Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2000-2004  (264)
  • 2001  (264)
  • Safari Tech Books Online  (185)
  • Edward Elgar Publishing  (79)
  • Deutsche Gesellschaft für Soziologie (DGS)
Datasource
Material
Language
Years
  • 2000-2004  (264)
Year
  • 1
    Online Resource
    Online Resource
    Cheltenham, UK : Edward Elgar Publishing
    ISBN: 9781781959947
    Language: English
    Pages: 1 Online-Ressource (xiv, 348 pages) , illustrations
    Parallel Title: Erscheint auch als
    DDC: 306/.0959
    Keywords: Wages ; Wages ; Globalization ; Southeast Asia Social conditions ; Southeast Asia Economic conditions ; Europe Social conditions ; Europe Economic conditions 1945-
    Abstract: The impact of globalisation on social development is a critical issue for both developed and developing countries. In Globalisation and Social Development, leading experts investigate this from the perspective of European, and more specifically, Southeast Asian economies including Thailand, the Philippines and Vietnam. The contributors provide a well documented, multi-disciplinary analysis of the relationship between globalisation and social development in regions which, in the last two decades, have relied heavily on an outward looking development strategy and on attracting FDI, and which have been severely hit by the Asian crisis. In order to substantiate their analysis, the contributors include case studies of company relocation to Southeast Asia. The effects of globalisation on compliance with core labour standards in the Asia Pacific are also explored. Examining the complex link between globalisation and social development in Europe and Southeast Asia, Globalisation and Social Development will be welcomed by economists and social researchers with a specific interest in globalisation and Southeast Asian economies. Lecturers and scholars of international economics, international business and Asian business will also find the book to be of great interest
    Description / Table of Contents: Contents: Globalisation and social development: An Introduction -- Part I: Europe -- 1. Globalisation and wages in industrial countries -- 2. Globalisation, employment and wages -- 3. Globalisation and relocation -- 4. Relocation from industrial countries to Asia -- Part II: Southeast Asia -- 5. ILO fundamental principles and rights at work in Asia Pacific -- 6. Economic crisis, social development and challenges for the trade unions -- 7. Relocation to Thailand -- 8. Social development and globalisation -- 9. Globalisation and social development in the Philippines -- 10. International business relocation to the Philippines -- 11. Fdi, economic growth and social equality in Vietnam since the later 1980s -- 12. Globalisation and the reform of the financial system in Vietnam -- 13. A comparison of social conditions in local and joint venture companies in Vietnam -- Index.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Harlow, England ; : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxi, 664 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: The third edition of Java Gently by Judith Bishop continues the successful approach that made earlier versions popular and has added improvements which will maintain its place as a worldwide bestseller. Java Gently teaches the reader how to program and how to do it in the best possible style in Java. In the process, it details the fundamental structures of the Java 2 language and most of its core libraries and utilities. The book covers object-orientation, software design, structured programming, graphical user interfacing, event-driven programming, networking, and an introduction to data structures. Java Gently gets students started on meaningful input/output in an object-oriented way without hiding basic concepts. Applets, multimedia, graphics, and networking are introduced as students encounter and can handle classes, objects, instantiation, and inheirtance. The textbook's excellent pedagogy reinforces understanding and demonstrates good programming practice. The three kinds of diagrams include class, form, and algorithm diagrams. The fully worked examples have been carefully chosen to illustrate recently introduced concepts and solve real-world problems in a user-friendly manner. End of chapter multiple choice quizzes and problems allow students to test their comprehension of the material.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781782542377
    Language: English
    Pages: 1 Online-Ressource (xi, 367 pages)
    Parallel Title: Erscheint auch als
    DDC: 330.1
    Keywords: Social sciences ; Knowledge, Sociology of ; Economics
    Abstract: Knowledge, Social Institutions and the Division of Labour gives rise to a new and richer institutional analysis of the economy centred around the analysis of language, the division of labour and social knowledge. It is in this perspective that the economic analysis of institutions comes to be associated with the study of civil society, or with the broad framework of communication and coordination behind the interaction of individuals in economic and non-economic spheres. This fascinating book is divided into three parts beginning with the issue of the development of science as an aspect of the division of labour, starting from methodological problems on the communication of scientific knowledge. The volume goes on to explore issues on the moral bases of social interaction and, more particularly, of commercial society before ending with in depth analyses of questions on the division of labour, social institutions and the diffusion of knowledge in society
    Description / Table of Contents: Contents: Preface -- Coordination, connecting principles and social knowledge: An introductory essay -- Part I: Rationality, communication and connecting principles -- Part II: Social interaction and moral sentiments -- Part III: Division of labour, patterns of interdependence and social institutions -- Index.
    Note: A collection of 16 papers first presented at a conference sponsored by the European Society of the History of Economic Thought in February-March 1998, and subsequently revised , Includes bibliographical references and indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 214 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8/068
    Keywords: Computer security ; Management ; Information technology ; Management ; Electronic books ; local
    Abstract: Seventy percent of businesses reported security breaches in 2000, and the rate is on the rise. Is your organization ready to respond to such an incident head-on? Will you be able to tell whether an incident is an attack or a glitch in the system? Do you know how to assess the possible damage from an incident? Incident Response shows you how to answer questions like these and create a plan for exactly what to do before, during, and after an incident. The authors of Incident Response draw on years of experience developing and taking part in incident response teams at the highest levels of government and business. They guide you through both the technical and administrative details of effective incident response planning as they describe: What incident response is, and the problems of distinguishing real risk from perceived risk The different types of incident response teams, and advantages and disadvantages of each Planning and establishing an incident response team State of the Hack® information about different types of attacks Recommendations and details about available tools for incident response teams Resources available to incident response teams Whatever your organization's size or purpose, Incident Response shows how to put in place an incident-response process that's as planned, efficient, and businesslike as any other IT operation in a mature organization. Incidents happen, and being able to respond to them effectively makes good business sense.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvii, 466 p. , ill. ; , 23 cm
    Edition: 1st. ed.
    DDC: 004/.36
    Keywords: COM (Computer architecture) ; Electronic books ; local
    Abstract: COM+ is Microsoft¿s new version of its COM object-oriented programming framework. Built into Windows 2000, this is an extremely powerful and complex technology that consolidates the features of a number of existing Microsoft tools: OLE, ActiveX, DCOM, Microsoft Message Queue, and Microsoft Transaction Server. By pulling all of these disparate services into one unified technology, COM+ hold the promise of greater efficiency and more diverse capabilities for developers who are creating applications - either enterprise or commercial software -- to run on a Windows 2000 system. The demand for reliable and real-world application-based information on COM+ is huge, and so far greatly exceeds the availability of such documentation. This book will provide a coherent, unified view of the COM+ architecture.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xii, 299 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Keywords: JavaScript (Computer program language) ; Electronic books ; local
    Abstract: JavaScript 1.5 by Example starts with a taste of JavaScript - what it is, what it¿s for, and what readers need to get started. The book then explains how to add JavaScript to existing HTML pages, leading readers into the fundamentals of the language including JavaScript syntax, notation and conventions, communicating with users via input and output, manipulating variables and data, logic statements in JavaScript, and object programming with JavaScript. The book progresses to an explanation of JavaScript¿s role in Dynamic HTML, and how that power can be exploited to create animation, navigation, forms processing and more.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Newtown Square, Pa. : Project Management Institute | Boston, MA :Safari,
    Language: English
    Keywords: Personnel management ; Project management ; Electronic books ; local
    Abstract: Project management professionals are fortunate to have access to a rich and growing body of tools and metrics to aid in their success. However, that is just what they are: tools and metrics. The industry is no less prone than any other discipline to the problems inherent in managing people. In fact, strong arguments can be made that project management offers far more. This important book focuses on one of the nine knowledge areas of A Guide to the Project Management Body of Knowledge (PMBOK®)2000 Editionnamely, human resource management. This publication is one of the most important collections of writings related to the people side of management that PMI has produced in more than six years. Topics are far ranging and are divided into nine chapters ranging from Key Management Skills and Duties to Managing Change. People in Projects also highlights the importance of true leadership and challenges all project leaders to empower, coach and motivate their team to achieve unimaginable success. You will find a wealth of information on every page to help you effectively manage one of your most important assetspeople!
    Note: Title from title screen. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxv, 929 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Object-oriented programming (Computer science) ; Python (Computer program language) ; Electronic books ; local
    Abstract: The Python Developer's Handbook is designed to expose experienced developers to Python and its uses. Beginning with a brief introduction to the language and its syntax, the book moves quickly into more advanced programming topics, including embedding Python, network programming, GUI toolkits, JPython, Web development, Python/C API, and more. Python is an interpreted, object-oriented programming language. Its syntax is simple and easy to learn, and it encourages programmers to write and think clearly. The Python Developer's Handbook is carefully written, well-organized introduction to this powerful, fast-growing programming language for experienced developers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xx, 362 p. , ill. ; , 24 cm
    Edition: lst ed.
    DDC: 005.1/17
    Keywords: COM (Computer architecture) ; Component software ; Microsoft .NET Framework ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: With COM and .NET Component Services, skilled COM developers can leverage their knowledge for the next generation of components to be built for Microsoft's new .NET framework. A primary goal of Microsoft's COM+ is to provide proven design solutions for scalable systems. Assuming experience with classic COM, COM and .NET Component Services focuses on the added services of COM+, including support for transactions, queued components, events, concurrency management, and security. Along the way, it ably demonstrates that COM+ is a masterpiece of design and usability from the ground up--truly a mature set of component services oriented for the middle tier. COM+ provides a foundation for robust, enterprise-wide, mission-critical distributed applications. And it's not limited to Internet applications. You can use COM+ services in the same places as classic COM components: in-house two-tier information systems, client-tier controls, desktop applications, machine control components, and every other conceivable application of COM. COM and .NET Component Services is the first book to stress the importance of learning to use COM+ services for both .NET and COM component-based applications. Since most companies have considerable investment in existing code base and development skills, COM+ can serve as a migration path for companies and developers. Companies can start (or continue) their projects in COM, using COM+ as a supporting platform for component services, and then when the time comes to move to .NET, they can start plugging .NET components seamlessly into the same architecture, reusing and interacting with their existing COM components.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 366 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Mac OS ; Application program interfaces (Computer software) ; C (Computer program language) ; Cocoa (Application development environment) ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: Cocoa™ is one of the principal application environments for Mac® OS X. Among Cocoa's many attributes, its advanced object-oriented APIs allow you to develop in both Java and Objective-C. This revolutionary new way of developing sophisticated applications for the Macintosh is both powerful and easy. With Learning Cocoa you'll become familiar with Cocoa application development, using Objective C, not merely by reading, but by doing. The book begins with a discussion of essential object-oriented programming concepts for those with no previous experience. It proceeds through an introduction to the Cocoa environment, development, tools, and some simple tutorials to help you become familiar with the basic elements of Cocoa programming. The remaining tutorials guide you as you create a series of increasingly complex example applications. The techniques and concepts you learn in one tutorial lay the foundation for the more advanced techniques and concepts in the next. You don't need extensive programming experience to complete the examples in this book, though it would be helpful to have some experience with the C programming language. The code for each example is included in the text so you can simply type it in. If you're already familiar with an object-oriented programming language like Java or Smalltalk, you'll quickly feel right at home with Objective-C, the language used throughout this book. As you ease your way into the experience of Cocoa programming, you're encouraged to play, to explore, to "kick the tires." You'll finish this book much better prepared to take on serious application development with Cocoa, and you'll find Apple's development environment not only less mysterious, but one that you'll be eager to program in. Written by insiders at Apple Computer, the book brings you information that you can't get anywhere else--and a potential leg up in the Mac OS X application development market.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Language: English
    Pages: xxxvi, 469 p. , ill. ; , 23 cm. +
    Edition: 4th ed.
    DDC: 005.75/6
    Keywords: Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: This latest edition of the best-selling implementation guide to the Structured Query Language teaches SQL fundamentals while providing practical solutions for critical business applications. The Practical SQL Handbook, Fourth Edition now includes expanded platform SQL coverage and extensive real-world examples based on feedback from actual SQL users. The Practical SQL Handbook begins with a step-by-step introduction to SQL basics and examines the issues involved in designing SQL-based database applications. It fully explores SQL's most popular implementations from industry leaders, Oracle, Microsoft, Sybase, and Informix. Highlights include: Detailed coverage of SQL commands for creating databases, tables, and indexes, and for adding, changing, and deleting data Using the SELECT command to retrieve specific data Handling NULL values (missing information) in a relational database Joining tables, including self joins and outer joins (ANSI and WHERE-clause syntax) Working with nested queries (subqueries) to get data from multiple tables Creating views (virtual tables) to provide customized access to data Using SQL functions A bonus CD-ROM contains a time-limited, full-feature version of the Sybase® Adaptive Server Anywhere™ software as well as the sample database, scripts, and examples included in the book. The Practical SQL Handbook is the most complete reference available for day-to-day SQL implementations. 0201703092B05222001
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 341 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Mac OS ; Application program interfaces (Computer software) ; C (Computer program language) ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: Learning Carbon is designed to get you programming right away in Carbon™, one of two APIs (Application Programmer Interfaces) Macintosh® programmers can use to write applications that run native in Mac® OS X. Using Carbon, you don't have to rewrite your Mac OS programs entirely to get them to take advantage of the new features in Mac OS X. Instead, all you have to rewrite is the 10 to 20 percent of the code that can't be translated to OS X. For C programmers, Apple's Carbon is the essential building block for applications on Mac OS X. With Carbon, you can use simple, traditional C interfaces to create world-class applications for a world-class operating system. After orienting you with a detailed tour of a Carbon application, Learning Carbon walks you through the entire process of designing and creating a complete Carbon application called Moon Travel Planner. Along the way, you'll be introduced to two pivotal development tools: Project Builder and Interface Builder. You'll learn key concepts about Carbon and Mac OS X programming, including event management, resource handling, and bundle anatomy. And you'll get direct, hands-on instruction on how to implement essential application tasks, such as managing windows, printing documents, opening and saving files, creating and responding to menu commands, providing user help, and organizing your application for easy localization in multiple countries and languages. After finishing this book, you'll be ready to start writing your own Carbon applications. Written by Apple insiders with access to engineers deeply involved in creating Mac OS X, Learning Carbon brings you information that's not available anywhere else, to get you in on the ground floor of the exciting new Mac OS X application development market.
