Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (2,140)
  • Grimm, Jacob  (31)
  • Liberty, Jesse  (14)
  • Pogue, David  (12)
  • Forta, Ben  (6)
  • Boston, MA :Safari,  (2,140)
  • München : Denkimpulse-Verl.  (31)
Datasource
Material
Language
Subjects(RVK)
  • 101
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 695 p. , ill. ; , 24 cm
    Series Statement: IBM Press series--information management
    Keywords: WebSphere ; Application software ; Development ; Java (Computer program language) ; Web servers ; Computer programs ; Web site development ; Electronic books ; local
    Abstract: The expert guide to deploying and managing any WebSphere Application Server V5.x application and environment If you're a WebSphere Application Server administrator or developer, this is your advanced guide for delivering applications rapidly, running them smoothly, and administering them efficiently. Four leading IBM consultants draw on their years of experience to illuminate the key steps involved in taking WebSphere Application Server applications from development to production. They focus on the areas most crucial to success, including application assembly and build, application and infrastructure configuration and administration, and application testing and verification. Along the way, they show how to implement automated deployment processes that can be executed frequently, reliably, and quickly-so you can get your applications to market fast. The focus is on WebSphere Application Server Version 5.1, but much of the information applies to other versions. Coverage includes Installing, testing, and managing WebSphere Application Server environments: clustering, security, messaging, integration, and more Deploying and managing key J2EE technologies: JDBC, Connectors, EJB, container managed and message driven beans, transactions, JMS, JavaMail, and more Deploying highly available, scalable multi-node WebSphere Application Server environments: clustering, distributed session management, and edge components Advanced considerations: working with Java Management Extensions, caching, and much more Performance-tuning tools Troubleshooting Leveraging key WebSphere deployment and administration tools: ANT, wsadmin, Admin Console, and the Application Server Toolkit Advanced discussions of J2EE and architectural concepts you need to deploy successfully-with practical examples © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 102
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 1664 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: HP-UX ; Hewlett-Packard computers ; Programming ; Examinations ; Study guides ; Operating systems (Computers) ; Electronic books ; local
    Abstract: HP-UX CSE: Official Study Guide and Desk Reference The definitive HP-UX CSE exam preparation guide and reference HP-approved coverage of all three CSE exams: CSE HP-UX Advanced System Administration, CSE High Availability Using HP-UX Serviceguard, and CSE HP-UX Networking and Security Comprehensive study resources: exam objectives, sample questions, and summaries for last-minute review More than a great study guide: an outstanding reference for working system engineers This book delivers comprehensive preparation for all three HP-UX CSE exams, the core exam: CSE HP-UX Advanced System Administration, and specialty exams, CSE High Availability Using HP-UX Serviceguard and CSE HP-UX Networking and Security . Coverage includes: Implementing HP-UX in technology-rich enterprise environments Maximizing the performance and availability of HP-UX systems and applications Partitioning: node and virtual partitions Disks, volumes, file systems: RAID, LVM, VxVM, HFS, VxFS, VFS layer, swap/dump space, and more Monitoring system resources, activities, events, and kernels Processes, threads, and bottlenecks: priorities, run queues, multi-processor environments, memory requirements, bottlenecks, and more Installation, patching, and recovery, including Software Distributor and Ignite-UX Emergency recovery with HP-UX installation media Broad networking coverage: IPv6, ndd, DHCP, DNS, NTP, CIFS/9000, LDAP, sendmail, Automatic Port Aggregation, VPNs, VLANs, and more Planning, implementing, and managing high availability clustering with Serviceguard Other HP-UX cluster solutions: Extended Serviceguard Cluster, Metrocluster, Continentalclusters, and more Infrastructure for remote access to HA clusters: SANs, DWDM, dark fiber HP-UX security administration: Trusted systems, SSH, HIDS, IPSec, IPFilter, and Bastille Operating Systems/HP-UX Sample questions, last-minute review tips, and other study resources This isn't just an outstanding prep guide, it's the definitive day-to-day reference for working professionals in high availability environments. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 103
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 525 p. , ill. ; , 24 cm
    DDC: 005.2'765
    Keywords: Lotus Notes ; WebSphere ; Software configuration management ; Web servers ; Computer programs ; Electronic books ; local
    Abstract: Straight from IBM, this is the first comprehensive guide to building collaborative solutions that integrate WebSphere and Lotus to drive maximum business value. Writing for experienced Web developers, three leading IBM consultants show how to design and deploy WebSphere and Domino together in any environment, no matter how large or complex. The authors address architecture, security, performance, availability, development, and much more. Using their techniques, you can implement cutting-edge collaboration, drive productivity improvements, streamline business processes, accelerate response times-and build your On Demand enterprise. Coverage includes Architecting WebSphere and Lotus collaboration for maximum effectiveness Establishing a common platform that reduces administrative costs and increases ROI Choosing what to deploy on WebSphere and what to deploy on Domino Optimizing new Lotus collaborative applications for existing WebSphere environments Managing integrated WebSphere and Domino systems Using WebSphere and Domino development tools to extend and customize your system Accessing J2EE from Domino-and vice versa Detailed appendices on WebSphere Application Server, Domino, WebSphere Portal, Lotus Workplace, and much more... © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 501-504) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 104
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Pearson Education/PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 337 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: BEA WebLogic server ; BEA WebLogic workshop ; Client/server computing ; Java (Computer program language) ; Web services ; Electronic books ; local
    Abstract: "Very impressive work. This book is valuable for beginning and intermediate technologists." Dwight Mamanteo, Technical Manager, BEA Systems "Provides explanations of Web services, tuning tips, and discussions on security that will likely be of benefit to developers as they create their Web services." Robert W. Husted, Member, Technical Staff, Requisite Software Build Web services infrastructure based on service-oriented architecture (SOA) Implement enterprise-class Web services using WebLogic and J2EE Complete lifecycle coverage with best practices: design, prototyping, development, testing, deployment, and management Real-world enterprise Web services implementation with J2EE and WebLogic You've seen plenty of theory about Web services. This book is about the reality: what it takes to successfully implement J2EE Web services with BEA WebLogic in complex enterprise environments. Anjali Anagol-Subbarao, one of the world's leading Web services experts, offers powerful insights for every stage of the Web services lifecycle: design, prototyping, development, testing, deployment, and management. Anagol-Subbarao draws on her experience architecting and building Web services infrastructure for HP's worldwide operations and takes on the challenges that face every enterprise implementer. She demonstrates how to design robust Web services that align with business processes, smoothly integrate with existing infrastructure, deliver superior performance and security, and can be managed effectively. Coverage includes Primers on WebLogic Workshop, WebLogic Server, WLI, and J2EE Web services technology Building effective service-oriented architectural (SOA) frameworks Translating designs into working code Designing for end-to-end security and tuning for high performance Testing Web services and deploying them to production environments Addressing the unique challenges associated with managing distributed Web services © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 105
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxi, 434 p. , ill. ; , 24 cm
    Series Statement: Robert C. Martin series
    DDC: 005.1
    Keywords: Application software ; Development ; Electronic books ; local
    Abstract: Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your development efforts. In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases. This book draws on material Michael created for his renowned Object Mentor seminars: techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include Understanding the mechanics of software change: adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platformwith examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structure This book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 106
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit | Boston, MA :Safari,
    Language: English
    Pages: 290 p. ; , 23 cm
    Keywords: Flash (Computer file) ; Computer animation ; Electronic books ; local
    Abstract: This guide allows you to learn specific Flash skills step-by-step at your own pace. Choose from among several tutorials to develop the skills that are most appropriate to the Flash projects you are working on at any given time. Each lesson leads you through the workflow for implementing a specific real-world feature or effect in your Flash applications. In Macromedia Flash 8: A Tutorial Guide, learn how to: • Navigate the Flash workspace and use common document types • Use the Flash drawing tools and create engaging graphic effects • Use ActionScript to add interactivity and custom functionality to your documents • Connect your Flash projects to external data sources to create data-driven applications Powerful development and design tools require thorough and authoritative technical advice and documentation. When it comes to Macromedia Flash, no one is more authoritative than Macromedia's own development and writing teams. Now their official documentation is available to you in printed book form. As you work, keep this guide by your side for ready access to valuable information on using Flash. We've designed it so that it's easy to annotate as you progress.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 107
