulness. It will always have a place right next to my computer." --Dr. Benjamin Kuperman, Swarthmore College Praise for the First Edition " Advanced Programming in the UNIX® Environment is a must-have for any serious C programmer who works under UNIX. Its depth, thoroughness, and clarity of explana-tion are unmatched." -- UniForum Monthly "Numerous readers recommended Advanced Programming in the UNIX® Environment by W. Richard Stevens (Addison-Wesley), and I'm glad they did; I hadn't even heard of this book, and it's been out since 1992. I just got my hands on a copy, and the first few chapters have been fascinating." -- Open Systems Today "A much more readable and detailed treatment of UNIX internals can be found in Advanced Programming in the UNIX® Environment by W. Richard Steven...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvi, 316 p. , ill. ; , 24 cm
    DDC: 006.74
    Keywords: HTML (Document markup language) ; Electronic books ; local
    Abstract: The fastest route to true HTML/CSS mastery! Need to build a web site? Or update one? Or just create some effective new web content? Maybe you just need to update your skills, do the job better. Welcome. This book's for you. We'll leverage what you already know about the web, so you'll go further, faster than you ever expected. You'll master today's best practices: the real nuts and bolts, not theory or hooey. You'll learn through dozens of focused HTML, XHTML, and CSS examples: crafted for simplicity and easy to adapt for your own projects. Need specific solutions? This book's modular, visual, high-efficiency format delivers them instantly . Molly E. Holzschlag draws on her unparalleled experience teaching Web design and development. No other HTML/CSS guide covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with HTML, XHTML, and CSS in real-world projects Learn how to build web pages that'll work in any environment, on virtually any contemporary browser Construct templates that simplify every page you develop Structure and tag text so it's easy to work with and manage Add images, media, and scripts-quickly and reliably Discover the right ways to use HTML tables Build easy-to-use forms and validate your users' input Use CSS to take total control over your site's look and feel Master core CSS techniques: color, images, text styles, link effects, lists, navigation, and more Control margins, borders, padding, positioning, floats, even Z-index Design efficient, compatible, easy-to-manage CSS layouts Includes concise XHTML and CSS annotated references: quick help for every language element Spring Into... is a new series of fast-paced tutorials from Addison-Wesley. Each book in the series is designed to bring you up to speed quickly. Complex topics and technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working...now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network. Securing Your Business with Cis...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The all-in-one practical guide to supporting your Cisco network Provides detailed tips for using freeware and open-source tools readily available from the Internet, including the reasons behind choosing a particular tool Refer to a single source for common Cisco network administration issues Dedicated section for network security aids administrators in effectively dealing with security issues Deploy fully functional RADIUS and TACACS+ for servers for controlling access to Cisco devices Deploy Linux- and Windows-based syslog servers to centrally collect syslog information generated by Cisco devices Deploy Linux- and Windows-based network monitoring systems to monitor interface traffic through Cisco devices including routers, switches, VPN concentrators, and Cisco PIX® firewalls Use the trending feature of network monitoring systems for long-term network analysis and capacity planning Automatically detect and report configuration changes on Cisco IOS® Software-based devices and Cisco PIX firewalls Deploy Cisco-based VPNs in mixed environments using Linux- and Windows-based VPN servers Network Administrators Survival Guide solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco® networks using freeware tools. It is a single reference source that explains particular issues, their significance for administrators, and the installation and configuration process for the tools. The solutions are Cisco centric and provide detail not available in generic online information. Network Administrators Survival Guide emphasizes solutions for network managers and administrators of small to medium-sized businesses and enterprises. Each chapter is broadly based on a network administration function, starting with an overview of the topic, followed by the methodology involved to accomplish that function. This includes the tools available, why they are the right choice, and their installation, configuration, and usage methods. For any given function, Network Administrators Survival Guide covers both Windows- and Linux-based tools as appropriate. Most of the Windows-based tools offer the advantage of GUI for ease of use, whereas the Linux-based tools are command-line based and can be used in automated scripts. Both are significant for network administrators. Based on author Anand Deveriya's extensive field experience, this practical guide to maintaining Cisco networks will save you signifi...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 419 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Wireless LANs ; Security measures ; Electronic books ; local
    Abstract: Expert guidance for securing your 802.11 networks Learn best practices for securely managing, operating, and scaling WLANs Comprehend the security-related technological underpinnings of WLANs Explore new security protocols in 802.11i and WPA and learn how they prevent attacks Review centralized deployment models for wired/wireless integration Deepen your knowledge of defense by understanding the tools that attackers use to perform reconnaissance and to attack authentication and encryption mechanisms Understand how to design secure WLANs to support enterprise applications with the new standards and practices detailed in this book Reference the next generation authentication standards and protocols Find out about mobility, hotspots, and campus wireless networks Grasp Open Authentication, MAC-based authentication, shared key authentication, EAP authentication protocols, WEP, WPA, and 802.11i Cisco Wireless LAN Security is an in-depth guide to wireless LAN technology and security, introducing the key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect the entire network. Because a WLAN is less effective as an isolated piece of the network, this book emphasizes how to effectively integrate WLAN devices into the wired network while maintaining maximum security. Cisco Wireless LAN Security covers the spectrum of WLAN security, including protocols and specifications, vulnerabilities and threats, and, especially, deployment patterns and design guidelines. With a unique combination of theory and practice, this book addresses fundamental wireless concepts, such as WEP, and innovations, such as EAP, switching, and management. Each chapter includes detailed illustrations, checklists, design templates, and other resources. You will also find generic wireless deployment patterns based on real-world customer installations and functional examples of architecture, design, and best practices. Whether you currently design, configure, implement, and maintain WLANs or simply want to explore wireless security issues, Cisco Wireless LAN Security has everything you need to understand how to create a seamlessly secure, impenetrable 802.11 network. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references (p. [399]-402) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: 418 p. ; , 24 cm. +
    DDC: 794.816693
    Keywords: Computer games ; Programming ; Three-dimensional display systems ; Electronic books ; local
    Abstract: There are many programming hobbyists who write 2D games but there are far fewer that grasp the concepts of 3D programming. Although there are also quite a few ¿game development¿ books on the market, few deal with 3D game development. Those that do are mainly aimed at advanced readers. This book will provide a practical, example driven approach to learning the unique art of 3D Game Development that even the beginner can grasp. It won¿t get bogged down in page after page of boring theory but instead will teach through many interesting hands on examples. Tom Miller brings years and years of 3D game programming to the table and couples that with an engaging writing style to mentor readers in the intricacies of game development. The book starts out with a crash course in game programming concepts and then progresses into developing 3 different types of games with many useful tips, notes, and cautions along the way. This title will serve as a useful guide to either current 2D game developers or programmers that want to learn to program games.
    Note: Includes CD-ROM
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit | Boston, MA :Safari,
    Language: English
    Pages: 290 p. ; , 23 cm
    Keywords: Flash (Computer file) ; Computer animation ; Electronic books ; local
    Abstract: This guide allows you to learn specific Flash skills step-by-step at your own pace. Choose from among several tutorials to develop the skills that are most appropriate to the Flash projects you are working on at any given time. Each lesson leads you through the workflow for implementing a specific real-world feature or effect in your Flash applications. In Macromedia Flash 8: A Tutorial Guide, learn how to: • Navigate the Flash workspace and use common document types • Use the Flash drawing tools and create engaging graphic effects • Use ActionScript to add interactivity and custom functionality to your documents • Connect your Flash projects to external data sources to create data-driven applications Powerful development and design tools require thorough and authoritative technical advice and documentation. When it comes to Macromedia Flash, no one is more authoritative than Macromedia's own development and writing teams. Now their official documentation is available to you in printed book form. As you work, keep this guide by your side for ready access to valuable information on using Flash. We've designed it so that it's easy to annotate as you progress.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    San Jose, Calif. : Adobe ; | Boston, MA :Safari,
    Language: English
    Pages: 600 p. ; , 24 cm
    DDC: 005.72
    Keywords: Adobe Acrobat (Computer file) ; Electronic books ; local
    Abstract: Ready to learn the visual effects secrets used at such leading-edge studios as Industrial Light + Magic and The Orphanage? Adobe After Effects 6.5 Studio Techniques inspires you to take your work to the next level with realworld examples and insider techniques. Get blockbuster results without the big budget as you delve deep into the essence of visual effects. This book goes beyond conventional step-by-step instruction, teaching you bread-and-butter effects that you can adapt and combine for countless projects. • Real solutions from real professionals: Nobody does it better, and now they'll show you how. Discover the keys to analyzing your shots from Stu Maschwitz, Visual Effects Supervisor for Star Wars, Episode One and Sin City . Unlock the mysteries of linear color space with Brendan Bolles, co-creator of the eLin plug-ins. Master fundamental effects techniques with Mark Christiansen, After Effects specialist for The Orphanage on The Day After Tomorrow . • Compositing essentials: No matter how sophisticated the effect, they all start from the same building blocks. Find out what you've been missing about color and light matching, keying, motion tracking, rotoscoping, working with film, and more. • Advanced techniques: Your goal should be effects so good that no one notices them. From sky replacement to explosions, from smoke to fire, learn to bring your shots to life and enhance scenes without anyone ever knowing what they're seeing isn't 100% real. • Companion CD-ROM: Professional tools produce professional results. Demo versions of plug-ins from Andersson Technologies, Red Giant Software, Frischluft, and Trapcode will enhance your work. Stop relying on ready-made solutions and pre-built effects. Learn how to build up and customize your own effects with the tools at hand-you'll be amazed at how much better the results look!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "I have had the good fortune to be involved with mobile Java from the very beginning, and I know what it takes to be successful in this marketplace. This book will help you be successful with mobile Java application design and development. If you take the information inside and sprinkle it with some imaginative application ideas, you will have a winning combination." - Jon Bostrom, Senior Director, CTO Java Technology Platforms, Nokia The First Official End-To-End Solutions Guide for Every Nokia Series 40 Developer Nokia's Series 40 Developer Platform gives Java developers access to the world's highest-volume, fastest-growing, and most exciting mobile markets. Nokia sells close to 100 million units within their Developer Platform families every year, and the Series 40 Developer Platform is the highest-volume platform in the family. Success on this platform is crucial for the commercial success of any mobile application. Knowledge of the Series 40 Developer Platform can be applied to the Java environment on all Nokia Developer Platform devices, including Series 60 devices. Fully reviewed by Nokia's subject matter experts, this book covers the entire development process-from design and coding through testing and deployment. The authors walk you through eleven complete example applications, presenting downloadable client and server source code that you can use to jump-start virtually any project. Along the way, the authors illuminate the technical underpinnings of Series 40, review crucial architectural issues, introduce key mobile design patterns, discuss scalability and device optimization strategies, and offer dozens of best practices and tips-many of which have never before been published. Coverage includes Identifying your best opportunities and killer applications for mobile development Building effective MIDP 2.0 user interfaces for devices built on the Series 40 Developer Platform Building animated mobile games Handling persistent and networking data Proven techniques for scaling and optimizing applications across devices © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 342 p. , ill. ; , 24 cm
    DDC: 005.74/068
    Keywords: Business ; Data processing ; Data warehousing ; Database management ; Electronic books ; local
    Abstract: The definitive best-practices guide to enterprise data-management strategy. You can no longer manage enterprise data "piecemeal." To maximize the business value of your data assets, you must define a coherent, enterprise-wide data strategy that reflects all the ways you capture, store, manage, and use information. In this book, three renowned data management experts walk you through creating the optimal data strategy for your organization. Using their proven techniques, you can reduce hardware and maintenance costs, and rein in out-of-control data spending. You can build new systems with less risk, higher quality, and improve data access. Best of all, you can learn how to integrate new applications that support your key business objectives. Drawing on real enterprise case studies and proven best practices, the author team covers everything from goal-setting through managing security and performance. You'll learn how to: Identify the real risks and bottlenecks you face in delivering data-and the right solutions Integrate enterprise data and improve its quality, so it can be used more widely and effectively Systematically secure enterprise data and protect customer privacy Model data more effectively and take full advantage of metadata Choose the DBMS and data storage products that fit best into your overall plan Smoothly accommodate new Business Intelligence (BI) and unstructured data applications Improve the performance of your enterprise database applications Revamp your organization to streamline day-to-day data management and reduce cost Data Strategy is indispensable for everyone who needs to manage enterprise data more efficiently-from database architects to DBAs, technical staff to senior IT decision-makers. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. [317]-321) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: xx, 392 p. , ill. (some col.) ; , 23 cm
    Edition: 3rd ed.