    Note: "A/D/C, Apple Developer Connection recommended title"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 645 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 004/.36
    Keywords: Jini ; Electronic data processing ; Distributed processing ; Electronic books ; local
    Abstract: Built on top of the Java™ software infrastructure, Jini™ technology enables all types of services and devices to work together in a community--organized without extensive planning, installation, or human intervention. Jini technology allows the lines to blur between what is hardware and what is software by representing all hardware and software as Jini technology-enabled "services," accessible either directly or through surrogates written in the Java programming language. In a distributed system of Jini technology-enabled services, these programs interact spontaneously, enabling services to join or leave the network with ease, which allows clients to view and access available services with confidence. A system of Jini technology-enabled services can link office components such as printers, faxes, and desktop computers. Beyond these traditional networks, the technology is also ideal for building the home-based networks that are now emerging: entertainment systems, cars, smart houses, and personal computers. This book contains the formal specification for the core Jini technology, as well as specifications for local helper utilities and remote helper services. It offers a review of distributed computing fundamentals, an overview of the Jini architecture, and an introduction to the key concepts that are the source of the technology's simplicity and power--remote objects, leasing, distributed events, and a two-phase commit protocol. The formal specifications provide the definitive description of every element of the Jini architecture, including detailed information on such topics as: Jini discovery and join protocols Jini entry usage Jini distributed leasing concepts Jini distributed event programming model Jini transaction model and semantics Jini lookup service and lookup attribute schema Jini discovery, event, leasing, and join utilities Jini lookup discovery, lease renewal, and event mailbox helper services Jini device architecture 0201726173B04062001
    Note: Includes index. - Rev. ed of: The Jini specification. c1999
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxv, 371 p. , ill. ; , 24 cm. +
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Parser building is a powerful programming technique that opens a world of opportunity for designing how users interact with applications. By creating mini-languages, you can precisely address the requirements of your application development domain. Writing your own parsers empowers you to access a database more effectively than SQL to efficiently control the movement of an order through its workflow, to command the actions of a robot, and to control access privileges to transactions in a system. The repertoire of today's professional programmer should include the know-how to create custom languages. Building Parsers with Java ™ shows how to create parsers that recognize custom programming languages. This book and its accompanying CD provide an in-depth explanation and clearly written tutorial on writing parsers, following the Interpreter Design Pattern. An easy-to-follow demonstration on how to apply parsers to vital development tasks is included, using more than a hundred short examples, numerous UML diagrams, and a pure Java parser toolkit to illustrate key points. You will learn How to design, code, and test a working parser How to create a parser to read a data language, and how to create new computer languages with XML How to translate the design of a language into code How to accept an arithmetic formula and compute its result How to accept and apply matching expressions like th* one How to use tokenizers to define a parser in terms of logical nuggets instead of individual characters How to build parsers for a custom logic language like Prolog How to build parsers for a custom query language that goes beyond SQL How to construct an imperative language that translates text into commands that direct a sequence of actions 0201719622B04062001
    Note: Includes bibliographical references (p. 357) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Greensboro, N.C. : Center for Creative Leadership | Boston, MA :Safari,
    Language: English
    Pages: 30 p. ; , 23 cm
    DDC: 658.4/02
    Keywords: Organizational effectiveness ; Teams in the workplace ; Electronic books ; local
    Abstract: One of the first steps to take toward increasing team effectiveness is to pay attention to how the team is formed. You can head off most of the problems that beset teams during the formation stage by setting a clear direction, building organizational support, creating an empowering team design, identifying key relationships, and monitoring external factors. When a team is formed with the five high-performance principles described in this guidebook, it has a head start on achieving success.
    Note: Includes bibliographical references (p. 27-28)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 499 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Internet ; Security measures ; Electronic books ; local
    Abstract: Must-have security strategies using Cisco's complete solution to network security The only book to cover interoperability among the Cisco Secure product family to provide the holistic approach to Internet security The first book to provide Cisco proactive solutions to common Internet threats A source of industry-ready pre-built configurations for the Cisco Secure product range Cisco Secure Internet Security Solutions covers the basics of Internet security, and then concentrates on each member of the Cisco Secure product family, providing a detailed explanation with examples of the preferred configurations required for securing Internet connections. The Cisco Secure PIX Firewall is covered in depth from an architectural point of view, and a reference of the PIX commands explains their use in the real world. Although Cisco Secure Internet Security Solutions is primarily concerned with Internet security, the information inside is also applicable to many general network security scenarios
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Boston : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xx, 407 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/469
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Windows Management Instrumentation (WMI) tells readers everything they need to know in order to harness the power of WMI to automate vast parts of Windows 2000 workstation and server management. The book starts with the absolute basics, teaching the fundamentals of WMI terminology and the VBScript programming language. By the time readers complete the book, the readers will not only have the ability to use the scripts supplied, but also have a good understanding of both WMI and VBScript.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 499 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Mac OS ; AppleScript (Computer program language) ; Macintosh (Computer) ; Programming ; Electronic books ; local
    Abstract: AppleScript in a Nutshell is the first complete reference to AppleScript, the popular programming language that gives both power users and sophisticated enterprise customers the important ability to automate repetitive tasks and customize applications. As the Macintosh continues to expand and solidify its base in the multimedia and publishing industries, AppleScript is the tool of choice on this platform for creating sophisticated time- and money-saving workflow applications (applets). These applets automate the processing and management of digital video, imaging, print, and web-based material. AppleScript is also gaining a foothold in scientific programming, as technical organizations adopt G4 CPU-based systems for advanced computing and scientific analysis. Finally, "power users" and script novices will find that AppleScript is a great everyday Mac programming tool, similar to Perl on Windows NT or Unix.In this well-organized and concise reference, AppleScript programmers will find: Detailed coverage of AppleScript Version 1.4 and beyond on Mac OS 9 and Mac OS X. Complete descriptions of AppleScript language features, such as data types, flow-control statements, functions, object-oriented features (script objects and libraries), and other syntactical elements. Descriptions and hundreds of code samples on programming the various "scriptable" system components, such as the Finder, File Sharing, File Exchange, Network scripting, Web scripting, Apple System Profiler, the ColorSync program, and the numerous powerful language extensions called "osax" or scripting additions.Most other AppleScript books are hopelessly out of date. AppleScript in a Nutshell covers the latest updates and improvements with practical, easy to understand tips, including: Using AppleScript as a tool for distributed computing, an exciting development that Apple Computer calls "program linking over IP." Programmers can now do distributed computing with Macs over TCP/IP networks, including controlling remote applications with AppleScript and calling AppleScript methods on code libraries that are located on other machines. Using the Sherlock find application to automate web and network searching. Insights on scripting new Apple technologies such as Apple Data Detectors, Folder Actions, Keychain Access, and Apple Verifier. AppleScript in a Nutshell is a high-end handbook at a low-end price--an essential desktop reference that puts the full power ...
    Note: "A/D/C, Apple Developer Connection recommended title"--Cover. - Includes bibliographical references (p. 474-476) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Sebastapol, CA ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 387 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Database management ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Net8 is the fundamental Oracle technology that allows Oracle services and clients to communicate with each other over a network. Net8 is most often used to connect client software to Oracle database servers. It may also be used to connect database servers to one another, allowing communication between distributed databases. This practical guide provides the information that readers, especially database administrators, need to know in order to install configure, tune, and troubleshoot Net8. It discusses how Oracle's network architecture, products, and name resolution methods work, and it provides the details of client and server configuration using a variety of Oracle protocols and networking products, including: The Oracle Internet Directory (OID), Oracle's implementation of the standard Lightweight Directory Access Protocol (LDAP). This directory can be used to maintain a central repository of net service names that can be referenced by all clients. Oracle Names, a networking component used mainly in earlier versions of Oracle, that allows net service names to be defined centrally. Multi-Threaded Server (MTS), an environment in which the client connections share access to a pool of shared server processes. Oracle Connection Manager, a Net8 component that acts much like a router and provides protocol conversion, connection concentration, and access control. The book also describes the utilities Oracle provides to help manage a Net8 environment; these include the Listener Control Utility (lsnrctl), the Oracle Names Control Utility (namesctl), the Oracle Connection Manager Control Utility (cmctl), tnsping, and Net8 Assistant. In addition, it provides a variety of networking troubleshooting techniques and commonly encountered Net8 configuration problems, and provides complete syntax for all networking files and commands.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xv, 300 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.5/3
    Keywords: Browsers (Computer programs) ; Cache memory ; Software configuration management ; World Wide Web ; Electronic books ; local
    Abstract: On the World Wide Web, speed and efficiency are vital. Users have little patience for slow web pages, while network administrators want to make the most of their available bandwidth. A properly designed web cache reduces network traffic and improves access times to popular web sites--a boon to network administrators and web users alike. Web Caching hands you all the technical information you need to design, deploy, and operate an effective web caching service. It starts with the basics of how web caching works, from the HTTP headers that govern cachability to cache validation and replacement algorithms. Topics covered in this book include: Designing an effective cache solution Configuring web browsers to use a cache Setting up a collection of caches that can talk to each other Configuring an interception cache or proxy Monitoring and fine-tuning the performance of a cache Configuring web servers to cooperate with web caches Benchmarking cache products The book also covers the important political aspects of web caching, including privacy, intellectual property, and security issues. Internet service providers, large corporations, or educational institutions--in short, any network that provides connectivity to a wide variety of users--can reap enormous benefit from running a well-tuned web caching service. Web Caching shows you how to do it right.
    Note: Includes bibliographical references (p. 288-290) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: x, 260 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Cisco IOS ; Computer networks ; Access control ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet. Cisco IOS Access Lists covers three critical areas: Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking. Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, and Cisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers. The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet. Cisco IOS Access Lists differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    New York : AMACOM | Boston, MA :Safari,
    Language: English
    Pages: vii, 264 p. ; , 24 cm
    DDC: 658.4/092
    Keywords: Leadership ; Case studies ; Electronic books ; local
    Abstract: A refreshingly different look at an old question: Are leaders born or made? Some people appear to be natural born leaders. But are they literally born that way? Or have they been taught, coached, rewarded, and reinforced in ways that enable them to be leaders? According to The 108 Skills of Natural Born Leaders, no one is born a leader. But everyone has the natural born capacity to lead. We label people natural born leaders because they consistently and frequently model qualities that inspire others to commit to their direction. This book identifies the skill set that causes others to see people as natural born leaders, helps readers assess their current level of these skills, and coaches readers to master their weak areas. Readers will learn: Foundation skills, including self-awareness and the ability to establish rapport Direction skills, including the ability to set a course and develop others as leaders Willing follower skills, including the ability to influence others and create a motivating environment.
    Note: Includes bibliographical references (p. 255-257) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Indianapolis, IN : SAMS | Boston, MA :Safari,
    Language: English
    Pages: ix, 415 p. , ill. ; , 24 cm
    Keywords: Internet programming ; Microsoft .NET ; Simple Object Access Protocol (Computer network protocol) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Abstract: This book takes the reader from the architecture of .NET to real-world techniques they can use in their own Internet applications. The reader is introduced to .NET and Web Services and explores (in detail) issues surrounding the fielding of successful Web Services. Practical guidelines as well as solutions are provided that the rader may use in their own projects. Some of the issues involve lack of specific guidance in the SOAP specification, while others transcend SOAP and involve issues Internet developers have grappled with since the inception of the World Wide Web. At this time, this book has no competition.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Indianapolis : Que | Boston, MA :Safari,
    Language: English
    Pages: ix, 404 p. , ill. ; , 24 cm. +
    DDC: 005.2/762
    Keywords: Java (Computer program language) ; Web servers ; Electronic books ; local
    Abstract: JavaServer Pages From Scratch teaches beginning users about the many techniques involved in JavaServer Pages by building an online auction house with an events calendar. In addition to discussing the planning and designing of an application, the book will also cover development of forms, validating data, registering new users, servlets, sessions management, enterprise javabeans, cookies and wireless protocol.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xiv, 348 p. , ill. ; , 23 cm
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; COM (Computer architecture) ; Computer programming ; Electronic books ; local
    Abstract: The importance of a book like COM+ Programming with Visual Basic lies in the fact that the Visual Basic programming environment is designed to hide as many low-level system details as possible. While this approach can speed development time by letting you focus on the task at hand, it actually hinders the process when it obscures details you need to understand or control. Such is often the case for programmers who are developing components that take advantage of COM+ services. COM+ Programming with Visual Basic takes aim squarely at the information needs of these developers. For instance, despite the marketing hype about COM+ as the new and improved version of COM, classic COM is very much the foundation on which COM+ is built: COM+ components are a particular kind of COM component. Visual Basic hides almost all COM implementation details; yet it is precisely in the area of COM+ programming that these hidden details are most important. Therefore, we've devoted significant content to exploring COM internals: Interface-based programming How COM interfaces work internally How COM components are activated How versioning COM components works in Visual Basic How to use interfaces Passing objects by reference or by value What it means to have multithreaded applications How declarative programming works How to program within a distributed transaction How to add role-based security to applications The second section focuses on incorporating individual COM+ services, like transaction support, security, and asynchronous operations, into applications. The author concludes by discussing what you need to learn to transition to Microsoft's coming .NET framework. Regardless of what lies ahead for .NET, many distributed systems are being built today with COM+. COM+ Programming with Visual Basic focuses on topics relevant to distributed applications that are here to stay: There's simply no other documentation available for much of what's in COM+ Programming with Visual Basic. It's destined to be the resource behind the most robust, efficient, high-performance COM+ applications.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: x, 786 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Series Statement: In a nutshell
    DDC: 005.4/4769
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Anyone who installs Windows 2000, creates a user, or adds a printer is a 2000 system administrator. This book covers all the important day-to-day administrative tasks, and the tools for performing each task are included in a handy easy-to-look-up alphabetical reference. What's the same and what's different between the Windows 2000 and Windows NT platform? Has the GUI or the networking architecture changed, and if so, how? Windows 2000 Administration in a Nutshell addresses the problems associated with bridging the gap between the Windows NT and Windows 2000 platforms. This book covers: Commonalities and differences between Windows NT and Windows 2000 All the administrative tasks, including Installation, Group Policies, Terminal Services, User Accounts, and Virtual Private Networks Microsoft Management Console tool (MMC) What's new and significant in the Control Panel utilities Command-line Tools, Utilities and Wizards TCP/IP networking with Windows 2000 Whether the concern is new security issues or how Active Directory works, Windows 2000 Administration in a Nutshell is as useful to the single-system home user as it is to the administrator of a 1,000-node corporate network.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xviii, 522 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8/4
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out in Malicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book? Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers: The current state of the malicious code writing and cracker community How malicious code works, what types there are, and what it can and cannot do Common anti-virus defenses, including anti-virus software How malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent it Macro viruses affecting MS Word, MS Excel, and VBScript Java applets and ActiveX controls Enterprise-wide malicious code protection Hoaxes The future of malicious mobile code and how to combat such code These days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever. Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Beijing ; : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xiii, 601 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Keywords: ActiveX ; Internet programming ; Web sites ; Electronic books ; local
    Abstract: Getting data across platforms and formats is a cornerstone of present-day applications development. ADO: ActiveX Data Objects is both an introduction and a complete reference to ADO (ActiveX Data Objects), Microsoft's universal data access solution. You'll learn how to easily access data in multiple formats--such as email messages, Access databases, Word documents, and SQL databases--even on different platforms, without spending extra time learning every last detail about each format.Author Jason Roff shows by example how to use ADO with your programming language of choice to save programming time, so you can concentrate on the content and quality of your application rather than the nitty-gritty of specific data formats. ADO: ActiveX Data Objects includes: Chapters dedicated to the Connection, Recordset, Field, and Command objects and the Properties collection A complete, detailed reference listing every ADO object, method, property, and event, in convenient alphabetical order Chapters on ADO architecture, data shaping, the ADO Event Model An appendix containing enumeration tables used by ADO objects and collections, listed alphabetically Brief introductions to RDS, ADO.NET, and SQL ADO: ActiveX Data Objects is a versatile one-stop guide to both the theory and practice of programming with ADO through Version 2.6. The thorough reference section and topic-specific chapters will help you find quick answers about the details of objects, collections, methods, and properties of ADO. And the abundance of practical code examples will give you a good grasp of how to use ADO's strong points most effectively.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Language: English
    Pages: xix, 474 p. , ill. ; , 26 cm
    DDC: 658.8/1
    Keywords: Sales management ; Sales personnel ; Electronic books ; local
    Abstract: Every firm's sales force combines the distinctive personalities of its members with the complex issues of size, pay structure, incentives, performance evaluation, and effective uses of new technology. And while underrepresented in most marketing texts, the success of the sales force is a major component in the overall success of most companies. The Complete Guide to Accelerating Sales Force Performance develops an effective, innovative framework for evaluating and improving the performance of any sales force. This book identifies and describes the key factors for creating a fast-track, go-to-market strategy. It's loaded with proven ideas for improving such "success drivers" as: culture sales force structure hiring sales manager selection training compensation technology sales territory design goal setting performance management. Packed with valuable insights and real-life examples, this guide is an excellent source of practical ideas for sales and marketing managers in all industries.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xv, 817 p. , ill. ; , 23 cm
    Edition: 6th ed.