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 369 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Linux ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: Covers Red Hat and SUSE When something goes wrong with your Linux firewall, you need to fix it-right now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes: Troubleshooting Linux® Firewalls . Authors Michael Shinn and Scott Shinn are among the world's leading firewall experts; they've even been hired to protect computer security at the White House. In this book, they cover every area where Linux firewalls can go wrong: rules and filtering problems, Layer 2/3/4 issues, trouble with individual services, DNS/DHCP failures, even misconfigured VPNs. They also present an easy, start-to-finish troubleshooting methodology that'll help you identify even the newest or most obscure firewall problem fast-and solve it! Inside, you will find in-depth information on the following areas: What you must know about iptables and netfilter to troubleshoot and avoid problems Using loggers, sniffers, and other tools to diagnose even the most obscure firewall problems Making sure your firewall rules work the way they're supposed to Resolving problems with Network Address Translation and IP Forwarding Troubleshooting SMTP, Apache, Squid, NFS, FTP, instant messaging, and other Web-based services Finding and fixing common problems with IPsec VPN configuration Making your firewalls more failure-resistant: recommendations from the experts If you depend on a Linux firewall, what will you do if it goes down? With Troubleshooting Linux® Firewalls , you can be confident that the solutions are right at hand-so you can sleep at night! © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 108
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 651 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Where has this book been all my professional life? It is about time someone wrote this book. The author covers many basic, practical issues that other authors omit in a format that makes for a great troubleshooting reference and for casual perusing. There are a lot of books available that give a broad overview of system and network administration, and there are a lot of detailed books on each specific topic covered in this book, but I don't know of any other place where I can get so much useful, practical information on such a wide range of topics in such a concise and readable form. I will highly recommend it to my friends and colleagues who are trying to manage their own systems. I am anxious to show it to our instructors who teach data communications and networks as a possible text or lab manual." -Ron McCarty, instructor and program chair, Computer Science, Penn State Erie "This book takes a very unique approach and is very flexible. It offers a great deal to the home user, students, small businesses-all the way to any Linux sys admin that needs a handy reference. I found it very refreshing in terms of style, stated goals, presentation, ease of use, direction, and the "present and future" value of the content. In other words the author is very current and knowledgeable. I would recommend this book to every level from programmer to manager." -Joe Brazeal, Information Technician III, Southwest Power Pool "This book is an excellent resource for new Linux administrators. I was impressed with the comprehensive set of 35 topic chapters, making this book a very useful reference. I know of no other work like this." -George Vish II, Linux curriculum program manager and senior education consultant, Hewlett-Packard Education "I would recommend this book to novice Linux users and administrators. It covers a lot of topics, and makes it easy for readers to follow along." -Bret Strong, education consultant, Hewlett-Packard Company "Linux Quick Fix Notebook is a well-written guide to designing, installing, and maintaining Linux servers. Many Linux reference texts are just simple rewrites of Linux ¨man¨ and ¨info¨ pages, but this book addresses the real issues that systems administrators encounter when working with Linux. The author provides a pedagogical guide to learning Linux server administration. In addition, the book includes step-by-step information so that users can quickly take advantage of the best that open source software has to offer today. I...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 109
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The all-in-one guide to modern routed and switched campus network design Understand the network design process and network design models Learn how switches are used in network design Design an IP addressing plan and select appropriate IP routing protocols Apply network security design principles to boost network security Enable WLANs to improve workforce mobility Examine QoS design requirements and tools Unleash the power of voice transport over data networks, including VoIP and IP telephony Use content networking to provide content to users quickly and efficiently Learn how to integrate network management protocols and tools into network designs Understand how to effectively integrate IP multicast, high availability, storage networking, and IPv6 into your network designs Over the past decade, campus network design has evolved many times as new technologies have emerged and business needs have changed. For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and content networking, their core infrastructures must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step. Campus Network Design Fundamentals is an all-in-one guide to key technologies that can be integrated into network design. The book provides insight into why each technology is important and how to apply this knowledge to create a campus network that includes as many or as few of today's productivity-enhancing applications as are needed in your environment. Topics covered throughout the book include network design process and models, switching, IP routing, quality of service (QoS), security, wireless LANs (WLANs), voice transport, content networking, network management, IPv6, IP multicast, increasing network availability, and storage networking. Sample network designs are included through-out, and the book concludes with a comprehensive case study that illustrates the design process and solutions for headquarters, branch offices, and home office/remote users. Whether you need an overview of modern campus technologies or seek advice on how to design switched and routed networks that securely support these technologies, this book is your comprehensive resource to the foundations upon which all modern-day campus networks are based. This book is part of the Cisco Press® Fundament...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 110
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Identify, mitigate, and respond to network attacks Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI) Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM) Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network. This new family of adaptive security appliances also controls network activity and application traffic and delivers flexible VPN connectivity. The result is a powerful multifunction network security device that provides the security breadth and depth for protecting your entire network, while reducing the high deployment and operations costs and complexities associated with managing multiple point products. Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a practitioner's guide to planning, deploying, and troubleshooting a comprehensive security plan with Cisco ASA. The book provides valuable insight and deployment examples and demonstrates how adaptive identification and mitigation services on Cisco ASA provide a sophisticated security solution for both large and small network environments. The book contains many useful sample configurations, proven design scenarios, and discussions of debugs that help you understand how to get the most out of Cisco ASA in your own network. "I have found this book really highlights the practical aspects needed for building real-world security. It offers the insider's guidance needed to plan, implement, configure, and troubleshoot the Cisco ASA in customer environments and demonstrates the potential and power of Self-Defending Networks." -Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems® This security book is part of th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 111
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Direct from the creators of the Java™ programming language, the completely revised fourth edition of The Java™ Programming Language is an indispensable resource for novice and advanced programmers alike. Developers around the world have used previous editions to quickly gain a deep understanding of the Java programming language, its design goals, and how to use it most effectively in real-world development. Now, Ken Arnold, James Gosling, and David Holmes have updated this classic to reflect the major enhancements in Java™ 2 Standard Edition 5.0 (J2SE™ 5.0). The authors systematically cover most classes in Java's main packages, java.lang.* , java.util, and java.io, presenting in-depth explanations of why these classes work as they do, with informative examples. Several new chapters and major sections have been added, and every chapter has been updated to reflect today's best practices for building robust, efficient, and maintainable Java software. Key changes in this edition include New chapters on generics, enums, and annotations, the most powerful new language features introduced in J2SE 5.0 Changes to classes and methods throughout to reflect the addition of generics Major new sections on assertions and regular expressions Coverage of all the new language features, from autoboxing and variable argument methods to the enhanced for-loop and covariant return types Coverage of key new classes, such as Formatter and Scanner The Java™ Programming Language, Fourth Edition, is the definitive tutorial introduction to the Java language and essential libraries and an indispensable reference for all programmers, including those with extensive experience. It brings together insights you can only get from the creators of Java: insights that will help you write software of exceptional quality.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 112
    Online Resource
    Online Resource
    San Jose, Calif. : Adobe ; | Boston, MA :Safari,
    Language: English
    Pages: 600 p. ; , 24 cm
    DDC: 005.72
    Keywords: Adobe Acrobat (Computer file) ; Electronic books ; local