    DDC: 005.7/2
    Keywords: Cascading style sheets ; Computer graphics ; Web publishing ; Web sites ; Design ; Electronic books ; local
    Abstract: In this updated edition to their original best-selling classic, the co-creators of CSS clearly, logically, and painlessly explain the hows and whys and ins and outs of the visual formatting language that is their gift to us. The Web would be a poorer place without Messieurs Bos and Lie. Your shelf will be richer for the addition of this book. Rely on it. Study it. Savor it. The Indispensible CSS Tutorial and Reference-Straight from the Creators of CSS Direct from the creators of CSS, this is the definitive guide to CSS, today's indispensable standard for controlling the appearance of any Web or XML document. This book doesn't just show how to use every significant CSS 1 and 2.x feature; it carefully explains the "why" behind today's most valuable CSS design techniques. You'll find practical, downloadable examples throughout-along with essential browser support information and best practices for building high-impact pages and applications. Cascading Style Sheets: Designing for the Web, Third Edition covers every CSS 2.1 improvement and fix, from new height/width definitions in absolutely positioned elements to new clip property calculations. Clear, readable, and thorough, it's the one must-have CSS resource for every Web developer, designer, and content provider. Coverage includes Mastering essential CSS concepts: Rules, declarations, selectors, properties, and more Working with type: From absolute/relative units to font size and weight Understanding CSS objects: Box model, display properties, list styles, and more Exercising total control over spacing and positioning Specifying colors for borders and backgrounds Managing printing: Margins, page breaks, and more Implementing media-specific style sheets for audio rendering, handhelds, and other forms of presentation Moving from HTML extensions to CSS: Five practical case studies Making the most of cascading and inheritance Using external style sheets and import Integrating CSS with XML documents Optimizing the performance of CSS pages Includes a handy CSS Quick Reference printed on the inside covers © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 4th ed.
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: " C++ Primer is well known as one of the best books for learning C++ and is useful for C++ programmers of all skill levels. This Fourth Edition not only keeps this tradition alive, it actually improves on it." --Steve Vinoski, Chief Engineer, Product Innovation, IONA Technologies " The Primer really brings this large and complex language down to size." --Justin Shaw, Senior Member of Technical Staff, Electronic Programs Division, The Aerospace Corporation "It not only gets novices up and running early, but gets them to do so using good programming practices." --Nevin ":-)" Liber, Senior Principal Engineer (C++ developer since 1988) This popular tutorial introduction to standard C++ has been completely updated, reorganized, and rewritten to help programmers learn the language faster and use it in a more modern, effective way. Just as C++ has evolved since the last edition, so has the authors' approach to teaching it. They now introduce the C++ standard library from the beginning, giving readers the means to write useful programs without first having to master every language detail. Highlighting today's best practices, they show how to write programs that are safe, can be built quickly, and yet offer outstanding performance. Examples that take advantage of the library, and explain the features of C++, also show how to make the best use of the language. As in its previous editions, the book's authoritative discussion of fundamental C++ concepts and techniques makes it a valuable resource even for more experienced programmers. Program Faster and More Effectively with This Rewritten Classic Restructured for quicker learning, using the C++ standard library Updated to teach the most current programming styles and program design techniques Filled with new learning aids that emphasize important points, warn about common pitfalls, suggest good programming practices, and provide general usage tips Complete with exercises that reinforce skills learned Authoritative and comprehensive in its coverage The source code for the book's extended examples is available on the Web at the address below. www.awprofessional.com/cpp_primer
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxi, 384 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Software engineering ; Electronic books ; local
    Abstract: Extend RUP to Drive Improvements Across the Entire IT Lifecycle The Rational Unified Process is a powerful tool for improving software development -- but it doesn't go nearly far enough. Today's development organizations need to extend RUP to cover the entire IT lifecycle, including the cross-project and enterprise issues it largely ignores. The Enterprise Unified Process (EUP) does precisely that, enabling you to deliver systems that meet all the needs of today's businesses. Now, EUP's creator and architects present the definitive introduction to EUP, and demonstrate how to use it in your environment. The Enterprise Unified Process systematically identifies the business and technical problems that RUP fails to address, and shows how EUP fills those gaps. Using actual examples and case studies, the authors introduce processes and disciplines for producing new software, implementing strategic reuse, "sunsetting" obsolete code and systems, managing software portfolios, and much more. Their independent, "tool agnostic" coverage will be indispensable no matter which RUP products or platforms you've invested in. Coverage includes Practical, step-by-step guidance for adopting EUP in midsized-to-large organizations Proven processes for optimizing ongoing IT operations and support Enterprise business modeling and architecture with EUP EUP disciplines for enterprise administration, people management, and software process improvement Using the new EUP plug-in for IBM's RUP platform Workflow diagrams fully consistent with RUP for easy understanding Detailed appendices covering EUP roles, artifacts, and terminology EUP is the missing link that can help IT professionals achieve the full benefits of RUP in the enterprise. This book will help you discover it, master it, implement it, and succeed with it. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 361-369) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Upper Saddle River, NJ : IBM Press | Boston, MA :Safari,
    Language: English
    Pages: xxx, 895 p. , ill. ; , 24 cm. +
    DDC: 005.75/65
    Keywords: IBM Database 2 ; Relational databases ; Electronic books ; local
    Abstract: The Easy, Visual Guide to IBM DB2 V8.2 IBM DB2 Universal Database™ V8.2 for Linux®, UNIX®, and Windows® is a flexible, scalable, cost-effective, and easy-to-use enterprise database. Now, one book makes DB2 even easier. Understanding DB2 teaches DB2 V8.2 visually, step by step, with dozens of examples and case studies drawn from the authors' unsurpassed experience as DB2 consultants at IBM. Understanding DB2 doesn't just present the big picture. It thoroughly introduces every DB2 concept, procedure, and tool you'll need to get results as an administrator, user, or developer. You'll find authoritative coverage of installation, configuration, objects, database instances, storage, connectivity, security, performance, backup and recovery, SQL fundamentals, and much more. Virtually every new concept is explained with screenshots, diagrams, or tables, all designed to help you learn faster and remember more. For those preparing for certification, this book also contains over a hundred sample questions crafted by the authors to reflect the content and format of the IBM DB2 UDB Database Administration Certification exams, with answers and detailed explanations. Coverage includes Understanding the DB2 product family, DB2 commands, and the DB2 environment Configuring client and server connectivity: walkthroughs of four typical scenarios Managing DB2 storage: partitions, tablespaces, buffer pools, and more Leveraging the power of SQL: queries, inserts, deletes, and updates Implementing security: encryption, authentication, and authorization Administering and maintaining data, from LOAD and EXPORT to backup/recovery Providing high availability with online split mirroring and suspended I/O DB2 architecture: process and memory models Managing database performance and troubleshooting
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: 360 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The fastest route to true Linux mastery! You know your way around Windows (or maybe a Mac, or even UNIX). Now, you're ready for Linux. And you don't have a minute to waste. Welcome. This book's for you . Janet Valade has spent thirteen years helping new users master Linux and related technologies. She knows the "magic words" that'll help you get the job done, fast. (And she knows exactly how to keep you out of trouble, too!) You'll learn Linux through dozens of focused, bite-size examples, each one carefully designed to build on what you've learned before. Need specific solutions? This book's carefully crafted, high-efficiency format delivers them... instantly . Working on Fedora? Mandrake? SuSE? No matter. This book is for you. No other introduction to Linux covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with Linux- without the hassles! Choose the best Linux distribution for your personal or business needs Get Linux installed quickly and running reliably Handle your day-to-day tasks and efficiently manage your files Master KDE, GNOME, and the Linux command line Write documents and build spreadsheets with OpenOffice.org Set up Web access, email, and instant messaging Work with powerful Linux multimedia and graphics software Find, install, and run new Linux software Set up your printer to work with Linux Supercharge Linux with shell scripts and customized configuration files Includes concise Linux command reference and quick guide to building powerful Regular Expressions Spring Into ... is a new series of fast-paced tutorials from Addison-Wesley Professional Publishers. Each book in the series is designed to bring you up-to-speed quickly. Complex technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working... now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Santa Clara, Calif. : Sun Microsystems Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 762 p. , ill. ; , 24 cm
    Edition: 7th ed.
    DDC: 005.133
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Completely revised and up-to-date coverage of Generic programming, restrictions and limitations, type bounds, wilcard types, and generic reflection Swing GUI development, including input validation and other enhancements Exception handling and debugging, including chained exceptions, stack frames, assertions, and logging Streams and files, the new I/O API, memory-mapped files, file locking, and character set encoders/decoders Regular expressions using the powerful java.util.regex package Inner classes, reflection, and dynamic proxies Application packaging and the Preferences API The seventh edition of Core Java™ 2, Volume I, covers the fundamentals of the Java 2 Platform, Standard Edition (J2SE™). A no-nonsense tutorial and reliable reference, this book features thoroughly tested real-world examples. The most important language and library features are demonstrated with deliberately simple sample programs, but they aren't fake and they don't cut corners. More importantly, all of the programs have been updated for J2SE 5.0 and should make good starting points for your own code. You won't find any toy examples here. This is a book for programmers who want to write real code to solve real problems. Volume I concentrates on the fundamental concepts of the Java language, along with the basics of user-interface programming and provides detailed coverage of Object-oriented programming Reflection and proxies Interfaces and inner classes The event listener model Graphical user-interface design with the Swing UI toolkit Exception handling Stream input/output and object serialization Generic programming For the same real-world treatment of enterprise features and advanced user-interface programming, look for the forthcoming new edition of Core Java™ 2, Volume II-Advanced Features. It includes new sections on metadata and other J2SE 5.0 enhancements along with complete coverage of: Multithreading • Distributed objects • Databases • Advanced GUI components • Native methods • XML Processing • Network programming • Collection classes • Advanced graphics • Internationalization • JavaBeans
    Note: "J2SE 5.0"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "This welcome addition to the Linux bookshelf provides real insight into the black-art of debugging. All too often debugging books concentrate solely on the tools but this book avoids that pitfall by concentrating on examples. The authors dissect and discuss each example in detail; in so doing they give invaluable insight into the Linux environment." - Richard J Moore , IBM Advanced Linux Response Team-Linux Technology Centre "A plethora of Linux books exist but this guide offers a definitive overview of practical hints and tips for Linux users. Written by experts in the field, it will be extremely useful for system administrators and Linux enthusiasts." - Markus Rex , VP and General Manager, SUSE LINUX The indispensable troubleshooting resource for every Linux administrator, developer, support professional, and power user! Systematically resolve errors, crashes, hangs, performance slowdowns, unexpected behavior, and unexpected outputs Master essential Linux troubleshooting tools, including strace, gdb, kdb, SysRq, /proc, and more The indispensable start-to-finish troubleshooting guide for every Linux professional Now, there's a systematic, practical guide to Linux troubleshooting for every power user, administrator, and developer. In Self-Service Linux® , two of IBM's leading Linux experts introduce a four-step methodology for identifying and resolving every type of Linux-related system or application problem: errors, crashes, hangs, performance slowdowns, unexpected behavior, and unexpected outputs. You'll learn exactly how to use Linux's key troubleshooting tools to solve problems on your own- and how to make effective use of the Linux community's knowledge. If you use Linux professionally, this book can dramatically increase your efficiency, productivity, and marketability. If you're involved with deploying or managing Linux in the enterprise, it can help you significantly reduce operation costs, enhance availability, and improve ROI. Discover proven best practices for diagnosing problems in Linux environments Leverage troubleshooting skills you've developed with other platforms Learn to identify problems with strace -the most frequently used Linux troubleshooting tool Use /proc to uncover crucial information about hardware, kernels, and processes Recompile open source applications with debug information Debug applications with gdb , including C++ and threaded applications Debug kernel crashes and hangs, one step at a time Understand the E...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "This book is the best way for beginning developers to learn wxWidgets programming in C++. It is a must-have for programmers thinking of using wxWidgets and those already using it." -Mitch Kapor, founder of Lotus Software and the Open Source Applications Foundation Build advanced cross-platform applications that support native look-and-feel on Windows, Linux, Unix, Mac OS X, and even Pocket PC Master wxWidgets from start to finish-even if you've never built GUI applications before Leverage advanced wxWidgets capabilities: networking, multithreading, streaming, and more CD-ROM: library of development tools, source code, and sample applications Foreword by Mitch Kapor, founder, Lotus Development and Open Source Application Foundation wxWidgets is an easy-to-use, open source C++ API for writing GUI applications that run on Windows, Linux, Unix, Mac OS X, and even Pocket PC-supporting each platform's native look and feel with virtually no additional coding. Now, its creator and two leading developers teach you all you need to know to write robust cross-platform software with wxWidgets. This book covers everything from dialog boxes to drag-and-drop, from networking to multithreading. It includes all the tools and code you need to get great results, fast. From AMD to AOL, Lockheed Martin to Xerox, world-class developers are using wxWidgets to save money, increase efficiency, and reach new markets. With this book, you can, too. wxWidgets quickstart: event/input handling, window layouts, drawing, printing, dialogs, and more Working with window classes, from simple to advanced Memory management, debugging, error checking, internationalization, and other advanced topics Includes extensive code samples for Windows, Linux (GTK+), and Mac OS X About the CD-ROM The CD-ROM contains all of the source code from the book; wxWidgets distributions for Windows, Linux, Unix, Mac OS X, and other platforms; the wxWidgets reference guide; and development tools including the OpenWatcom C++ compiler, the poEdit translation helper, and the DialogBlocks user interface builder. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Language: English
    Pages: xxii, 232 p. , ill. ; , 23 cm
    DDC: 364.16/3