    DDC: 005.4/469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux is a significant force in the server room and the desktop, delivering reliability, ease of installation and administration, high performance, security, and robust applications. Special Edition Using Linux 6E is written to the just-released 2.4.x kernel and includes the following topics: installation and configuration of Red Hat Linux, Caldera OpenLinux, and Debian GNU/Linux; configuration and use of Samba, Netscape, sendmail, SSH, and Webmin; coverage of KDE 2.0 and its integrated utility suite; configuration of the X Windows System; installation and managment of applications; creation of a VPN with FreeS/WAN; customization of your shell environment; networking with Linux; Novell NetWare integration; and more. Special Edition Using Linux 6E details the latest Linux technologies, such as Ximian GNOME and the 2.4 kernel.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Indianapolis, IN : SAMS | Boston, MA :Safari,
    Language: English
    Pages: vii, 205 p. ; , 23 cm. +
    DDC: 004.6
    Keywords: Linux ; Routers (Computer networks) ; Electronic books ; local
    Abstract: Traditional IPv4 routing is summarized as "All routing is a destination driven process". When a router looks at an IPv4 packet it cares only about the destination address in the header of the packet. It uses this destination address to make a decision on where to forward the packet. But what if you want to route packets differently depending not only on the destination addresses but also on other packet fields such as source address, IP protocol, transport protocol ports or even packet payload? This is Policy Routing and this book tells you how to do it.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xii, 369 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Keywords: HTML (Document markup language) ; Web sites ; XHTML (Document markup language) ; XML (Document markup language) ; Electronic books ; local
    Abstract: XHTML by Example explains the differences in syntax between HTML and XHTML, and the concept of 'well-formedness', which is underused in HTML but crucial and required in XHTML. Further coverage includes authoring guidelines for a smooth transition to XHTML, XML DTDs and Schemas, and how they relate to XHTML, how XHTML modularization provides content to non-traditional browsers such as Palm devices, pagers, and cell phones, adding custom XHTML modules to standard XHTML, XHTML document profiling, and plans for XHTML 1.1. The final chapters cover advanced features, including Extended Forms, XHTML Basic, and Profiling content for different types of browsers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xvi, 315 p. , ill., map ; , 23 cm
    DDC: 005.7/1376
    Keywords: UNIX (Computer file) ; Internet domain names ; Electronic books ; local
    Abstract: The Concise Guide to DNS and BIND provides you with the technical depth and expert-level information you need to understand and administer DNS and BIND. Domain Name System (DNS) is a distributed Internet directory service. It is used mainly to translate between domain names and IP addresses, and to control Internet email delivery. Most Internet services rely on DNS to work, and if DNS fails, Web sites cannot be located and email delivery stalls. BIND (Berkeley Internet Name Daemon) is an implementation of the Domain Name System (DNS) protocols. This book covers setting up a DNS server and client, DNS domain zones, compiling and configuring BIND, dial-up connections, adding more domains, setting up root servers on private networks, firewall rules, Dynamic DNS (DDNS), subdomains and delegation, caching and name resolution, troubleshooting tools and techniques, debugging and logging, new features in BIND 8.2.2, and it offers introductory information on BIND 9.
    Note: Includes bibliographical references (p. [287]-292) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Indianapolis, Ind. ; : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xix, 664 p. , ill. ; , 23 cm
    DDC: 005.74
    Keywords: Berkeley DB ; Database management ; Electronic books ; local
    Abstract: Small, special-purpose computing devices and high-end core Internet servers need fast, reliable database management. Berkeley DB is an embedded database that provides high-performance, scalable, transaction-protected and recoverable data management services to applications. Extremely portable, this library runs under almost all UNIX and Windows variants, as well as a number of embedded, real-time operating systems. Berkeley DB is the ultimate resource for the world's most widely deployed embedded database engine. This book will aid software architects and engineers, product managers, and systems and network administrators without the overhead imposed by other database products. Designed by programmers for programmers, this classic library style toolkit provides a broad base of functionality to application writers. This book will help you to make intelligent choices about when and how to use Berkeley DB to meet your needs. You can visit the Sleepycat website to get the latest errata for this book. NOTE: The first printing of this book contained an error in the table of contents that caused the page numbers to be off. This will be corrected in the second printing. If you have an earlier edition, you can download a pdf of the correct table of contents that you can print out and use with your book. If you have any questions, please feel free to contact the editor of this book at stephanie.wallnewriders.com.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 192 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Embedded Linux provides the reader the information needed to design, develop, and debug an embedded Linux appliance. It explores why Linux is a great choice for an embedded application and what to look for when choosing hardware.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 432 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.6/8
    Keywords: Disruptive technologies ; Local area networks (Computer networks) ; Peer-to-peer architecture (Computer networks) ; Electronic books ; local
    Abstract: The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and control to ordinary users.While this book is mostly about the technical promise of peer-to-peer, we also talk about its exciting social promise. Communities have been forming on the Internet for a long time, but they have been limited by the flat interactive qualities of email and Network newsgroups. People can exchange recommendations and ideas over these media, but have great difficulty commenting on each other's postings, structuring information, performing searches, or creating summaries. If tools provided ways to organize information intelligently, and if each person could serve up his or her own data and retrieve others' data, the possibilities for collaboration would take off. Peer-to-peer technologies along with metadata could enhance almost any group of people who share an interest--technical, cultural, political, medical, you name it.This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. Learn here the essentials of peer-to-peer from leaders of the field: Nelson Minar and Marc Hedlund of target="new"〉 Popular Power , on a history of peer-to-peer Clay Shirky of acceleratorgroup , on where peer-to-peer is likely to be headed Tim O'Reilly of O'Reilly & Associates , on redefining the public's perceptions Dan Bricklin , cocreator of Visicalc , on harvesting information from end-users David Anderson of SETIhome , on how SETI@Home created the world's largest computer Jeremie Miller of Jabber , on the Internet as a collection of conversations Gene Kan of Gnutella and GoneSilent.com , on lessons from Gnutella for peer-to-peer technologies Adam Langley of Freenet , on Freenet's present and upcoming architecture Alan Brown of Red Rover, on a deliberately low-tech content distribution system Marc Waldman , Lorrie Cranor , and Avi Rubin of AT&T Labs , on the Publius project and trust in distributed systems Roger Dingledine , Michael J. Freedman , and David Molnar of Free Haven , on resource allocation and accountability in distributed systems Rael Dornfest of O'Reilly Network and Dan Brick...
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Language: English
    Pages: xvii, 309 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Keywords: Business ; Data processing ; Java (Computer program language) ; Electronic books ; local
    Abstract: Since its introduction, The Java 2 Platform, Enterprise Edition (J2EE) has achieved remarkable success among application server providers and their customers. More than a dozen leading application server companies have announced J2EE compatible products, and over one million developers have downloaded the J2EE SDK from Sun's J2EE Web site (http://java.sun.com/j2ee). Today, numerous enterprises face the challenge of developing distributed applications. IT professionals deal with a variety of issues: connecting dispersed users with centralized applications, building applications quickly and efficiently, and connecting heterogeneous clients and servers. J2EE in Practice provides ten examples of ways that J2EE technology has helped leading corporations, educational institutions, and government organizations face these challenges and reap significant rewards. Chapters in this book explore how: JCrew enhanced its traditional catalog sales operation using J2EE technology from Art Technology Group (ATG). One of the country's largest mortgage companies, HomeSide Lending, produced innovative online lending services using the BEA WebLogic server. The Borland Application Server enabled AT&T Unisource to respond quickly to demand in long-distance voice traffic routing. Codexa Corporation used Brokat's GemStone/J platform to deliver information for widely dispersed financial services professionals. eTapestry.com delivers applications to assist nonprofits in their fundraising using GemStone/J and Sun Microsystem's Forte for Java development environment. Altura International used the HP BlueStone J2EE platform to implement the Web's first online catalog shopping portal, catalogcity.com. IBM customers Honeywell and Bekins use Java technology to improve processes on the manufacturing floor and in the warehousing and delivery of large consumer products. International Data Post (IDP), a service owned by seven European postal operators, brought snail mail to the Internet age using iPlanet's J2EE technology. Physics research institute CERN worked with Oracle to provide electronic document handling services to over 5000 users worldwide. J2EE technology helps the US Military Traffic Management Command, Freight Systems Office (FSO) manage and control costs of small package shipping. 0201746220B01172002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 300 p. , ill. ; , 24 cm
    DDC: 005.74
    Keywords: Database design ; UML (Computer science) ; Electronic books ; local
    Abstract: The Unified Modeling Language (UML), the standard graphical notation for modeling business and software application needs, has emerged as an effective modeling tool for database design. When used as a common modeling language for the many facets of system development, the UML can serve as a unifying framework that facilitates the integration of database models with the rest of a system design. This pragmatic guide introduces you to the UML and leads you through the process of UML-based database modeling and design. The book presents the different types of UML diagrams, explaining how they apply to the database world, and shows how data modeling with the UML can be tied into the Rational Unified Process. UML for Database Design is structured around the database design process: business use case modeling, business object modeling, database requirements definition, analysis and preliminary design, and, finally, detailed design and deployment. For each phase of development the book describes the overall objectives and workflow of that phase, the status of the case study, the relevant UML constructs, and the nuts and bolts of database modeling and design with the UML. Drawing on their extensive industry experience, the authors reveal the trials and tribulations of database development teams, lessons learned, and pointers for success. Topics covered include: The business use case model Activity and sequence diagrams for modeling database functions and tasks Moving from the business to system model Class diagrams and statecharts Mapping classes to tables Transformation of attributes Rational's UML Profile for Database Design Creating tables from classes DDL scripts, component diagrams, and deployment diagrams Jump starting the database design process A case study runs throughout the book to illustrate key concepts and techniques, and appendixes containing the actual UML models from this case study are used to catalog the type and extent of models that would be developed for such a system. Practical, concrete, and based on real-life experience, UML for Database Design brings you exactly the information you need to begin working with the UML and take full advantage of the technology for high-quality database modeling and design. 0201721635B06292001
    Note: Includes bibliographical references (p. 287-288) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 323 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Generic programming (Computer science) ; Electronic books ; local
    Abstract: Modern C++ Design is an important book. Fundamentally, it demonstrates 'generic patterns' or 'pattern templates' as a powerful new way of creating extensible designs in C++-a new way to combine templates and patterns that you may never have dreamt was possible, but is. If your work involves C++ design and coding, you should read this book. Highly recommended. -Herb Sutter What's left to say about C++ that hasn't already been said? Plenty, it turns out. -From the Foreword by John Vlissides In Modern C++ Design , Andrei Alexandrescu opens new vistas for C++ programmers. Displaying extraordinary creativity and programming virtuosity, Alexandrescu offers a cutting-edge approach to design that unites design patterns, generic programming, and C++, enabling programmers to achieve expressive, flexible, and highly reusable code. This book introduces the concept of generic components-reusable design templates that produce boilerplate code for compiler consumption-all within C++. Generic components enable an easier and more seamless transition from design to application code, generate code that better expresses the original design intention, and support the reuse of design structures with minimal recoding. The author describes the specific C++ techniques and features that are used in building generic components and goes on to implement industrial strength generic components for real-world applications. Recurring issues that C++ developers face in their day-to-day activity are discussed in depth and implemented in a generic way. These include: Policy-based design for flexibility Partial template specialization Typelists-powerful type manipulation structures Patterns such as Visitor, Singleton, Command, and Factories Multi-method engines For each generic component, the book presents the fundamental problems and design options, and finally implements a generic solution. In addition, an accompanying Web site, http://www.awl.com/cseng/titles/0-201-70431-5 , makes the code implementations available for the generic components in the book and provides a free, downloadable C++ library, called Loki, created by the author. Loki provides out-of-the-box functionality for virtually any C++ project. Get a value-added service! Try out all the examples from this book at www.codesaw.com. CodeSaw is a free online learning tool that allows you to experiment with live code from your book right in your browser. 0201704315B11102003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Language: English
    Pages: p. cm
    DDC: 004.2/2
    Keywords: Computer architecture ; UML (Computer science) ; Electronic books ; local
    Abstract: The aim of the UML profile for framework architectures is the definition of a UML subset, enriched with a few UML-compliant extensions, which allows the annotation of such artefacts. Thus, the resulting profile that we call UML-F does not correspond to a specific domain, but to framework technology. Though profiles might be standardized in the future, sound proposals from various communities will get the process of defining and standardizing UML profiles started. In that sense, this book sets the stage for the UML profile for framework architectures.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Yourdon Press | Boston, MA :Safari,
    Language: English
    Pages: xix, 346 p. ; , 21 cm
    Edition: [2nd ed.].
    Keywords: Computer software ; Development ; Computer software ; Human factors ; Electronic books ; local
    Abstract: When it comes to the human side of software, nobody speaks with as much insight as Larry Constantine: developers and managers worldwide recognize his Constantine on Peopleware as the classic in the field. In The Peopleware Papers , Constantine thoroughly updates all 52 of the legendary columns in that book, and adds 25 new essays published for the first time in book form. These 77 essays offer powerful guidance on virtually every software development challenge in the "no-man's land" where technical and social issues blur, psychology meets cybernetics, and theory and practice intersect. Constantine's range is extraordinary: project management, group development, discipline vs. chaos, tools, models, methods, processes, personalities, usability, and beyond. The Peopleware Papers includes two completely new sections: one on organizational culture, and another on making software objects more usable-including Constantine's hard-to-find, breakthrough essays on usage-centered design.