    Abstract: Ready to learn the visual effects secrets used at such leading-edge studios as Industrial Light + Magic and The Orphanage? Adobe After Effects 6.5 Studio Techniques inspires you to take your work to the next level with realworld examples and insider techniques. Get blockbuster results without the big budget as you delve deep into the essence of visual effects. This book goes beyond conventional step-by-step instruction, teaching you bread-and-butter effects that you can adapt and combine for countless projects. • Real solutions from real professionals: Nobody does it better, and now they'll show you how. Discover the keys to analyzing your shots from Stu Maschwitz, Visual Effects Supervisor for Star Wars, Episode One and Sin City . Unlock the mysteries of linear color space with Brendan Bolles, co-creator of the eLin plug-ins. Master fundamental effects techniques with Mark Christiansen, After Effects specialist for The Orphanage on The Day After Tomorrow . • Compositing essentials: No matter how sophisticated the effect, they all start from the same building blocks. Find out what you've been missing about color and light matching, keying, motion tracking, rotoscoping, working with film, and more. • Advanced techniques: Your goal should be effects so good that no one notices them. From sky replacement to explosions, from smoke to fire, learn to bring your shots to life and enhance scenes without anyone ever knowing what they're seeing isn't 100% real. • Companion CD-ROM: Professional tools produce professional results. Demo versions of plug-ins from Andersson Technologies, Red Giant Software, Frischluft, and Trapcode will enhance your work. Stop relying on ready-made solutions and pre-built effects. Learn how to build up and customize your own effects with the tools at hand-you'll be amazed at how much better the results look!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 113
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Eclipse Distilled David Carlson Foreword by Grady Booch Series Editors Erich Gamma Lee Nackman John Wiegand A Concise Introduction to Eclipse for the Productive Programmer Organized for rapid access, focused on productivity, Eclipse Distilled brings together all the answers you need to make the most of today's most powerful Java development environment. David Carlson introduces proven best practices for working with Eclipse, and shows exactly how to integrate Eclipse into any Agile development process. Part I shows how to customize workspaces, projects, perspectives, and views for optimal efficiency-and how to leverage Eclipse's rapid development, navigation, and debugging features to maximize both productivity and code quality. Part II focuses entirely on Agile development, demonstrating how Eclipse can simplify team ownership, refactoring, continuous testing, continuousintegration, and other Agile practices. Coverage includes Managing Eclipse projects from start to finish: handling both content and complexity Using perspectives, views, and editors to work more efficiently Setting preferences to fit your own unique needs-or your team's Leveraging Eclipse's powerful local and remote debugging tools Understanding how Eclipse fits into contemporary iterative development processes Performing continuous testing with JUnit in the Eclipse environment Using Eclipse's wizard-assisted refactoring tools Implementing continuous integration with Ant-based automated project builders Employing best practices for code sharing with CVS and other repositories By focusing on need-to-know information and providing best practices and methodologies, this book is designed to get you working with Eclipse quickly. Whether you're building enterprise systems, Eclipse plug-ins, or anything else, this concise book will help you write better code-and do it faster. About the Author David Carlson is a developer, researcher, author, instructor, and consultant who thrives on innovative technology. He started using Java in 1995 and Eclipse in 2001. David has a Ph.D. in Information Systems from the University of Arizona and is a frequent speaker at conferences and a contributor to technical journals. He is creator of the hyperModel plug-in for Eclipse, and author of Modeling XML Applications with UML (Addison-Wesley, 2001). Cover photo: © archivberlin Fotoagentur GmbH / Alamy Addison-Wesley www.awprofessional.com/series/eclipse ISBN 0-321-28815-7 $34.99 US $48.99 CANADA © Copyr...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 114
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Finally, there's a book that treats Excel as the powerful development platform it really is, and covers every facet of developing commercial-quality Excel applications. This is not a book for beginners. Writing for professional developers and true Excel experts, the authors share insider's knowledge they've acquired building Excel applications for many of the world's largest companies-including Microsoft. Professional Excel Development demonstrates how to get the utmost from Excel, addressing everything from application architectures through worksheet and userform design, charting, debugging, error handling and optimizing performance. Along the way, the authors offer best practices for every type of Excel development, from building add-ins through interacting with XML Web services. Coverage includes Building add-ins to provide new Excel functions Designing effective worksheets, userforms and other user interface elements Leveraging Excel's powerful data analysis features Creating sophisticated custom charts Handling errors, debugging applications and optimizing performance Using class modules and interfaces to create custom objects Understanding Windows API calls: when to use them, and how to modify them Adding worksheet functions with C-based XLLs Programming with databases Controlling external applications from Excel Integrating with Visual Basic 6, VB.NET and Visual Studio Tools for Office Using XML to import and export data and communicate with Web services Providing help, securing, packaging and distributing The accompanying CD-ROM contains the book's sample timesheet application at every stage of construction, with detailed code comments. It also includes many examples of the concepts introduced in each chapter and a collection of the authors' Excel development utilities. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 115
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvi, 316 p. , ill. ; , 24 cm
    DDC: 006.74
    Keywords: HTML (Document markup language) ; Electronic books ; local
    Abstract: The fastest route to true HTML/CSS mastery! Need to build a web site? Or update one? Or just create some effective new web content? Maybe you just need to update your skills, do the job better. Welcome. This book's for you. We'll leverage what you already know about the web, so you'll go further, faster than you ever expected. You'll master today's best practices: the real nuts and bolts, not theory or hooey. You'll learn through dozens of focused HTML, XHTML, and CSS examples: crafted for simplicity and easy to adapt for your own projects. Need specific solutions? This book's modular, visual, high-efficiency format delivers them instantly . Molly E. Holzschlag draws on her unparalleled experience teaching Web design and development. No other HTML/CSS guide covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with HTML, XHTML, and CSS in real-world projects Learn how to build web pages that'll work in any environment, on virtually any contemporary browser Construct templates that simplify every page you develop Structure and tag text so it's easy to work with and manage Add images, media, and scripts-quickly and reliably Discover the right ways to use HTML tables Build easy-to-use forms and validate your users' input Use CSS to take total control over your site's look and feel Master core CSS techniques: color, images, text styles, link effects, lists, navigation, and more Control margins, borders, padding, positioning, floats, even Z-index Design efficient, compatible, easy-to-manage CSS layouts Includes concise XHTML and CSS annotated references: quick help for every language element Spring Into... is a new series of fast-paced tutorials from Addison-Wesley. Each book in the series is designed to bring you up to speed quickly. Complex topics and technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working...now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 116
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 352 p. , ill. ; , 23 cm. +
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Enter your Linux Desktop Garage Don't just survive with Linux: thrive Find tools & info to do practically everything , such as: Ripping your CDs (&DVDs) De-Spam-ifying your email Capturing, editing, organizing your digital photos Chatting with your Linux-deficient IM pals Tracking your contacts, appointments, life Transforming Firefox into easy blogware Finding great substitutes for your Windows apps Diving into a veritable plethora of games Where you get the truth (unvarnished) Where you get productive (quick) Where Linux is fun (honest) Your guide: Susan Matteson , real user, real expert She reveals the fun stuff (from MP3s to desktop wallpaper) Demystifies the essentials (from file management to passwords) Simplifies the tasks they said were easy, but weren't (until now) Where there's even more (plenty) Step-by-step instructions for both Mandrake & Fedora Linux Zero-hassle tips for managing & personalizing your PC Gnoppix Linux on CD-ROM (run Linux without touching Windows) © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 117
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR ; | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 353 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The first comprehensive, expert guide for end-to-end Linux application optimization Learn to choose the right tools-and use them together to solve real problems in real production environments Superior application performance is more crucial than ever-and in today's complex production environments, it's tougher to ensure, too. If you use Linux, you have extraordinary advantages: complete source code access, plus an exceptional array of optimization tools. But the tools are scattered across the Internet. Many are poorly documented. And few experts know how to use them together to solve real problems. Now, one of those experts has written the definitive Linux tuning primer for every professional: Optimizing Linux® Performance. Renowned Linux benchmarking specialist Phillip Ezolt introduces each of today's most important Linux optimization tools, showing how they fit into a proven methodology for perfecting overall application performance. Using realistic examples, Ezolt shows developers how to pinpoint exact lines of source code that are impacting performance. He teaches sysadmins and application developers how to rapidly drill down to specific bottlenecks, so they can implement solutions more quickly. You'll discover how to: Identify bottlenecks even if you're not familiar with the underlying system Find and choose the right performance tools for any problem Recognize the meaning of the events you're measuring Optimize system CPU, user CPU, memory, network I/O, and disk I/O-and understand their interrelationships Fix CPU-bound, latency-sensitive, and I/O-bound applications, through case studies you can easily adapt to your own environment Install and use oprofile, the advanced systemwide profiler for Linux systems If you're new to tuning, Ezolt gives you a clear and practical introduction to all the principles and strategies you'll need. If you're migrating to Linux, you'll quickly master Linux equivalents to the tools and techniques you already know. Whatever your background or environment, this book can help you improve the performance of all your Linux applications-increasingbusiness value and user satisfaction at the same time. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 118