    Keywords: Consumer credit ; United States ; Handbooks, manuals, etc ; Credit ratings ; United States ; Handbooks, manuals, etc ; Identity theft ; United States ; Prevention ; Handbooks, manuals, etc ; Privacy, Right of ; United States ; Handbooks, manuals, etc ; Records ; Access control ; United States ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Everything You Need to Know About Identity Theft, Credit Cards, Credit Repair, and Credit Reports "The author substitutes straight talk for legal mumbo-jumbo in 50 Ways to Protect Your Identity and Your Credit. Reading this book is like getting a black belt in consumer self-defense." -Jim Bohannon, host of The Jim Bohannon Show "Identity theft is among the fastest-growing problems facing Americans today. This book will help you learn all you need to know to protect your lives, money, and security. Consider it your first stop in your quest for knowledge and guidance to prevent ID theft." -Robert Powell, Editor of CBS MarketWatch "As one who has lived through some of the nightmare scenarios discussed by the author, I believe "Steve's Rules" (Chapter 14) need to be placed in a prominent place so you can see them any time you think you are safe. They may be the new practical commandments for financial survival." -Doug Stephan, host of the Good Day nationally syndicated radio show "Detecting and stopping identity thieves is imperative to protecting your finances and financial reputation. Steve Weisman shows you how to protect yourself and what steps to take if you are victimized. This is a must-read for anyone with a bank account and a credit card!" -Bonnie Bleidt, Boston Stock Exchange Reporter, CBS4 Boston, Host of Early Exchange , WBIX Don't be a victim! Save your identity, save your credit-and save a fortune! 10,000,000 Americans had their identities stolen last year-don't be the next! Discover easy steps you can take now to reduce your vulnerability. Recognize "phishing" and other identity scams-online and off. Learn what you must do immediately if you've been attacked. Defend yourself against credit rip-offs, and stop paying more than you have to! It's all here: simple rules, handy checklists, even easy-to-use form letters! © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Indianapolis, Ind. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 434 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Software patterns ; Electronic books ; local
    Abstract: "Gunnar and Karin have not only defined a large collection of use-case patterns and examples of how specific usages are to be modeled in a use-case model, they have also provided an accurate, complete, and comprehensible description of the constructs used in use-case modeling... I am impressed by this book." -From the Foreword by Ivar Jacobson Employ the proven concept of design patterns to build more accurate, usable, and maintainable use-case models This book brings together dozens of proven patterns for creating use cases that more accurately reflect real requirements, are easier to translate into working systems, and are simpler to maintain. Utilizing these patterns, architects, analysts, engineers, and managers can leverage decades of hard-earned knowledge to achieve far better results, far more quickly. The authors carefully describe how each pattern works, what problems it is intended to solve, and the consequences associated with using it. All patterns are supported with detailed examples and platform-independent class models that demonstrate how they may be realized. All constructs and diagrams reflect the current UML 2.0 standard. This book also includes an insightful use-case primer that will be indispensable both to novices and veteran modelers seeking to become more effective. Coverage includes Modeling rules that lead to more comprehensible, maintainable, and correct models Patterns for structuring, layering, mapping, sequencing, and viewing use cases more effectively Blueprints for security, legacy integration, data input/ output, task scheduling, and reporting Constructing use cases that separate mandatory elements from optional parts that can be delivered separately Incorporating business rules in use-case modeling Practical techniques for documenting use cases more effectively When to use multiple patterns and blueprints together Identifying and avoiding eight common mistakes in use-case modeling: guidance for designers and reviewers Examples from a wide range of application domains Rely on this book as the world's #1 reference to reusable use-case solutions- and as a catalyst for inspiration in all your use-case modeling projects. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 423-424) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Boston : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 665 p. , ill. ; , 24 cm. +
    Keywords: Linux ; Business ; Data processing ; Computer networks ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Switch your business to Linux: proven techniques for working IT Professionals This is the complete technical resource for migrating your business desktops to Linux, administering them efficiently, and using them to drive cost savings throughout your organization. Respected Linux Journal columnist Marcel Gagné walks you step-by-step through planning and managing the transition, getting users up and running, and keeping them happy. Gagné covers hardware, productivity applications, messaging, coexistence with Windows environments, support, and much more. This is also the first book with in-depth coverage of using Linux Terminal Server Project (LTSP) thin clients to dramatically reduce the cost and complexity of computing. Deploy Linux with your existing PCs, printers, and IT/network infrastructure Centrally manage users and security through Webmin's convenient Web interface Deliver reliable email services with Postfix, or integrate Linux mail clients with Microsoft Exchange servers Configure Windows file sharing with Samba, and Linux file sharing with NFS Secure network communications with Linux firewalls and OpenSSH Plan and deploy LTSP thin clients and diskless workstations and the server support for them Provide LDAP directory services to all your clients Support users by "remote control"-without leaving your desk From network security to spam reduction, automated backup/restore to collaboration groupware, Gagné offers specific solutions and proven techniques for leveraging the full power of Linux in your business. Say goodbye to the expense, hassle, and insecurity of Windows desktops! Say hello to business computing the way it's supposed to be-with Linux! About the Author Marcel Gagné is best known as the author of the Linux Journal's "Cooking with Linux" series, winner of the Readers' Choice award for favorite column for three straight years. He has written two highly acclaimed Addison-Wesley books: Moving to Linux and Linux System Administration: A User's Guide. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxi, 434 p. , ill. ; , 24 cm
    Series Statement: Robert C. Martin series
    DDC: 005.1
    Keywords: Application software ; Development ; Electronic books ; local
    Abstract: Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your development efforts. In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases. This book draws on material Michael created for his renowned Object Mentor seminars: techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include Understanding the mechanics of software change: adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platformwith examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structure This book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Sun Microsystems Pr | Boston, MA :Safari,
    Language: English
    Keywords: Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0132354799 ISBN-13: 9780132354790 Completely revised and up-to-date coverage of Multithreading -including the java.util.concurrent library, locks, condition objects, futures, thread pools, thread-safe collections, threads and Swing Collection classes -collections framework, concrete collections, and generic utility methods Annotations and metadata -using annotations to automate programming tasks, JDK™ 5.0 standard annotations, the apt tool for source-level annotation processing, and bytecode engineering Advanced Swing and AWT -lists, trees, tables, and other advanced components; image processing and printing JavaBeans™ -including property editors, customizers, and long-term persistence XML -DOM and SAX parsers, XPath, and XSL transformations The seventh edition of Core Java™ 2, Volume II, covers advanced user-interface programming and the enterprise features of the Java 2 Platform, Standard Edition (J2SE™). Like Volume I (which covers the most important language and library features), this book has been completely updated and revised for J2SE 5.0. All of the sample programs have been updated and carefully crafted to illustrate practical solutions to the type of real-world problems professional developers encounter. Volume II includes new sections on annotations and other J2SE 5.0 enhancements, along with complete coverage of Multithreading Distributed objects Databases JNDI and LDAP Advanced GUI components Native methods XML processing Network programming Collection classes Advanced graphics Internationalization JavaBeans Annotations
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    ISBN: 9781587050404 , 1587050404
    Language: English
    Pages: xxxiii, 696 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    DDC: 621.382
    Keywords: Signaling system 7 ; Telecommunication systems ; Telephone switching systems, Electronic ; Telephone systems ; Electronic books ; local ; Telecommunication systems ; Telephone switching systems, Electronic ; Telephone systems ; Téléphonie ; Système de signalisation 7 ; Téléphone ; Systèmes de commutation électronique ; Signaling system 7 ; Telecommunication systems ; Systèmes de télécommunications ; Telephone systems
    Abstract: A complete, practical guide to the world's most popular signaling system, including SIGTRAN, GSM-MAP, and Intelligent Networks. Provides in-depth coverage of the SS7 protocols, including implementation details Covers SS7 over IP (SIGTRAN) using real-world examples Covers SS7/C7 from both a North American and European perspective, providing a broad international understanding of the technology and associated standards Explains mobile wireless concepts and signaling, including mobile application part (MAP) Provides a thorough explanation of the Intelligent Network (IN) and associated protocols (INAP/AIN) Signaling System No. 7 (SS7) is a signaling network and protocol that is used globally to bring telecommunications networks, both fixed-line and cellular, to life. SS7 has numerous applications and is at the very heart of telecommunications. Setting up phone calls, providing cellular roaming and messaging, and supplying converged voice and data services are only a few of the ways that SS7 is used in the communications network. SS7 also provides the point of interconnection between converging voice and data networks. This transition, which affects everyone who works with the data network, has bolstered the need for practical and applied information on SS7. In short, anyone who is interested in telecommunications should have a solid understanding of SS7. Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services will help you understand SS7 from several perspectives. It examines the framework and architecture of SS7, as well as how it is used to provide today's telecommunications services. It also examines each level of the SS7 protocol-all the way down to the bit level of messages. In addition, the SIGTRAN standards are discussed in detail, showing the migration from SS7 to IP and explaining how SS7 information is transported over IP.
    Note: Includes bibliographical references (p. [665]-673) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    ISBN: 9780596517168 , 0596517165 , 0596005040
    Language: English
    Pages: xxxv, 816 p. , ill. ; , 24 cm
    Parallel Title: Erscheint auch als
    DDC: 384.5/35
    Keywords: Flash (Computer file) ; Mobile communication systems ; Multimedia communications ; Electronic books ; local ; Flash (Computer file) ; Mobile communication systems ; Multimedia communications ; Réseaux multimédias ; TECHNOLOGY & ENGINEERING ; Mobile & Wireless Communications ; Flash (Logiciel) ; Radiocommunications mobiles
    Abstract: With the advent of Flash Communication Server MX (FCS), Macromedia believes that it's on the edge of a breakthrough in how people think about the Internet. FCS has been designed to provide web developers with the means to add polished interactive audio and video features to their sites, the sort of features that users have come to expect. Naturally, the process of efficiently integrating rich media into applications, web sites, and web content is a complex one, to say the least. That's where Programming Flash Communication Server factors in. As the foremost reference on FCS, it helps readers understand how FCS can facilitate: Video on demand Live webcasts Video chat and messaging Shared desktop conferences Live auctions Interactive whiteboard presentations Workflow collaboration Multi-user games Programming Flash Communication Server not only explains how to use the pre-built FCS components to construct a simple application, it also explains the architecture so that developers can program custom components to make even more advanced applications. In addition, the book explains how to truly optimize performance, and talks about considerations for networked applications as well as the media issues pertaining to FCS. Programming Flash Communication Server gives developers a sorely needed leg up on this potentially intimidating technology. It lets users develop cool web applications ranging from direct dating experiences with real-time video, to pre-recorded corporate presentations, to news services with video and audio, and much more. At last, the ability to build web sites with rich interactive features--minus the complex downloads and installation hassles--is a reality. And now, with Programming Flash Communication Server from O'Reilly by your side, you can do more quickly and easily than you ever dreamed possible.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: xvii, 722 p. , ill. ; , 23 cm. +
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Electronic data processing personnel ; Certification ; Microsoft software ; Examinations ; Study guides ; Electronic books ; local
    Abstract: The MCSA/MCSE 70-270 Exam Prep 2: Windows XP Professional is the most comprehensive, accurate study guide for this popular MCSE exam. Updated with Service Pack 2 information, this in-depth approach to the exam objectives also explains the core concepts of the technology to help you pass the exam. Organized by exam objective, you will be able to quickly and easily assess your understanding of key exam topics. The real-world examples, extensive hands-on exercises and end-of-chapter exercises support exam objectives and reinforce learning. Notes, tips, warnings, key terms, study strategies, fast facts and self-assessment opportunities will also help you score better on the exam. Additional practice questions are included on a test-engine CD, provided by MeasureUp. With all of these great features and proven study methods, MCSA/MCSE 70-270 Exam Prep 2: Windows XP Professional is your smartest way to get certified.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 414 p., [2] p. of folded plates , ill. ; , 23 cm. +
    DDC: 005.7585
    Keywords: Oracle (Computer file) ; Examinations ; Database management ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Study guides ; SQL (Computer program language) ; Electronic books ; local
    Abstract: Whether you're studying for the Oracle 9i SQL exam or just need to take the New Features update exam, Oracle 9i: SQL Exam Cram 2 can help you get certified. This efficient study guide follows the exam objectives clearly and concisely. New Features materials are also included in the book, as well as a full-customizable practice test engine on CD. Oracle 9i: SQL Exam Cram 2 is your smartest way to get certified.
    Note: "Exam 1Z0-007"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: viii, 251 p. , ill. ; , 23 cm
    Keywords: Home economics ; Time management ; Electronic books ; local
    Abstract: Add three kids, two sporting events on opposite ends of town, a ballet lesson, and a scout event all in one Saturday and what do you get? An overwhelmed family struggling to just make it through the day. If this sounds all too familiar, Organize Your Family's Schedule In No Time is the book that will help you get control of the calendar. Valentina Sgro, a professional organizer, shows you how to find more family time for fun and relaxation using a system that is customized to your family's unique needs. Using to-do lists and step-by-step instructions, this book helps the entire family better organize the group calendar, project list, homework schedule, and chores. In addition, Valentina helps parents to teach their kids essential organizational skills and good study and scheduling habits. With quick, easy projects, you'll learn how to: Select the planner that is best for you - either paper or electronic Choose a comfortable mix of activities for everyone in the family and avoid overscheduling Schedule the planning and preparations for family events, such as birthday parties and vacations Help children of any age organize their time Deal with special circumstances such as homeschooling your children, caring for an aging relative, or searching for the right college for your teenager Enjoy precious time with your family with the help of Organize Your Family's Schedule In No Time !