    Note: Previous ed.: published as Constantine on Peopleware. Englewood Cliffs, N.J. : Yourdon Press, 1995. - Includes bibliographical references (p. 329-334) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 266 p. ; , 24 cm
    DDC: 004.2/1
    Keywords: Management information systems ; System analysis ; System design ; Electronic books ; local
    Abstract: The complete "how-to guide" for maximizing the availability of enterprise systems. Training, support, backup, and maintenance account for nearly 80 percent of the total cost of today's enterprise applications-and much of that money is spent trying to squeeze increased availability out of applications in spite of weak design and management processes. In High Availability, two leading IT experts bring together best practices for every people and process-related issue associated with maximizing application availability. The goal: to help enterprises dramatically improve the value of their strategic applications, without investing a dime more than necessary. Enhancing all four key elements of availability: reliability, recoverability, serviceability, and manageability Understanding how your users define availability Planning achievable service level agreements-and delivering on them Strategies for multiple platforms, from the mainframe to the desktop Lowering administrative costs through standardization and other techniques Redundancy, backup, fault tolerance, partitioning, automation, and other high availability solutions Leveraging availability features built into your existing hardware and operating systems Discover how to create systems that will be easier to maintain, anticipate and prevent problems, and define ongoing availability strategies that account for business change. Whatever your IT role, whatever your IT architecture, this book can help you deliver the breakthrough availability levels your organization needs right now.
    Note: Includes indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 459 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Over the last few years, Java 2 Platform, Enterprise Edition (J2EE) technology has emerged and matured as a standard platform for building enterprise applications. While the platform has matured into a solid offering for developing and deploying enterprise applications, it does offer its challenges. As developers, often we confuse learning the technology with learning to design with the technology. In this book, senior architects from the Sun Java Center, Sun's Java consulting organization share with the reader their cumulative design experience with and expertise on J2EE technology. The primary focus of the book is on patterns, best practices, design strategies, and proven solutions using the key J2EE technologies including JavaServer Pages (JSP), Servlets, Enterprise Java Beans (EJB), and Java Message Service (J.M.S) API. Other ancillary technologies like JDBC and JNDI are also discussed as relevant to their usage in these patterns. The J2EE Patterns catalog with 16 patterns and numerous strategies is presented to document and promote best practices for these technologies. In addition to the patterns and strategies, the book offers the following: Presents various design strategies for the presentation tier and business tier design. Identifies bad practices in presentation, business, and integration tiers, and offers directions to remedy them by using certain patterns, strategies, and refactorings. Refactorings for various tiers and mechanics to move away from a bad implementation to a better solution. Sample code and examples for patterns, strategies, and refactorings. Core J2EE Patterns delivers: Proven solutions for enterprise applications J2EE Patterns Catalog with patterns for JSP technology, EJB technology, and J.M.S. Identifies bad practices and recommends solutions Refactorings to improve existing designs using patterns, strategies, and best practices UML Diagrams illustrate structure and behavior of each pattern
    Note: Includes bibliographical references (p. 439-442) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xliii, 1056 p. ; , 24 cm. +
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Handbooks, manuals, etc ; Computer programming ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Start here if you want to master C++. No experience necessary. Honestly. Learn C++ from a master: how to think like a programmer! A remarkable personal dialogue between a C++ expert and a novice From the absolute basics to advanced topics: inheritance, polymorphism, pointers, and more. Even if you have absolutely no programming experience, this book will help you truly master C++. You won't merely learn the basics. You'll master sophisticated, professional techniques-up to and including the effective use of encapsulation, inheritance, polymorphism, and pointers. You'll never find yourself copying syntax without understanding it. You'll learn to think like a programmer, engineer code that delivers great reliability and performance, and avoid the pitfalls that await every new C++ developer. These are powerful promises. But Learning to Program in C++ is a remarkable book. It's a book-length dialogue between renowned C++ developer Steve Heller and a real-life programming novice-a novice with an uncanny ability to ask the questions you'd ask-and get crystal-clear, on-target answers. It starts from absolute scratch, making only one assumption: you're ready to learn. And it's more like reading a novel-or participating in an intelligent discussion-than any computer book you've ever seen. Steve Heller's Learning to Program in C++ . It's a pleasure to read. And if you pay attention, you'll walk away with a superb understanding of C++: what to do, how to do it, and above all, why. Previously published as Who's Afraid of C++? and Who's Afraid of More C++? : Both classic books, integrated and updated, together for the first time, at a great price!
    Note: Includes index. - Previously published as: Who's afraid of C++? / Steve Heller and Who's afraid of more C++? / Steve Heller. Both books integrated and updated as: Learning to Program in C++
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 508 p. , ill. ; , 23 cm. +
    Series Statement: Prentice Hall PTR Microsoft technologies series
    DDC: 005.4/469
    Keywords: Microsoft Windows (Computer file) ; Application software ; Development ; Electronic books ; local
    Abstract: Windows CE 3.0 programming for Pocket PC, handheld PC, and embedded devices Enterprise computing including COM, DCOM, database access using ADOCE, and Microsoft Message Queue Communications, including Internet Web access with HTTP, TCP/IP, sockets, serial communications, and desktop synchronization with ActiveSync 3.0 Build and run applications in Visual C++ using Microsoft Foundation Classes CD-ROM with eMbedded Visual C++ 3.0 and Pocket PC SDK Beyond the user interface to hard-core programming Full-scale networking and enterprise computing Global communications from Pocket PCs All the new features of Windows CE 3.0 Advanced techniques for serious Windows CE programmers. Get beyond user interface programming and discover the behind-the-scenes operating system facilities that will let you make the most of the new features in Windows CE 3.0. This hot technology lets you control Pocket PCs, handheld PCs, and the embedded devices in hundreds of commercial products. Learn the lean and mean techniques that keep your programs humming on portable devices with limited memory, and the key data storage methods that make them possible. Master the communications protocols that keep Windows CE devices in contact with desktop computers and the Internet. In addition: Build and run applications in Visual C++ 6.0 and eMbedded Visual C++ 3.0 Use the Windows CE API and Microsoft Foundation Classes Communicate via HTTP, TCP/IP, sockets, remote access, and telephony Access standard Windows CE databases and Microsoft SQL Server for Windows CE Interface between desktop systems and Windows CE devices This book is for serious developers with real programming experience. Besides familiarity with Windows CE devices and general Windows API programming, a basic knowledge of C and C++ is needed to understand the code samples. About the Software The accompanying CD-ROM contains all the code examples from the book, as well as a fully searchable index of all the book's examples, programs, and tutorials. The CD-ROM also contains a complete working copy of eMbedded Visual C++ 3.0 and Pocket PC SDK.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 446 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.4/4769
    Keywords: Microsoft Windows device drivers (Computer programs) ; Electronic books ; local
    Abstract: The #1 Windows device driver book-fully updated for Windows 2000! Step-by-step planning, implementation, testing, debugging, installation, and distribution Complete coverage of the new Windows Driver Model (WDM) Practical debugging and interactive troubleshooting CD-ROM: Exclusive tools for streamlining driver development, plus extensive C/C++ sample driver library! Windows Driver Model (WDM) for Windows 2000 and 98-in depth! Building drivers that support Plug-and-Play and Power Management Windows Management Instrumentation: logging device errors and events-and interpreting them Constructing safe reentrant driver code Handling time-out conditions safely and effectively Advanced techniques: kernel-mode threads, layered drivers, and more Start-to-finish debugging and troubleshooting techniques Foreword by Andrew Scoppa, UCI Corporation The #1 book on Windows driver development-totally updated for Windows 2000! With The Windows 2000 Device Driver Book , any experienced Windows programmer can master driver development start to finish: planning, implementation, testing, debugging, installation, and distribution. Totally updated to reflect Microsoft's Windows Driver Model (WDM) for Windows 2000 and 98, this programming bestseller covers everything from architecture to tools, and includes a powerhouse library of exclusive tools and code for streamlining any driver development project. You'll start with a high-level overview of WDM components and then move quickly into the details of the development environment and driver installation. Next, master the Windows 2000 I/O Manager, its data structures, and its interaction with drivers. Using extensive practical examples, you'll implement Plug-and-Play and Power Management; construct safe reentrant driver code; use Windows Management Instrumentation to log errors and events, and more. The book covers today's most advanced Windows driver development techniques and provides extensive debugging guidance, including crash dump analysis using WinDbg; lists of common bugcheck codes, meanings, and probable causes; and much more. About the CD-ROM Bonus CD-ROM contains powerful resources for streamlining device driver development! An exclusive Device Driver AppWizard that works with Visual Studio to instantly create your driver's framework A library of complete sample drivers C++ classes to jumpstart any project-including a Unicode string handling class that eliminates tedious, repetitive code An exclusive Driver In...
    Note: Includes bibliographical references (p. 439) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: ix, 166 p. , ill. ; , 24 cm
    Series Statement: Management skills, Neteffect series
    DDC: 658.4/56
    Keywords: Business communication ; Meetings ; Electronic books ; local
    Abstract: This book provides practical information on a major business concern-how to manage meetings. It demonstrates how to lead them effectively, in the shortest time frame possible. Three types of meetings are outlined: information-giving, interactive, and problem solving, with details on how to prepare for and preside over each. KEY TOPICS: Chapter topics include an overview of the meeting process; structuring a topic and organizing the message; audience; platform conduct; visuals; agendas; disruptions; and asking and answering questions. MARKET: For training programs in business and industry. y.
    Note: Includes bibliographical references (p. 107) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Language: English
    Pages: ix, 262 p. , ill. ; , 26 cm
    DDC: 346.7304/8
    Keywords: Intellectual property ; United States ; Popular works ; Electronic books ; local
    Abstract: You can't touch it or feel it. Sometimes you can't even see it. Yet, intellectual property continues to soar in value, comprising an increasingly greater portion of a typical company's assets. In the age of instant global communication, understanding what intellectual property is, how to protect it, and how to enhance its value are prerequisites for corporate survival. Enter attorney Deborah E. Bouchoux and her informative book, Protecting Your Company's Intellectual Property . Packed with fascinating and illuminating examples, this book is a succinct, yet comprehensive discussion of the four key areas of intellectual property: trademarks * copyrights * patents * trade secrets. In addition to defining these areas (for instance, did you know that customer lists and marketing plans are protectable trade secrets?), the book offers practical tools for protecting intellectual property, including: How to identify and establish the sales roles an organization needs to turn in double-digit growth on a continuous basis Trademark and copyright application forms Sample employment agreements An Internet usage policy Tips on preventing unauthorized dissemination of information via the Web A guide for conducting an IP audit, and much more.
    Note: Includes bibliographical references (p. 245-249) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xix, 632 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: SQL (Computer program language) ; Electronic books ; local
    Abstract: MySQL: Designing User Interfaces starts by introducing the functionality of GTK+ and how to migrate from Microsoft's Visual Basic. It then introduces MySQL as a simple, fast, reliable database for corporate applications. The book then flows into the how-to of combining GTK+ and MySQL through the coverage of the C API for MySQL because it is the "backend" to a GTK+ application. It then expands its coverage and teaches about heterogeneous network and deployment issues, as well as migration from existing systems to MySQL.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders Pub. | Boston, MA :Safari,
    Language: English
    Pages: xvi, 797 p. , ill. ; , 24 cm
    DDC: 005.4/469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: With in-depth complete coverage on the installation process, editing and typesetting, graphical user interfaces, programming system administration, and managing Internet sites, Inside Linux is the only book "smart users" new to Linux will need. Many of the users new to Linux have an understanding of computer technology and will be looking for just the right reference to fit their sophisticated needs. This book guides users to a high level of proficiency with all the flavors of Linux, and help them with crucial system administration chores. Inside Linux is different than other books available because it's a unique blend of a how-to and a reference guide.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Indianapolis, IN : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 1112 p. , ill. ; , 23 cm. +
    DDC: 005.4/469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Red Hat Linux 7 Unleashed shows you how to install, configure, and manage version 7, the latest version of Red Hat operating system. Version 7 boasts the latest stable Linux kernel, a new and improved installation program, updated libraries and a host of other improvements, including the new Xfree86 4.x. Learn how the operating system works from the inside out.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 372 p. , ill. ; , 24 cm
    Keywords: BGP (Computer network protocol) ; Routers (Computer networks) ; Software configuration management ; Electronic books ; local
    Abstract: The comprehensive, hands-on guide to all Cisco IOS(r) Software BGP-4 commands The complete BGP-4 command reference invaluable for network designers, engineers, and architects Provides configuration, troubleshooting, and verification scenarios for every possible BGP-4 command supported by Cisco IOS Software that can be implemented on a minimum number of routers Groups BGP-4 commands by area of implementation route aggregation, auto-summary, route filtering, and route advertisement, just to name a few Provides clear and concise commentary on the initial release, purpose, syntax, and usage of each BGP-4 command Offers excellent CCIE certification preparation from one of the CCIE Program Managers Includes supplementary information on regular expressions, route map logic, and RFC 1771, A Border Gateway Protocol 4 (BGP-4) Cisco BGP-4 Command and Configuration Handbook is an exhaustive practical reference to the commands contained within BGP-4. For each command/subcommand, author Bill Parkhurst explains the intended use or function and how to properly configure it. Then he presents scenarios to demonstrate every facet of the command and its use, along with appropriate show and debug commands. Through the discussion of functionality and the scenario-based configuration examples, Cisco BGP-4 Command and Configuration Handbook will help you gain a thorough understanding of the practical side of BGP-4.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Language: English
    Pages: xxiv, 417 p. , ill. ; , 26 cm
    Edition: 2nd ed.
    DDC: 658.3/22
    Keywords: Compensation management ; Incentives in industry ; Sales personnel ; Salaries, etc ; Electronic books ; local
    Abstract: With the explosion in Internet sales, organizations are frantically transforming their sales departments, adding new roles and redefining existing positions, to capture a share of this lucrative new market. This second edition of the landmark Compensating New Sales Roles explains: How to identify and establish the sales roles an organization needs to turn in double-digit growth on a continuous basis How to design and implement a compensation plan that directs, motivates, and rewards employees who perform effectively--regardless of sales channels How to compensate sales staffs in telesales and teleweb operations--the fastest growing fields of selling Packed with updated tips, tools, and examples, along with a new focus on online selling opportunities, this is an essential guide for human resources/compensation professionals, business owners, and sales executives.
    Note: Includes bibliographical references (p. 397-399) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Indianapolis, IN : Que | Boston, MA :Safari,
    Language: English
    Pages: xxi, 1158 p. , ill. ; , 24 cm
    Edition: Special ed.
    DDC: 005.369
    Keywords: Microsoft Office ; Business ; Computer programs ; Electronic books ; local
    Abstract: With this edition of Special Edition Using Office XP there is a continual emphasis on realistic applications and uses of the program features. While there are many other big books in the Office market today, there are few that tailor coverage uniquely for the intermediate to advanced Office user as Special Edition Using does, delivering more focused value for the customer. It has been updated to reflect Office XP's Smart tags, collaboration features, speech and dictation tools, built-in recovery features, "add network place" wizard and much more
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Indianapolis, IN : Que | Boston, MA :Safari,
    Language: English
    Pages: xv, 1062 p. , ill. ; , 24 cm. +
    Edition: Enterprise ed.
