Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (51)
  • Anderson, Fritz  (3)
  • Kannan, Sowmya
  • Upper Saddle River, NJ : Addison-Wesley  (28)
  • Upper Saddle River, N.J. : Prentice Hall  (27)
Datasource
Material
Language
  • 1
    ISBN: 9780134034706 , 0134034708
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Sixth edition.
    Keywords: Java (Computer program language) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: The Java® Tutorial, 6th Edition, is based on the Java Platform, Standard Edition (Java SE) 8. This revised and updated edition introduces the new features added to the platform, including lambda expressions, default methods, aggregate operations, and more. An accessible and practical guide for programmers of any level, this book focuses on how to use the rich environment provided by Java to build applications, applets, and components. Expanded coverage includes a chapter on the Date-Time API and a new chapter on annotations, with sections on type annotations and pluggable type systems as well as repeating annotations. In addition, the updated sections "Security in Rich Internet Applications" and "Guidelines for Securing Rich Internet Applications" address key security topics. The latest deployment best practices are described in the chapter "Deployment in Depth." If you plan to take one of the Java SE 8 certification exams, this book can help. A special appendix, "Preparing for Java Programming Language Certification," details the items covered on the available exams. Check online for updates. All of the material has been thoroughly reviewed by members of Oracle Java engineering to ensure that the information is accurate and up to date. This book is based on the online tutorial hosted on Oracle Corporation's website at http://docs.oracle.com/javase/tutorial .
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed December 5, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley
    ISBN: 9780134052793 , 013405279X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Xcode ; Mac OS ; iOS (Electronic resource) ; Macintosh (Computer) ; Programming ; iPhone (Smartphone) ; Programming ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Use Xcode 6 to Craft Outstanding iOS and OS X Apps! Xcode 6 Start to Finish will help you use Apple's Xcode 6 tools to improve productivity, write great code, and leverage the newest iOS 8 and OS X Yosemite features, including Apple's new Swift programming language. Drawing on more than thirty years of experience developing for Apple platforms, and helping others do so, Fritz Anderson presents a complete best-practice workflow that reflects Xcode's latest innovations. Through three full, sample projects, you'll learn to integrate testing, source control, and other key skills into a high-efficiency process that works. And all sample code has been completely written in Swift, with figures and descriptions that reflect Xcode's radically new interface. This is the only Xcode 6 book focused on deep mastery of the tools you'll be living with every day. Anderson reveals better ways to storyboard, instrument, build, and compile code, and helps you apply new features, ranging from Interface Builder Live Rendering to View Debugging and XCTest Performance Testing. By the time you're finished, you'll have all the Xcode 6 skills you need in order to develop truly exceptional software. Coverage includes Working with iOS-side dynamic frameworks and iOS/OS X extension modules Streamlining Model, View, and Controller development with Swift Rewriting Objective-C functions in Swift Efficiently managing layouts and view hierarchies with size classes Inspecting and fixing interface issues with the new View Debugger Displaying and configuring custom views within Interface Builder via Live Rendering Benchmarking performance within the Xcode 6 unit test framework Leveraging Xcode 6 automated tools to simplify localization Creating new extensions to inject services and UI into other applications Mastering new Swift debugging techniques Register your book at informit.com/register for access to this title's downloadable code.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley
    ISBN: 9780133751031 , 0133751031
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Xcode ; iOS (Electronic resource) ; Mac OS ; Macintosh (Computer) ; Programming ; iPhone (Smartphone) ; Programming ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Use Xcode 5 to Write Great iOS and OS X Apps! Xcode 5 Start to Finish will help you use the tools in Apple's Xcode 5 to improve productivity, write great code, and leverage the newest iOS 7 and OS X Mavericks features. Drawing on thirty years of experience developing for Apple platforms and helping others do so, Fritz Anderson shows you a complete best-practice Xcode workflow. Through three full sample projects, you'll learn to integrate testing, source control, and other key skills into a high-efficiency process that works. Anderson shows you better ways to storyboard, instrument, build, and compile code, and helps you apply innovations ranging from Quick Look to Preview Assistant. By the time you're finished, you'll have the advanced Xcode skills to develop outstanding software. Coverage includes Setting breakpoints and tracing execution for active debugging Creating libraries by adding and building new targets Integrating Git or Subversion version control Creating iOS projects with MVC design Designing Core Data schemas for iOS apps Linking data models to views Designing UI views with Interface Builder Using the improved Xcode 5 Autolayout editor Improving reliability with unit testing Simplifying iOS provisioning Leveraging refactoring and continual error checking Using OS X bindings, bundles, packages, frameworks, and property lists Localizing your apps Controlling how Xcode builds source code into executables Analyzing processor and memory usage with Instruments Integrating with Mavericks Server's sleek continuous integration system Register your book at www.informit.com/register for access to this title's downloadable code.
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780132761987 , 013276198X
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 5th ed.
    Parallel Title: Erscheint auch als
    Keywords: Java (Computer program language) ; Electronic books ; Electronic books ; local
    Abstract: The Java® Tutorial, Fifth Edition, is based on Release 7 of the Java Platform Standard Edition. This revised and updated edition introduces the new features added to the platform, including a section on NIO.2, the new file I/O API, and information on migrating legacy code to the new API. The deployment coverage has also been expanded, with new chapters such as "Doing More with Rich Internet Applications" and "Deployment in Depth," and a section on the fork/join feature has been added to the chapter on concurrency. Information reflecting Project Coin developments, including the new try-with-resources statement, the ability to catch more than one type of exception with a single exception handler, support for binary literals, and diamond syntax, which results in cleaner generics code, has been added where appropriate. The chapters covering generics, Java Web Start, and applets have also been updated. In addition, if you plan to take one of the Java SE 7 certification exams, this guide can help. A special appendix, "Preparing for Java Programming Language Certification," lists the three exams available, details the items covered on each exam, and provides cross-references to where more information about each topic appears in the text. All of the material has been thoroughly reviewed by members of Oracle Java engineering to ensure that the information is accurate and up to date.
    Note: Previous ed.: The Java tutorial : a short course on the basics / Sharon Zakhour... [et al.]. 2006, which was based on The Java tutorial / by Mary Campione. - "Oracle"--Cover. - "Java"--Cover. - Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Microsoft Windows (Computer file) ; Computer software ; Development ; Microsoft .NET ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: "Brian Noyes' writing style easily captures your attention as he elaborates on all aspects of data binding in his book. He has a refreshingly clear and crisp delivery as he starts each chapter with a simple tour of each topic, and then leads you into practical concerns for sound practices and extensibility opportunities. Most importantly, as Brian explains approaches to data-binding architecture, patterns of usage, the value of data sets, binding controls and the rest, he always describes how he reaches his recommendations on the topic. This book is perfect for newcomers to .NET 2.0, but also for those that have some experience. Anyone who cares about data in their applications (okay, that should be almost everyone) is guaranteed to learn something new and useful by reading Brian's book." -Michele Leroux Bustamante, IDesign chief architect, Microsoft regional director, and MVP "Brian has saved me a lot of time. I'm writing The Hitchhiker's Guide to Visual Studio and SQL Server 2005 (7th Edition) and I'm not going to have to cover data binding nearly as deeply because Brian has done it for me. His book gets right to the meat of the subject and makes data binding look easy. I was also pleased to see that the book focuses on the misunderstood and under-applied Windows Forms architecture. It's a must-read for anyone trying to make their application more interactive and to leverage the new Visual Studio 2005 technology. I'm planning to point my readers to this resource when they need an in-depth treatment of data binding." -William Vaughn, president, Beta V Corporation "Data binding has finally come of age in Windows applications. Back in the Visual Studio 6.0 days, I ignored data binding completely and wrote my own repetitive code to encapsulate my business logic. With Visual Studio 2005, we finally have a robust and compelling data-binding technology. To ignore it today would make you inefficient and put you behind the curve. Brian delivers a clear and concise discussion of a core topic of development for Windows today. A combination of an easy-to-follow conversational yet technical tone, excellent examples, and solid explanations make this a must-read for any developer writing for Windows or learning to write for Windows." -Stephen Forte, chief technical officer, Corzen Inc. "This book provides a clear, readable, and in-depth treatment of data binding, with detailed discussions of best practices in the presentation and use of data. Brian c...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/465
    Keywords: Macintosh (Computer) ; Software ; Operating systems (Computers) ; Software ; Electronic books ; local
    Abstract: A Step-by-Step Guide to the Xcode Mac OS Development Environment Every copy of Mac OS X comes with Xcode, the powerful development suite that Apple uses to build applications ranging from Safari to iTunes. But because Xcode is complex and subtle, even experienced Mac programmers rarely take full advantage of it. Now, Mac developer Fritz Anderson has written the definitive introduction and guide to using Xcode to build applications with any Macintosh technology or language. Anderson helps you master Xcode's powerful text editor, industry-standard gcc compiler, graphical interactive debugger, mature UI layout and object linkage editor, and exceptional optimization tools. One step at a time, you'll develop a command-line utility, then use Xcode tools to evolve it into a full-fledged Cocoa application. Anderson provides expert guidance on development frameworks, source code management, Core Data modeling, localization, and much more. Coverage includes Understanding Xcode workflow and the Mac OS X application lifecycle Porting established legacy projects into Xcode Using the Model-View-Controller design pattern to build robust graphical applications Building static libraries and working with Xcode's build system Making the most of bundles and package directories Creating applications compatible with older versions of Mac OS X Creating universal binaries to run on both Intel and PowerPC Macintoshes Adding Spotlight searchability to data files Leveraging Xcode's built-in support for unit testing Using Xcode on makefile-based UNIX development projects Step Into Xcode 's breadth, depth, and practical focus make it indispensable to every Mac developer: current Xcode users upgrading to Xcode 2.1, experienced Mac programmers migrating from CodeWarrior, UNIX/Linux programmers moving to Mac OS X, and even novices writing their first programs or scripts.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 658.5/14