    Note: Includes bibliography and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: xvi, 486 p. , ill. ; , 24 cm
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Electronic books ; local
    Abstract: The world of mathematical formulas and jargon in Microsoft Excel is complex and can be intimidating for even advanced computer users. Perhaps like you, a majority of users find it difficult to get the most they can out of this very valuable program. Formulas and Functions with Microsoft Excel 2003 strives to break down the complexities by focusing on the four primary technologies to master: ranges, formulas, data analysis tools and lists. Chapters such as "Getting the Most Out of Ranges," "Building Your Own Functions Using VBA," and "Solving Complex Problems with Solver" will teach you practical skills and solutions that you can put to work immediately. Frustration will become a thing of the past as you begin to master the complex world of Excel!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 1187 p. , ill. ; , 24 cm. +
    DDC: 005.4'476
    Keywords: NetWare ; Computer networks ; Management ; Examinations ; Study guides ; Local area networks (Computer networks) ; Management ; Study guides ; Novell software ; Examinations ; Study guides ; Electronic books ; local
    Abstract: If you are studying for the Novell CNE certification tests 681, 682, 664 or 683, you need Novell's CNE Study Guide for NetWare 6 . It is the official Novell study guide and is the most effective tool to turn the passing rate in your favor. Loaded with illustrations, screen shots and hands-on exercises, it also includes sample test questions for all exams. A CD is included that provides you with a 3-user version of NetWare 6 server and NetWare 6 client software. Go after the most sought-after certification that Novell offers with this book in your hand.
    Note: "CD-ROM included; 3-user version of NetWare 6 server; NetWare 6 client software"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxi, 793 p. , ill. (some col.) ; , 24 cm. +
    DDC: 006.696
    Keywords: Maya (Computer file) ; Computer animation ; Three-dimensional display systems ; Electronic books ; local
    Abstract: If you thought Angelina Jolie was responsible for Lara Croft's curves, think again! Long before the Hollywood actress brought the Tomb Raider heroine to life, Alias' 3D modeling software Maya was used to create the lovely Lara; Ms. Jolie simply filled in her curves! When you're ready to start creating equally compelling characters of your own, you need this comprehensive volume! In these pages, gaming-industry veteran Antony Ward uses a combination of informative narrative, hands-on tutorials, and a slew of illustrations and screen shots to show you how to use Maya to address the most complex element of game creation-developing great characters! As you follow along, Antony uses the development of two diverse characters-a female figure and a fantastical character with outrageous proportions, wings, and a demon-like face-to demonstrate the techniques involved in modeling detailing, optimizing, texturing, rigging, binding, and animating characters with Maya. The companion CD includes lesson files, scripts, an automatic rigging tool, demo software, and more!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Language: English
    Edition: 4th ed.
    Keywords: Microsoft Windows (Computer file) ; Microsoft Windows server ; Computer network architectures ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The premier guide to the Windows kernel now covers Windows Server 2003, Windows XP, and Windows 2000, including 64-bit extensions. Get the architectural perspectives and insider insights needed to unlock the power of Windows.
    Note: Includes index. - Title from caption
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xx, 388 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 522
    Keywords: Astronomy ; Observers' manuals ; Electronic books ; local
    Abstract: Why use the traditional approach to study the stars when you can turn computers, handheld devices, and telescopes into out-of-this-world stargazing tools? Whether you're a first timer or an advanced hobbyist, you'll find Astronomy Hacks both useful and fun. From upgrading your optical finder to photographing stars, this book is the perfect cosmic companion.This handy field guide covers the basics of observing, and what you need to know about tweaking, tuning, adjusting, and tricking out a 'scope. Expect priceless tips and tools for using a Dobsonian Telescope, the large-aperture telescope you can inexpensively build in your garage. Get advice on protocols involved with using electronics including in dark places without ruining the party. Astronomy Hacks begins the space exploration by getting you set up with the right equipment for observing and admiring the stars in an urban setting. Along for the trip are first rate tips for making most of observations. The hacks show you how to: Dark-Adapt Your Notebook Computer Choose the Best Binocular Clean Your Eyepieces and Lenses Safely Upgrade Your Optical Finder Photograph the Stars with Basic Equipment The O'Reilly Hacks series has reclaimed the term "hacking" to mean innovating, unearthing, and creating shortcuts, gizmos, and gears. With these hacks, you don't dream it-you do it--and Astronomy Hacks brings space dreams to life. The book is essential for anyone who wants to get the most out of an evening under the stars and have memorable celestial adventures.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media Inc. | Boston, MA :Safari,
    Language: English
    Pages: xii, 388 p. , ill. (some col.) ; , 24 cm
    Edition: 1st ed.
    Keywords: iPhoto (Computer file) ; Image processing ; Digital techniques ; Macintosh (Computer) ; Photography ; Digital techniques ; Electronic books ; local
    Abstract: Our Missing Manual is hands-down the bestselling book on iPhoto. And now, updated to cover Apple's newest release, iPhoto 5: The Missing Manual comes fully loaded--and in full color--so you can exercise all the power, flexibility, and creativity of the stunning new iPhoto 5. Some of iPhoto 5's fifty new features are tiny nips and tucks, such as menu rewordings, quiet refinements, and secret keystrokes that take most people days to stumble through. Others are big-ticket overhauls aimed at both power users (RAW-file import and editing, color correction sliders, real-time histogram) and everyday shutterbugs (nested file folders, individual-photo control in slideshows, and a completely rewritten book-layout kit). Additional improvements include a robust search feature (similar to that of iTunes) and the addition of "objects" for slideshow and book projects (using objects, you can manipulate images without affecting pictures in your master library). iPhoto 5: The Missing Manual covers them all with the scrupulous objectivity, clever wit, and technical wisdom you count on from David Pogue along with the Mac and digital photography expertise of Derrick Story. Their authoritative guide starts out with a crash course on digital photography, complete with tutorials on buying a digital camera, composing brilliant photos in various situations (including sports photography, portraits, nighttime photography--even kid photography!) and making digital movies. iPhoto 5: The Missing Manual then launches into every detail of iPhoto, from camera-meets-Mac basics to storing, searching, and editing; from sharing your digital photography with the world (via customized slideshows--complete with iTunes soundtrack, if you like--prints, photo books, email, the Web, and even your network) to exporting to QuickTime and iDVD. And don't forget iPhoto "stunts," such as building custom screen savers and desktop backdrops; exporting pictures; making the most of plug-ins, add-ons, and beef-ups; using AppleScript; and managing files with backups, CDs, and photo libraries. iPhoto 5: The Missing Manual gives you everything you need to become the digital photographer extraordinaire you want to be.
    Note: "The brilliance of digital photos on the Macintosh"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 333 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    Series Statement: Nutshell handbook
    Keywords: UNIX (Computer file) ; UNIX Shells ; Electronic books ; local
    Abstract: O'Reilly's bestselling book on Linux's bash shell is at it again. Now that Linux is an established player both as a server and on the desktop Learning the bash Shell has been updated and refreshed to account for all the latest changes. Indeed, this third edition serves as the most valuable guide yet to the bash shell.As any good programmer knows, the first thing users of the Linux operating system come face to face with is the shell the UNIX term for a user interface to the system. In other words, it's what lets you communicate with the computer via the keyboard and display. Mastering the bash shell might sound fairly simple but it isn't. In truth, there are many complexities that need careful explanation, which is just what Learning the bash Shell provides.If you are new to shell programming, the book provides an excellent introduction, covering everything from the most basic to the most advanced features. And if you've been writing shell scripts for years, it offers a great way to find out what the new shell offers. Learning the bash Shell is also full of practical examples of shell commands and programs that will make everyday use of Linux that much easier. With this book, programmers will learn: How to install bash as your login shell The basics of interactive shell use, including UNIX file and directory structures, standard I/O, and background jobs Command line editing, history substitution, and key bindings How to customize your shell environment without programming The nuts and bolts of basic shell programming, flow control structures, command-line options and typed variables Process handling, from job control to processes, coroutines and subshells Debugging techniques, such as trace and verbose modes Techniques for implementing system-wide shell customization and features related to system security
    Note: Includes index. - Previous ed.: 1998
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xviii, 395 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    DDC: 005.4465
    Keywords: Mac OS ; UNIX (Computer file) ; TIGER System (Information retrieval system) ; UNIX device drivers (Computer programs) ; Electronic books ; local
    Abstract: If you're one of the many Unix developers drawn to Mac OS X for its Unix core, you'll find yourself in surprisingly unfamiliar territory. Unix and Mac OS X are kissing cousins, but there are enough pitfalls and minefields in going from one to another that even a Unix guru can stumble, and most guides to Mac OS X are written for Mac aficionados. For a Unix developer, approaching Tiger from the Mac side is a bit like learning Russian by reading the Russian side of a Russian-English dictionary. Fortunately, O'Reilly has been the Unix authority for over 25 years, and in Mac OS X Tiger for Unix Geeks , that depth of understanding shows.This is the book for Mac command-line fans. Completely revised and updated to cover Mac OS X Tiger, this new edition helps you quickly and painlessly get acclimated with Tiger's familiar-yet foreign-Unix environment. Topics include: Using the Terminal and understanding how it differs from an xterm Using Directory Services, Open Directory (LDAP), and NetInfo Compiling code with GCC 3 Library linking and porting Unix software Creating and installing packages with Fink Using DarwinPorts Search through metadata with Spotlight's command-line utilities Building the Darwin kernel Running X Windows on top of Mac OS X, or better yet, run Mac OS X on a Windows machine with PearPC! Mac OS X Tiger for Unix Geeks is the ideal survival guide for taming the Unix side of Tiger. If you're a Unix geek with an interest in Mac OS X, you'll find this clear, concise book invaluable.
    Note: First ed. published as: Mac OS X for Unix geeks; 2nd ed. published as: Mac OS X Panther for Unix geeks, 2004. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: x, 136 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Intranets (Computer networks) ; Handbooks, manuals, etc ; Web servers ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: There's nothing like teamwork for making progress on a project, but sharing information and building on each other's successes can be challenging when your team is scattered across the miles. Microsoft's SharePoint helps teams and organizations close the distance. With SharePoint, groups construct web sites specifically for collaboration--sites where individuals can capture and share ideas, and work together on documents, tasks, contacts, and events. It's the next best thing to being in the room together.Unfortunately, much of the documentation for SharePoint is written to help system administrators get it up and running, which often leaves end users in the dark. The SharePoint User's Guide takes another approach: this quick and easy guide shows you what you need to know to start using SharePoint effectively and how to get the most from it. You'll learn how to create sites that your organization can use to work together or independently, from an end user's point of view. Now, even beginners can learn how to: access sites that are already set up create new sites personalize sites use the document and picture libraries for adding and editing content add discussion boards and surveys to a site enhance security You'll learn how you can receive alerts to tell you when existing documents and information have been changed, or when new information or documents have been added. You can even share select information with partners or customers outside your organization. No one that uses SharePoint collaboration services can afford to be without this handy book.The SharePoint User's Guide is designed to help you find answers quickly, explaining key concepts and major points in straightforward language. With SharePoint, any team or organization can overcome geographic or time-zone challenges, and the SharePoint User's Guide will show them how.
    Note: "Getting started with SharePoint collaboration services"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Sebastopol, CA : Pogue Press/O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 592 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: QuickBooks ; Small business ; Accounting ; Computer programs ; Handbooks, manuals, etc ; Small business ; Finance ; Computer programs ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Every company large and small wants to boost its sales, control its spending, and keep the auditors at the Internal Revenue Service happy. But, no company wants to waste time on more paperwork. These days, a growing number of companies are turning to QuickBooks accounting software not only to speed up their bookkeeping efforts, but manage their businesses more effectively.Organizations come in all shapes, sizes, and business models, so it's no surprise that accounting practices can be a convoluted road to travel. QuickBooks can handle many of the financial tasks companies face, but the price you pay is an overabundance of software features. To make the learning curve even more challenging, QuickBooks doesn't come with a manual.Fortunately, to help pave the road to accounting success, there's QuickBooks 2005: The Missing Manual , a comprehensive guide from O'Reilly that examines everything the QuickBooks Pro edition has to offer, from invoices and inventory to assets and accounts payable.With QuickBooks 2005: The Missing Manual , financial managers can quickly learn how to use the program's tools to implement and maintain critical accounting processes. By covering details in a friendly and light-hearted way, the book explains when and why a feature is useful, and then offers indispensable, relevant advice. Each page of this Missing Manual provides insightful tips and tricks to help readers become more efficient, sophisticated users no matter what the extent of their existing knowledge is.Whether you're interested in QuickBooks for its basic bookkeeping features or its more powerful, business planning tools, the only way to truly harness its power is to read the book that should have been in the box: QuickBooks 2005: The Missing Manual .