    DDC: 005.13/3
    Keywords: Business ; Data processing ; Java (Computer program language) ; Electronic books ; local
    Abstract: Java 2 Enterprise Edition is a combination of Java-related technologies including Java Server Pages, Servlets, and Enterprise Java Beans. Working together these "pieces" make Java a viable solution for enterprise-scale applications. "SE Using J2EE" starts with a section covering the core J2EE components and how they fit into the overall application architecture. The book then builds off this foundation to explore the practical applications of J2EE including incorporating XML into J2EE, creating wireless Web applications, network programming with J2EE, managing security and encryption, object programming with Serialization and Reflection, and programming Java applets in the enterprise. Later chapters discuss alternative approaches to solving problems in J2EE applications including debugging, decompiling and disassembly. The book finishes with a useful reference section discussing each of the core J2EE APIs.
    Note: "JSP, servlets, EJB 2.0, JNDI, JMS, JDBC, CORBA, XML, RMI"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xviii, 237 p. , ill. ; , 24 cm. +
    DDC: 004.6
    Keywords: Computer networks ; Internetworking (Telecommunication) ; Electronic books ; local
    Abstract: A practical guide to modeling and designing reliable networks Provides a detailed introduction to modeling availability necessary for network design Helps network designers understand the theoretical availability of their topologies Explains the factors that limit availability to minimize the number of network failures Provides all the information necessary to do basic availability modeling/budgeting High Availability Network Fundamentals discusses the need for and the mathematics of availability, then moves on to cover the issues affecting availability, including hardware, software, design strategies, human error, and environmental considerations. After setting up the range of common problems, it then delves into the details of how to design networks for fault tolerance and provides sample calculations for specific systems. Also included is a complete, end-to-end example showing availability calculations for a sample network.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xviii, 398 p. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Electronic books ; local
    Abstract: Python Essential Reference, Second Edition, is the definitive guide to the Python programming language. Designed for programmers, it covers the core language, more than 100 modules in the standard library, and the techniques used to extend Python with compiled procedures in C or C++. Coverage expands upon and clarifies existing Python documentation - especially for advanced topics, including operating system interfaces, threads, network programming, and Unicode. Concise, to the point, and extensively indexed, readers will find this volume packed with information not previously available in any other single reference source. Updated for Python 2.1, it is a must-have for any serious programmer wanting to develop advanced Python applications. As a comprehensive reference to the Python programming language, this book will help you: Learn about the features in Python 2.0 and 2.1 Master the details of Python types, operators, and the execution model Discover the details of Unicode and internationalization support Learn the details of operating system interfaces, threads, and network-programming modules Build C/C++ extensions to Python Make effective use of the Python library Find the information you need to start developing advanced Python applications
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Indianapolis, IN : Sams | Boston, MA :Safari,
    Language: English
    Pages: xix, 593 p. , ill. ; , 24 cm
    DDC: 005.7/1369
    Keywords: Postfix (Computer file) ; Electronic mail systems ; Computer programs ; Internet ; Electronic books ; local
    Abstract: This book will offer broad coverage to instruct both the large ISP and the small business network administrator on how to install and configure a full featured Internet email system with a minimum amount of expense. This is possible using the Linux Operating System which supplies all of the necessary server software, the Postfix email software package, and Public Domain client email software on the client PC's. This book also includes educational information that can be used by network administrators in using Postfix to connect an office email server to an ISP. The Postfix email software package is in widely used on the Internet without any books documenting how to install, configure, and operate the email server. This book will provide all the information needed to run Postfix effectively and efficiently.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 861 p. ; , 23 cm. +
    Edition: 3rd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Maximum Security, Third Edition provides comprehensive, platform-by-platform coverage of security issues and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. In one book, security managers and others interested in computer and network security can learn everything the hackers already know, and then take steps to protect their systems.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 346 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.6
    Keywords: Computer networks ; Maintenance and repair ; Computer networks ; Management ; Electronic books ; local
    Abstract: Over the years, thousands of tools have been developed for debugging TCP/IP networks. They range from very specialized tools that do one particular task, to generalized suites that do just about everything except replace bad Ethernet cables. Even better, many of them are absolutely free. There's only one problem: who has time to track them all down, sort through them for the best ones for a particular purpose, or figure out how to use them? Network Troubleshooting Tools does the work for you--by describing the best of the freely available tools for debugging and troubleshooting. You can start with a lesser-known version of ping that diagnoses connectivity problems, or take on a much more comprehensive program like MRTG for graphing traffic through network interfaces. There's tkined for mapping and automatically monitoring networks, and Ethereal for capturing packets and debugging low-level problems.This book isn't just about the tools available for troubleshooting common network problems. It also outlines a systematic approach to network troubleshooting: how to document your network so you know how it behaves under normal conditions, and how to think about problems when they arise, so you can solve them more effectively.The topics covered in this book include: Understanding your network Connectivity testing Evaluating the path between two network nodes Tools for capturing packets Tools for network discovery and mapping Tools for working with SNMP Performance monitoring Testing application layer protocols Software sources If you're involved with network operations, this book will save you time, money, and needless experimentation.
    Note: Includes bibliographical references (p. 312-315) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 618 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.7/2
    Keywords: Web sites ; Design ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Web Design in a Nutshell, 2nd Edition contains the nitty-gritty on everything you need to know to design web pages. It's the good stuff, without the fluff, written and organized so that answers can be found quickly. This completely revised and expanded 2nd edition is chock-full of information about the wide range of front-end technologies and techniques from which web designers and authors must draw. Web Design in a Nutshell, 2nd Edition is an excellent reference for HTML 4.01 tags (including tables, frames, forms, color, and cascading style sheets) with special attention given to browser support, platform idiosyncrasies, and standards. You'll also find lots of updated information on using graphics, multimedia, audio and video, and advanced technologies such Dynamic HTML, Javascript, and XML, as well as new chapters on XHTML, WML, and SMIL. This book is an indispensable tool for web designers and authors of all levels. Web Design in a Nutshell, 2nd Edition includes: Discussions of the web environment including monitors and browsers, printing from the Web, accessibility, and internationalization A complete reference to HTML and Server Side Includes, including up-to-date browser support (Netscape 6, IE 6.0, and Opera 5) for every tag and attribute Updated chapters on creating GIF, animated GIF, JPEG, and PNG graphics, including designing with the Web Palette Information on multimedia and interactivity, including audio, video, Flash 5 and Shockwave, and a new chapter on SMIL A revised tutorial and reference on Cascading Style Sheets Appendixes detailing HTML tags, attributes, deprecated tags, proprietary tags, CSS compatibility and support, and character entities
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxix, 850 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: The Java Cookbook is a comprehensive collection of problems, solutions, and practical examples for anyone programming in Java. Developers will find hundreds of tried-and-true Java "recipes" covering all of the major APIs as well as some APIs that aren't as well documented in other Java books. The Java Cookbook, like the bestselling Perl Cookbook, covers a lot of ground, and offers Java developers short, focused pieces of code that can be easily incorporated into other programs. The idea is to focus on things that are useful, tricky, or both. The book includes code segments covering many specialized APIs--like media and servlets--and should serve as a great "jumping-off place" for Java developers who want to get started in areas outside of their specialization. The book provides quick solutions to particular problems that can be incorporated into other programs, but that aren't usually programs in and of themselves.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 510 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.7/2
    Keywords: Java (Computer program language) ; XML (Document markup language) ; XSLT (Computer program language) ; Electronic books ; local
    Abstract: The power of XSLT is its ability to change the structure or format of any content that can be converted to XML. Java and XSLT shows you how to use XSL transformations in Java programs ranging from stand-alone applications to servlets. After an introduction to XSLT, the book focuses on applying transformations in some real-world scenarios, such as developing a discussion forum, transforming documents from one form to another, and generating content for wireless devices. Java and XSLT discusses several common XSLT processors and the TRAX API, paying special attention to performance issues. Although there's a brief tutorial introduction to the XSLT language, the primary focus of the book isn't on learning XSLT or developing stylesheets; it's on making practical use of transformations in Java code. The book covers: Introduction and Technology Review XSLT--The Basics XSLT--Beyond The Basics Java Web Architecture Programmatic Interfaces to XSLT Processors Using XSLT with Servlets Discussion Forum Implementation Advanced XSLT Web Techniques Testing, Tuning and Development Environments WAP and WML XSLT and Wireless Examples
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: vi, 110 p. ; , 18 cm
    Edition: 1st ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Windows administrators can accomplish many of their routine tasks much more quickly by using the command line (similar to the command line of DOS or Unix-based systems) than by going through the graphical user interface that most users associate with Windows. Windows 20000 Commands Pocket Reference documents the Windows command mode. It's designed for system administrators, but will also be valuable to many users. It includes most available Windows 2000 commands, as well as the most useful system administration command-line utilities from the Resource Kit. Weeded out of this book are Windows commands and command options that are obscure, obsolete, broken, unacceptably insecure, or frankly inadvisable, as well a few special-purpose classes of commands. Whenever several utilities perform essentially identical tasks, we include only the best of them.Commands are grouped according to their purpose and function; within a group, commands are arranged alphabetically. Options for each command are grouped by function and ordered by importance.The Windows 2000 Commands Pocket Reference complements Windows 2000 Administration in a Nutshell by conveying the kind of no-nonsense, boiled-down information typical of O'Reilly's highly successful companion Pocket Reference series. It's a valuable, concise reference to Windows 2000 commands and command-line utilities.
    Note: "Includes Resource Kit commands"--Cover. - Includes bibliographical references (p. 105-106) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    [Sebastopol, CA] : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 182 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Database management ; Computer programs ; PL/SQL (Computer program language) ; Relational databases ; Electronic books ; local
    Abstract: In this book, Steven Feuerstein, widely recognized as one of the world's experts on the Oracle PL/SQL language, distills his many years of programming, writing, and teaching about PL/SQL into a set of PL/SQL language "best practices"--rules for writing code that is readable, maintainable, and efficient. Too often, developers focus on simply writing programs that run without errors--and ignore the impact of poorly written code upon both system performance and their ability (and their colleagues' ability) to maintain that code over time. Oracle PL/SQL Best Practices is a concise, easy-to-use reference to Feuerstein's recommendations for excellent PL/SQL coding. It answers the kinds of questions PL/SQL developers most frequently ask about their code: How should I format my code? What naming conventions, if any, should I use? How can I write my packages so they can be more easily maintained? What is the most efficient way to query information from the database? How can I get all the developers on my team to handle errors the same way? The book contains 120 best practices, divided by topic area. It's full of advice on the program development process, coding style, writing SQL in PL/SQL, data structures, control structures, exception handling, program and package construction, and built-in packages. It also contains a handy, pull-out quick reference card. As a helpful supplement to the text, code examples demonstrating each of the best practices are available on the O'Reilly web site. Oracle PL/SQL Best Practices is intended as a companion to O'Reilly's larger Oracle PL/SQL books. It's a compact, readable reference that you'll turn to again and again--a book that no serious developer can afford to be without.
    Note: "Optimizing Oracle code"--Cover. - Cover title. - Includes bibliographical references (p. xvi-xvii)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Beijing : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 1255 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.13/3
    Keywords: Python (Computer program language) ; Electronic books ; local
    Abstract: Programming Python focuses on advanced uses of the Python programming/scripting language, which has evolved from an emerging language of interest primarily to pioneers, to a widely accepted tool that traditional programmers use for real day-to-day development tasks. With Python, you can do almost anything you can do with C++; but Python is an interpreted language designed for rapid application development and deployment. Among other things, Python supports object-oriented programming; a remarkably simple, readable, and maintainable syntax; integration with C components; and a vast collection of pre-coded interfaces and utilities. As Python has grown to embrace developers on a number of different platforms (Unix, Linux, Windows, Mac), companies have taken notice and are adopting Python for their products. It has shown up animating the latest Star Wars movie, serving up maps and directories on the Internet, guiding users through Linux installations, testing chips and boards, managing Internet discussion forums, scripting online games, and even scripting wireless products. Programming Python is the most comprehensive resource for advanced Python programmers available today. Reviewed and endorsed by Python creator Guido van Rossum, who also provides the foreword, this book zeroes in on real-world Python applications. It's been updated for Python 2.0 and covers Internet scripting, systems programming, Tkinter GUIs, C integration domains, and new Python tools and applications. Among them: IDLE, JYthon, Active Scripting and COM extensions, Zope, PSP server pages, restricted execution mode, the HTMLgen and SWIG code generators, thread support, CGI and Internet protocol modules. Such applications are the heart and soul of this second edition. Veteran O'Reilly author Mark Lutz has included a platform-neutral CD-ROM with book examples and various Python-related packages, including the full Python 2.0 source code distribution.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 451 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/469
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: In an ideal world, an operating system is a collection of software that handles a computer's "dirty work" invisibly, quickly, and most of all, painlessly. For many of us, however, Microsoft Windows exists outside this ideal world. We are annoyed by "personalized Menus" that keep changing, icons we don't use cluttering up our workspace, periodic crashes, unintelligible error messages, and inadequate documentation to help us figure it all out. Windows Me Annoyances has the insider information you need for overcoming Windows' many annoyances and limitations. Whether you're looking to finally solve a nagging problem, dramatically improve system performance, or customize the interface to better suit your work habits, the Windows Me Annoyances solution-oriented format makes finding information and implementing solutions easy and pain free. Thanks to the thorough and relevant documentation on the registry, Windows Scripting Host, and Windows' built-in networking capabilities, customizing and improving Windows Me is easier than ever. Based on the author's extremely popular Annoyances.org web sites, Windows Me Annoyances delivers an authoritative collection of techniques and tools for customizing Windows Me, including: Several approaches and hidden tools for working with the Windows registry, the database of system- and application-specific configuration information How to bypass Windows roadblocks such as the Home Networking and System Restore wizards, allowing you to take control of the processes quickly and painlessly A tutorial and reference on automation with the Windows Scripting Host as a means of eliminating many Windows Me annoyances Using third-party software and utilities to handle some of the more complex workarounds and customizations Dealing with software that overwrites your file associations and other settings without warning Windows Me Annoyances is the intermediate and advanced Windows user's best resource for turning Windows into the user-friendly, customizable interface it was meant to be, but doesn't always manage to be on its own.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: v, 104 p. ; , 18 cm
    Edition: 1st ed.