    Keywords: Industrial management ; Information technology ; Management ; Managerial economics ; Strategic planning ; Electronic books ; local
    Abstract: Like an old-fashioned three-legged race, the business and technology sides of any company are running today with the left leg of one tied to the right leg of the other. Some companies understand that and run well; some don't. The top executives interviewed in this book (see overflow page for a partial list) know where competitive leaders are headed. Winning the Three Legged Race is the first major output of the new Business Technology Management (BTM) Institute, reflecting insights from world-class experts in industry and academia. It gives enterprise, line-of-business, and IT leaders a powerful framework for optimizing areas critical to producing sustainable value from technology: 1. Strategy, planning, and management. 2. Technology investment. 3. Strategic enterprise architecture. 4. Governance and organization. For each area, the authors identify implications for ordered processes, organizational structures, information requirements, and technology. Winning the Three Legged Race introduces the BTM Maturity Model: a breakthrough benchmark for setting priorities and mapping effective change paths. The authors support their framework with up-to-the-minute data, new case studies, executive interviews, and Top 10 Action Lists that empower decision-makers to act--and get results.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: "When it comes to software security, the devil is in the details. This book tackles the details." --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies "McGraw's book shows you how to make the 'culture of security' part of your development lifecycle." --Howard A. Schmidt, Former White House Cyber Security Advisor "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the lunchroom wall." --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book's methods without radically changing the way you work. Inside you'll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development lifecycle with the touchpoints described in this book. Let this expert author show you how to build more secure software by building security in.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 004.6/2
    Keywords: IS-IS (Computer network protocol) ; Open Shortest Path First (Computer network protocol) ; Electronic books ; local
    Abstract: The practical guide to large-scale networking with OSPF and IS-IS This is the definitive guide to using OSPF and IS-IS protocols in large-scale IP enterprise, carrier, and service provider networks. Well-known network designer Jeff Doyle draws on his consulting experience, offering realistic advice and straight answers on every aspect of working with link-state protocols-from scalability, reliability, and security to area design and database synchronization. This book is organized to help network engineers and architects compare OSPF and IS-IS. One feature at a time, Doyle first demonstrates how a topic or feature is implemented in OSPF, and then walks through a similar implementation using IS-IS. Professionals who are relatively new to large-scale networking will welcome his practical introduction to the concepts, goals, and history of link state protocols. Coverage includes Understanding message types, encapsulation, architecture, LSAs, and LSPs Optimizing addressing, neighbor discovery, adjacencies, and router designation Improving scalability: controlling the scope of flooding, link state database size, SPF calculation efficiency, and much more Designing and operating large-scale networks for maximum security and reliability Hardening networks to thwart attacks against routing protocols Comparing OSPF and IS-IS extensibility Utilizing extensions for MPLS-based traffic engineering, IPv6, and multi-topology routing Troubleshooting OSPF and IS-IS log entries, debug output, and LS databases Doyle's thorough explanations, end-of-chapter review questions, and many wide-ranging examples for both Cisco's IOS and Juniper's JUNOS also make this book an exceptional resource for anyone pursuing a CCIE or JNCIE certification. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 006.6/86
    Keywords: OpenGL ; Computer graphics ; Electronic books ; local
    Abstract: "As the 'Red Book' is known to be the gold standard for OpenGL, the 'Orange Book' is considered to be the gold standard for the OpenGL Shading Language. With Randi's extensive knowledge of OpenGL and GLSL, you can be assured you will be learning from a graphics industry veteran. Within the pages of the second edition you can find topics from beginning shader development to advanced topics such as the spherical harmonic lighting model and more." -David Tommeraasen, CEO/Programmer, Plasma Software "This will be the definitive guide for OpenGL shaders; no other book goes into this detail. Rost has done an excellent job at setting the stage for shader development, what the purpose is, how to do it, and how it all fits together. The book includes great examples and details, and good additional coverage of 2.0 changes!" -Jeffery Galinovsky, Director of Emerging Market Platform Development, Intel Corporation "The coverage in this new edition of the book is pitched just right to help many new shader-writers get started, but with enough deep information for the 'old hands.'" -Marc Olano, Assistant Professor, University of Maryland "This is a really great book on GLSL-well written and organized, very accessible, and with good real-world examples and sample code. The topics flow naturally and easily, explanatory code fragments are inserted in very logical places to illustrate concepts, and all in all, this book makes an excellent tutorial as well as a reference." -John Carey, Chief Technology Officer, C.O.R.E. Feature Animation OpenGL® Shading Language, Second Edition , extensively updated for OpenGL 2.0, is the experienced application programmer's guide to writing shaders. Part reference, part tutorial, this book thoroughly explains the shift from fixed-functionality graphics hardware to the new era of programmable graphics hardware and the additions to the OpenGL API that support this programmability. With OpenGL and shaders written in the OpenGL Shading Language, applications can perform better, achieving stunning graphics effects by using the capabilities of both the visual processing unit and the central processing unit. In this book, you will find a detailed introduction to the OpenGL Shading Language (GLSL) and the new OpenGL function calls that support it. The text begins by describing the syntax and semantics of this high-level programming language. Once this foundation has been established, the book explores the creation and manipulation of sha...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    ISBN: 0321267974
    Language: English
    Pages: xviii, 475 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    Series Statement: The Addison-Wesley object technology series
    Parallel Title: Erscheint auch als
    DDC: 005.1
    Keywords: Computer software Development ; UML (Computer science) ; Electronic books ; local ; Computer software ; Development ; UML (Computer science) ; UML (Informatique) ; Engenharia de software ; Uml
    Abstract: For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the artifacts of a software-intensive system. As the de facto standard modeling language, the UML facilitates communication and reduces confusion among project stakeholders. The recent standardization of UML 2.0 has further extended the language's scope and viability. Its inherent expressiveness allows users to model everything from enterprise information systems and distributed Web-based applications to real-time embedded systems. In this eagerly anticipated revision of the best-selling and definitive guide to the use of the UML, the creators of the language provide a tutorial to its core aspects in a two-color format designed to facilitate learning. Starting with an overview of the UML, the book explains the language gradually by introducing a few concepts and notations in each chapter. It also illustrates the application of the UML to complex modeling problems across a variety of application domains. The in-depth coverage and example-driven approach that made the first edition of The Unified Modeling Language User Guide an indispensable resource remain unchanged. However, content has been thoroughly updated to reflect changes to notation and usage required by UML 2.0. Highlights include: A new chapter on components and internal structure, including significant new capabilities for building encapsulated designs New details and updated coverage of provided and required interfaces, collaborations, and UML profiles Additions and changes to discussions of sequence diagrams, activity diagrams, and more Coverage of many other changes introduced by the UML 2.0 specification With this essential guide, you will quickly get up to speed on the latest features of the industry standard modeling language and be able to apply them to your next software project.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.5/7
    Keywords: Microsoft Outlook ; Electronic mail systems ; Computer programs ; Personal information management ; Computer programs ; Time management ; Computer programs ; Electronic books ; local
    Abstract: Discover many useful customizations you can do with Outlook to improve efficiency both at home and on the job. Get more out of Outlook! The Outlook Answer Book brings together hundreds of bite-size tips and tricks for saving time, using Outlook more efficiently, uncovering its hidden power, and overcoming its quirks and pitfalls. With this book's fast-paced Q&A format, you can find new ideas and better solutions fast. From Favorite Folders to the Journal, you'll learn how to take advantage of Outlook features you've never used-or even noticed! You'll master simple techniques for automating routine tasks...customizations that make Outlook far more powerful...easy backup and troubleshooting solutions...even new ways to protect your privacy and security. Bite-size, useful items include FAQ 1.5 How Can I Get Outlook to Start Automatically? FAQ 1.8 Can I Add Shortcuts to the Quick Launch Bar for Specific Outlook Tasks? FAQ 4.54 How Can I Open Blocked E-mail Attachments? FAQ 6.33 How Do I Share My Notes with Others? FAQ 7.1 What Is the Difference Between Journaling and Other Outlook Features Such As Notes and Tasks? FAQ 9.15 What Is the Research Service? FAQ 10.10 How Do I Customize a Default Outlook Form? FAQ 14.1 What Is Outlook Web Access (OWA)? FAQ 14.39 How Can I Get a Map Showing the Location of a Contact's Address? FAQ 16.26 How Do I Recover Items from a Backup? © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 1142 p. , ill. ; , 24 cm