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 338 p. , ill. ; , 24 cm
    DDC: 005.2762
    Keywords: Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Easy-to-follow coverage of twelve indispensable Jakarta Commons packages Code examples that show innovative uses of Commons components, including using HttpClient to access Web resources, FileUpload for handling HTTP file uploads, and BeanUtils for easy form generation Detailed instructions for combining the Commons project libraries with the popular Eclipse IDE Save time and money with reusable open source Java™ components Master the Jakarta Commons Library of Open Source JavaTM Components Using the Apache Jakarta Commons reusable Java™ components, you can leverage the work of the global open-source community to solve common programming problems reliably, quickly, and inexpensively. But, to use the Commons libraries effectively, you need far more guidance than the official documentation offers. In Apache Jakarta Commons: Reusable Java™ Components, Will Iverson covers what Java developers need to know to take full advantage of Jakarta Commons-starting right now. Iverson begins with a definitive overview of the Commons project: goals, installation, and getting started with Commons components. Next, he presents example-rich chapters on the twelve most useful Commons packages, covering topics ranging from HTTP FileUpload to database connectivity. Iverson provides detailed code samples for every component he describes. After you've mastered the core Jakarta Commons packages, you'll constantly rely on this book's handy seventy-five page quick-reference. Iverson's coverage includes Downloading Commons project libraries and installing them into Eclipse Programmatically accessing resources via HTTP, FTP, NNTP, and other Internet protocols Using the Jakarta Commons suite of configurable object pools Managing database connectivity in Swing applications-and anywhere containers aren't doing it for you Using BeanUtils to generate forms and gain runtime access to information provided by JavaBeans-style objects Traversing complex object graphs with JXPath Using Jakarta Commons' advanced collections tools to establish richer object relationships Extending java.lang with better methods for manipulating core classes Implementing conversion routines, configurable logging, command-line help, and more Exploring the newest packages, including emerging "sandbox" packages Whether you're building code for front-end Web applications, client-side software, or back-end servers, learning Jakarta Commons will make you far more efficient. Apache Jakarta Commons is the faste...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 119
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "This book is the best way for beginning developers to learn wxWidgets programming in C++. It is a must-have for programmers thinking of using wxWidgets and those already using it." -Mitch Kapor, founder of Lotus Software and the Open Source Applications Foundation Build advanced cross-platform applications that support native look-and-feel on Windows, Linux, Unix, Mac OS X, and even Pocket PC Master wxWidgets from start to finish-even if you've never built GUI applications before Leverage advanced wxWidgets capabilities: networking, multithreading, streaming, and more CD-ROM: library of development tools, source code, and sample applications Foreword by Mitch Kapor, founder, Lotus Development and Open Source Application Foundation wxWidgets is an easy-to-use, open source C++ API for writing GUI applications that run on Windows, Linux, Unix, Mac OS X, and even Pocket PC-supporting each platform's native look and feel with virtually no additional coding. Now, its creator and two leading developers teach you all you need to know to write robust cross-platform software with wxWidgets. This book covers everything from dialog boxes to drag-and-drop, from networking to multithreading. It includes all the tools and code you need to get great results, fast. From AMD to AOL, Lockheed Martin to Xerox, world-class developers are using wxWidgets to save money, increase efficiency, and reach new markets. With this book, you can, too. wxWidgets quickstart: event/input handling, window layouts, drawing, printing, dialogs, and more Working with window classes, from simple to advanced Memory management, debugging, error checking, internationalization, and other advanced topics Includes extensive code samples for Windows, Linux (GTK+), and Mac OS X About the CD-ROM The CD-ROM contains all of the source code from the book; wxWidgets distributions for Windows, Linux, Unix, Mac OS X, and other platforms; the wxWidgets reference guide; and development tools including the OpenWatcom C++ compiler, the poEdit translation helper, and the DialogBlocks user interface builder. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 120
    Online Resource
    Online Resource
    Indianapolis, Ind. : Pearson Education, Inc. | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 575 p. , ill. ; , 23 cm
    Edition: NetWare ed.
    DDC: 005.4/3
    Keywords: NetWare ; Handbooks, manuals, etc ; Operating systems (Computers) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Novell® Open Enterprise Server Administrator's Handbook, NetWare® Edition covers the major components and features of Open Enterprise Server (OES) on the NetWare platform. This book helps you understand how to integrate the benefits of OES in an existing environment. After a brief introduction to the concepts necessary to introduce features, the book focuses on the implementation of OES on the NetWare platform. While this book is not a reference for network theory, protocols or architectures, the administrator will learn about adding open source options, features and technologies that extend the applicability and value of NetWare and how to use the major components and features of OES on NetWare.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 121
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams ; | Boston, MA :Safari,
    Language: English
    Pages: 948 p. ; , 24 cm
    DDC: 005.2762
    Keywords: JBoss (Computer file) ; Web sites ; Authoring programs ; Electronic books ; local
    Abstract: If you need to understand how JBoss works, why not learn it from the people who created it? JBoss 4.0 - The Official Guide is the authoritative resource recognized as the official print documentation for JBoss 4.0. The only book for advanced JBoss users, this guide presents a complete understanding to configuring and using JBoss 4.0. It is fully up-to-date with the new features and changes in JBoss 4.0, including those used to integrate development with Eclipse, incorporate Aspect-Oriented Programming and implement J2EE 1.4 functionality months ahead of the commercial competition. Get under the hood and explore everything that JBoss 4.0 can offer you with JBoss 4.0 - The Official Guide .
    Note: Includes CD-ROM
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 122
    Online Resource
    Online Resource
    Indianapolis : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 338.4/762138
    Keywords: Electronic industries ; Technological innovations ; Electronic industries ; Household electronics ; Electronic books ; local
    Abstract: "The consumer electronics world sets a blistering pace for innovation, and anyone hoping to keep up-or take the lead-should read this book. Insightful and comprehensive, it maps out the industry terrain, and then points the way toward opportunities that lie ahead. Bailey and Wenzek have put together a compelling read on this fas­cinating global industry." -Tom Kelley, General Manager IDEO author, The Ten Faces of Innovation "Consumer electronics is one of the largest, fastest growing, most exciting, and most ruthless markets in the global economy. And technology and innovation are pouring into the space at an accelerating pace. Unfortunately, many vendors are not making money. Maniacal focus on return on investment is the key to success, and this book provides thought-provoking ideas on how to drive it." -Mike Bingle, Managing Director Silver Lake Partners "An industry built on the foundation of market dominance is being shaken up. In consumer electronics, those keystone companies that appraise the innovative value of niche players regain profitable growth. This book outlines what it takes to win in a turbulent ecosystem." -Marco Iansiti, Professor of Business Administration Harvard Business School The consumer electronics industry is entering an era of extraordinary growth. The industry's best companies will ride that wave to unprecedented success. But, today, many CE companies are struggling with business models that are simply untenable. They must change to survive: they must change even more dramatically to win. In this book, two world-renowned consultants preview the industry's future-from online gaming to telehealthcare, and beyond. Next, they present a powerful new blueprint, offering indispensable guidance on everything from technology platforms to user interface design, branding to channel strategies. You'll discover how to uncover new sources of value, design better models for doing business, and fuel growth by reaching new geographical markets. Whatever your role in the industry, this book will help you: · Make better decisions, find your differentiators, and focus on your key success drivers · Tap into the emergent "meta-value" that arises when technologies, devices, services, and content come together · Reach tomorrow's smart, service-sensitive shopper: not just the "technology-hungry" customers · Widen margins by adding value consumers will pay for · Transform cost structures to support rapid growth and nonstop change ·...