    Keywords: Oracle (Computer file) ; UNIX (Computer file) ; Relational databases ; Electronic books ; local
    Abstract: The Unix for Oracle DBAs Pocket Reference puts within easyreach the commands that Oracle database administrators need mostwhen operating in a Unix environment. If you are an Oracle DBAmoving to Unix from another environment such as Windows NT or IBMMainframe, you know that these commands are far different fromthose covered in most beginning Unix books. To jump start yourlearning process, Don Burleson has gathered together in thissuccinct book the Unix commands he most often uses when managingOracle databases. You'll be able to reach into your pocket for theanswer when you need to know how to: Display all Unix components related to Oracle,identify the top CPU consumers on your server, and even killprocesses when necessary Stack Unix commands into powerful scripts that canperform vital DBA functions Monitor Unix filesystems, and automatically manageyour trace files, dump files, and archived redo log files Use essential server monitoring commands such astop, sar, and vmstat And there's much more between these covers. If you need to get upto speed with Oracle on Unix, and quickly, this book is for you.
    Note: "Command syntax and scripts"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 139 p. , ill. ; , 24 cm
    DDC: 005.3
    Keywords: Computer software ; Development ; eXtreme programming ; Electronic books ; local
    Abstract: "XP is the most important movement in our field today. I predict that it will be as essential to the present generation as the S.E.I. and its Capability Maturity Model were to the last." --From the foreword by Tom DeMarco The hallmarks of Extreme Programming--constant integration and automated testing, frequent small releases that incorporate continual customer feedback, and a teamwork approach--make it an exceptionally flexible and effective approach to software development. Once considered radical, Extreme Programming (XP) is rapidly becoming recognized as an approach particularly well-suited to small teams facing vague or rapidly changing requirements--that is, the majority of projects in today's fast-paced software development world. Within this context of flexibility and rapid-fire changes, planning is critical; without it, software projects can quickly fall apart. Written by acknowledged XP authorities Kent Beck and Martin Fowler, Planning Extreme Programming presents the approaches, methods, and advice you need to plan and track a successful Extreme Programming project. The key XP philosophy: Planning is not a one-time event, but a constant process of reevaluation and course-correction throughout the lifecycle of the project. You will learn how planning is essential to controlling workload, reducing programmer stress, increasing productivity, and keeping projects on track. Planning Extreme Programming also focuses on the importance of estimating the cost and time for each user story (requirement), determining its priority, and planning software releases accordingly. Specific topics include: Planning and the four key variables: cost, quality, time, and scope Deciding how many features to incorporate into a release Estimating scope, time, and effort for user stories Prioritizing user stories Balancing the business value and technical risk of user stories Rebuilding the release plan based on customer and programmer input Choosing the iteration length Tracking an iteration What to do when you're not going to make the date Dealing with bugs Making changes to the team Outsourcing Working with business contracts In addition, this book alerts you to the red flags that signal serious problems: customers who won't make decisions, growing defect reports, failing daily builds, and more. An entire chapter is devoted to war stories from the trenches that illustrate the real-world problems many programmers encounter and the solutions they've devised. ...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 262 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Debugging in computer science ; Perl (Computer program language) ; Electronic books ; local
    Abstract: "This book was a joy to read. It covered all sorts of techniques for debugging, including 'defensive' paradigms that will eliminate bugs in the first place. As coach of the USA Programming Team, I find the most difficult thing to teach is debugging. This is the first text I've even heard of that attacks the problem. It does a fine job. Please encourage these guys to write more ."-Rob Kolstad Perl Debugged provides the expertise and solutions developers require for coding better, faster, and more reliably in Perl. Focusing on debugging, the most vexing aspect of programming in Perl, this example-rich reference and how-to guide minimizes development, troubleshooting, and maintenance time resulting in the creation of elegant and error-free Perl code. Designed for the novice to intermediate software developer, Perl Debugged will save the programmer time and frustration in debugging Perl programs . Based on the authors' extensive experience with the language, this book guides developers through the entire programming process, tackling the benefits, plights, and pitfalls of Perl programming . Beginning with a guided tour of the Perl documentation, the book progresses to debugging, testing, and performance issues, and also devotes a chapter to CGI programming in Perl. Throughout the book, the authors espouse defensible paradigms for improving the accuracy and performance of Perl code . In addition, Perl Debugged includes Scott and Wright's "Perls of Wisdom" which summarize key ideas from each of the chapters, and an appendix containing a comprehensive listing of Perl debugger commands. In this exceptional reference and debugging guide, the authors cover every aspect of efficient Perl programming, including: CGI programming-special tips for debugging this type of Perl program How to develop the proper mindset for developing and programming effectively in Perl Perl "gotchas"-how to understand them, work around them, and avoid them "Antibugging"-the authors' rules of thumb on how to code defensively The Perl debugger -the authors' guide to using this Perl built-in Common syntax errors and how to track down their causes Semantical errors-why code may appear correct but the programs do not work How to improve the performance of resource-hungry programs Tips and advice for programmers moving to Perl from other language environments Focusing on the process of Perl programming and guidelines for identifying and correcting mistakes, Perl Debugged helps the de...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xiv, 210 p. , ill. ; , 24 cm
    Series Statement: Job skills neteffect series
    DDC: 155.9/042
    Keywords: Stress management ; Electronic books ; local
    Abstract: The creators of a state- of-the-art stress management center combine their decades' of clinical psychology experience to present a complete and concise volume on stress management in the workplace. Their approach incorporates a reader-friendly style with proven exercises and techniques designed to teach readers how to maximize effectiveness and deal with workplace stress. KEY TOPICS: The text includes an introduction to stress, the three phases of the authors' master strategy, as well as a focus on workplace stress mastery and psychotechnologies. MARKET: For students, workers and the general public interested in stress management techniques.
    Note: Includes bibliographical references (p. 203-206) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxi, 356 p. , ill. ; , 24 cm
    Series Statement: Essential guide series
    DDC: 004.5
    Keywords: Computer storage devices ; Electronic books ; local
    Abstract: The complete decision-maker's guide to choosing-and using-the right data storage technologies Personal and small business storage: hard drives, DVD, CD, Zip, Jaz, and more Enterprise storage: SAN, NAS, Fibre Channel, RAID, and beyond New Web-based storage alternatives Start-to-finish backup and disaster recovery tips Choosing reliable, cost-effective data storage solutions-and making the most of them! Whether you're an IT professional, enterprise manager, small business owner, or home PC user, you've got more data than ever-and choosing reliable, cost-effective storage has never been more important. Now, a leading data storage expert explains all your options, and shows you exactly how to make the most of them. Dr. Andrei Khurshudov reviews the capabilities, advantages, and underlying technologies associated with every current storage alternative, offering expert tips for buying, interfacing, scalability, recovery, and much more. Data storage interfaces: UDMA, USB, IEEE 1394 "FireWire," SCSI, FC-AL, and Serial Storage Architecture In-depth coverage of magnetic media: hard disks, tapes, and removables Up-to-date comparisons of removable storage: Superdisk, HiFD, Zip, Jaz, Orb, external hard disk drives, and more Tape alternatives: DAT, Travan, Mammoth, AIT, DLT, LTO, and beyond Optical storage: CD-RW, CD-R, and today's competing DVD formats Other storage solutions: Magneto-optical, Flash memory, and solid-state disk drives Enterprise storage strategies: storage area networks (SAN), network attached storage (NAS), RAID, and more Storage for digital cameras, PDAs, MP3 players, Personal Video Recorders, and other next-generation devices Storage on the Web: alternatives, limitations, and case studies Preventing data loss-and what to do if the disaster has already happened If you're planning for business growth and disaster recovery, or simply want the best storage "bang for the buck," The Essential Guide to Computer Data Storage delivers objective guidance-and realistic solutions.
    Note: Includes bibliographical references (p. 349) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Financial Times/Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xiii, 202 p. , ill. ; , 24 cm
    DDC: 658.7/2/02854678
    Keywords: Business logistics ; Electronic information resources ; Electronic commerce ; Industrial procurement ; Electronic information resources ; Electronic books ; local
    Abstract: The comprehensive guide to Web-enabled procurement. Achieving rapid ROI with e-procurement Discover start-to-finish planning and implementation strategies that work in real enterprise environments. Flexible, a gile e-procurement architectures Define technical architectures and business processes that can take advantage of rapid change and new opportunities. Electronic trading communities e-markets, auctions, reverse auctions, ex changes: who'll dominate and how will it affect you? Security and trust Overcome the security and trust obstacles that prevent many companies from fully leveraging e-procurement. Structuring the project Master e-procurement strategy, project scoping, prioritization, planning, analysis, and design. Managing change in an e-procurement project Change management lessons learned from ERP: making sure your new processes actually get used. The complete guide to Web-enabled procurement Proven solutions based on real enterprise experience Covers every e-procurement model: sell-side, buyer-managed, vertical and horizontal e-markets, ASPs, auctions, and mor e Explores today's leading e-procurement technologies, including XML Explains how to make e-Procurement work: in-depth, start-to-finish lifecycle coverage e-procurement is hot and important-and no wonder! Leading companies are already saving millions of dollars annually with it. Best of breed CEO's like GE's Jack Welch and Cisco's John Chambers are on record that e-procurement will save their companies millions, perhaps billions, of dollars. Now, there's a start-t o-finish guide to implementing e-procurement in any enterprise. Dale Neef covers it all-from making the business case to designing the solution, managing the risks to reaping the benefits. Neef begins with an up-to-the-minute overview of t he promise of B2B e-procurement in supporting globalized, extended enterprises. He reviews every option for deploying e-procurement, including sell-side one-to-many systems, buyer-managed/hosted markets, independent portals, online trading communities, ve rtical and horizontal e-markets, auctions, reverse auctions, ASPs, and more. Coverage includes: Making the business case for e-procurement: process efficiencies, compliance, leverage, and beyond Designing the optimal e-procureme nt solution Identifying the most appropriate role for integrators and consultants Leading approaches, from ERP-centered solutions to enterprise application integration e-procurement opportunities in the pu...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    London ; : Financial Times Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xiv, 352 p. , ill. ; , 24 cm
    DDC: 658.8/27
    Keywords: Brand choice ; Electronic commerce ; Electronic books ; local
    Abstract: The first complete framework for integrating offline and online marketing! Step-by-step processes for reengineering any brand! Achieving true synergies between online and offline brands Includes interviews with the world's leading Internet branding executives The Internet has changed all the business rules you live by-especially the rules for branding your products, services, and organization. Cyberbranding doesn't merely show you how the rules have changed: it presents a complete framework for branding that works now-and for years to come. Drawing on her extensive experience as a marketing consultant-and on interviews with many of the world's leading Internet branding executives-Deirdre Breakenridge answers these and other crucial questions: How do you move your brand online without compromising the values it already holds in the "real" world? How can you re-engineer an existing brand in the wake of the Internet revolution? How can you create a new brand that leverages the full power of the Web? The Internet. It isn't easy money. It isn't an excuse to forget the fundamentals. But for marketers willing to work hard, and work intelligently, it is the brand-building opportunity of a lifetime. In Cyberbranding , Deirdre Breakenridge shows how to use the Internet to build brands-and customer relationships-of remarkable depth and power. Drawing on the Internet's most impressive success stories-and its cautionary tales of disaster-she shows how to: Develop the vision of your online brand Identify your true online audience Persuade your customers by empowering them Personalize without becoming intrusive Make the most of online and offline research Use the much-maligned banner ad as a key branding tool Integrate Internet-based and off-line branding activities Appeal more effectively to today's multi-tasking consumer Draw the repeat traffic you're looking for Create affiliate marketing programs that work With Cyberbranding you can master lessons others spent billions to learn-and build 21st century brands worth billions to own. Whether you're a business leader, strategist, marketing professional, or public relations specialist, Cyberbranding gives you an action plan for strengthening your brand online and off-and leveraging it for maximum competitive advantage. "Finally, a book that covers all the important aspects of Internet marketing!" -Chuck Riegel, EVP Worldwide Marketing, Cybercash From the Foreword: "...Smart CyberBranding is not about building ...
    Note: Includes bibliographical references (p. 330- 341) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xix, 504 p. , ill. ; , 24 cm. +
    DDC: 005.7/2
    Keywords: Application software ; Enterprise application integration (Computer systems) ; Java (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Abstract: High-value solutions for integrating enterprise and legacy systems XML, Enterprise JavaAPIs, and much more Techniques for building flexible, extensible EIA solutions Easy-to-read, fully-documented code throughout CD-ROM includes leading-edge software and code library for XML/Java integration! "XML is the amazing new web standard for universal data interchange. With this book and XML you can integrate your applications without converting the code!" -Charles F. Goldfarb Integrate your enterprise with XML and Java! Enterprise Application Integration (EAI) links diverse applications, platforms, and operating systems so they work as one-and deliver powerful business results seamlessly. Platform-independent Java is one powerful tool for building EAI applications, and XML adds the missing link: robust mechanisms to exchange data with non-Java applications. Now there's a complete, step-by-step guide to using Java and XML together to deliver enterprise integration solutions that work! Enterprise Application Integration With XML and Java covers all this, and more: Demonstrating why XML is such a powerful EAI infrastructure solution Identifying your key requirements for sharing and exchanging data Building robust, high-performance Java applications for parsing and processing XML documents Moving data between Java and non-Java applications Integrating XML with relational databases Serializing Java objects into XML, and asynchronous messaging with XML Providing convenient references to XML 1.0 grammar and the W3C Document Object Model Whether you're a technical manager planning for enterprise application integration, or a Java developer tasked with delivering it, Enterprise Application Integration With XML and Java delivers the in-depth solutions and real-world expertise you need. CD-ROM INCLUDED The CD-ROM contains extensive source code from the book, plus a remarkable library of leading-edge software and trialware, including: Bluestone Visual-XML desktop XML development environment; IBM XML4J Java-based parser; and Push-technologies SpiritWAVE2 implementation of the Java Messaging Service!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xvii, 315 p. , ill. ; , 24 cm
    Series Statement: Essential guide series
    DDC: 621.382
    Keywords: Wireless communication systems ; Electronic books ; local
    Abstract: Your complete guide to today's "killer" wireless apps-and tomorrow's! Covers EVERYTHING you can do with wireless technology! The wireless Web: WAP and beyond Mobile e-commerce: security, payment systems, and more PCS and high-bandwidth 3G cellular Bluetooth: breakthrough short-range wireless applications For consumers, investors, executives, marketing/PR professionals, and developers The next-generation wireless and mobile Internet revolution is under way! Now here's a complete guide to next-generation wireless applications and their business impact, written specifically for nontechnical professionals. The Essential Guide to Wireless Communications Applications covers all the latest developments, from the wireless Web to Bluetooth, WAP to 3G, and beyond. Coverage includes: 3G wireless multimedia and personal services: revolutionary convenience, global compatibility M-commerce: Buy anywhere, anything, right now The wireless Web revolution that's about to explode Bluetooth: wireless computing, networking, conferencing, and beyond Phones or computers: Which platform will drive the wireless Web? Internet in the sky: high-bandwidth Web services via satellite Fixed wireless applications-from SOHO to enterprise Mobile operators vs. content providers: Who "owns" the customer? Mobile OS platforms: Palm, Windows CE, Symbian EPOC A peek into the far future: 4G, holophones, and more Whether you're an investor, decision maker, or consumer, Network magazine editor Andy Dornan delivers all the information you need to identify your best wireless opportunities-and take advantage of them!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 487 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Keywords: JavaServer pages ; Web site development ; Computer programs ; Web sites ; Authoring programs ; Electronic books ; local
    Abstract: Design and implement flexible, extensible, and maintainable applications with servlets and JSP technology Master powerful authentication and internationalization techniques Learn how to integrate industry-standard XML and XSLT with JSP technology Use JSP technology-based templates to develop robust applications from modular components Advanced JavaServer Pages delivers: Web application design techniques based on JSP and servlets technology Proven strategies for achieving enterprise-class robustness and scalability with JSP technology Expert guidance on implementing JSP technology-based applications with reusable components To fully exploit the power of JavaServer Pages technology in Web application development, based on J2EE technology, you need to master the sophisticated server-side techniques that David Geary presents in Advanced JavaServer Pages . Geary tackles JavaServer Pages technology with the same exhaustive, authoritative approach that made his Graphic Java books into worldwide best sellers. He presents in-depth coverage of advanced topics including: Implementing custom JSP technology tags Designing scalable and extensible Web applications Using authentication to build secure JSP technology-based applications Internationalizing JSP technology-based applications for global environments Advanced JavaServer Pages features detailed chapters on internationalization, authentication, JSP technology templates, design, and XML. It concludes with a comprehensive case study that ties together key topics developed in the book and demonstrates how to integrate advanced techniques based on JSP technology. This book is a must-have resource for every developer of Java technology creating server-side applications with JSP technology and servlets.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Palo Alto, Calif. : Sun Microsystems Press | Boston, MA :Safari,
    Language: English
    Pages: l, 789 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    Keywords: Solaris (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The widely used reference for experienced system administrators of the Solaris Operating Environment-now fully updated for the Solaris 8 platform. Focuses on the tasks experienced sysadmins find most challenging Completely updated for the Solaris 8 Operating Environment! Includes extensive new coverage of WebNFS technology Ready to leverage the full power of Solaris 8 software? Now there's a hands-on reference specifically for you. In Solaris 8 Advanced System Administrator's Guide, Third Edition , award-winning author Janice Winsor delivers hundreds of indispensible tips, step-by-step procedures, and quick reference tables, all focused on the features experienced administrators find most challenging. Thoroughly updated, this book's coverage includes: The Solaris platform mail services, including detailed procedures for planning and customizing sendmail Understanding the NIS+ nameservice environment, and configuring both servers and clients All-new coverage of WebNFS technology-concepts, configuration, and day-to-day management Advanced security coverage-authentication, Role-Based Access Control (RBAC), and the Automated Security Enhancement Tool (ASET) New Service Access Facility services for terminals, modems, and printers Software management-installation, removal, patching, and more Automounter services, volume management, shell programming, and much more No matter how well you know Solaris, this book will make you far more effective-just as it has for thousands of Solaris sysadmins worldwide.