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!" James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker Jamesaccusource.net "Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003." Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com "Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security." Bob Reinsch bob.reinsch@fosstraining.com " Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information." Richard Siddaway, MCSE rsiddaw@hotmail.com "Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security." Michael VonTungeln, MCSE, CTT mvontung@yahoo.com "I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it. Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all." Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net "R...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 444 p. , ill. ; , 24 cm
    DDC: 004.6/5
    Keywords: Computer network architectures ; Web services ; Electronic books ; local
    Abstract: Praise for Understanding SOA with Web Services "This book does the best job of describing not only "where we are" in the timeline of enterprise integration efforts, but also providing strategic guidance for where we need to be. The authors have worked diligently to break down the integration problem into functional areas, and send you down the path of strategic integration utilizing XML Web Services and Service-Oriented Architecture as the vehicle of choice. You will love this book!" - Daniel Edgar, Architect, Portland General Electric "E-Government needs a comprehensive guide to SOA with Web Services standards and best practices for implementation to get from the current "as is" to the future "to be" architecture. This book meets that need superbly." - Brand Niemann, Ph.D., Co-Chair, Semantic (Web Services) Interoperability Community of Practice, U.S. Federal CIO Council. "There are many books on SOA available today, but Understanding SOA with Web Services stands out from the pack because of its thorough, outstanding coverage of transactions, reliability, and process. Where most SOA books focus on integration and architecture basics, Lomow and Newcomer fearlessly dive into these more advanced, yet critical, topics, and provide a depth of treatment unavailable anywhere else." - Jason Bloomberg, Senior Analyst, ZapThink LLC "This book provides a wealth of content on Web Services and SOA not found elsewhere. Although the book is technical in nature, it is surprisingly easy to read and digest. Managers who would like to keep up with the most effective technical strategies will find this book required reading." - Hari Mailvaganam, University of British Columbia, Vancouver "I have been teaching companies and lecturing on SOA and XML Web Services for years and sort of felt at home with these technologies. I didn't think anyone else could teach me anything more significant about either of them. This book surprised me. If a person teaching SOA and Web Services can learn something from this book, you can too. This book is a must-read for all architects, senior developers, and concerned CTOs." - Sayed Y. Hashimi, SOA Consultant "Newcomer and Lomow are no doubt the industry luminaries on the topics of Web Services, Service-Oriented Architecture, and integration. This book is sure to be a must-have for developers and architects looking to take advantage of the coming wave of standards-based, loosely coupled integration." - Ronald Schmelzer, Senior Analyst...
    Note: Includes bibliographical references (p. 421-430) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Apache (Computer file : Apache Group) ; Web servers ; Computer programs ; Web sites ; Security measures ; Computer programs ; Electronic books ; local
    Abstract: "Ryan Barnett has raised the bar in terms of running Apache securely. If you run Apache, stop right now and leaf through this book; you need this information." -Stephen Northcutt, The SANS Institute The only end-to-end guide to securing Apache Web servers and Web applications Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications. Firewalls and SSL won't protect you: you must systematically harden your Web application environment. Preventing Web Attacks with Apache brings together all the information you'll need to do that: step-by-step guidance, hands-on examples, and tested configuration files. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against. Exploits discussed include: buffer overflows, denial of service, attacks on vulnerable scripts and programs, credential sniffing and spoofing, client parameter manipulation, brute force attacks, web defacements, and more. Barnett introduces the Center for Internet Security Apache Benchmarks, a set of best-practice Apache security configuration actions and settings he helped to create. He addresses issues related to IT processes and your underlying OS; Apache downloading, installation, and configuration; application hardening; monitoring, and more. He also presents a chapter-length case study using actual Web attack logs and data captured "in the wild." For every sysadmin, Web professional, and security specialist responsible for Apache or Web application security. With this book, you will learn to Address the OS-related flaws most likely to compromise Web server security Perform security-related tasks needed to safely download, configure, and install Apache Lock down your Apache httpd.conf file and install essential Apache security modules Test security with the CIS Apache Benchmark Scoring Tool Use the WASC Web Security Threat Classification to identify and mitigate application threats Test Apache mitigation settings against the Buggy Bank Web application Analyze an Open Web Proxy Honeypot to gather crucial intelligence about attackers Master advanced techniques for detecting and preventing intrusions
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: "It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding." --Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible." --Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight. "Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine. "Understanding the ultimate attacker's tool provides ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 582 p. , ill. ; , 24 cm. +
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Open source software ; Electronic books ; local
    Abstract: "If you're a Java developer interested in leveraging open source tools to build multitier applications, Larne Pekowsky can help--this book will walk you all the way through development, build, testing, and deployment. This soup-to-nuts coverage is a rare find." --Angela Yochem, author of J2EE Applications and BEA WebLogic Server, Second Edition (Prentice Hall, 2004) The Jakarta project consists of many powerful open source tools for the Java platform, but most lack tutorials or clear online help documentation. Apache Jakarta and Beyond is the definitive guide to using Jakarta and other Java open source tools to develop Web applications more efficiently and effectively. In this example-packed book, readers will find An introduction to the philosophy behind the Jakarta project Details on many ready-to-use Java toolkits, including Ant, JUnit, Cactus, Log4J, POI, Tomcat, James, Struts, and more In-depth guidelines on how to develop with multiple toolkits A guide to splitting work along lines of "what is available" and "what must be written" Best practices for development, such as the model/view/controller paradigm Numerous examples that can serve as templates for readers' own projects The accompanying CD-ROM contains templates and complete code examples from the book. Whether you are developing client applications, Web applications, or Web services, Apache Jakarta and Beyond will help you use existing code to simplify the task at hand.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 004.67/8
    Keywords: Extranets (Computer networks) ; IPSec (Computer network protocol) ; Electronic books ; local
    Abstract: Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." By learning to read and interpret various network traces, such as those produced by tcpdump, readers will be able to better understand and troubleshoot VPN and network behavior. Specific topics covered include: Block and stream symmetric ciphers, such as AES and RC4; and asymmetric ciphers, such as RSA and EIGamal Message authentication codes, including HMACs Tunneling technologies based on gtunnel SSL protocol for building network-to-network VPNs SSH protocols as drop-in replacements for telnet, ftp, and the BSD r-commands Lightweight VPNs, including VTun, CIPE, tinc, and OpenVPN IPsec, including its Authentication Header (AH) protocol, Encapsulating Security Payload (ESP), and IKE (the key management protocol) Packed with details, the text can be used as a handbook describing the functions of the protocols and the message formats that they use. Source code is available for download, and an appendix covers publicly available software that can be used to build tunnels and analyze traffic flow. VPNs Illustrated gives you the knowledge of tunneling and VPN technology you need to understand existing VPN implementations and successfully create your own.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 250 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: "We live in a time when, perhaps surprisingly, the best printed works on C++ are just now emerging. This is one of those works. Although C++ has been at the forefront of innovation and productivity in software development for more than two decades, it is only now being fully understood and utilized. This book is one of those rare contributions that can bear repeated study by practitioners and experts alike. It is not a treatise on the arcane or academic-rather it completes your understanding of things you think you know but will bite you sooner or later until you really learn them. Few people have mastered C++ and software design as well as Steve has; almost no one has such a level head as he when it comes to software development. He knows what you need to know, believe me. When he speaks, I always listen-closely. I invite you to do the same. You (and your customers) will be glad you did." -Chuck Allison, editor, The C++ Source "Steve taught me C++. This was back in 1982 or 1983, I think-he had just returned from an internship sitting with Bjarne Stroustrup inventor of C++ at Bell Labs. Steve is one of the unsung heroes of the early days, and anything Steve writes is on my A-list of things to read. This book is an easy read and collects a great deal of Steve's extensive knowledge and experience. It is highly recommended." -Stan Lippman, coauthor of C++ Primer, Fourth Edition "I welcome the self-consciously non-Dummies approach of a short, smart book." -Matthew P. Johnson, Columbia University "I agree with the author's assessment of the types of programmers. I have encountered the same types in my experience as a developer and a book like this will go far to help bridge their knowledge gap.... I think this book complements other books, like Effective C++ by Scott Meyers. It presents everything in a concise and easy-to-read style." -Moataz Kamel, senior software designer, Motorola Canada "Dewhurst has written yet another very good book. This book should be required reading for people who are using C++ (and think that they already know everything in C++)." -Clovis Tondo, coauthor of C++ Primer Answer Book What Every Professional C++ Programmer Needs to Know-Pared to Its Essentials So It Can Be Efficiently and Accurately Absorbed C++ is a large, complex language, and learning it is never entirely easy. But some concepts and techniques must be thoroughly mastered if programmers are ever to do professional-quality work. This book cut...