    Note: "Business finance and accounting demystified"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Language: English
    Pages: xviii, 645 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Keywords: UNIX Shells ; Computer networks ; Security measures ; Data encryption (Computer science) ; Electronic books ; local
    Abstract: Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide . This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
    Note: "Covers SSH-2 protocol"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 341 p. , ill. ; , 23 cm. +
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: For years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you to perform all the tasks you can do with Windows.Getting to know Linux has never been easier, because now there's a way to test-drive Linux without changing, installing, or configuring a thing on your computer. It's called Test Driving Linux: From Windows to Linux in 60 Seconds .This latest release from O'Reilly comes with a Live CD called Move, that allows Windows users to try all the features of Mandrake Linux, a popular Linux distribution without the hassle of actually installing Linux. Users simply place the Move CD into their CD drive, boot from the disc, then watch an entire Mandrake system run on the fly from the CD-ROM. Test Driving Linux: From Windows to Linux in 60 Seconds is a detailed step-by-step guide to the Linux operating system and several popular open source programs. With this guide you can quickly learn how to use Linux to perform the tasks you do most: surf the web, send and receive email, instant message with friends, write letters, create spreadsheets, and even how to enhance your digital photos. Test Driving Linux: From Windows to Linux in 60 Seconds provides both home and business users with a hassle-free way to investigate this operating system before they purchase and install a complete Linux distribution.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 735 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.2762
    Keywords: Computer networks ; Programming ; Java (Computer program language) ; Electronic books ; local
    Abstract: The new third edition of this highly regarded introduction to Java networking programming has been thoroughly revised to cover all of the 100+ significant updates to Java Developers Kit (JDK) 1.5. It is a clear, complete introduction to developing network programs (both applets and applications) using Java, covering everything from networking fundamentals to remote method invocation (RMI). Java Network Programming , 3rd Edition includes chapters on TCP and UDP sockets, multicasting protocol and content handlers, servlets, multithreaded network programming, I/O, HTML parsing and display, the Java Mail API, and the Java Secure Sockets Extension. There's also significant information on the New I/O API that was developed in large part because of the needs of network programmers.This invaluable book is a complete, single source guide to writing sophisticated network applications. Packed with useful examples, it is the essential resource for any serious Java developer.
    Note: Includes index. - Previous ed.: Beijing; Sebastopol, Calif.: O'Reilly, 2000
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 238 p. , ill. ; , 24 cm
    Keywords: Linux ; Computer security ; Electronic books ; local
    Abstract: The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: A readable and concrete explanation of SELinux concepts and the SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With SELinux , a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 770 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Computer programs ; Electronic books ; local
    Abstract: Whether you are an Excel neophyte, a sophisticate who knows the program inside out, or an intermediate-level plodder eager to hone your skills, Excel: The Missing Manual is sure to become your go-to resource for all things Excel. Covering all the features of Excel 2002 and 2003, the most recent versions for Windows, Excel: The Missing Manual is an easy-to-read, thorough and downright enjoyable guide to one of the world's most popular, (and annoyingly complicated!) computer programs.Never a candidate for "the most user-friendly of Microsoft programs," Excel demands study, practice and dedication to gain even a working knowledge of the basics. Excel 2003 is probably even tougher to use than any previous version of Excel. However, despite its fairly steep learning curve, this marvelously rich program enables users of every stripe to turn data into information using tools to analyze, communicate, and share knowledge. Excel can help you to collaborate effectively, and protect and control access to your work. Power users can take advantage of industry-standard Extensible Markup Language (XML) data to connect to business processes.To unleash the power of the program and mine the full potential of their database talents, users need an authorative and friendly resource. None is more authoritative or friendlier than Excel: The Missing Manual . Not only does the book provide exhaustive coverage of the basics, it provides numerous tips and tricks, as well as advanced data analysis, programming and Web interface knowledge that pros can adopt for their latest project. Neophytes will find everything they need to create professional spreadsheets and become confident users. Excel: The Missing Manual covers: worksheet basics, formulas and functions, organizing worksheets, charts and graphics, advanced data analysis, sharing data with the rest of the world, and programming.If you buy just one book about using Excel, this has GOT to be it. This book has all you need to help you excel at Excel.
    Note: "Covers versions 2002 and 2003"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Upper Saddle River NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xx, 297 Seiten , 24 cm
    Edition: 3rd ed.
    Parallel Title: Erscheint auch als Meyers, Scott, 1959 - Effective C++
    DDC: 005.133
    RVK:
    Keywords: C++ (Computer program language) ; Electronic books ; local ; C++ ; Objektorientierte Programmierung ; C++
    Abstract: "Every C++ professional needs a copy of Effective C++ . It is an absolute must-read for anyone thinking of doing serious C++ development. If you've never read Effective C++ and you think you know everything about C++, think again." - Steve Schirripa, Software Engineer, Google "C++ and the C++ community have grown up in the last fifteen years, and the third edition of Effective C++ reflects this. The clear and precise style of the book is evidence of Scott's deep insight and distinctive ability to impart knowledge." - Gerhard Kreuzer, Research and Development Engineer, Siemens AG The first two editions of Effective C++ were embraced by hundreds of thousands of programmers worldwide. The reason is clear: Scott Meyers' practical approach to C++ describes the rules of thumb used by the experts - the things they almost always do or almost always avoid doing - to produce clear, correct, efficient code. The book is organized around 55 specific guidelines, each of which describes a way to write better C++. Each is backed by concrete examples. For this third edition, more than half the content is new, including added chapters on managing resources and using templates. Topics from the second edition have been extensively revised to reflect modern design considerations, including exceptions, design patterns, and multithreading. Important features of Effective C++ include: Expert guidance on the design of effective classes, functions, templates, and inheritance hierarchies. Applications of new "TR1" standard library functionality, along with comparisons to existing standard library components. Insights into differences between C++ and other languages (e.g., Java, C#, C) that help developers from those languages assimilate "the C++ way" of doing things.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit | Boston, MA :Safari,
    Language: English
    Pages: xvii, 396 p. , ill. ; , 23 cm
    Keywords: Adobe Premiere ; Digital video ; Editing ; Data processing ; Electronic books ; local
    Abstract: Just because you don't work for a major production house and you don't plan to add Star Wars style special effects to your latest movie project doesn't mean you don't want to do interesting things with the video you've shot. Now, with Adobe's first consumer-level video editing software you can-and at $99, you won't spend an arm and a leg to do so! In these pages, veteran author Antony Bolante provides all the instruction you need to start editing video fast with Adobe Premiere Elements. Just as Photoshop Elements brought image manipulation to the masses, Premiere Elements brings video editing prowess to anybody who owns a digital video camera. Whether you're a student filmmaker, a video hobbyist, or a proud parent who wants to put together a snazzy film of your daughter's winning soccer season, Antony's simple step-by-step instructions and straightforward teaching style will have you capturing and importing video, creating transitions and titles, and outputting the final product with Premier Elements in no time.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xv, 127 p. , col. ill. ; , 23 cm
    DDC: 005.36
    Keywords: Microsoft Excel (Computer file) ; Handbooks, manuals, etc ; Business ; Computer programs ; Handbooks, manuals, etc ; Electronic spreadsheets ; Computer programs ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Excel can be daunting: that empty grid just stares you in the face when you start the program, challenging you to fill in the cells with thenumbers you need to crunch. How do you start? What do you do? Creating Spreadsheets and Charts in Excel: Visual QuickProject Guide answers those questions and puts you on the straight track to getting the job done. This new addition to Peachpit's Visual QuickProject Guide series by Excel guru Maria Langer uses full color screen shots and numbered steps to walk you through the process of creating an Excel workbook file. You'll learn how to build a worksheet from the ground up, enter data, write formulas, and copy cell contents. You'll then see how to duplicate and modify worksheets to fine-tune them for your needs. The project's steps also include creating a consolidation worksheet, formatting all worksheets, creating a colorful pie chart, and setting options for printing your work. There's no time wasted in this book; Maria shows you the quickest and most efficient way to perform each task and doesn't waste paper with lengthy explanations or alternative methods. This slim book is all you'll need to get started creating spreadsheets and charts with Excel.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 798 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: "The book you are about to read will arm you with the knowledge you need to defend your network from attackers-both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." -Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security-one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." -Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." -Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." -Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes-resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools-including Sguil, Argus, and Ethereal-to mine network traffic for full content, session, statistical, and ale...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Alexandria, VA : ASTD Press | Boston, MA :Safari,
    Language: English
    Pages: x, 193 p. , ill. ; , 28 cm. +
    Keywords: Diversity in the workplace ; Handbooks, manuals, etc ; Diversity in the workplace ; Study and teaching ; Handbooks, manuals, etc ; Employees ; Training of ; Handbooks, manuals, etc ; Intercultural communication ; Handbooks, manuals, etc ; Interpersonal relations ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Traditionally, diversity education initiatives involve the catch phrase celebrate diversity. While the authors applaud this approach, this book offers a fresh perspective that focuses instead on the search for common ground among individuals and groups. In addition, the four fully scripted diversity modules allow you to develop a customized program quickly or enhance an existing diversity imitative. All ready-to-use PowerPoint slides, handouts, and other materials are included on a companion CD-ROM.
    Note: Accompanying CD-ROM includes: Adobe.pdf documents (assessments, tools, training instruments); Microsoft PowerPoint presentations which add to training activities in the book; Microsoft PowerPoint files of overhead transparency masters to facilitate printing of viewgraphs and handouts. - Includes bibliographical references (p. 189-191)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 621 p. , ill. ; , 25 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Management ; Software engineering ; Management ; Electronic books ; local
    Abstract: "This pioneering book highlights critical, overlooked skills needed by true software professionals." Steve McConnell CEO and Chief Software Engineering Construx Software "It's about time someone took this stuff seriously." Steven Mellor Chief Scientist Embedded Systems Division Mentor Graphics Corporation Co-Author of Exploring the Role of Executable UML in Model-Driven Architecture and six other books "Despite the fact that engineering economics is considered a core area of any engineering field, virtually no books have been written in the area of software engineering economics. Steve Tockey's Return on Software nicely fills this gaps by providing a comprehensive introduction to software engineering economics accessible both to students and to new software professionals." Donald J. Bagert, Ph.D., P.E. Director of Software Engineering and Professor of Computer Science & Software Engineering Rose-Hulman Institute of Technology "The elements of this book are useful not only in making decisions but also in understanding why and how other people and organizations make decisions" Shari Lawrence Pfleeger Senior Researcher, RAND Co-author of Security in Computing and eight other software engineering titles "This just what the doctor ordered to help software programs solve the problem of how to introduce engineering economics and business decision-making into their curricula. The economics of software development should not only be part of any computing curriculum they are an essential element of recent accreditation and certification recommendations. This book is an accessible and relevant text for any student of software engineering. The style is clear and straightforward and the software examples will be appealing to students and faculty alike. I can't wait to use it in class!" Thomas B. Hilburn, Professor Department of Computer and Software Engineering Embry-Riddle Aeronautical University Is your organization maximizing the return on its investments of money, time, and personnel? Probably not, because most software professionals don't know how to consider the business aspects of their software decisions. Most don't even know that it's important to do so. Business consequences should play a critical role in all software technical choices-from choosing which projects to do, selecting software development processes, choosing algorithms and data structures, all the way to determining how much testing is enough. Return on Software: Maximizing the Retur...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Language: English
    Pages: xlvi, 1394 p. , ill. ; , 23 cm. +
    Keywords: ColdFusion ; Database design ; Web databases ; Electronic books ; local
    Abstract: With more than 75 of the Fortune 100 companies using it (and more than 10,000 organizations employing it worldwide), it's pretty much a given that if you're developing applications for the Web, you're going to need to know ColdFusion at some point! Not to worry: Macromedia ColdFusion MX 7 Web Application Construction Kit provides everything you need to start creating Web-based applications immediately-including the latest version of the ColdFusion Web Application Server and development environment. Author and ColdFusion master Ben Forta starts by covering the fundamentals of Web-based database design and then proceeds to show you how to do everything from create data-driven pages to build complete applications, implement security mechanisms, integrate with e-mail, interact with Macromedia Flash, and more. From design and installation to application deployment and troubleshooting, this guide's got ColdFusion covered, including all the features new to the latest version: structured business reports, rich forms, Enterprise Manager (which lets users cluster multiple ColdFusion servers on a single machine), and more!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 702 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    DDC: 005.1
    Keywords: Linux ; Application software ; Development ; Electronic books ; local