    Note: Previous ed.: 1998. - Includes bibliographical references (p. 739-741) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 291 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Computer networks ; Computer storage devices ; Information storage and retrieval systems ; Electronic books ; local
    Abstract: Evaluating, planning, and migrating to SAN storage architectures SAN concepts, components, and applications-in depth Management, backup, disaster recovery, and day-to-day administration Includes an overview of Fibre Channel, the SAN enabler The complete guide to SAN technology for every implementer and manager! Every month, enterprises require more information, delivered faster, with greater reliability-and traditional data storage methods no longer suffice. Enter the Storage Area Network (SAN), which can store enormous amounts of data, serve it at lightning speed, scale to meet accelerating growth, and deliver unprecedented reliability. Now, there's a complete guide to SAN technology for every IT professional and decision-maker. Storage Area Networks covers it all: key concepts, components, applications, implementation examples, management, and much more. Coverage includes: What SANs are, what they can do, and how they overcome the critical limitations of earlier data storage systems Evolving to SANs: best practices for building SANs from your legacy storage topologies An overview of Fibre Channel, the key enabling technology for SANs SAN configuration, device, and connectivity options-in depth Well-managed SANs: day-to-day administration, backup, restore, and disaster recovery A detailed review of Hewlett-Packard's market-leading SAN product line: Fibre Channel chips, host bus adapters, hubs, arrays, tape libraries, bridges, switches, and more Storage Area Networks also previews the future of SAN technology: policy-based SANs, emerging applications, and more. Whether you're considering a SAN for the first time, or you want a comprehensive management reference for the SAN you've already invested in, this book offers the insights, techniques, and guidance you need right now.
    Note: Includes bibliographical references (p. 281-283) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Palo Alto, CA : Sun Microsystems, Inc. | Boston, MA :Safari,
    Language: English
    Pages: xli, 657 p. , ill. ; , 24 cm
    Keywords: Solaris (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The definitive Sun Microsystems guide to the internals of the Solaris kernel. This book focuses on the core kernel functions, major data structures and algorithms. Its practical approach makes it an essential resource for anyone responsible for kernel, driver or application software. Anyone doing development, debugging, maintenance, performance tuning, capacity planning, or application tuning will also benefit from Mauro and McDougall's in-depth coverage of the Solaris kernel. This authoritative and comprehensive guide covers the key components that comprise the Solaris kernel. The modular architecture of the kernel is discussed and each major subsystem is fully explored. Topics covered include: Scheduler implementation and behavior The Solaris multi-threaded architecture Multi-threaded synchronization primitives The Solaris Virtual Memory implementation, including tools for memory measurement and analysis The Virtual File System framework Techniques for analyzing kernel behavior and structures with sar, vmstat, crash, and adb Solaris Internals is an indispensable reference for kernel developers and is full of useful information for monitoring and optimizing Solaris systems. Whether you're a software developer, systems architect, system administrator, or performance analyst, you'll rely on it constantly.
    Note: Includes bibliographical references (p. 635-637) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 247 p. , ill. ; , 25 cm
    DDC: 658.5
    Keywords: Project management ; Electronic books ; local
    Abstract: Master project management, today's most critical business skill! Project management leadership is today's #1 business skill. Talented, knowledgeable project managers command the best assignments and compensation: they are the future leaders of business. But expert project managers aren't born that way: they've learned specific, proven techniques and strategies for achieving outstanding results. In Project Management , Richard Murch shares those techniques and strategies. Whether you're managing your first project, or you're an experienced project manager facing tough, new challenges, Project Management offers expert solutions. You'll find coverage of all this, and more: The fundamentals of project management, planning, reporting, team building, and team leadership The project lifecycle: planning, analysis, design, construction, testing, rollout, and beyond Responding to constant changes in market conditions, resources, requirements, and schedules Mastering today's latest rapid development management techniques Managing risks and problems more effectively Handling the unique challenges of IT and knowledge management Leveraging Internet and intranet-based project management tools and resources At last, there's a single source for all the expertise project managers need to be successful! Next time you're called upon to do the impossible-and do it yesterday-reach for the one book that can help you make it happen: Project Management by Richard Murch.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxv, 499 p. , ill. ; , 24 cm
    DDC: 004
    Keywords: Computer networks ; Computers ; Electronic data processing ; Electronic books ; local
    Abstract: The complete, easy-to-understand guide to IT-now and in the future! Computers, networks, and pervasive computing Hardware, operating systems, and software How networks work: LANs, WANs, and the Internet E-business, the Web, and security The guide for ANYONE who needs to understand the key technologies driving today's economy and high tech industries! You can't afford not to understand the information revolution that's sweeping the world-but who's got time for all the acronyms and hype most technology books give you? The Essential Guide to Computing demystifies the digital society we live in with an intelligent, thorough, and up-to-date explanation of computer, networking, and Internet technologies. It's perfect for smart professionals who want to get up to speed, but don't have computer science or engineering degrees! You'll find up-to-the-minute coverage on all of today's hottest technologies including: The evolution of computing: from the room-sized "monoliths" of the 1950s to today's global Internet Preview of the next revolution: "pervasive computing" Computer hardware: microprocessors, memory, storage, I/O, displays, and architecture Windows, Macintosh, UNIX/Linux, DOS, NetWare, Palm: what operating systems do, and how they compare Programming languages: from machine language to advanced object-oriented technologies Key software applications: databases, spreadsheets, word processing, voice recognition, and beyond Microsoft and the software industry: where they stand, where they're headed How networks work: LANs, WANs, packet switching, hardware, media, and more The Internet, e-commerce, and security Enterprise applications: data warehousing, Web-centered development, and groupware Whether you're a consumer, investor, marketer, or executive, this is your start-to-finish briefing on the information technologies that have changed the world-and the coming technologies that will transform it yet again!
    Note: Includes bibliographical references (p. 481-485) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xv, 579 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/76
    Keywords: WebSphere ; Handbooks, manuals, etc ; Application software ; Development ; Handbooks, manuals, etc ; Web servers ; Computer programs ; Handbooks, manuals, etc ; Web site development ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Complete guide for WebSphere application development How to make the best use of available tools Product experts reveal their secrets Complete guide for WebSphere application development How to make the best use of available tools Product experts reveal their secrets This IBM Redbook provides detailed information on how to develop Web applications for IBM WebSphere Application Server Version 4 using a variety of application development tools. The target audience for this book includes team leaders and developers, who are setting up a new J2EE development project using WebSphere Application Server and related tools. It also includes developers with experience of earlier versions of the WebSphere products, who are looking to migrate to the Version 4 environment. This book is split into four parts, starting with an introduction, which is followed by parts presenting topics relating to the high-level development activities of analysis and design, code, and unit test. A common theme running through all parts of the book is the use of tooling and automation to improve productivity and streamline the development process. In Part 1 we introduce the WebSphere programming model, the application development tools, and the example application we use in our discussions. In Part 2 we cover the analysis and design process, from requirements modeling through object modeling and code generation to the usage of frameworks. In Part 3 we cover coding and building an application using the Java 2 Software Development Kit, WebSphere Studio Version 4, and VisualAge for Java Version 4. We touch on Software Configuration Management using Rational ClearCase and provide coding guidelines for WebSphere applications. We also cover coding using frameworks, such as Jakarta Struts and WebSphere Business Components. In Part 4 we cover application testing from simple unit testing through application assembly and deployment to debugging and tracing. We also investigate how unit testing can be automated using JUnit. In our examples we often refer to the PiggyBank application. This is a very simple J2EE application we created to help illustrate the use of the tools, concepts and principles we describe throughout the book.
    Note: Includes bibliographical references (p. 563-567) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Greensboro, N.C. : Center for Creative Leadership | Boston, MA :Safari,
    Language: English
    Series Statement: An ideas into action guidebook
    Series Statement: CCL no. 412.
    Keywords: Strategic planning ; Teams in the workplace ; Work environment ; Electronic books ; local
    Abstract: Despite all of the attention and accolades that organizations place on teams, they are not always the most efficient way to meet a business challenge. It's expensive and time consuming to launch a team, and it's a full-time job to lead a team toward achieving organizational objectives. This guidebook was written to help managers determine if a team is the right tool for meeting a business goal, and explains potential obstacles and challenges to forming a team that can operate at its full potential.
    Note: Title from title screen. - Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xviii, 490 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.7/13
    Keywords: UNIX (Computer file) ; Computer networks ; Network File System (Computer network protocol) ; Electronic books ; local
    Abstract: A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem. Managing NFS and NIS, in a new edition based on Solaris 8, is a guide to two tools that are absolutely essential to distributed computing environments: the Network Filesystem (NFS) and the Network Information System (formerly called the "yellow pages" or YP).The Network Filesystem, developed by Sun Microsystems, is fundamental to most Unix networks. It lets systems ranging from PCs and Unix workstations to large mainframes access each other's files transparently, and is the standard method for sharing files between different computer systems.As popular as NFS is, it's a "black box" for most users and administrators. Updated for NFS Version 3, Managing NFS and NIS offers detailed access to what's inside, including: How to plan, set up, and debug an NFS network Using the NFS automounter Diskless workstations PC/NFS A new transport protocol for NFS (TCP/IP) New security options (IPSec and Kerberos V5) Diagnostic tools and utilities NFS client and server tuning NFS isn't really complete without its companion, NIS, a distributed database service for managing the most important administrative files, such as the passwd file and the hosts file. NIS centralizes administration of commonly replicated files, allowing a single change to the database rather than requiring changes on every system on the network.If you are managing a network of Unix systems, or are thinking of setting up a Unix network, you can't afford to overlook this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: 78 p. ; , 18 cm
    Keywords: Samba (Computer file) ; UNIX (Computer file) ; Client/server computing ; Electronic books ; local
    Abstract: Samba is a cross-platform triumph: it turns a Unix or Linux system into a file and print server for Microsoft Windows network clients. Now you can let users store their files (and even important executables) in a single place for easy sharing and backup, protected by Unix or NT security mechanisms, and still offer such transparent access that PC users don't even realize they're going to another system.This book describes all the options for Samba's configuration file in quick-reference format. It also contains command-line options and related information on the use of the Samba daemons ( smbd and nmbd ) and the utilities in the Samba distribution ( smbsh, smbclient, smbstatus, smbtar nmblookup, smbpasswd, testparm, testprns, rpcclient, and a version of tcpdump enhanced to interpret the protocol used by Samba).System administrators who are familiar with Samba and want a handy reminder of how to administer it without the bulk of a full-sized book will find this pocket reference invaluable.