    Note: Includes bibliographical references (p. 235) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xiv, 282 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: "Every programming language has its quirks. This lively book reveals oddities of the Java programming language through entertaining and thought-provoking programming puzzles." --Guy Steele, Sun Fellow and coauthor of The Java™ Language Specification "I laughed, I cried, I threw up (my hands in admiration)." --Tim Peierls, president, Prior Artisans LLC, and member of the JSR 166 Expert Group How well do you really know Java? Are you a code sleuth? Have you ever spent days chasing a bug caused by a trap or pitfall in Java or its libraries? Do you like brainteasers? Then this is the book for you! In the tradition of Effective Java™ , Bloch and Gafter dive deep into the subtleties of the Java programming language and its core libraries. Illustrated with visually stunning optical illusions, Java™ Puzzlers features 95 diabolical puzzles that educate and entertain. Anyone with a working knowledge of Java will understand the puzzles, but even the most seasoned veteran will find them challenging. Most of the puzzles take the form of a short program whose behavior isn't what it seems. Can you figure out what it does? Puzzles are grouped loosely according to the features they use, and detailed solutions follow each puzzle. The solutions go well beyond a simple explanation of the program's behavior--they show you how to avoid the underlying traps and pitfalls for good. A handy catalog of traps and pitfalls at the back of the book provides a concise taxonomy for future reference. Solve these puzzles and you'll never again fall prey to the counterintuitive or obscure behaviors that can fool even the most experienced programmers.
    Note: Includes bibliographical references (p. 265-269) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 396 p. , ill. ; , 23 cm
    DDC: 004.692
    Keywords: Spam (Electronic mail) ; Spam filtering (Electronic mail) ; Electronic books ; local
    Abstract: Real Anti-Spam Help for System Administrators In Slamming Spam , two spam fighters show you how to fight back-and win. Unlike most spam books, this one is written specifically for in-the-trenches system administrators: professionals who need hands-on solutions for detecting, managing, and deterring spam in Unix/Linux and/or Microsoft Windows environments. The authors offer deep, administrator-focused coverage of the most valuable open-source tools for reducing spam's impact in the enterprise-especially SpamAssassin. Drawing on their extensive experience in developing and implementing anti-spam tools, the authors present expert insights into every leading approach to fighting spam, including Bayesian filtering, distributed checksum filtering, and email client filtering. Coverage includes Step-by-step junk mail filtering with Procmail Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse McAfee SpamKiller for Lotus Domino McAfee SpamKiller for Microsoft Exchange Implementing and managing SpamAssassin Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords Sender verification techniques, including challenge/response, special use addresses, and sender compute Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs-IT staff time, network/computing resources, and user productivity. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 363-374) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 342 p. , ill. ; , 24 cm
    DDC: 005.74/068
    Keywords: Business ; Data processing ; Data warehousing ; Database management ; Electronic books ; local
    Abstract: The definitive best-practices guide to enterprise data-management strategy. You can no longer manage enterprise data "piecemeal." To maximize the business value of your data assets, you must define a coherent, enterprise-wide data strategy that reflects all the ways you capture, store, manage, and use information. In this book, three renowned data management experts walk you through creating the optimal data strategy for your organization. Using their proven techniques, you can reduce hardware and maintenance costs, and rein in out-of-control data spending. You can build new systems with less risk, higher quality, and improve data access. Best of all, you can learn how to integrate new applications that support your key business objectives. Drawing on real enterprise case studies and proven best practices, the author team covers everything from goal-setting through managing security and performance. You'll learn how to: Identify the real risks and bottlenecks you face in delivering data-and the right solutions Integrate enterprise data and improve its quality, so it can be used more widely and effectively Systematically secure enterprise data and protect customer privacy Model data more effectively and take full advantage of metadata Choose the DBMS and data storage products that fit best into your overall plan Smoothly accommodate new Business Intelligence (BI) and unstructured data applications Improve the performance of your enterprise database applications Revamp your organization to streamline day-to-day data management and reduce cost Data Strategy is indispensable for everyone who needs to manage enterprise data more efficiently-from database architects to DBAs, technical staff to senior IT decision-makers. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. [317]-321) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 369 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Linux ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: Covers Red Hat and SUSE When something goes wrong with your Linux firewall, you need to fix it-right now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes: Troubleshooting Linux® Firewalls . Authors Michael Shinn and Scott Shinn are among the world's leading firewall experts; they've even been hired to protect computer security at the White House. In this book, they cover every area where Linux firewalls can go wrong: rules and filtering problems, Layer 2/3/4 issues, trouble with individual services, DNS/DHCP failures, even misconfigured VPNs. They also present an easy, start-to-finish troubleshooting methodology that'll help you identify even the newest or most obscure firewall problem fast-and solve it! Inside, you will find in-depth information on the following areas: What you must know about iptables and netfilter to troubleshoot and avoid problems Using loggers, sniffers, and other tools to diagnose even the most obscure firewall problems Making sure your firewall rules work the way they're supposed to Resolving problems with Network Address Translation and IP Forwarding Troubleshooting SMTP, Apache, Squid, NFS, FTP, instant messaging, and other Web-based services Finding and fixing common problems with IPsec VPN configuration Making your firewalls more failure-resistant: recommendations from the experts If you depend on a Linux firewall, what will you do if it goes down? With Troubleshooting Linux® Firewalls , you can be confident that the solutions are right at hand-so you can sleep at night! © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 397 p. , ill. ; , 25 cm
    DDC: 005.1/068/5
    Keywords: Capability maturity model (Computer software) ; Electronic books ; local
    Abstract: Use Assessments to Drive Process Improvements in Software, Systems, Human Resources, and Beyond Pioneered by the world's leading innovators in software engineering, assessments have evolved into a remarkably powerful tool for process improvement in areas ranging from systems to services, hardware to human resources. Unlike audits, assessments are conducted from the inside. When handled correctly, assessments can help transform technical and managerial culture, dramatically improving both quality and profitability. In CMMI Assessments: Motivating Positive Change , two of the field's most respected leaders show exactly how to use them for maximum business advantage. Writing for executives, managers, technical professionals, and assessors themselves, Marilyn Bush and Donna Dunaway illuminate every phase of the assessment process-from planning through post-assessment follow-up. The authors begin with an expert overview of what assessments entail, when they make sense, how to set achievable goals for them, and how to lead them to success. Next, they "drill down" into each stage of the process, presenting step-by-step instructions and defining the roles and responsibilities of every participant. Coverage includes creating and training assessment teams; identifying assessment products; consolidating interview data and other onsite activities; presenting results; and using those results productively. Drawing on their unsurpassed experience leading assessments and mentoring assessors, they offer deep insights into the real-world challenges and obstacles you'll face-and proven solutions. They also present an extended case study showing how a real software development organization drove continuous improvement through four years of iterative assessments-moving from CMM Level 2 to elite Level 5 status, and driving dramatic business benefits along the way. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 375-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvi, 316 p. , ill. ; , 24 cm
    DDC: 006.74
    Keywords: HTML (Document markup language) ; Electronic books ; local