    Abstract: "The first edition of this book has always been kept within arm's reach of my desk due to the wonderful explanations of all areas of the Linux userspace API. This second edition greatly overshadows the first one, and will replace it." --Greg Kroah-Hartman, Linux kernel programmer Develop Software that Leverages the Full Power of Today's Linux Linux Application Development, Second Edition, is the definitive reference for Linux programmers at all levels of experience, including C programmers moving from other operating systems. Building on their widely praised first edition, leading Linux programmers Michael Johnson and Erik Troan systematically present the key APIs and techniques you need to create robust, secure, efficient software or to port existing code to Linux. This book has been fully updated for the Linux 2.6 kernel, GNU C library version 2.3, the latest POSIX standards, and the Single Unix Specification, Issue 6. Its deep coverage of Linux-specific extensions and features helps you take advantage of the full power of contemporary Linux. Along the way, the authors share insights, tips, and tricks for developers working with any recent Linux distribution, and virtually any version of Unix. Topics include Developing in Linux: understanding the operating system, licensing, and documentation The development environment: compilers, linker and loader, and unique debugging tools System programming: process models, file handling, signal processing, directory operations, and job control Terminals, sockets, timers, virtual consoles, and the Linux console Development libraries: string matching, terminal handling, command-line parsing, authentication, and more Hundreds of downloadable code samples New to this edition The GNU C library (glibc), underlying standards, and test macros Writing secure Linux programs, system daemons, and utilities Significantly expanded coverage of memory debugging, including Valgrind and mpr Greatly improved coverage of regular expressions IPv6 networking coverage, including new system library interfaces for using IPv6 and IPv4 interchangeably Coverage of strace, ltrace, real-time signals, poll and epoll system calls, popt library improvements, Pluggable Authentication Modules (PAM), qdbm, and much more Improved index and glossary, plus line-numbered code examples
    Note: Includes bibliographical references (p. 679-682) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 367 p. , ill. ; , 24 cm
    DDC: 005.1/6
    Keywords: Software patterns ; Software refactoring ; Electronic books ; local
    Abstract: In 1994, Design Patterns changed the landscape of object-oriented development by introducing classic solutions to recurring design problems. In 1999, Refactoring revolutionized design by introducing an effective process for improving code. With the highly anticipated Refactoring to Patterns , Joshua Kerievsky has changed our approach to design by forever uniting patterns with the evolutionary process of refactoring. This book introduces the theory and practice of pattern-directed refactorings: sequences of low-level refactorings that allow designers to safely move designs to, towards, or away from pattern implementations. Using code from real-world projects, Kerievsky documents the thinking and steps underlying over two dozen pattern-based design transformations. Along the way he offers insights into pattern differences and how to implement patterns in the simplest possible ways. Coverage includes: A catalog of twenty-seven pattern-directed refactorings, featuring real-world code examples Descriptions of twelve design smells that indicate the need for this book's refactorings General information and new insights about patterns and refactoring Detailed implementation mechanics: how low-level refactorings are combined to implement high-level patterns Multiple ways to implement the same pattern-and when to use each Practical ways to get started even if you have little experience with patterns or refactoring Refactoring to Patterns reflects three years of refinement and the insights of more than sixty software engineering thought leaders in the global patterns, refactoring, and agile development communities. Whether you're focused on legacy or "greenfield" development, this book will make you a better software designer by helping you learn how to make important design changes safely and effectively.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xvii, 413 p. , ill. ; , 24 cm
    DDC: 005.52
    Keywords: Word processing ; WordPerfect (Computer file) ; Electronic books ; local
    Abstract: Maybe you just bought a brand new Dell, Sony or HP computer and are curious about the WordPerfect software that came with it. Or maybe you just took a new job in an office where they use WordPerfect 12 for word processing. Whatever the case may be, if you are new to Word Perfect 12, the Absolute Beginner's Guide to WordPerfect 12 can help you figure it all out. Endorsed by Corel, the makers of WordPerfect, this is the best beginning level guide on the market. Organized in an easy-to-follow, progressive format, you will learn how to navigate the program and build complex documents. By the time you're done, you will know how to use WordPerfect 12 from beginning to end!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 701 p. , ill. ; , 25 cm
    DDC: 005.1
    Keywords: Software engineering ; UML (Computer science) ; Electronic books ; local
    Abstract: "Designing Software Product Lines with UML is well-written, informative, and addresses a very important topic. It is a valuable contribution to the literature in this area, and offers practical guidance for software architects and engineers." -Alan Brown Distinguished Engineer, Rational Software, IBM Software Group "Gomaa's process and UML extensions allow development teams to focus on feature-oriented development and provide a basis for improving the level of reuse across multiple software development efforts. This book will be valuable to any software development professional who needs to manage across projects and wants to focus on creating software that is consistent, reusable, and modular in nature." -Jeffrey S Hammond Group Marketing Manager, Rational Software, IBM Software Group "This book brings together a good range of concepts for understanding software product lines and provides an organized method for developing product lines using object-oriented techniques with the UML. Once again, Hassan has done an excellent job in balancing the needs of both experienced and novice software engineers." -Robert G. Pettit IV, Ph.D. Adjunct Professor of Software Engineering, George Mason University "This breakthrough book provides a comprehensive step-by-step approach on how to develop software product lines, which is of great strategic benefit to industry. The development of software product lines enables significant reuse of software architectures. Practitioners will benefit from the well-defined PLUS process and rich case studies." -Hurley V. Blankenship II Program Manager, Justice and Public Safety, Science Applications International Corporation "The Product Line UML based Software engineering (PLUS) is leading edge. With the author's wide experience and deep knowledge, PLUS is well harmonized with architectural and design pattern technologies." -Michael Shin Assistant Professor, Texas Tech University Long a standard practice in traditional manufacturing, the concept of product lines is quickly earning recognition in the software industry. A software product line is a family of systems that shares a common set of core technical assets with preplanned extensions and variations to address the needs of specific customers or market segments. When skillfully implemented, a product line strategy can yield enormous gains in productivity, quality, and time-to-market. Studies indicate that if three or more systems with a degree of common functiona...
    Note: Includes bibliographical references (p. 675-685) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Electronic books ; local
    Abstract: The Definitive Guide to Protecting Enterprise Data Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecycle Management , leading industry consultant Tom Petrocelli presents a systematic, coherent approach to planning and implementing cost-effective data protection. This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy. Coverage includes A complete, unique framework for considering and planning data protection Understanding storage technology from the standpoint of data protection Architecting more effective backup/restore solutions Using remote copy and replication to keep data synchronized and support immediate failover to hot sites Leveraging core computer security concepts and strategies to protect your most critical data Securing your entire storage infrastructure, not just servers Using policy-driven data protection and Data Lifecycle Management (DLM) to improve security and reduce cost Using ILM to identify your highest-value data and choose the right ways to protect it Data Protection and Information Lifecycle Management is an indispensable resource for IT executives who must plan and implement strategies for data protection; administrators who must protect data on a day-to-day basis; and product managers, consultants, and marketers responsible for crafting superior data-security solutions.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Fully Updated to Reflect Major Improvements and Configuration Changes in Samba-3.0.11 through 3.0.20+! You've deployed Samba: Now get the most out of it with today's definitive guide to maximizing Samba performance, stability, reliability, and power in your production environment. Direct from members of the Samba Team, The Official Samba-3 HOWTO and Reference Guide, Second Edition, offers the most systematic and authoritative coverage of Samba's advanced features and capabilities. It has been extensively updated to reflect major improvements in the Samba-3.0 series of releases and additional performance enhancements in Samba-3.0.20 and later. Use this book to go far beyond basic deployment, leveraging all of Samba's components, from directory services to remote administration. Use it to find practical optimization techniques for any environment, from the workgroup to the enterprise. Use it to find detailed guidance and best practices for troubleshooting and problem solving. And, if your background is in Windows networking, use this book to get up to speed rapidly with Samba network administration in Linux/UNIX environments. Coverage includes NEW! User Rights and Privileges features and their impact on default system behavior NEW! Expanded LDAP capabilities, the new Winbind subsystem, and Samba's improved ACL handling NEW! Detailed coverage of the powerful Samba-3.x net local/remote administration utility NEW! Comprehensive documentation of IDMAP functionality NEW! Proven techniques for improving performance with large directories NEW! Samba integration with Windows Server 2003 and the latest versions of Active Directory Advanced techniques: interdomain trusts, loadable VFS file system drivers, distributed authentication, desktop profile management, CUPS printing, high availability, and more Contains a dramatically improved, more-detailed index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    London ; : Financial Times Prentice Hall, c2005 | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 335 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    DDC: 332.64/53
    Keywords: Options (Finance) ; Speculation ; Electronic books ; local
    Abstract: In Options Made Easy , Second Edition, Guy Cohen clearly explains everything you need to know about options in plain English so that you can start trading fast and make consistent profits in any market, bull or bear! Simply and clearly, the author reveals secrets of options trading that were formerly limited to elite professionals-and exposes the dangerous myths that keep investors from profiting. As you set out on your options journey, you'll learn interactively through real-life examples, anecdotes, case studies, and pictures. Guy Cohen is your friendly expert guide, helping you pick the right stocks, learn the right strategies, create the trading plans that work, and master the psychology of the winning trader. Master all the essentials-and put them to work Options demystified so that you can get past the fear and start profiting! Learn the safest ways to trade options Identify high-probability trades that lead to consistent profits Design a winning Trading Plan-and stick to it Understand your risk profile and discover exactly when to enter and exit your trades Choose the right stocks for maximum profit Screen for your best opportunities-stocks that are moving-or are about to move Discover the optimum strategies for you Match your trading strategies to your personal investment goals No bull! The realities and myths of the markets What you must know about fundamental and technical analysis
    Note: Includes bibliographical references (p. 319-320) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Berkeley, CA : New Riders Games | Boston, MA :Safari,
    Language: English
    Pages: xiv, 218 p. , ill. ; , 24 cm
    DDC: 794.8/165
    Keywords: Computer games ; Computer sound processing ; Electronic books ; local
    Abstract: Tired of video games in which the sound lags far behind the rest of the user's experience? If so, and if you're ready to do better, you need this forward-looking volume! In these pages, sound artist extraordinaire Alexander Brandon provides a broad-ranging exploration of how game audio is created today and how it should be done in the future in order to create groundbreaking audio. After providing a map of the audio development process in Chapter 1, Alexander discusses the basic preproduction, workflow, production, post-production, and technology issues audio designers must address today. Then, after a post-mortem analysis of the audio development process for a game that's currently on the market, Alexander takes a good, hard look at the heights to which video-game audio can be taken in chapters on ideal workflow, technology, and production. Throughout, the focus is on the practical advice you need to create better (and better!) sound!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xiii, 333 p. , col. ill. ; , 19 x 23 cm
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Get the fast facts that make learning Windows XP plain and simple! Fully updated for the latest service packs, technologies, and security updates, this colorful, no-nonsense guide shows the most expedient way to learn a skill or solve a problem.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Redmond, WA : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Get advanced programming techniques and guidelines to exploit the flexibility and customizability of the common language runtime for a variety of applications, from databases to cell phones.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR, c2005 | Boston, MA :Safari,
    ISBN: 0131489062
    Language: English
    Pages: xxv, 702 p. , ill. ; , 26 cm
    Edition: 3rd ed.
    DDC: 005.1/17
    Keywords: Object-oriented methods (Computer science) ; System analysis ; System design ; UML (Computer science) ; Electronic books ; local
    Abstract: "This edition contains Larman's usual accurate and thoughtful writing. It is a very good book made even better." - Alistair Cockburn, author, Writing Effective Use Cases and Surviving OO Projects "Too few people have a knack for explaining things. Fewer still have a handle on software analysis and design. Craig Larman has both." - John Vlissides, author, Design Patterns and Pattern Hatching "People often ask me which is the best book to introduce them to the world of OO design. Ever since I came across it Applying UML and Patterns has been my unreserved choice." - Martin Fowler, author, UML Distilled and Refactoring "This book makes learning UML enjoyable and pragmatic by incrementally introducing it as an intuitive language for specifying the artifacts of object analysis and design. It is a well written introduction to UML and object methods by an expert practitioner." - Cris Kobryn, Chair of the UML Revision Task Force and UML 2.0 Working Group A brand new edition of the world's most admired introduction to object-oriented analysis and design with UML Fully updated for UML 2 and the latest iterative/agile practices Includes an all-new case study illustrating many of the book's key points Applying UML and Patterns is the world's #1 business and college introduction to "thinking in objects"-and using that insight in real-world object-oriented analysis and design. Building on two widely acclaimed previous editions, Craig Larman has updated this book to fully reflect the new UML 2 standard, to help you master the art of object design, and to promote high-impact, iterative, and skillful agile modeling practices. Developers and students will learn object-oriented analysis and design (OOA/D) through three iterations of two cohesive, start-to-finish case studies. These case studies incrementally introduce key skills, essential OO principles and patterns, UML notation, and best practices. You won't just learn UML diagrams-you'll learn how to apply UML in the context of OO software development. Drawing on his unsurpassed experience as a mentor and consultant, Larman helps you understand evolutionary requirements and use cases, domain object modeling, responsibility-driven design, essential OO design, layered architectures, "Gang of Four" design patterns, GRASP, iterative methods, an agile approach to the Unified Process (UP), and much more. This edition's extensive improvements include A stronger focus on helping you master OOA/D through case studi...