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 123
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Pearson Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxii, 185 p. , ill. ; , 24 cm
    Keywords: Business presentations ; Debates and debating ; Public speaking ; Questioning ; Self presentation ; Verbal self-defense ; Electronic books ; local
    Abstract: Jerry Weissman has made a career of coaching nearly 500 execs on their IPO roadshows, the most critical presentations of their lives. Now, he's written an indispensable guide to answering the toughest questions you'll ever face. Using compelling examples from Presidential debates to stock analyst meetings, Weissman teaches how to respond with perfect assurance. Discover how to avoid the defensive, evasive, or contentious answers that have destroyed political careers and ruin credibility. Learn to control your entire exchange with a hostile questioner: the question, answer, interactions with questioner and audience, timing, and above all, yourself. Whether an executive, politician, fundraiser, interviewee, teacher, student -- or even a family member at Thanksgiving dinner -- you're judged on how you handle these moments. Get this book: handle them brilliantly.
    Note: Includes bibliographical references (p. 169-173) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 124
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xliv, 256 p. , ill. ; , 24 cm
    Keywords: Business ethics ; Leadership ; Moral and ethical aspects ; Moral development ; Success in business ; Moral and ethical aspects ; Electronic books ; local
    Abstract: Through a combination of research, and original thought leadership, the authors demonstrate how the best performing companies have leaders who actively apply moral values to achieve enduring personal and organizational success. These individuals exhibit moral intelligence: a strong moral compass and the ability to follow it. Lennick and Kiel reveal how dozens of companies benefit from the moral intelligence of their leaders, help build specific moral competencies leaders need: integrity, responsibility, compassion, forgiveness, and more. This book also includes the new Moral and Emotional Competency Inventory (MECI): an indispensable metric to assess moral intelligence. Leaders with strong moral intelligence can build the trust and commitment that are the foundation of truly great businesses. Be one of those leaders, lead one of those companies, with Moral Intelligence.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 125
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School | Boston, MA :Safari,
    Language: English
    Pages: xliii, 241 p. , ill. ; , 24 cm
    DDC: 658.408
    Keywords: Capitalism ; Social responsibility of business ; Electronic books ; local
    Abstract: Capitalism is indeed at a crossroads, facing international terrorism, worldwide environmental change, and an accelerating backlash against globalization. Companies are at crossroads, too: finding new strategies for profitable growth is now more challenging. Both sets of problems are intimately linked. Learn how to identify sustainable products and technologies that can drive new growth while also helping to solve today's most crucial social and environmental problems. Hart shows how to become truly indigenous to all markets -- and avoid the pitfalls of traditional 'greening' and 'sustainability' strategies. This book doesn't just point the way to a capitalism that is more inclusive and more welcome: it offers specific techniques to recharge innovation, growth, and profitability.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 126
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 3rd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco IPS exam 642-532 The official study guide helps you master all the topics on the IPS exam, including: IPS concepts Command-line interface (CLI) and IPS Device Manager (IDM) configuration modes Basic sensor and IPS signature configuration IPS signature engines Sensor tuning IPS event monitoring Sensor maintenance Verifying system configuration Using the Cisco IDS Module (IDSM) and Cisco IDS Network Module Capturing network traffic CCSP IPS Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the IPS exam. Cisco Security Test Engineer Earl Carter shares preparation hints and test-taking tips, helping you identify areas of weakness and improve your Intrusion Prevention System (IPS) knowledge. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCSP IPS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary materials make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP IPS Exam Certification Guide is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains an electronic copy of the book and more than 200 practice questions for the IPS ex...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 127
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The practical guide to building resilient and highly available IP networks Learn from an all-in-one introduction to new features and developments in building a resilient IP network Enable your organization to meet internal service-level agreements (SLAs) for mission-critical resources Understand how a resilient IP network can help in delivering mission-critical information such as video and voice services Work with configuration examples that are based on real-world issues and customer requirements Get tips and best practices from field personnel who have worked on some of the largest networks with stringent uptime requirements and SLAs More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is of utmost importance to companies and their service providers. The challenges for the professionals responsible for these networks include ensuring that the network remains up all the time, keeping abreast of the latest technologies that help maintain uptime, and reacting to ever-increasing denial-of-service (DoS) attacks. Building Resilient IP Networks helps you meet those challenges. This practical guide to building highly available IP networks captures the essence of technologies that contribute to the uptime of networks. You gain a clear understanding of how to achieve network availability through the use of tools, design strategy, and Cisco IOS® Software. With Building Resilient IP Networks , you examine misconceptions about five-nines availability and learn to focus your attention on the real issues: appreciating the limitations of the protocols, understanding what has been done to improve them, and keeping abreast of those changes. Building Resilient IP Networks highlights the importance of having a modular approach to building an IP network and, most important, illustrates how a modular design contributes to a resilient network. You learn how an IP network can be broken down to various modules and how these modules interconnect with one another. Then you explore new network resiliency features that have been developed recently, categorized with respect to the design modules. Building Resilient IP Networks is relevant to both enterprise and service provider customers of all sizes. Regardless of whether the network connects to the Internet, fortifying IP networks for maximum uptime and prevention of attacks is mandatory for anyone's b...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 128
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: 418 p. ; , 24 cm. +
    DDC: 794.816693
    Keywords: Computer games ; Programming ; Three-dimensional display systems ; Electronic books ; local
    Abstract: There are many programming hobbyists who write 2D games but there are far fewer that grasp the concepts of 3D programming. Although there are also quite a few ¿game development¿ books on the market, few deal with 3D game development. Those that do are mainly aimed at advanced readers. This book will provide a practical, example driven approach to learning the unique art of 3D Game Development that even the beginner can grasp. It won¿t get bogged down in page after page of boring theory but instead will teach through many interesting hands on examples. Tom Miller brings years and years of 3D game programming to the table and couples that with an engaging writing style to mentor readers in the intricacies of game development. The book starts out with a crash course in game programming concepts and then progresses into developing 3 different types of games with many useful tips, notes, and cautions along the way. This title will serve as a useful guide to either current 2D game developers or programmers that want to learn to program games.
    Note: Includes CD-ROM
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 129
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 624 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Keywords: Internet programming ; Microsoft .NET ; Electronic books ; local
    Abstract: Brilliantly compiled by author Juval Lowy, Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover .NET 2.0. It remains one of the few practical books available on this topic. This invaluable resource is targeted at anyone who develops complex or enterprise-level applications with the .NET platform--an ever-widening market. In fact, nearly two million Microsoft developers worldwide now work on such systems. Programming .NET Components , Second Edition begins with a look at the fundamentals of component-oriented programming and then progresses from there. It takes the time to carefully examine how components can simplify and add flexibility to complex applications by allowing users to extend their capabilities. Next, the book introduces a variety of .NET essentials, as well as .NET development techniques. Within this discussion on component development, a separate chapter is devoted to each critical development feature, including asynchronous calls, serialization, remoting, security, and more. All the while, hazardous programming pitfalls are pointed out, saving the reader from experiencing them the hard way.A .NET expert and noted authority on component-oriented programming, Lowy uses his unique access to Microsoft technical teams to the best possible advantage, conveying detailed, insider information in easy-to-grasp, activity-filled language. This hands-on approach is designed to allow individuals to learn by doing rather than just reading. Indeed, after digesting Programming .NET Components , Second Edition, readers should be able to start developing .NET components immediately. Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover...