    Abstract: The fastest route to true HTML/CSS mastery! Need to build a web site? Or update one? Or just create some effective new web content? Maybe you just need to update your skills, do the job better. Welcome. This book's for you. We'll leverage what you already know about the web, so you'll go further, faster than you ever expected. You'll master today's best practices: the real nuts and bolts, not theory or hooey. You'll learn through dozens of focused HTML, XHTML, and CSS examples: crafted for simplicity and easy to adapt for your own projects. Need specific solutions? This book's modular, visual, high-efficiency format delivers them instantly . Molly E. Holzschlag draws on her unparalleled experience teaching Web design and development. No other HTML/CSS guide covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with HTML, XHTML, and CSS in real-world projects Learn how to build web pages that'll work in any environment, on virtually any contemporary browser Construct templates that simplify every page you develop Structure and tag text so it's easy to work with and manage Add images, media, and scripts-quickly and reliably Discover the right ways to use HTML tables Build easy-to-use forms and validate your users' input Use CSS to take total control over your site's look and feel Master core CSS techniques: color, images, text styles, link effects, lists, navigation, and more Control margins, borders, padding, positioning, floats, even Z-index Design efficient, compatible, easy-to-manage CSS layouts Includes concise XHTML and CSS annotated references: quick help for every language element Spring Into... is a new series of fast-paced tutorials from Addison-Wesley. Each book in the series is designed to bring you up to speed quickly. Complex topics and technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working...now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Direct from the creators of the Java™ programming language, the completely revised fourth edition of The Java™ Programming Language is an indispensable resource for novice and advanced programmers alike. Developers around the world have used previous editions to quickly gain a deep understanding of the Java programming language, its design goals, and how to use it most effectively in real-world development. Now, Ken Arnold, James Gosling, and David Holmes have updated this classic to reflect the major enhancements in Java™ 2 Standard Edition 5.0 (J2SE™ 5.0). The authors systematically cover most classes in Java's main packages, java.lang.* , java.util, and java.io, presenting in-depth explanations of why these classes work as they do, with informative examples. Several new chapters and major sections have been added, and every chapter has been updated to reflect today's best practices for building robust, efficient, and maintainable Java software. Key changes in this edition include New chapters on generics, enums, and annotations, the most powerful new language features introduced in J2SE 5.0 Changes to classes and methods throughout to reflect the addition of generics Major new sections on assertions and regular expressions Coverage of all the new language features, from autoboxing and variable argument methods to the enhanced for-loop and covariant return types Coverage of key new classes, such as Formatter and Scanner The Java™ Programming Language, Fourth Edition, is the definitive tutorial introduction to the Java language and essential libraries and an indispensable reference for all programmers, including those with extensive experience. It brings together insights you can only get from the creators of Java: insights that will help you write software of exceptional quality.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 713 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." -Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code-and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 4th ed.
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: " C++ Primer is well known as one of the best books for learning C++ and is useful for C++ programmers of all skill levels. This Fourth Edition not only keeps this tradition alive, it actually improves on it." --Steve Vinoski, Chief Engineer, Product Innovation, IONA Technologies " The Primer really brings this large and complex language down to size." --Justin Shaw, Senior Member of Technical Staff, Electronic Programs Division, The Aerospace Corporation "It not only gets novices up and running early, but gets them to do so using good programming practices." --Nevin ":-)" Liber, Senior Principal Engineer (C++ developer since 1988) This popular tutorial introduction to standard C++ has been completely updated, reorganized, and rewritten to help programmers learn the language faster and use it in a more modern, effective way. Just as C++ has evolved since the last edition, so has the authors' approach to teaching it. They now introduce the C++ standard library from the beginning, giving readers the means to write useful programs without first having to master every language detail. Highlighting today's best practices, they show how to write programs that are safe, can be built quickly, and yet offer outstanding performance. Examples that take advantage of the library, and explain the features of C++, also show how to make the best use of the language. As in its previous editions, the book's authoritative discussion of fundamental C++ concepts and techniques makes it a valuable resource even for more experienced programmers. Program Faster and More Effectively with This Rewritten Classic Restructured for quicker learning, using the C++ standard library Updated to teach the most current programming styles and program design techniques Filled with new learning aids that emphasize important points, warn about common pitfalls, suggest good programming practices, and provide general usage tips Complete with exercises that reinforce skills learned Authoritative and comprehensive in its coverage The source code for the book's extended examples is available on the Web at the address below. www.awprofessional.com/cpp_primer
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: 360 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The fastest route to true Linux mastery! You know your way around Windows (or maybe a Mac, or even UNIX). Now, you're ready for Linux. And you don't have a minute to waste. Welcome. This book's for you . Janet Valade has spent thirteen years helping new users master Linux and related technologies. She knows the "magic words" that'll help you get the job done, fast. (And she knows exactly how to keep you out of trouble, too!) You'll learn Linux through dozens of focused, bite-size examples, each one carefully designed to build on what you've learned before. Need specific solutions? This book's carefully crafted, high-efficiency format delivers them... instantly . Working on Fedora? Mandrake? SuSE? No matter. This book is for you. No other introduction to Linux covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with Linux- without the hassles! Choose the best Linux distribution for your personal or business needs Get Linux installed quickly and running reliably Handle your day-to-day tasks and efficiently manage your files Master KDE, GNOME, and the Linux command line Write documents and build spreadsheets with OpenOffice.org Set up Web access, email, and instant messaging Work with powerful Linux multimedia and graphics software Find, install, and run new Linux software Set up your printer to work with Linux Supercharge Linux with shell scripts and customized configuration files Includes concise Linux command reference and quick guide to building powerful Regular Expressions Spring Into ... is a new series of fast-paced tutorials from Addison-Wesley Professional Publishers. Each book in the series is designed to bring you up-to-speed quickly. Complex technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working... now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xviii, 190 p. , ill. ; , 25 cm
    DDC: 005.3
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: Software by Numbers is a significant new contribution to value-based, financially responsible software engineering...-Barry Boehm, Ph.D., Director, USC Center for Software Engineering, Creator of COCOMO and Spiral Model Link software development to value creation and optimize ROI. Ultimately, software development is about creating value-yet, all too often, software fails to deliver the business value customers need. This book will help you change that, by linking software development directly to value creation. You'll learn exactly how to identify which features add value and which don't-and refocus your entire development process on delivering more value, more rapidly. Software by Numbers shows you how to: Identify Minimum Marketable Features (MMFs)-the fundamental units of value in software development Accelerate value delivery by linking iterative development to iterative funding Optimize returns through incremental architecture techniques Effectively involve business stakeholders in the development process Sequence feature delivery based on "mini-ROI" assessments Quantify financial risk at every step throughout the development process Manage "intangibles" throughout the software development process Whatever methodology you're already using-whether it's RUP or XP-this book shows how to achieve the goals that matter most to your business: reduced risk, better cash flow, and higher ROI .
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 452 p. , ill. ; , 24 cm
    Series Statement: Prentice Hall PTR series in computer networking and distributed systems
    DDC: 005.2/76
    Keywords: Client/server computing ; Internet programming ; Web site development ; Standards ; WebDAV (Standard) ; Electronic books ; local
    Abstract: WebDAV: Next-Generation Collaborative Web Authoring is the complete guide to Web-based Distributed Authoring and Versioning (WebDAV), the IETF standard for Web authoring and wide area collaboration. Experienced implementer Lisa Dusseault covers WebDAV from bits on the wire up to custom application implementation, demonstrating with extensive examples and traces from real clients and servers. Coverage includes: practical rules for building WebDAV document management systems; step-by-step, Internet Explorer compatible sample applications; and the latest WebDAV tools. For application designers, software engineers, and information managers.