    Note: Includes bibliographical references (p. 683-[688]) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Indianapolis, IN : Financial Times Prentice Hall Books | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 277 p. , ill. ; , 24 cm
    DDC: 332.4/5
    Keywords: Foreign exchange futures ; Foreign exchange market ; Investments ; Electronic books ; local
    Abstract: "For many investors, an intense, 24-hour-a-day, $1.5 trillion roller-coaster of a market spells "danger"; for readers of Forex Revolution , the word is "opportunity." -Michael J. Panzner, vice president, Rabo Securities USA, Inc., and author of The New Laws of the Stock Market Jungle "The author possesses an uncommon ability to describe a difficult and rapidly changing marketplace as if seen through a beginner's eyes. A most useful book for anyone that might not have been paying attention these past five years as the market reinvented itself." -Brentin C. Elam, director, Northcoast Asset Management, LLC Foreign currency exchange-"Forex"-is today's #1 new investment opportunity. Revolutions in technology, regulation, and globalization have made Forex trading accessible to every active investor. Only one thing has been missing: An objective, clear "user's guide" to Forex trading. Now it's here- and it's in your hands . Simply and clearly, Forex Revolution reveals everything you need to know to trade Forex hands-on-from fundamental and technical trading strategies to the unyielding discipline that's essential to success. In this book, Peter Rosenstreich brings together insider techniques from all over the industry: Traders, banks, Forex firms, even the National Futures Association. You'll find expert guidance on everything from handling 24/7 markets to profiting from the emergence of China. Unlike other books, Forex Revolution doesn't require you to subscribe to costly services or purchase expensive tools. Whether you're an individual investor or a money manager new to Forex, this book gives you all you need: Facts, techniques, resources and-above all- the insider's edge . How the currency markets became indispensable to the active investor Why Forex has become your #1 profit opportunity Everything you should know before you get started Meet the players, markets, tools, portals, and platforms Understand currency futures, options, swaps, and more Choose the right FX investments and discover why you need to know both Master both fundamental and technical trading strategies Develop the discipline you need to succeed Gut check: What it takes to win in the Forex markets Foreign Exchange Trading: Today's #1 Opportunity for Explosive Profits! The practical, hands-on Forex trading guide for individual investors No costly subscriptions or expensive tools needed Delivers unbiased, up-to-the-minute techniques you can start profiting from today Covers everyt...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xv, 476 p. , ill. ; , 24 cm
    DDC: 621.389/28
    Keywords: Biometric identification ; Identification ; Automation ; Pattern recognition systems ; Electronic books ; local
    Abstract: A breakthrough approach to improving biometrics performance Constructing robust information processing systems for face and voice recognition Supporting high-performance data fusion in multimodal systems Algorithms, implementation techniques, and application examples Machine learning: driving significant improvements in biometric performance As they improve, biometric authentication systems are becoming increasingly indispensable for protecting life and property. This book introduces powerful machine learning techniques that significantly improve biometric performance in a broad spectrum of application domains. Three leading researchers bridge the gap between research, design, and deployment, introducing key algorithms as well as practical implementation techniques. They demonstrate how to construct robust information processing systems for biometric authentication in both face and voice recognition systems, and to support data fusion in multimodal systems. Coverage includes: How machine learning approaches differ from conventional template matching Theoretical pillars of machine learning for complex pattern recognition and classification Expectation-maximization (EM) algorithms and support vector machines (SVM) Multi-layer learning models and back-propagation (BP) algorithms Probabilistic decision-based neural networks (PDNNs) for face biometrics Flexible structural frameworks for incorporating machine learning subsystems in biometric applications Hierarchical mixture of experts and inter-class learning strategies based on class-based modular networks Multi-cue data fusion techniques that integrate face and voice recognition Application case studies
    Note: Includes bibliographical references (p. 427-456) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxii, 372 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer crimes ; Prevention ; Computer networks ; Security measures ; Internet ; Security measures ; Electronic books ; local
    Abstract: Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the following topics How denial-of-service attacks are waged How to improve your network's resilience to denial-of-service attacks What to do when you are involved in a denial-of-service attack The laws that apply to these attacks and their implications How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplices The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.
    Note: Includes bibliographical references (p. 335-350) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Pearson Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xix, 281 p. , ill. ; , 24 cm
    DDC: 519.5
    Keywords: Statistics ; Popular works ; Electronic books ; local
    Abstract: Even You Can Learn Statistics A Guide for Everyone Who Has Ever Been Afraid Of Statistics One easy step at a time, this book will teach you the key statistical techniques you'll need for finance, quality, marketing, the social sciences, or just about any other field. Each technique is introduced with a simple, jargon-free explanation, practical examples, and hands-on guidance for solving real problems with Excel or a TI-83/84 series calculator, including Plus models. Hate math? No sweat. You'll be amazed how little you need! For those who do have an interest in mathematics, optional "Equation Blackboard" sections review the equations that provide the foundations for important concepts. David M. Levine is a much-honored innovator in statistics education. He is Professor Emeritus of Statistics and Computer Information Systems at Bernard M. Baruch College (CUNY), and co-author of several best-selling books, including Statistics for Managers using Microsoft Excel, Basic Business Statistics, Quality Management, and Six Sigma for Green Belts and Champions. Instructional designer David F. Stephan pioneered the classroom use of personal computers, and is a leader in making Excel more accessible to statistics students. He has co-authored several textbooks with David M. Levine. Here's just some of what you'll learn how to do... Use statistics in your everyday work or study Perform common statistical tasks using a Texas Instruments statistical calculator or Microsoft Excel Build and interpret statistical charts and tables "Test Yourself" at the end of each chapter to review the concepts and methods that you learned in the chapter Work with mean, median, mode, standard deviation, Z scores, skewness, and other descriptive statistics Use probability and probability distributions Work with sampling distributions and confidence intervals Test hypotheses and decision-making risks with Z, t, Chi-Square, ANOVA, and other techniques Perform regression analysis and modeling The easy, practical introduction to statistics-for everyone! Thought you couldn't learn statistics? Think again. You can-and you will! Complementary Web site Downloadable practice files at http://www.ftpress.com/youcanlearnstatistics
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 343 p. , ill., maps ; , 24 cm
    DDC: 658.406
    Keywords: Corporations ; Growth ; Organizational change ; Management ; Electronic books ; local
    Abstract: If there's one thing that's consistent in today's business world, it's rapid change. So how do you not only stay steady but actually grow'and quickly enough to stay safely ahead of your competitors? Built for Growth delivers specific solutions to create a brand and presence that generates true customer passion, as you lay a solid foundation for long-term success. Author Arthur Rubinfeld was a major driver in Starbucks' unprecedented retail expansion from 100 stores to more than 4000-- and its transformation into one of the world's most recognized brands. Here he draws on his singular expertise to present a proven, holistic approach to conceiving, designing, and executing your business plan: creating exciting concepts, growing them to fruition in local markets, expanding rapidly, and keeping your brand fresh and relevant as it matures. His revolutionary approach to business strategy embodies strong personal values, promotes exceptional creativity, leverages scientific methodology in finance and market analysis, and brings it all together with 'old-time' customer service.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxi, 366 p. , ill. ; , 25 cm
    DDC: 338.54
    Keywords: Business forecasting ; Economic forecasting ; Economic indicators ; Electronic books ; local
    Abstract: Every day, stocks, bonds, and currencies bounce wildly in response to new economic indicators. Money managers obsess over those statistics, because they provide crucial clues about the future of the economy and the financial markets. Now you can use these indicators to make smarter investment decisions, just like the professionals do.You don't need an economics degree, or a CPA... just this easy-to-use book. Former TIME Magazine senior economics reporter Bernard Baumohl has done the impossible: he's made economic indicators fascinating . Using real-world examples and stories,Baumohl illuminates every U.S. and foreign indicator that matters.Where to find them.What they look like. What the insiders know about their track records. And exactly how to interpret them. Whether you're an investor,broker, portfolio manager, researcher, journalist,or student, you'll find this book indispensable.Nobody can predict the future with certainty. But The Secrets of Economic Indicators will get you as close as humanly possible. What the numbers really mean... ...to stocks, bonds, rates, currencies, and you Ahead of the curve: spotting turning points Calling recessions and recoveries in time to profit from them Leading indicators: where's the economy really heading Decoding initial unemployment claims, housing starts, the yield curve, and other predictors Beyond the borders Why foreign indicators are increasingly important-and how to use them Making sense of indicators in conflict What to do when the numbers disagree Finding the data Free web resources for the latest economic data Investments "This is the most up-to-date guide to economic indicators and their importance to financial markets in print. For anyone trying to follow the economic data, this should be next to your computer so that you can understand and find the data on the Internet." David Wyss, Chief Economist, Standard and Poor's "I find Baumohl's writing fascinating. Just about anyone who's serious about understanding which way the economy is headed will want to read this book. It could be a classic." Harry Domash, Columnist for MSN Money and Publisher, Winning Investing Newsletter "Every business person or investor should keep a copy of Baumohl's book close-at-hand. It is great, at long last, to have someone who has eliminated what may have been so perplexing to so many and to have done so with such remarkable clarity." Hugh Johnson, Chief Investment Officer, First Albany "Bernie Baumohl has writt...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxv, 585 p. , ill. ; , 24 cm
    DDC: 621.39/2
    Keywords: Integrated circuits ; Verification ; Electronic books ; local
    Abstract: The Practical, Start-to-Finish Guide to Modern Digital Design Verification As digital logic designs grow larger and more complex, functional verification has become the number one bottleneck in the design process. Reducing verification time is crucial to project success, yet many practicing engineers have had little formal training in verification, and little exposure to the newest solutions. Hardware Design Verification systematically presents today's most valuable simulation-based and formal verification techniques, helping test and design engineers choose the best approach for each project, quickly gain confidence in their designs, and move into fabrication far more rapidly. College students will find that coverage of verification principles and common industry practices will help them prepare for jobs as future verification engineers. Author William K. Lam, one of the world's leading experts in design verification, is a recent winner of the Chairman's Award for Innovation, Sun Microsystems' most prestigious technical achievement award. Drawing on his wide-ranging experience, he introduces the foundational principles of verification, presents traditional techniques that have survived the test of time, and introduces emerging techniques for today's most challenging designs. Throughout, Lam emphasizes practical examples rather than mathematical proofs; wherever advanced math is essential, he explains it clearly and accessibly. Coverage includes Simulation-based versus formal verification: advantages, disadvantages, and tradeoffs Coding for verification: functional and timing correctness, syntactical and structure checks, simulation performance, and more Simulator architectures and operations, including event-driven, cycle-based, hybrid, and hardware-based simulators Testbench organization, design, and tools: creating a fast, efficient test environment Test scenarios and assertion: planning, test cases, test generators, commercial and Verilog assertions, and more Ensuring complete coverage, including code, parameters, functions, items, and cross-coverage The verification cycle: failure capture, scope reduction, bug tracking, simulation data dumping, isolation of underlying causes, revision control, regression, release mechanisms, and tape-out criteria An accessible introduction to the mathematics and algorithms of formal verification, from Boolean functions to state-machine equivalence and graph algorithms Decision diagrams, equivalence checki...
    Note: Includes bibliographical references (p. 539-559) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxi, 382 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Cellular telephones ; Mobile communication systems ; Electronic books ; local
    Abstract: Nokia's smartphones pack a powerful computer into a very small space. Unlike your desktop or laptop, your smallest computer can be connected to the Internet all the time, and can interact with the world around it through its camera, voice recognition, and its traditional phone keypad. Nokia smartphones combine these features with impressive storage options and a host of networking protocols that make this smallest computer the only thing a road warrior truly needs. If you're still cracking open your laptop or pining for your desktop while you're on the road, you haven't begun to unlock your Nokia's full potential. Nokia Smartphone Hacks is dedicated to tricking out your smartphone and finding all the capabilities lurking under the surface. Learn how to: Unlock your phone so that you can use it with any carrier Avoid and recover from malicious mobile software Watch DVD movies on the phone Use the phone as a remote control Use the phone as a data modem for your notebook Check your email and browse the web Post to your weblog from your phone Record phone conversations Choose mobile service plans Transfer files between the phone and your computer Whether you want to use your smartphone as your lifeline while you're on the road, or you're just looking for a way to make the most of the time you spend waiting in lines, you'll find all the user-friendly tips, tools, and tricks you need to become massively productive with your Nokia smartphone. With Nokia Smartphone Hacks , you'll unleash the full power of that computer that's sitting in your pocket, purse, or backpack.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 519 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Swing (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Abstract: Swing Hacks helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. If you're a Java developer looking to build enterprise applications with a first-class look and feel, Swing is definitely one skill you need to master. This latest title from O'Reilly is a reference to the cool stuff in Swing. It's about the interesting things you learn over the years--creative, original, even weird hacks--the things that make you say, "I didn't know you could even do that with Swing!" Swing Hacks will show you how to extend Swing's rich component set in advanced and sometimes non-obvious ways. The book touches upon the entire Swing gamut-tables, trees, sliders, spinners, progress bars, internal frames, and text components. Detail is also provided on JTable/JTree, threaded component models, and translucent windows. You'll learn how to filter lists, power-up trees and tables, and add drag-and-drop support. Swing Hacks will show you how to do fun things that will directly enhance your own applications. Some are visual enhancements to make your software look better. Some are functional improvements to make your software do something it couldn't do before. Some are even just plain silly, in print only to prove it could be done. The book will also give you give you a small glimpse of the applications coming in the future. New technology is streaming into the Java community at a blistering rate, and it gives application developers a whole new set of blocks to play with. With its profusion of tips and tricks, Swing Hacks isn't just for the developer who wants to build a better user interface. It's also ideally suited for client-side Java developers who want to deliver polished applications, enthusiasts who want to push Java client application boundaries, and coders who want to bring powerful techniques to their own applications. Whatever your programming needs, Swing Hacks is packed with programming lessons that increase your competency with interface-building tools.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Sebastopol, CA : Pogue Press | Boston, MA :Safari,
    Language: English
    Pages: 402 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    Keywords: iTunes ; Handbooks, manuals, etc ; MP3 (Audio coding standard) ; Handbooks, manuals, etc ; MP3 players ; Handbooks, manuals, etc ; Music ; Data processing ; Handbooks, manuals, etc ; Pocket computers ; Handbooks, manuals, etc ; iPod (Digital music player) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Whether it's the ultra-thin, pocket-sized iPod or the vast music library known as iTunes, it seems like everyone is relying on these marvels of technology for their musical needs. CDs and cassettes? They're so twentieth century! But like any cutting-edge technology, improvements come fast and furious. To keep up with all the recent changes to iPod and iTunes, O'Reilly has once again fully updated and refreshed its bestselling Missing Manual. This third edition now reflects the following cool advancements: the fourth-generation iPod, which has a capacity of 10,000 songs iPod Photo and iPod Shuffle: the two newest members of the iPod family Airport Express (featuring AirTunes), a gadget that streams iTunes music wirelessly through the speakers of a nearby stereo the latest version of iTunes (4.7) Covering all iPod models for both Mac and Windows, iPod & iTunes: The Missing Manual , 3rd Edition lays bare an astonishing collection of useful tips, tricks, and shortcuts. For prospective iPod owners, it reveals how the iPod can be used as a PalmPilot, a hard drive, an e-book, and even as a GameBoy. Experienced iPodders, meanwhile, will benefit from the up-to-the-minute nature of the book's content. And if the deep reservoir of the iTunes music store is more your style, it's also the ultimate guide to the iTunes software and iTunes Music Store for both Mac and Windows. Like the rest of the Missing Manual series, iPod & iTunes: The Missing Manual is written in a witty and entertaining style that makes it an easy read for even the most non-technical of consumers.