    Note: "Covers .NET 2.0 & Visual Studio 2005"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 130
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Build Powerful, Cross-Platform Rich Client Applications Eclipse is more than a state-of-the-art IDE: its Rich Client Platform (RCP) plug-ins form an outstanding foundation for any desktop application, from chat applications to enterprise software front-ends. In Eclipse Rich Client Platform , two leaders of the Eclipse RCP project show exactly how to leverage Eclipse for rapid, efficient, cross-platform desktop development. In addition to explaining the power of Eclipse as a desktop application development platform, the authors walk step-by-step through developing a fully featured, branded RCP application. They introduce a wide range of techniques, including developing pluggable and dynamically extensible systems, using third-party code libraries, and packaging applications for diverse environments. You'll build, refine, and refactor a complete prototype; customize the user interface; add Help and Update features; and build, brand, and ship the finished software. For every Java developer, regardless of previous Eclipse experience Thoroughly covers Eclipse 3.1's new RCP features and its extensive new tools for designing, coding, and packaging RCP applications Presents techniques for branding and customizing the look and feel of RCP applications Shows how to overcome the challenges and "rough edges" of RCP development Discusses the similarities and differences between RCP and conventional plug-in development Includes an overview of OSGi, the base execution framework for Eclipse If you want to develop and deploy world-class Java applications with rich, native GUIs, and use Eclipse RCP- get this book . CD-ROM contains the Eclipse 3.1 SDK, Eclipse 3.1 RCP SDK, and Eclipse 3.1 RCP Delta Pack appropriate for Windows, Linux, and Mac OS X. It also contains all the code samples developed in the book. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 131
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 713 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." -Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code-and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 132
    Online Resource
    Online Resource
    Boston, Mass. ; : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 651 p. ; , 24 cm
    Edition: 3rd ed.
    Series Statement: The Java series
    DDC: 005.71262
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Written by the inventors of the technology, The Java™ Language Specification, Third Edition , is the definitive technical reference for the Java™ programming language. If you want to know the precise meaning of the language's constructs, this is the source for you. The book provides complete, accurate, and detailed coverage of the Java programming language. It provides full coverage of all new features added since the previous edition, including generics, annotations, asserts, autoboxing, enums, for-each loops, variable arity methods, and static import clauses.
    Note: Previous ed.: 2000
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 133
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 342 p. , ill. ; , 24 cm
    DDC: 005.74/068
    Keywords: Business ; Data processing ; Data warehousing ; Database management ; Electronic books ; local
    Abstract: The definitive best-practices guide to enterprise data-management strategy. You can no longer manage enterprise data "piecemeal." To maximize the business value of your data assets, you must define a coherent, enterprise-wide data strategy that reflects all the ways you capture, store, manage, and use information. In this book, three renowned data management experts walk you through creating the optimal data strategy for your organization. Using their proven techniques, you can reduce hardware and maintenance costs, and rein in out-of-control data spending. You can build new systems with less risk, higher quality, and improve data access. Best of all, you can learn how to integrate new applications that support your key business objectives. Drawing on real enterprise case studies and proven best practices, the author team covers everything from goal-setting through managing security and performance. You'll learn how to: Identify the real risks and bottlenecks you face in delivering data-and the right solutions Integrate enterprise data and improve its quality, so it can be used more widely and effectively Systematically secure enterprise data and protect customer privacy Model data more effectively and take full advantage of metadata Choose the DBMS and data storage products that fit best into your overall plan Smoothly accommodate new Business Intelligence (BI) and unstructured data applications Improve the performance of your enterprise database applications Revamp your organization to streamline day-to-day data management and reduce cost Data Strategy is indispensable for everyone who needs to manage enterprise data more efficiently-from database architects to DBAs, technical staff to senior IT decision-makers. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. [317]-321) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 134
    Language: English
    Pages: xxxii, 346 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.1
    Keywords: Rational Clearcase ; Software configuration management ; Electronic books ; local
    Abstract: "I wrote that the first edition of this book "communicates much of the experience, wisdom, and insight that was acquired along the way to discovering what SCM best practices are and how to implement/deploy them." The second edition is full of even more practical experience! It not only refines and expands upon earlier strategies and best practices, it also contains even more concrete "how-to" information about implementing and deploying them." -Brad Appleton co-author of Software Configuration Management Patterns: Effective Teamwork, Practical Integration "Read this book when you're getting started with configuration management (CM); read it again in six months and once more two years later. Software Configuration Management Strategies and IBM Rational ClearCase goes beyond the basics to provide a coherent review of CM strategies for projects of all sizes and complexities." -Jennie Brown, CM Specialist IBM Corporation "This book covers practical software configuration management (SCM), ClearCase UCM and ClearCase use for project teams. Every project lead and SCM specialist should (re)read this book before starting a project." -Roger Jarrett, Senior Software Engineer IBM Rational Software "This second edition captures vital Unified Change Management (UCM) features and concepts. It brings the entire UCM feature set full circle and lays the ground work for a successful UCM implementation; Bellagio and Milligan continue where the first edition left off. The inclusion of composite baseline concepts, single stream development, performance tuning, and other features and concepts make this the core of any old or new Unified Change Management implementation. It is rare that a second edition of a book can hold your interest like the first. This publication does just that...this continues to be the standard for users interested in Unified Change Management deployment." -Adam Levensohn, Manager IBM Rational Software Software Configuration Management (SCM) can help even the largest, most complex project teams manage change, so they can deliver higher quality products faster. The First Edition of Software Configuration Management Strategies and Rational ClearCase established itself as the definitive single source for guidance on both SCM best practices and the market's leading product, IBM Rational ClearCase. This fully updated Second Edition systematically addresses the latest ClearCase and ClearQuest® innovations, while offering even deeper insight into S...
    Note: Previous ed.: published under title: Software configuration management strategies and Rational ClearCase / by Brian A. White, 2000. - Includes bibliographical references (p. 325-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 135
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 434 p. , ill. ; , 24 cm
    DDC: 004.6/2
    Keywords: BGP (Computer network protocol) ; Electronic books ; local
    Abstract: PRACTICAL BGP "I would recommend this book to network engineers, Internet service providers, network software developers, and IT staff who need to deal with network planning and routing." -Enke Chen, Redback Networks Hands-on guidance for deploying and optimizing BGP networks-enterprise and ISP Now there's a practical guide to deploying and managing BGPv4 in any environment-from small enterprises to the largest Tier 2 and Tier 3 service providers. A team of the world's leading BGP experts brings together powerful insights into network design, configuration, and deployment with the latest version of BGP-including hands-on guidance for leveraging its key enhancements. Coverage includes • Best practices and diverse real-world scenarios for applying BGPv4 • Understanding the impact of BGP design on local networks and the global Internet backbone • Building effective BGP policies: aggregation, propagation, accounting, and more • Maximizing scalability and performance in BGPv4 networks • BGP and network security, including Secure Origin BGP • Deploying BGP/MPLS Layer 3 VPNs • Extensive troubleshooting guidance unavailable in any other book If you're a network engineer or administrator looking to drive maximum reliability and performance from BGP-based networks, Practical BGP will help you get the job done-from start to finish. RUSS WHITE is a Network Protocols Deployment Engineer in Cisco Systems Routing DNA Team specializing in routing protocols. A widely recognized expert in networking, he co-chairs the IETF Routing Protocols Security working group, and co-authored Advanced IP Network Design, IS-IS for IP Networks, and Inside Cisco IOS Software Architecture. DANNY McPHERSON is a member of the Architecture Team at Arbor Networks. He has held technical leadership positions with several global ISPs, is active within the IETF, and is an acknowledged expert in Internet architecture and security. He co-authored Internet Routing Architectures, Second Edition. SRIHARI SANGLI , Senior Manager for MPLS and routing development at Procket Networks, was formerly Senior Technical Leader in Cisco's IOS Routing Protocols group. He, along with others at Cisco, coded the industry-first implementation of BGP/MPLS based Layer-3 VPN.