    Note: Includes bibliographical references (p. 431-435) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xvi, 256 p. , ill. ; , 24 cm. +
    DDC: 658.4/04
    Keywords: Project management ; Electronic books ; local
    Abstract: This book provides users with a solid basis for managing a project and helps them prepare for dealing with managers, project customers, and the people who work with them on a project. KEY TOPICS: This book serves as a useful handbook for project managers and can be used by those who receive project management assignments as part of their job as well as persons with project management titles. Topics include: Project Work Breakdown Structure and Team Recruitment, Creating the Project Gantt Chart, Budget and Cost, Project Plan Review, Project Execution, among many others. MARKET: Useful for various fields including project managers, civil engineers, mechanical engineers, manufacturing engineers, etc.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxii, 226 p. ; , 24 cm
    DDC: 330.1/6
    Keywords: Economic development ; Finance ; Investments ; Wealth ; Electronic books ; local
    Abstract: Brave New Wealthy World demonstrates how today's international financial arrangements arespreading prosperity and well-being more widely than ever before-and what it'll take to spreadthe wealth to virtually every corner of the Earth. John C. Edmunds proposes a new symbiotic relationship between rich and poor countries thatoffers powerful benefits to both. He demonstrates why "first world" investors will increasinglydepend upon growth in emerging economies to achieve the returns they need and offers a blueprintfor transforming emerging nations' financial systems into powerful drivers of economic growth. This book cuts through the conventional wisdom and ideologies that hide the true implicationsof globalization-and reveals a pragmatic path to a hopeful future. The long-term forecast: prosperity spreading worldwide The middle class grows- by billions Financial assets: the new catalysts of world prosperity Securitization: unleashing the power of emerging economies Why "rich" countries will increasingly depend on investments in emerging economies A new symbiosis between rich and poor Proven policies for promoting the investments that supercharge growth Overcoming the obstacles to investment in emerging economies Powerful lessons from three recent boom/bust cycles A tale of three booms Population trends and their surprising implications Demographics and economic destiny Accelerating the economic revolution that's bringing new prosperity to billions "Professor Edmunds does an outstanding job in explaining-in great detail and with examplesdrawn from concrete experience-why liquidity matters and why financial services make all thedifference if wealth is to be created. Extremely useful insight into the process of adding valuethrough securitization." -Hernando de Soto, author of The Mystery of Capital and President of the Institute for Liberty and Democracy (ILD) "I learned more about economics talking to Edmunds than I ever did in graduate school. Heshows that capitalism works. It can even work in developing countries. Capitalism is alreadyequalizing the distribution of income and bringing prosperity to many third world places.Capitalism can and will work if governments do not get in its way." -Peter T. Paul, Chairman, Sequoia National Bank, California "A provocative book with rich insights gleaned from the author's extensive professionalexperiences in developing countries." -James E. Austin Snider Professor of Business Administration, Harvard Business...
    Note: Includes bibliographical references (p. 207-213) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xx, 569 p. , ill. ; , 24 cm
    DDC: 004.6/2
    Keywords: Bluetooth technology ; Electronic books ; local
    Abstract: Build reliable, interoperable Bluetooth products-right now! Practical guidance for building reliable, interoperable Bluetooth products Covers usage models, profile principles, user expectations and dependencies Details every foundation profile and key application, from cordless telephony to file transfer Introduces emerging profiles for personal area networking, imaging, printing and automotive applications Shows how to build your own new profiles Bluetooth Profiles are the key to delivering interoperable products that work reliably, "right out of the box." Now, leading Bluetooth expert Dean Anthony Gratton brings the Bluetooth Profiles to life, showing you exactly how to use them to build winning user-centered products. Gratton takes you "under the hood" of every significant Bluetooth Profile, from Bluetooth's essential Foundation Profiles to powerful emerging profiles for personal area networking, automotive applications and imaging. Drawing on his extensive experience with Bluetooth development, Gratton also offers practical guidance for creating innovative new profiles of your own. Accessible, authoritative coverage of usage models, profile principles, user expectations and dependencies Presents practical introductions to GAP, SDAP, OBEX and SPP-the Foundation Profiles that underlie most of Bluetooth's application development Covers all core Bluetooth application profiles: cordless telephony, intercom, headset, dial-up networking, fax, LAN access, object push, file transfer and synchronisation Previews new profiles for imaging, printing, extended services discovery, hands-free and much more Contains a concise "macro-level" review of current Bluetooth protocol stacks and development kits Includes a detailed Bluetooth glossary and reference section
    Note: Includes bibliographical references (p. 547-549) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 384 p. , ill. ; , 24 cm
    Series Statement: Financial Times Prentice Hall
    DDC: 658.4/02
    Keywords: Corporate culture ; Creative ability in business ; Leadership ; Organizational change ; Electronic books ; local
    Abstract: Organization 21C: Someday All Organizations Will Lead This Way brings together 19 all-new essays by the world's leading management thinkers, covering every key driver of organizational success: leadership, process, people, and organizational design. You'll find breakthrough ideas and practical solutions for virtually every tactical and strategic challenge you face. Key topics include: James Champy's X-engineering, Total Rewards Management, the "New Boardroom," the changing nature of power and influence, building workable hierarchies and sustainable organizations, and new best practices for leading change.
    Note: Includes bibliographical references (p. 355-357) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xx, 745 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Keywords: Oracle (Computer file) ; Application software ; Development ; Internet programming ; PL/SQL (Computer program language) ; Electronic books ; local
    Abstract: The hands-on, rapid-mastery guide to Oracle PL/SQL Web development. Start building Oracle 9i PL/SQL Web applications-hands on Covers the entire development lifecycle, from design to deployment Provides instruction for PL/SQL Server Pages, the PL/SQL Web Toolkit, and the Oracle 9i Application Server Introduces Web basics-HTML, JavaScript, basic UNIX and FTP, and image handling Reviews PL/SQL and SQL concepts Includes practical tips and troubleshooting help Leverage your SQL and PL/SQL experience to build powerful data-driven Web and e-business applications-starting right now! In this book, a team of Columbia University PL/SQL instructors cover the core pieces of what you need to know, from preliminary configuration to deployment of dynamic, data-driven applications. You'll find practical examples, hands-on exercises, and dozens of practical tips and solutions designed to save you time, effort, and frustration. One step at a time, discover how to: Configure Oracle's Internet Application Server Control Web applications and servers remotely Build Oracle Web applications with PL/SQL Create dynamic, data-driven pages Test, debug, troubleshoot, and deploy your applications Maintain and optimize running Web applications Whether you've been writing simple queries or complex PL/SQL code, this book takes your database development skills onto the Web-and into the future!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 768 p. , ill. ; , 25 cm
    DDC: 658.5/62
    Keywords: Experimental design ; Quality control ; Statistical methods ; Electronic books ; local
    Abstract: This book addresses many new topical areas for the development of 6 Sigma performance. The text is structured to demonstrate how 6 Sigma methods can be used as a very powerful tool within System Engineering and integration evaluations to help enable the process of Critical Parameter Management. The case studies and examples used throughout the book come from recent successful applications of the material developed in the text.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxi, 309 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: "This is a really good book ... it spells out the motherhood and apple pie of information security in a highly readable way." -Warwick Ford, CTO, VeriSign, Inc. "An excellent security read! Breaks down a complex concept into a simple and easy-to-understand concept." -Vivek Shivananda, President Redefine your organization's information security Learn to think and act like a top security guru! Understand the founding principles of security itself and make better decisions Make your security solutions more effective, easily manageable, and less costly! Make smarter, more informed security decisions for your company Organizations today commit ever-increasing resources to information security, but are scarcely more secure than they were four or five years ago! By treating information security like an ordinary technological practice-that is, by throwing money, a handful of the latest technologies, and a lineup of gurus at the problem-they invariably wind up with expensive, but deeply flawed, solutions. The only way out of this trap is to change one's way of thinking about security: to grasp the reasoning, philosophy, and logic that underlie all successful security efforts. In Inside the Security Mind: Making the Tough Decisions , security expert Kevin Day teaches you how to approach information security the way the top gurus do-as an art, rather than a collection of technologies. By applying this discipline, your solutions will be more secure and less burdensome in time, expense, and effort. The first part of the book explains the practice of breaking security decisions down into a set of simple rules. These rules may then be applied to make solid security decisions in almost any environment. In the second part, Day uses a series of practical examples to illustrate exactly how the discipline works in practice. Additional material covers: Designing an enterprise security plan, including perimeter/firewall and Internal defenses, application, system, and hardware security Ongoing security measures-recurring audits, vulnerability maintenance, logging and monitoring, and incident response, plus risk assessment Choosing between open source and proprietary solutions; and wired, wireless, and virtual private networks This book is essential reading for anyone working to keep information secure. Technical and non-technical IT professionals alike can apply Day's concepts and strategies to become security gurus, while seasoned practitioners will benefit from th...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 194 p. , ill., maps ; , 23 cm
    Series Statement: Financial Times Prentice Hall
    Keywords: Group decision making ; Organizational change ; Planning ; Electronic books ; local
    Abstract: Of organizations that seek strategic change, 70% fail. In Leading Strategic Change,now in paperback, leading consultants J. Stewart Black and Hal B. Gregersen examine the core problem: organizations fail to change because individuals fail to change. Black and Gregersen identify the "brain barriers" that keep strategic change from success--failure to see, failure to move, and failure to finish--and offer a start-to-finish strategy for helping others change how they view their goals and the steps they must take to achieve them. This book systematically shows you how to implement the single change that makes all the others possible: redirecting individuals' ideas and expectations to be aligned with the new direction of the company.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xviii, 461 p. , ill. ; , 24 cm
    DDC: 006.7/4
    Keywords: Automatic speech recognition ; Speech synthesis ; VoiceXML (Document markup language) ; Electronic books ; local
    Abstract: The start-to-finish guide to building enterprise-class VoiceXML applications. Code examples and UML diagrams provided for each VoiceXML element Fully developed VoiceXML applications using Java servlets, JSP, and .NET Detailed coverage of text-to-speech and automatic speech recognition technologies "XML is not a spoken language, but thanks to VoiceXML, it is the language of choice for developing spoken interfaces. If you want to voice-enable your applications and Web sites, this book speaks your language." -Charles F. Goldfarb Definitive VoiceXML bridges the gap between enterprise computing and telephony engineering, demonstrating exactly how to build new enterprise-class voice applications and voice-enable existing applications. It's the first book that delivers the depth and breadth of knowledge needed by both enterprise and telephony developers, thoroughly addressing the unique challenges of building voice systems for business. VoiceXML in depth: its role, goals, and key techniques Effective ways to architect and integrate enterprise voice applications Detailed case studies utilizing VoiceXML, Java servlets, JSP, and .NET Thorough coverage of the W3C VXML 2.0 standard Speech Recognition Grammar Format (SRGF) and Speech Synthesis Markup Language (SSML) Complete VoiceXML language reference Whether you're developing systems for customer service, finance, travel, wireless commerce, or anything else, Definitive VoiceXML gives you the proven techniques you need to maximize performance, reliability, and ROI. Part of The Charles F. Goldfarb Definitive XML Series
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xviii, 254 p. , ill. ; , 24 cm
    Series Statement: Management skills, NetEffect series
    DDC: 658.8/12
    Keywords: Customer relations ; Management ; Case studies ; Customer relations ; Management ; Statistical models ; Electronic books ; local
    Abstract: For undergraduate/graduate-level courses in Quantitative Measurement and Consumer Behavior. Cutting-edge in perspective, this text presents innovative proven methods for determining whether a Customer Relationship Management (CRM) strategy for changing the way a company provides service (by adding new technology, processes, and procedures) will realize the return on the investment projected. Throughout, students see through measurable data-containing examples how CRM theory is applied with great success by various real-life companies. They learn 1) the scientific reasons why people resist change, 2) a process to deal with it (Successful People Process SSP™) and a process to measure the results in an on-going manner, and 3) how to tie those measure results to the bottom-line (SP3M™).