    Note: "Covers iTunes, Music Store (Mac & PC), and the iPod shuffle"--Cover. - "Juiciest secrets of Apple's pocket virtuoso"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xvi, 349 p. , ill. (some col.), maps ; , 24 cm
    Edition: 1st ed.
    DDC: 526.0285
    Keywords: Digital mapping ; Geodatabases ; Design and construction ; Web site development ; Electronic books ; local
    Abstract: With the help of the Internet and accompanying tools, creating and publishing online maps has become easier and rich with options. A city guide web site can use maps to show the location of restaurants, museums, and art venues. A business can post a map for reaching its offices. The state government can present a map showing average income by area.Developers who want to publish maps on the web often discover that commercial tools cost too much and hunting down the free tools scattered across Internet can use up too much of your time and resources. Web Mapping Illustrated shows you how to create maps, even interactive maps, with free tools, including MapServer, OpenEV, GDAL/OGR, and PostGIS. It also explains how to find, collect, understand, use, and share mapping data, both over the traditional Web and using OGC-standard services like WFS and WMS.Mapping is a growing field that goes beyond collecting and analyzing GIS data. Web Mapping Illustrated shows how to combine free geographic data, GPS, and data management tools into one resource for your mapping information needs so you don't have to lose your way while searching for it.Remember the fun you had exploring the world with maps? Experience the fun again with Web Mapping Illustrated . This book will take you on a direct route to creating valuable maps.
    Note: "Using open source GIS toolkits"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Language: English
    Pages: xviii, 714 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computerinteraction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security & Usability groups 34 essays into six parts: Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems--how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems--methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 209 p. , ill. ; , 25 cm
    Edition: 1st ed.
    DDC: 004.6/8
    Keywords: Home automation ; Home computer networks ; Electronic books ; local
    Abstract: The beauty of a home network is that it can make life so easy--what could be better than sharing an Internet connection so that everyone can be online at the same time? With home networking you can move files from one computer to another, share resources, print to a single printer or multiple printers from any computer in the house, and IM the kids when they're holed up in their rooms. And the downside? Anyone who's ever had to troubleshoot a network glitch doesn't need to ask that question. The simple words, "Why can't I print? Why can't I get to the Internet? Why does my computer say 'Access Denied' today, when it worked fine yesterday?" are enough to send the home network administrator running for cover. And the concept of "network security" can keep the soundest sleeper tossing and turning all night.Currently, more than 8 million homes in the US have installed a network of some kind, and within five years, that number is expected to jump to 37 million. This speaks to the availability of easy-to-install home networking products. Unfortunately, there's also a glut of potential headaches that can occur after installation (and during, sometimes) with no warning label on the box saying, "This product sure to cause annoyances."But help is here. Home Networking Annoyances will ease the headaches and annoyances of anyone who runs a home network. This book tackles all the common annoyances associated with running your network--whether it's wired or wireless, or a combination thereof. Its friendly, off-the-cuff approach will put you in a position of power over those home networking glitches, including file sharing, printing, cabling, security, and much more. You'll find dozens of on-target tips, workarounds, and fixes that will help you improve your home networking experience in every way possible.Whether you're a mainstream business user or a home user with newly installed network hardware, you've probably had your patience tested by frustrating network maintenance issues. Take a stand against annoyances now: just as the bestselling PC Annoyances brought peace and happiness to PC users everywhere, Home Networking Annoyances is your ticket to serenity.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 221 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: C-Sharp (Computer program language) ; Computer programming ; Electronic books ; local
    Abstract: In the three years since Microsoft made C# available, there have been lots of tweaks to the language. That's because C# is not only essential for making .NET work, it's a big way for Microsoft to attract millions of Java, C and C++ developers to the platform. And C# has definitely made some inroads. Because of its popularity among developers, the language received standardization from ECMA International, making it possible to port C# applications to other platforms. To bolster its appeal, C# 2.0 has undergone some key changes as part of Visual Studio 2005 that will make development with .NET quicker and easier.That's precisely what Visual C# 2005: A Developer's Notebook allows you to do. There are some great new features in C# and this unique "all lab, no lecture" guide covers them all with 50 hands-on projects. Each project explores a new feature, with emphasis on changes that increase productivity, simplify programming tasks, and add functionality to applications.C#'s component-based design combines the productivity of Microsoft's popular Visual Basic with the raw power of C++ for web-based applications. Many reviewers note a similarity between C# and Java--in fact, a new feature that took the Java development team five years to incorporate into Java is now available in C# 2.0. Called "generics", this feature enables developers to reuse and customize their existing code, so they can dramatically cut down the time it takes to develop new applications. Visual C# 2005: A Developer's Notebook is full of no-nonsense code without the usual page-filling commentary. You'll find suggestions for further experimentation, links to on-line documentation, plus practical notes and warnings. The book also tells developers how to acquire, install and configure Visual Studio 2005. Are you a coder to the core? Learn what C# 2.0 can do for you now.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxv, 191 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Maven (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Abstract: Maven is a new project management and comprehension tool which provides an elegant way to share build logic across projects. In terms of capabilities, Maven is an improvement to Apache Ant-thanks to numerous plug-ins and built-in integration with unit testing frameworks such as JUnit. Tired of writing the same build logic for every project? Using Maven, you can leverage the experience of the community to avoid the tedious process of creating yet another build script for each new project. Maven: A Developer's Notebook begins by introducing you to the concept of project object model (POM), and then offers further details on the essential features of Maven. Like all titles in O'Reilly's Developer's Notebook series, this no-nonsense book skips the boring prose and cuts right to the chase. It's an approach that forces you to get your hands dirty by working through a series of poignant labs-exercises that speak to you instead of at you.Plus, Maven: A Developer's Notebook is the first book on the subject to hit the market, so you know the information is fresh and timely. If you're a Java programmer, you'll be armed with all the critical information you need to get up to speed on this powerful new build tool. You'll discover how Maven can help you: manage a project's build, reporting, and documentation, all from a central piece of information break a complex project into a series of smaller subprojects report on code quality, unit tests, code duplication, and project activity create a custom remote repository build simple and complex plug-ins In the end, you'll find yourself spending less time working on your project's build system and more time working on your project's code.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Language: English
    Pages: xiii, 200 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Information technology ; Management ; Electronic books ; local
    Abstract: In a typical organization, there's always plenty that to do such as: pay vendors, invoice customers, answer customer inquiries, and fix bugs in hardware or software. You need to know who wants what and keep track of what is left to do. This is where a ticketing system comes in. A ticketing system allows you to check the status of various tasks: when they were requested, who requested them and why, when they were completed, and more. RT is a high-level, open source ticketing system efficiently enabling a group of people to manage tasks, issues, and requests submitted by a community of users. RT Essentials , co-written by one of the RT's original core developers, Jesse Vincent, starts off with a quick background lesson about ticketing systems and then shows you how to install and configure RT. This comprehensive guide explains how to perform day-to-day tasks to turn your RT server into a highly useful tracking tool. One way it does this is by examining how a company could use RT to manage its internal processes. Advanced chapters focus on developing add-on tools and utilities using Perl and Mason. There's also chapter filled with suggested uses for RT inside your organization. No matter what kind of data your organization tracks--from sales inquiries to security incidents or anything in between-- RT Essentials helps you use RT to provide order when you need it most.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 870 p. , ill. ; , 23 cm
    Series Statement: Networking technology series
    Keywords: Electronic books ; local
    Abstract: Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic Use router authentication to prevent spoofing and routing attacks Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks Apply stateful filtering of traffic with CBAC, including dynamic port mapping Use Authentication Proxy (AP) for user authentication Perform address translation with NAT, PAT, load distribution, and other methods Implement stateful NAT (SNAT) for redundancy Use Intrusion Detection System (IDS) to protect against basic types of attacks Obtain how-to instructions on basic logging and learn to easily interpret results Apply IPSec to provide secure connectivity for site-to-site and remote access connections Read about many, many more features of the IOS firewall for mastery of router security The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches you how to use the Cisco IOS firewall to enhance the security of your perimeter routers and, along the way, take advantage of the flexibility and scalability that is part of the Cisco IOS Software package. Each chapter in Cisco Router Firewall Security addresses an important component of perimeter router security. Author Richard Deal explains the advantages and disadvantages of all key security features to help you understand when they should be used and includes examples from his personal consulting experience to illustrate critical issues and security pitfalls. A detailed case study is included at the end of the book, which illustrates best practices and specific information on how to implement Cisco router security features. Whether you are looking to learn about firewall security or seeking how-to techniques to enhance security in your Cisco routers, Cisco R...
    Note: "Harden perimeter routers with Cisco firewall functionality and features to ensure network security"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Language: English
    Pages: xxii, 509 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    Keywords: GNU Emacs ; Text editors (Computer programs) ; Electronic books ; local
    Abstract: GNU Emacs is the most popular and widespread of the Emacs family of editors. It is also the most powerful and flexible. Unlike all other text editors, GNU Emacs is a complete working environment--you can stay within Emacs all day without leaving. Learning GNU Emacs , 3rd Edition tells readers how to get started with the GNU Emacs editor. It is a thorough guide that will also "grow" with you: as you become more proficient, this book will help you learn how to use Emacs more effectively. It takes you from basic Emacs usage (simple text editing) to moderately complicated customization and programming.The third edition of Learning GNU Emacs describes Emacs 21.3 from the ground up, including new user interface features such as an icon-based toolbar and an interactive interface to Emacs customization. A new chapter details how to install and run Emacs on Mac OS X, Windows, and Linux, including tips for using Emacs effectively on those platforms. Learning GNU Emacs , third edition, covers: How to edit files with Emacs Using the operating system shell through Emacs How to use multiple buffers, windows, and frames Customizing Emacs interactively and through startup files Writing macros to circumvent repetitious tasks Emacs as a programming environment for Java, C++, and Perl, among others Using Emacs as an integrated development environment (IDE) Integrating Emacs with CVS, Subversion and other change control systems for projects with multiple developers Writing HTML, XHTML, and XML with Emacs The basics of Emacs Lisp The book is aimed at new Emacs users, whether or not they are programmers. Also useful for readers switching from other Emacs implementations to GNU Emacs.
    Note: "A Guide to the World's Most Extensible, Customizable Editor"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly. | Boston, MA :Safari,
    Language: English
    Pages: xxii, 534 p. , ill. ; , 24 cm
    DDC: 005.43
    Keywords: Operating systems (Computers) ; Electronic books ; local
    Abstract: Shell scripting skills never go out of style. It's the shell that unlocks the real potential of Unix. Shell scripting is essential for Unix users and system administrators-a way to quickly harness and customize the full power of any Unix system. With shell scripts, you can combine the fundamental Unix text and file processing commands to crunch data and automate repetitive tasks. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards. Classic Shell Scripting is written to help you reliably navigate these tricky waters.Writing shell scripts requires more than just a knowledge of the shell language, it also requires familiarity with the individual Unix programs: why each one is there, how to use them by themselves, and in combination with the other programs. The authors are intimately familiar with the tips and tricks that can be used to create excellent scripts, as well as the traps that can make your best effort a bad shell script. With Classic Shell Scripting you'll avoid hours of wasted effort. You'll learn not only write useful shell scripts, but how to do it properly and portably.The ability to program and customize the shell quickly, reliably, and portably to get the best out of any individual system is an important skill for anyone operating and maintaining Unix or Linux systems. Classic Shell Scripting gives you everything you need to master these essential skills.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: 915 p. ; , 23 cm
    Keywords: Electronic books ; local
    Abstract: Novell eDirectory (formerly Novell Directory Services- NDS) is employed by system administrator to define users on the network and links those same users to their access rights with corporate resources, devices like printers and security policies. Novell eDirectory is comparable to Microsoft's Active Directory and is designed for large-scale, high-end directory deployments. Its strengths are scalability and reliability, a flexible yet strong security architecture, compatibility with key industry standards and operating systems. Novell's Guide to Troubleshooting eDirectory is the definitive source for information on eDirectory troubleshooting techniques. It is the single stop reference covering topics from good design to proactive/reactive problem resolution. All of the information presented in this book has been gathered from hands-on, real world experiences of the authors.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: You bought a digital video camera so that you could take and transfer home movies to DVD easily. Only come to find out, it's not so easy when faced with the task on your own. Why does "going digital" seem like such a difficult endeavor? It doesn't have to be and Create Your Own Digital Movies can show you how to get through it all with ease. Find out what camera to choose, filming dos and don'ts, and techniques for creating, editing, saving and sharing movies. Five projects will teach you everything you need to know, plus you'll benefit from numerous other tips, tricks and other helpful information. Don't get bogged down with the intricacies of camera mechanics or software use. Let Create Your Own Digital Movies show you how easy and fun it is to use your digital video camera.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...