    Note: Includes index. - The author's name Sangli Srihari is listed as Srihari Sangli on cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 136
    Online Resource
    Online Resource
    Upper Saddle River, NJ. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations of UNIX and UNIX-like environments. And yet, it does all this while retaining the style and taste of the original classic." --Mukesh Kacker, cofounder and former CTO of Pronto Networks, Inc. "One of the essential classics of UNIX programming." --Eric S. Raymond, author of The Art of UNIX Programming "This is the definitive reference book for any serious or professional UNIX systems programmer. Rago has updated and extended the classic Stevens text while keeping true to the original. The APIs are illuminated by clear examples of their use. He also mentions many of the pitfalls to look out for when programming across different UNIX system implementations and points out how to avoid these pitfalls using relevant standards such as POSIX 1003.1, 2004 edition and the Single UNIX Specification, Version 3." --Andrew Josey, Director, Certification, The Open Group, and Chair of the POSIX 1003.1 Working Group " Advanced Programming in the UNIX® Environment, Second Edition, is an essential reference for anyone writing programs for a UNIX system. It's the first book I turn to when I want to understand or re-learn any of the various system interfaces. Stephen Rago has successfully revised this book to incorporate newer operating systems such as GNU/Linux and Apple's OS X while keeping true to the first edition in terms of both readability and usefulness. It will always have a place right next to my computer." --Dr. Benjamin Kuperman, Swarthmore College Praise for the First Edition " Advanced Programming in the UNIX® Environment is a must-have for any serious C programmer who works under UNIX. Its depth, thoroughness, and clarity of explana-tion are unmatched." -- UniForum Monthly "Numerous readers recommended Advanced Programming in the UNIX® Environment by W. Richard Stevens (Addison-Wesley), and I'm glad they did; I hadn't even heard of this book, and it's been out since 1992. I just got my hands on a copy, and the first few chapters have been fascinating." -- Open Systems Today "A much more readable and detailed treatment of UNIX internals can be found in Advanced Programming in the UNIX® Environment by W. Richard Steven...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 137
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive book on Security Patterns, which are critical for secure programming. --Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your development efforts. --Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. --Judy Lin, Executive Vice President, VeriSign, Inc. Core Security Patterns provides a comprehensive patterns-driven approach and methodology for effectively incorporating security into your applications. I recommend that every application developer keep a copy of this indispensable security reference by their side. --Bill Hamilton, author of ADO.NET Cookbook , ADO.NET in a Nutshell , and NUnit Pocket Reference As a trusted advisor, this book will serve as a Java developers security handbook, providing applied patterns and design strategies for securing Java applications. --Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase Like Core J2EE Patterns , this book delivers a proactive and patterns-driven approach for designing end-to-end security in your applications. Leveraging the authors strong security experience, they created a must-have book for any designer/developer looking to create secure applications. --John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE Patterns Core Security Patterns is the hands-on practitioners guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisionin...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 138
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Learn Linux kernel programming, hands-on : a uniquely effective top-down approach The Linux ® Kernel Primer is the definitive guide to Linux kernel programming. The authors' unique top-down approach makes kernel programming easier to understand by systematically tracing functionality from user space into the kernel and carefully associating kernel internals with user-level programming fundamentals. Their approach helps you build on what you already know about Linux, gaining a deep understanding of how the kernel works and how its elements fit together. One step at a time, the authors introduce all the tools and assembly language programming techniques required to understand kernel code and control its behavior. They compare x86 and PowerPC implementations side-by-side, illuminating cryptic functionality through carefully-annotated source code examples and realistic projects. The Linux ® Kernel Primer is the first book to offer in-depth coverage of the rapidly growing PowerPC Linux development platform, and the only book to thoroughly discuss kernel configuration with the Linux build system. Coverage includes Data structures x86 and PPC assembly language Viewing kernel internals Linux process model User and kernel space Interrupts and exceptions Memory allocation and tracking Tracing subsystem behavior I/O interactions Filesystems and file operations Scheduling and synchronization Kernel boot process Kernel build system Configuration options Device drivers And more... If you know C, this book teaches you all the skills and techniques you need to succeed with Linux kernel programming. Whether you're a systems programmer, software engineer, systems analyst, test professional, open source project contributor, or simply a Linux enthusiast, you'll find it indispensable. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 139
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Mac OS ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The Most Useful UNIX Guide for Mac OS X Users Ever, with Hundreds of High-Quality Examples! Beneath Mac OS ® X's stunning graphical user interface (GUI) is the most powerful operating system ever created: UNIX ® . With unmatched clarity and insight, this book explains UNIX for the Mac OS X user-giving you total control over your system, so you can get more done, faster. Building on Mark Sobell's highly praised A Practical Guide to the UNIX System, it delivers comprehensive guidance on the UNIX command line tools every user, administrator, and developer needs to master-together with the world's best day-to-day UNIX reference. This book is packed with hundreds of high-quality examples. From networking and system utilities to shells and programming, this is UNIX from the ground up-both the "whys" and the "hows"-for every Mac user. You'll understand the relationships between GUI tools and their command line counterparts. Need instant answers? Don't bother with confusing online "manual pages": rely on this book's example-rich, quick-access, 236-page command reference! Don't settle for just any UNIX guidebook. Get one focused on your specific needs as a Mac user! A Practical Guide to UNIX ® for Mac OS ® X Users is the most useful, comprehensive UNIX tutorial and reference for Mac OS X and is the only book that delivers Better, more realistic examples covering tasks you'll actually need to perform Deeper insight, based on the authors' immense knowledge of every UNIX and OS X nook and cranny Practical guidance for experienced UNIX users moving to Mac OS X Exclusive discussions of Mac-only utilities, including plutil , ditto , nidump , otool , launchctl , diskutil , GetFileInfo , and SetFile Techniques for implementing secure communications with ssh and scp -plus dozens of tips for making your OS X system more secure Expert guidance on basic and advanced shell programming with bash and tcsh Tips and tricks for using the shell interactively from the command line Thorough guides to vi and emacs designed to help you get productive fast, and maximize your editing efficiency In-depth coverage of the Mac OS X filesystem and access permissions, including extended attributes and Access Control Lists (ACLs) A comprehensive UNIX glossary Dozens of exercises to help you practice and gain confidence And much more, including a superior introduction to UNIX programming tools such as awk , sed , otool , make , gcc , gdb , and CVS
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 140
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: 360 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The fastest route to true Linux mastery! You know your way around Windows (or maybe a Mac, or even UNIX). Now, you're ready for Linux. And you don't have a minute to waste. Welcome. This book's for you . Janet Valade has spent thirteen years helping new users master Linux and related technologies. She knows the "magic words" that'll help you get the job done, fast. (And she knows exactly how to keep you out of trouble, too!) You'll learn Linux through dozens of focused, bite-size examples, each one carefully designed to build on what you've learned before. Need specific solutions? This book's carefully crafted, high-efficiency format delivers them... instantly . Working on Fedora? Mandrake? SuSE? No matter. This book is for you. No other introduction to Linux covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with Linux- without the hassles! Choose the best Linux distribution for your personal or business needs Get Linux installed quickly and running reliably Handle your day-to-day tasks and efficiently manage your files Master KDE, GNOME, and the Linux command line Write documents and build spreadsheets with OpenOffice.org Set up Web access, email, and instant messaging Work with powerful Linux multimedia and graphics software Find, install, and run new Linux software Set up your printer to work with Linux Supercharge Linux with shell scripts and customized configuration files Includes concise Linux command reference and quick guide to building powerful Regular Expressions Spring Into ... is a new series of fast-paced tutorials from Addison-Wesley Professional Publishers. Each book in the series is designed to bring you up-to-speed quickly. Complex technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working... now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 141
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 282 p. , ill., maps ; , 24 cm
    Keywords: Economic forecasting ; Globalization ; Economic aspects ; Industrial management ; International business enterprises ; International economic integration ; Electronic books ; local