    Note: Includes bibliographical references (p. 246-249) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xviii, 510 p. , ill. ; , 24 cm
    DDC: 808/.0666
    Keywords: Business writing ; Problems, exercises, etc ; English language ; Business English ; Problems, exercises, etc ; English language ; Technical English ; Problems, exercises, etc ; Technical writing ; Problems, exercises, etc ; Electronic books ; local
    Abstract: Taking a research-based, integrated problem-solving approach to technical and professional writing, this text provides a model that illustrates real working-world solutions to problems that students are likely to encounter in the workplace. Each chapter begins with a short scenario case study that deals with theoretical or applied issues of technical and professional communication. The problem is carried through its development and resolution, thereby preparing students to deal appropriately and successfully in the professional world,
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxi, 680 p. , ill. ; , 25 cm
    DDC: 670.42/7
    Keywords: Process control ; Electronic books ; local
    Abstract: The state-of-the-art publication in model-based process control-by leading experts in the field. In Techniques of Model-Based Control , two leading experts bring together powerful advances in model-based control for chemical-process engineering. Coleman Brosilow and Babu Joseph focus on practical approaches designed to solve real-world problems, and they offer extensive examples and exercises. Coverage includes: The nature of the process-control problem and how model-based solutions help to solve it Continuous time modeling: time domain, Laplace domain, and FOPDT models Feedforward, cascade, override, and single-variable inferential control approaches One and two degree of freedom Internal Model Control Model State Feedback and PI/PID Implementations of IMC Tuning and synthesis of 1DF and 2DF IMC for process uncertainty Estimation and inferential control using multiple secondary measurements Basic and advanced techniques of model identification and model-predictive control The appendices review the basics of Laplace transforms, feedback control, frequency response analysis, probability, random variables, and linear least-square regression. From start to finish, Techniques of Model-Based Control offers the real-world insight that professionals need to identify and implement the best control strategies for virtually any process.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: ix, 93 p. ; , 21 cm
    Series Statement: Prentice-Hall guides to advanced communication
    DDC: 658.4/56
    Keywords: Business meetings ; Meetings ; Electronic books ; local
    Abstract: This concise, practical book is written for you if you want to assure your meetings will be... Necessary and not just a waste of time Interesting, coherent, and well-organized A place for people to share, rather than show off, their ideas Constructive, thoughtful, and creative Inclusive, with full participation from all Efficient and not a waste of energy In today's environment, meetings are more commonplace and important than ever, because of... Advances in technology-such as videoconferencing and conference calls Increased reliance on collaborative workgroups and cross-functional work teams Increased specialization, which necessitates sharing diverse knowledge and expertise Like all books in the Prentice Hall Guides to Advanced Business Communication series, this book is... Brief: summarizes key ideas only Practical: offers clear, straightforward tools you can use Reader-friendly: provides easy-to-skim format Reviews of the core concepts book for this series, Guide to Managerial Communication by Mary Munter -Listed by the Wall Street Journal as one of the five business "books you shouldn't miss." -"Really a gem." Former managing editor, Harvard Business Review -"Short, compact, practical, and readable... I liked it immensely." Journal of Business Communication
    Note: Includes bibliographical references (p.89) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 194 p. , ill., maps ; , 24 cm
    Series Statement: Financial Times Prentice Hall
    DDC: 658.4/02
    Keywords: Group decision making ; Organizational change ; Planning ; Electronic books ; local
    Abstract: Most organizations that seek to change fail. The central reason: employees are relying on obsolete "mental maps" that prevent them from observing changes in their business environment, responding effectively, or following through on changes they've begun. In Leading Strategic Change , two leading organizational consultants and researchers offer a start-to-finish strategy for helping employees redraw their mental maps -- and unleashing their power to support effective change.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: viii, 278 p. , ill. ; , 29 cm
    Edition: 9th ed.