    Note: "A Unix-to-Windows file & print server"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 567 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.2/762
    Keywords: JavaBeans ; Java (Computer program language) ; Electronic books ; local
    Abstract: Enterprise JavaBeans was recently voted "Best Java Book" by the editors and readers of Java Developer's Journal. Readers of JavaPro named it the "Best Java Book for Experts." And Amazon.com included it in the Top Computer Books for 2000. Now the best only gets better! In the new 3rd edition, Enterprise JavaBeans has been completely revised and updated with a thorough introduction to the new 2.0 version of the EJB specification. Significantly different from the earlier version, the 2.0 specification introduces three dramatic improvements: A completely new version of container-managed persistence; local interfaces; and a totally new kind of bean called the "message driven bean." The new version of container-managed persistence (CMP) beans in 2.0 is more portable and robust than in the older 1.1 version. Most significant is the introduction of the relationship fields, which allow entity beans to declare relationships with each other as natural references. In order to make this huge leap in component relationships possible, EJB 2.0 had to redesign how entity beans are defined and interact. Our new 3rd edition examines this critical CMP model in detail. Local interfaces are thoroughly discussed as well. Local interfaces allow beans that are co-located to interact without the overhead of remote method calls. This improves the performance of beans considerably and complements the CMP relationship fields. Message driven beans are a new kind of enterprise bean based on asynchronous messaging and the Java Message service (JMS). Instead of responding to Java RMI calls, message driven beans process JMS messages sent by messaging clients. An entire chapter is devoted to message-driven beans and how to use them effectively. In addition, the 3rd edition contains an architecture overview, information on resource management and primary services, design strategies, and XML deployment descriptors.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Language: English
    Pages: xvii, 364 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Abstract: The second edition of O'Reilly's bestselling Oracle Essentials has been updated to include the latest Oracle release, Oracle9 i. Oracle Essentials distills an enormous amount of information about Oracle's myriad technologies and releases into a compact, easy-to-read volume filled with focused text, illustrations, and helpful hints. Oracle9 i promises to be an even more significant upgrade than Oracle8 i, offering such major features as Real Application Clusters, flashback queries, Oracle personalization, clickstream intelligence, and Oracle Database Cache and Web Cache; it also promises significant improvements in Oracle's business intelligence, XML integration, high availability, and management capabilities. The book includes overviews of these features, as well as the new Oracle9 I Application Server (Oracle9 i AS) and Oracle9 i Portal. The book contains chapters on: Oracle products, options, and overall architecture for Oracle9 i and other recent releases Installing and running Oracle: creating databases, configuring Net8 (known as Oracle Net in Oracle9 i ), starting up and shutting down Oracle Oracle data structures, datatypes, and ways of extending datatypes Managing Oracle: security, the Oracle Enterprise Manager, fragmentation and reorganization, and backup and recovery Oracle networking, monitoring, and tuning Multi-user concurrency, online transaction processing (OLTP), and high availability Hardware architectures (e.g., SMP, MPP, NUMA) and their impact on Oracle Data warehousing and distributed databases Oracle9 i , Oracle8 i , and the Web, including the latest Java, web, and XML technologies, interMedia, Oracle9 i Application Server, and Oracle9 i Portal For new Oracle users, DBAs, developers, and managers, Oracle Essentials is an all-in-one introduction to the full range of Oracle features and technologies, including the just-released Oracle9 i features. But even if you already have a library full of Oracle documentation, this compact book is the one you'll turn to, again and again, as your one-stop, truly essential reference.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 599 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Series Statement: The Java series
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need. Java Security, 2nd Edition, focuses on the basic platform features of Java that provide security--the class loader, the bytecode verifier, and the security manager--and recent additions to Java that enhance this security model: digital signatures, security providers, and the access controller. The book covers the security model of Java 2, Version 1.3, which is significantly different from that of Java 1.1. It has extensive coverage of the two new important security APIs: JAAS (Java Authentication and Authorization Service) and JSSE (Java Secure Sockets Extension). Java Security, 2nd Edition, will give you a clear understanding of the architecture of Java's security model and how to use that model in both programming and administration.The book is intended primarily for programmers who want to write secure Java applications. However, it is also an excellent resource for system and network administrators who are interested in Java security, particularly those who are interested in assessing the risk of using Java and need to understand how the security model works in order to assess whether or not Java meets their security needs.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: 96 p. ; , 18 cm
    Edition: 2nd ed.
    DDC: 005.7/2
    Keywords: World Wide Web ; XML (Document markup language) ; Electronic books ; local
    Abstract: XML, the Extensible Markup Language, is the next-generation markup language for the Web. It provides a more structured (and therefore more powerful) medium than HTML, allowing you to define new document types and stylesheets as needed. Although the generic tags of HTML are sufficient for everyday text, XML gives you a way to add rich, well-defined markup to electronic documents. The XML Pocket Reference is both a handy introduction to XML terminology and syntax, and a quick reference to XML instructions, attributes, entities, and datatypes. Although XML itself is complex, its basic concepts are simple. This small book combines a perfect tutorial for learning the basics of XML with a reference to the XML and XSL specifications. The new edition introduces information on XSLT (Extensible Stylesheet Language Transformations) and Xpath.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Language: English
    Pages: xvii, 213 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.7/2
    Keywords: XML (Document markup language) ; Electronic books ; local
    Abstract: Have you ever needed to share processing between two or more computers running programs written in different languages on different operating systems? Or have you ever wanted to publish information on the Web so that programs other than browsers could work with it? XML-RPC, a system for remote procedure calls built on XML and the ubiquitous HTTP protocol, is the solution you've been looking for. Programming Web Services with XML-RPC introduces the simple but powerful capabilities of XML-RPC, which lets you connect programs running on different computers with a minimum of fuss, by wrapping procedure calls in XML and establishing simple pathways for calling functions. With XML-RPC, Java programs can talk to Perl scripts, which can talk to Python programs, ASP applications, and so on. You can provide access to procedure calls without having to worry about the system on the other end, so it's easy to create services that are available on the Web.XML-RPC isn't the only solution for web services; the Simple Object Access Protocol (SOAP) is another much-hyped protocol for implementing web services. While XML-RPC provides fewer capabilities than SOAP, it also has far fewer interoperability problems and its capabilities and limitations are much better understood. XML-RPC is also stable, with over 30 implementations on a wide variety of platforms, so you can start doing real work with it immediately. Programming Web Services with XML-RPC covers the details of five XML-RPC implementations, so you can get started developing distributed applications in Java, Perl, Python, ASP, or PHP. The chapters on these implementations contain code examples that you can use as the basis for your own work. This book also provides in-depth coverage of the XML-RPC specification, which is helpful for low-level debugging of XML-RPC clients and servers. And if you want to build your own XML-RPC implementation for another environment, the detailed explanations in this book will serve as a foundation for that work.
    Note: "Creating Web application gateways"--At head of front cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xvii, 330 p. , ill. ; , 24 cm
    DDC: 658
    Keywords: Interpersonal communication ; Management ; Electronic books ; local
    Abstract: Paul Caproni's clearly written, interesting new book will give you ideas, tools, and outstanding practices that can make you a better manager - and improve your life. If you would like to feel more fulfilled with your home life and advance in your career, this inspiring book can help you utilize your role as a manager to bring out the best in yourself, others, and your organization. In addition, Caproni will show you how to: manage in a diverse, global, technologically driven and fast-changing environment balance work and life when your firm expects a "24/7" commitment build the skills you need to move from an individual-contributor mindset to a managerial mindset build trust, respect, support, and influence in all your relationships become a critical consumer of managerial knowledge, and avoid falling victim to managerial fads
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxi, 323 p. , ill. ; , 24 cm
    DDC: 658.4/038/0285574
    Keywords: Data warehousing ; Electronic books ; local
    Abstract: The complete guide to building tomorrow's CRM-focused data warehouses. A complete methodology for building CRM-focused data warehouses Planning, ROI, conceptual and logical models, physical implementation, project management, and beyond For database developers, architects, consultants, project managers, and decision-makers Today's next-generation data warehouses are being built with a clear goal: to maximize the power of Customer Relationship Management. To make CRM-focused data warehousing work, you need new techniques, and new methodologies. In this book, Dr. Chris Todman-one of the world's leading data warehouse consultants-delivers the first start-to-finish methodology for defining, designing, and implementing CRM-focused data warehouses. Todman covers all this, and more: Critical design challenges unique to CRM-focused data warehousing A new look at data warehouse conceptual models, logical models, and physical implementation The crucial implications of time in data warehouse modeling and querying Project management: deliverables, assumptions, risks, and team-building-including a full breakdown of work Estimating the ROI of CRM-focused data warehouses up front Choosing software for loading, extraction, transformation, querying, data mining, campaign management, personalization, and metadata DW futures: temporal databases, OLAP SQL extensions, active decision support, integrating external and unstructured data, search agents, and more If you want to leverage the full power of your CRM system, you need a data warehouse designed for the purpose. One book shows you exactly how to build one: Designing Data Warehouses by Dr. Chris Todman.
    Note: Includes bibliographical references (p. 313) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xli, 1234 p. , ill. ; , 25 cm. +
    DDC: 006.6/6
    Keywords: DirectDraw ; Microsoft Win32 ; Microsoft Windows (Computer file) ; Computer graphics ; Electronic books ; local
    Abstract: The world's most complete guide to Windows graphics programming! Win32 GDI and DirectDraw: Accurate, under the hood, and in depth Beyond the API: Internals, restrictions, performance, and real-life problems Complete: Pixel, lines, curves, filled area, bitmap, image processing, fonts, text, metafile, printing, and more Up to date: Windows 2000 and Windows 98 graphics enhancements CD-ROM: Exclusive and professional quality generic C++ classes, reusable functions, demonstration programs, kernel mode drivers, GDI exploration tools, and more! Hewlett-Packard Professional Books To deliver high-performance Windows applications, you need an in-depth understanding of the Win32 GDI and DirectDraw-but until now, it's been virtually impossible to discover what's going on "behind" Microsoft's API calls. This book rips away the veil, giving experienced Windows programmers all the information and techniques they need to maximize performance, efficiency, and reliability! You'll discover how to make the most of Microsoft's Windows graphics APIs-including the important new graphics capabilities built into Windows 2000. Coverage includes: Uncovering the Windows system architecture and graphics system internal data structure Building graphics API "spies" that show what's going on "under the hood" Detecting GDI resource leaks and other powerful troubleshooting techniques Expert techniques for working with the Win32 GDI and DirectDraw APIs Device context, coordinate space and transformation, pixels, lines, curves, and area fills Bitmaps, image processing, fonts, text, enhanced metafiles, printing, and more Windows Graphics Programming delivers extensive code, practical techniques, and unprecedented insight-plus an exclusive CD-ROM containing original system-level tools, kernel mode drivers, sample code, and generic C++ classes for Windows graphics programming without MFC. If you want to build Windows graphics applications that deliver breakthrough performance and reliability, you'll find this book indispensable.
    Note: Includes bibliographical references (p. 1198) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 1154 p. , ill. ; , 24 cm. +
    Edition: 1st ed.
    DDC: 005.2/765
    Keywords: WebSphere ; Web servers ; Computer programs ; Web site development ; Electronic books ; local
    Abstract: WebSphere Application Server V3.5 is the latest version of the IBM open standards-based e-business application deployment environment. This redbook provides detailed insights into the product's architecture and a wealth of practical advice about how best to exploit WebSphere. At the heart of the book are detailed step-by-step descriptions of the tasks you carry out to deploy and execute your applications. The redbook places these task descriptions in a broader context by providing discussions of possible application architectures, deployment topologies, best practices and problem determination. These discussions are underpinned by clear descriptions of concepts and technologies including the Servlet, JSP and EJB APIs, security, and transactions. The redbook also contains details of the support for the Servlet API V2.2 and JSP V1.1 APIs introduced by WebSphere V3.5 Fix Pack 2.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xviii, 234 p. , ill. ; , 25 cm
    DDC: 004/.068
    Keywords: Electronic data processing ; Management ; Information technology ; Electronic books ; local
    Abstract: The complete "best practices" guide to IT problem resolution! No matter how professional your IT organization, if you can't resolve problems quickly and effectively, you'll lose your stakeholders' confidence-and fail. Nowadays, help desk s aren't enough: companies want true service centers capable of delivering complex, strategic solutions. IT Problem Management is the first single source for building world-class problem management processes. Drawing upon his extensive consulting e xperience, Gary Walker presents specific improvements you can make to achieve breakthrough results in any help desk or service center-in-house or out-sourced. Coverage includes: Problem identification, customer validation, problem lo gging, service delivery, knowledge capture and sharing, and management oversight The Immediate Response Model: accounting for problem variability, complexity, and volume Detailed metrics for measuring your responsiveness Bett er ways to create and use service level agreements State-of-the-art tools for customer interaction, service delivery, and proactive monitoring New Internet and knowledge base systems: empowering users to solve their own problems The human side: staffing, retention, and motivation IT Problem Management isn't just theory: it delivers real-world case studies, detailed benchmarks, and practical solutions for turning your help desk into a high-performance I T service center, starting today.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Greensboro, N.C. : Center for Creative Leadership | Boston, MA :Safari,
    Language: English
    Series Statement: CCL no. 411.
    Keywords: Career development ; Goal setting in personnel management ; Electronic books ; local
    Abstract: This guidebook is about changing the way you think about setting goals. It is about identifying goals that are important and meaningful to five key areas of your life: career, self, family, community, and spirit. The goals you create will be SMART: specific, measurable, attainable, realistic, and timed. Setting meaningful goals will reward you with real progress toward success in all areas of your life.
    Note: Title from title screen. - Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Alexandria, VA : American Society for Training & Development | Boston, MA :Safari,
    Language: English
    Pages: viii, 125 p. , ill. ; , 25 cm
    Keywords: Distance education ; Employees ; Training of ; Computer-assisted instruction ; Internet in education ; Electronic books ; local
    Abstract: Does e-learning work? How much does e-learning benefit both the organization and its learners? Is e-learning a wise investment or a waste of corporate resources? Here's a book that answers these and other important questions and guides you in taking a systematic approach that will strengthen your case for e-learning into your organization. Use the book's interactive sections and visit the companion Website to download design forms, examples, job aids, and more!
    Note: Includes bibliographical references (p. 121-124)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: ix, 292 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Series Statement: Technology series
    DDC: 658/.0546
    Keywords: Business networks ; Computer network architectures ; Electronic books ; local
    Abstract: Policy-based networking is the new frontier in networking. A high-level directive given to the network at a single console, it promises easy management of critical network elements such as security, Quality of Service, and device configuration. The translation of high level policies into the device specific configurations is a complex procedure, requiring detailed knowledge of the topology and routes in the network, and translation-enabling algorithms. This book would take the mystery out of this process, allowing you, the network engineer to build policy support into your network architecture. Only scattered pieces of the solution can currently be found in various IETF and DMTF working groups, or in some research presentations and workshops. In-depth understanding of the algorithms behind policy-based networking is necessary for network engineers/architects who want to create new products/applications that deliver policy features.
    Note: Includes bibliographical references (p. 287-292) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 251 p. , ill. ; , 24 cm
    Keywords: Oracle (Computer file) ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: SQL Loader is a ubiquitous tool in the Oracle world. It has been shipped with Oracle since at least Version 6 and continues to be supported and enhanced with each new version of Oracle, including Oracle8 and Oracle8 i. The job of SQL Loader is to load data from flat files into an Oracle database. It's optimized for loading large volumes of data, and is flexible enough to handle virtually any input format.Almost every Oracle user has to use SQL Loader at one time or another, and DBAs are frequently called upon to load data for the users in their organization. Despite SQL Loader's wide availability and usage, few DBAs and developers know how to get the most out of it. Oracle SQL Loader: The Definitive Guide has everything you need to know to put SQLLoader to its best use: an introduction to SQL Loader, a reference to all of its syntax options, and most importantly, step-by-step instructions for all the SQL Loader tasks you'd want to perform--and maybe some you didn't realize you COULD perform.You'll learn how to construct the necessary control files and load from different types of files containing different types of data (e.g., fixed-width data, delimited data, and data of various datatypes). You'll also learn how to validate data, load it selectively, transform it as it is loaded, and recover after failure. This book explains how to optimize SQL Loader performance by adjusting the transaction size and using the new direct path option. It also covers the newest SQL Loader features--the loading of large object (LOB) columns and the new object types (nested tables, varying arrays, and object tables). Oracle SQL Loader: The Definitive Guide is an indispensable resource for anyone who is new to SQLLoader; a task-oriented learning tool for those who are already using it; and a quick reference for every user. If you want to take best advantage of an essential Oracle tool, you need this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...