    DDC: 658.3/02
    Keywords: Personnel management ; Supervision of employees ; Electronic books ; local
    Abstract: SUPERVISOR'S SURVIVAL KIT, NINTH EDITION continues the successful tradition of preparing today's workforce for the first steps into management. Solve problems through Mini-Games. Create a motivating work environment. Lead effective work-team behavior. Improve interpersonal communication between employees.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xviii, 412 p. , ill. ; , 24 cm
    DDC: 004.5/6
    Keywords: Smart cards ; Electronic books ; local
    Abstract: The complete smart card guidebook for decision-makers, product managers, developers, and integrators. Smart card application development from start to finish: design, development, and deployment Covers every component of a complete system: cards, readers, host software, management systems, and more Focuses on advanced "post issuance programmable" multi-application smart cards Presents detailed case studies and product coverage Offers up-to-the-minute insights into the evolving smart card marketplace and smart card technology Smart cards represent a breakthrough solution for maximizing security in a wide range of applications. Now, two leading smart card consultants present a thorough, up-to-date, accessible introduction to smart card technology that will be invaluable to developers and decision-makers alike. Smart Cards: A Developer's Toolkit covers all you need to know to plan, design, develop, and deploy advanced multi-application smart card environments, including: Smart card physical structure, construction, tamper resistance, and tamper-evident features International standards, inter-industry command sets, and industry specifications "Post issuance programmable" smart cards: the cutting edge of smart card deployment An in-depth review of two "high-performance" smart cards, including one multi-application card PC and workstation host software for supporting smart cards Applications with the SIM smart cards in GSM and 3G mobile phones Card management systems and readers for large-scale applications in real-world environments The evolving marketplace for smart cards in the U.S. and worldwide The authors present case studies from today's most advanced smart card deployments, covering both the logistics of initial deployment and best practices for supporting ongoing operations and card populations. Whether you're an IT manager, corporate security officer, product manager, developer, or integrator, Smart Cards: A Developer's Toolkit gives you a powerful new weapon for protecting your digital assets.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 509 p. , ill. ; , 24 cm. +
    DDC: 005.2/762
    Keywords: E-speak (Computer network technology) ; Java (Computer program language) ; Web site development ; Computer programs ; Electronic books ; local
    Abstract: Master HP's fast, practical, secure technology for delivering advanced Internet-based Web services. Explains service-centric computing, competitive landscape, and the first Internet service technology-e-Speak Demonstrates how to deliver powerful Web services with HP's Java-based e-Speak platform Includes fully annotated Java code examples for every e-Speak component Contains two detailed case studies: supply chain management and location-based mobile services Make the Web work for you-with HP's open, Java, and XML-based software platform for creating and delivering Web services. Web Services: A Java Developer's Guide Using E-Speak is one of the first books focusing on service-centric computing. It is also the complete, authoritative guide to e-Speak technology. Written by two HP e-Speak experts, it covers all aspects of the service life cycle, while illuminating the broader technical and business issues associated with Internet service-based economies. Web services: what they are, and how they can solve business problems Enabling Internet-based services to find each other and interact programmatically, wherever they are-securely E-Speak service development, deployment, and discovery Comparative survey of competitive initiatives and technologies such as CORBA, J2EE, ebXML, UDDI, and .NET Key concepts: client and service interactions, vocabularies, contracts, service composition; the multicore environment; persistence, events, messages, and HP's "E-Services Village" service registry E-Speak's transformation into HP Web Services Platform-a standards-based, highly interoperable platform for Internet service delivery Web Services: A Java Developer's Guide Using E-Speak contains Java code examples throughout. It also includes comprehensive case studies in supply chain management and location-based mobile services. Whatever Internet services you intend to deploy, this book is your complete blueprint for getting the job done. CD-ROM INCLUDED The accompanying CD-ROM contains the e-Speak software to get developers started, plus working code examples, tools, and the databases used in the book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxi, 378 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 658.4/052
    Keywords: Negotiation in business ; Electronic books ; local
    Abstract: At last, a negotiation book that provides an integrated, big-picture view of what to do and what to avoid at the bargaining table based on the latest research findings! Combining a strong applied flavor with straightforward and lively writing, The Mind and Heart of the Negotiator presents a unified, and comprehensive overview of the insights, strategies, and practices inherent to successful negotiations and addresses the most common myths and pitfalls that plague negotiators. KEY TOPICS: This unique book weaves together a wide range of disciplines in its study of negotiation and discusses distributive negotiation, win-win negotiation, developing a negotiating style, creativity and problem solving, and cross-cultural negotiation. MARKET: For those in psychology, sociology, and organizational behavior economics interested in improving their negotiation skills.
    Note: Includes bibliographical references (p. 337-363) and indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xvii, 330 p. , ill. ; , 24 cm
    DDC: 658
    Keywords: Interpersonal communication ; Management ; Electronic books ; local
    Abstract: Paul Caproni's clearly written, interesting new book will give you ideas, tools, and outstanding practices that can make you a better manager - and improve your life. If you would like to feel more fulfilled with your home life and advance in your career, this inspiring book can help you utilize your role as a manager to bring out the best in yourself, others, and your organization. In addition, Caproni will show you how to: manage in a diverse, global, technologically driven and fast-changing environment balance work and life when your firm expects a "24/7" commitment build the skills you need to move from an individual-contributor mindset to a managerial mindset build trust, respect, support, and influence in all your relationships become a critical consumer of managerial knowledge, and avoid falling victim to managerial fads
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: ix, 166 p. , ill. ; , 24 cm
    Series Statement: Management skills, Neteffect series
    DDC: 658.4/56
    Keywords: Business communication ; Meetings ; Electronic books ; local
    Abstract: This book provides practical information on a major business concern-how to manage meetings. It demonstrates how to lead them effectively, in the shortest time frame possible. Three types of meetings are outlined: information-giving, interactive, and problem solving, with details on how to prepare for and preside over each. KEY TOPICS: Chapter topics include an overview of the meeting process; structuring a topic and organizing the message; audience; platform conduct; visuals; agendas; disruptions; and asking and answering questions. MARKET: For training programs in business and industry. y.
    Note: Includes bibliographical references (p. 107) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 160 p. , ill. ; , 24 cm
    DDC: 658/.05
    Keywords: Database management ; Information technology ; Electronic books ; local
    Abstract: 1378F-9 Maximize reliability, address downtime, and maintenance costs! Planning, analyzing, and implementing your appropriate level of automated data centers and infrastructure operations Real-world guidelines, methodology, and best practices Organization, staffing, technology, deployment, and management tips from the experts! Data center automation in distributed environments: practical advice and proven tools! Everyone wants a "lights out" data center and infrastructure operation-but in an era of distributed, Internet-centered computing, that's tougher to accomplish than ever. IT Automation: The Quest for Lights Out can get you remarkably close to the level that's right for you. In this book, a leading IT consultant, with the help of his number-one supporting cast, helps you define realistic goals for automating your IT data center and infrastructure, and then delivers a systematic, enterprise-level methodology that encompasses today's best approaches to achieving those goals, from planning through deployment and management. Coverage includes: Analyzing your own operation to identify gaps and requirements for automation Designing IT automation: steps, operations, and key considerations Addressing the organizational and staffing challenges associated with data center and infrastructure automation Redefining your technical architecture and administrative processes for maximum efficiency Selling your IT automation plan throughout the organization Post-deployment continuous improvement techniques for enhancing your "lights out" operation IT Automation: The Quest for Lights Out contains all the hands-on resources you need to get results: sample project plans, process flows, IT org charts, and more. If you're an IT executive, operations manager, consultant, or vendor seeking to enhance the value of enterprise data centers, or even an IT Management graduate student, this is the one book that will get you there.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xii, 132 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 303.3/4
    Keywords: Leadership ; Self-actualization (Psychology) ; Electronic books ; local
    Abstract: A brief inexpensive paperback on self-management. KEY TOPICS: This book explores methods for achieving personal goals using self-assessment, self-reward, and self-punishment concepts and exercises. This revision includes a new chapter on Self Leadership within Teams. The practical, applied assessment exercises and activities both build and reinforce the skills all managers need to manage themselves and employees.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 357 p. , ill. ; , 24 cm
    Series Statement: Enterprise computing series
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: 80% of software projects fail-here's why the other 20% succeed! Software Development is the most thorough, realistic guide to "what works" in software development-and how to make it happen in your organization. Leading consultant Marc Hamilton tackles all three key components of successful development: people, processes, and technology. From streamlining infrastructures to retraining programmers, choosing tools to implementing service-level agreements, Hamilton unifies all of today's best practices-in management, architecture, and software engineering. There's never been a more comprehensive blueprint for software success. Discover "The Ten Commandments of Software Development" Build a winning software development team, organize it for success - and retain your best talent Create a software architecture that maps to business goals and serves as a foundation for successful development Define processes that streamline component and Web-based development projects Leverage the advantages of object-oriented techniques throughout the entire lifecycle Make the most of Java, JavaBeans, and Jini technology Learn the best ways to measure software quality and productivity-and improve them Software Development is ruthlessly realistic and remarkably accessible-for managers and technical professionals alike. Best of all, its techniques can be applied to any project or organization, large or small. Ready to build software that meets all its goals? This book will get you there.
    Note: Includes bibliographical references (p. 351) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 799 p. , ill. ; , 24 cm. +
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Object-oriented methods (Computer science) ; System design ; Electronic books ; local
    Abstract: 53274-7 Learn ANSI C++ right from the start! If you're going to learn C++, learn it right from the start! Navigating C++ and Object-Oriented Design is the first book that teaches ANSI C++ and the object-oriented techniques that make C++ a software development breakthrough. This comprehensive tutorial reflects the authors' extensive experience teaching C++ to professional developers. Start with the clearest introduction to object modeling you'll ever read. Then learn all the essentials of C++ and more advanced topics such as exceptions, namespaces, and dynamic memory allocation. Next, discover C++ classes, the basic building block of object-oriented design. Through proven analogies and examples, the authors introduce containment and inheritance, overloading, templates, RTTI, and exception handling. And, the authors' unique presentation on multiple inheritance will give you invaluable insights into this complex topic. Learn to apply C++ and object-oriented techniques to real-world development. Discover how to design classes effectively using the authors' class design boilerplate. Understand how to design container classes. Walk through class designs using the powerful OMT methodology. Navigating C++ and Object-Oriented Design is one of the first C++ tutorials that covers in detail powerhouse ANSI C++ features like: Namespaces, bool, member templates, and RTTI Explicit, export, and nothrow versions of new and delete The IOStream Library and Standard Template Library Why learn C++ simply as a "better C" when you can write C++ code that really meets its potential? One book shows you how: Navigating C++ and Object-Oriented Design!
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...