    Abstract: Globalization is a fact. You can't stop it; it has already happened; it is here to stay. And we are moving into a new global stage. A radically new world is taking shape from the ashes of yesterday's nation-based economic world. To succeed, you must act on the global stage, leveraging radically new drivers of economic power and growth. Legendary business strategist Kenichi Ohmae-who in The Borderless World , published in 1990, predicted the rise and success of globalization, coining the very word-synthesizes today's emerging trends into the first coherent view of tomorrow's global economy-and its implications for politics, business, and personal success. Ohmae explores the dynamics of the new "region state," tomorrow's most potent economic institution, and demonstrates how China is rapidly becoming the exemplar of this new economic paradigm. The Next Global Stage offers a practical blueprint for businesses, governments, and individuals who intend to thrive in this new environment. Ohmae concludes with a detailed look at strategy in an era where it's tougher to define competitors, companies, and customers than ever before. As important as Huntington's The Clash of Civilizations , as fascinating as Friedman's The Lexus and the Olive Tree , this book doesn't just explain what's already happened: It offers a roadmap for action in the world that's beginning to emerge. Why Keynes' and Milton Friedman's economics are -and what might replace them New economics for a borderless world history From Windows to English to your global brand Leveraging today's most powerful platforms for growth Anticipating technological obsolescence-and jumping ahead of it Technology: driving business death-and rebirth What government can do when nation-states don't matter Government in the post-national era Honing your global vision and global leadership skills Leadership and strategy on the global stage
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 142
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The all-in-one practical guide to supporting your Cisco network Provides detailed tips for using freeware and open-source tools readily available from the Internet, including the reasons behind choosing a particular tool Refer to a single source for common Cisco network administration issues Dedicated section for network security aids administrators in effectively dealing with security issues Deploy fully functional RADIUS and TACACS+ for servers for controlling access to Cisco devices Deploy Linux- and Windows-based syslog servers to centrally collect syslog information generated by Cisco devices Deploy Linux- and Windows-based network monitoring systems to monitor interface traffic through Cisco devices including routers, switches, VPN concentrators, and Cisco PIX® firewalls Use the trending feature of network monitoring systems for long-term network analysis and capacity planning Automatically detect and report configuration changes on Cisco IOS® Software-based devices and Cisco PIX firewalls Deploy Cisco-based VPNs in mixed environments using Linux- and Windows-based VPN servers Network Administrators Survival Guide solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco® networks using freeware tools. It is a single reference source that explains particular issues, their significance for administrators, and the installation and configuration process for the tools. The solutions are Cisco centric and provide detail not available in generic online information. Network Administrators Survival Guide emphasizes solutions for network managers and administrators of small to medium-sized businesses and enterprises. Each chapter is broadly based on a network administration function, starting with an overview of the topic, followed by the methodology involved to accomplish that function. This includes the tools available, why they are the right choice, and their installation, configuration, and usage methods. For any given function, Network Administrators Survival Guide covers both Windows- and Linux-based tools as appropriate. Most of the Windows-based tools offer the advantage of GUI for ease of use, whereas the Linux-based tools are command-line based and can be used in automated scripts. Both are significant for network administrators. Based on author Anand Deveriya's extensive field experience, this practical guide to maintaining Cisco networks will save you signifi...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 143
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A complete configuration manual for MPLS, MPLS VPNs, MPLS TE, QoS, Any Transport over MPLS (AToM), and VPLS Understand the crucial Cisco commands for various MPLS scenarios Understand fundamentals of MPLS operation and learn to configure basic MPLS in Frame Relay and ATM-based environments Master fundamentals of MPLS VPN operation including Multiprotocol BGP (MBGP) operation, VPNv4 route exchange, and basic MPLS VPN configuration in the provider network Understand and configure various PE-CE routing protocols in MPLS VPN networks Understand MPLS VPN provisioning in an Inter-provider VPN (Inter-AS) and Carrier Supporting Carrier (CSC) environment Learn MPLS TE and its advanced features Examine AToM with configuration examples for like-to-like and any-to-any L2 VPN implementations and VPLS components and operation, VPLS configuration and verification, and VPLS topologies Learn about MPLS QoS, including configuration and implementation of uniform and short pipe modes MPLS Configuration on Cisco IOS Software is a complete and detailed resource to the configuration of Multiprotocol Label Switching (MPLS) networks and associated features. Through its practical, hands-on approach, you'll become familiar with MPLS technologies and their configurations using Cisco IOS® Software. MPLS Configuration on Cisco IOS Software covers basic-to-advanced MPLS concepts and configuration. Beyond its emphasis on MPLS, you'll learn about applications and deployments associated with MPLS, such as traffic engineering (TE), Layer 2 virtual private networks (VPN), and Virtual Private LAN Service (VPLS). You'll receive practical guidance and deployment scenarios that can be enhanced by re-creation of the setups and configurations demonstrated within this book. You'll move quickly from a brief overview of MPLS technology and basic MPLS configuration on Cisco® routers to more advanced topics. Several chapters provide instruction on VPN connectivity options, including implementing Border Gateway Protocol (BGP) in MPLS VPNs. You'll receive configuration guidelines for advanced MPLS implementations such as MPLS TE, quality of service (QoS), and extranet VPNs. You'll learn about implementation of Layer 2 VPNs versus Layer 3 VPNs with Cisco Any Transport over MPLS (AToM). And you'll see demonstrations of implementing VPLS on Cisco routers complete with the configurations and platform support. "I highly recommend MPLS Configuration on Cisco IOS Software as required reading for th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 144
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxi, 370 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Broadband communication systems ; Extranets (Computer networks) ; MPLS standard ; Electronic books ; local
    Abstract: Implement the design principles and configurations behind MPLS-based VPNs for broadband access networks The book discusses how MPLS and its VPN service are best used in a broadband environment, concentrating on key design issues and solutions, including How to manage tens of thousands of interfaces and host routes and hundreds of dynamic VPNs When a Virtual Home Gateway is necessary Why use dynamic address assignment How routes should be summarized into the core Deploy MPLS VPNs successfully in broadband networks with Building MPLS-Based Broadband Access VPNs . This book helps you understand why and how today's broadband networks function, covering the principal access technologies: DSL, Ethernet, and cable. The book also examines the different tunneling protocols used for VPN solutions today, namely GRE, IPSec, and L2TP, with examples of how these solutions are deployed and a discussion of their strengths and weaknesses. Building MPLS-Based Broadband Access VPNs also includes an in-depth description of the IOS VRF Lite, which helps you use VRF-aware features with an IP core. Detailed descriptions of the technologies, design principles, network configurations, and case studies are provided throughout the book, helping you develop a pragmatic understanding of MPLS-based broadband access VPNs. Obtain a realistic understanding of large-scale broadband access network design requirements Recognize the business impact of using MPLS to provide access VPN services, including the advantages of QoS, availability, and provisioning Use MPLS in access VPN and transport networks and deal with the unique scalability problems that such networks pose Leverage VRF-aware features to deploy IP-based VPNs Includes detailed Cisco IOS configuration examples based on real-world scenarios This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references (p. [341]-355) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 145
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 658.4/038
    Keywords: Chief information officers ; Information resources management ; Information technology ; Management ; Management ; Electronic books ; local
    Abstract: World-class IT leadership solutions from working CIOs: detailed, realistic, proven Every year, IT leadership becomes more challenging. Don't go it alone. Get practical help from the people who know what you're up against, and know what works: your most successful peers . In CIO Wisdom II, more than a dozen of today's leading CIOs share specific, realistic, up-to-the-minute techniques for maximizing agility, cost-effectiveness, and business value . You'll find solutions for managing both the internal and external forces impacting IT, and for dealing with more than 20 of your toughest issues -- business, technical, and human . You'll find specific, realistic approaches to everything from architecture to outsourcing, new technology selection to governance. CIO Wisdom II: it's more valuable than your last consultant -- and a whole lot more cost-effective. Anticipating the next transformation in your role as CIO -- and getting ahead of the curve Delivering real-time, mission-critical business intelligence: lessons from the military Integrating the enterprise: New best practices and cost-effective technical options Quantifying and maximizing software return on investment Mastering five crucial lessons for successful IT outsourcing Managing outsourced environments for maximum responsiveness, flexibility, and efficiency Leveraging the value of open source -- and minimizing its risks Using IT to improve business processes -- and improving your own internal processes, including procurement Systematically securing your IT facilities Achieving compliance -- and leveraging those investments for competitive advantage Previewing tomorrow's key trends in information management © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 146
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Praise for Mark Sobell's Books "I keep searching for books that collect everything you want to know about a subject in one place, and keep getting disappointed. Usually the books leave out some important topic, while others go too deep in some areas and must skim lightly over the others. A Practical Guide to Red Hat® Linux® is one of those rare books that actually pulls it off. Mark G. Sobell has created a single reference for Red Hat Linux that cannot be beat! This marvelous text (with a 4-CD set of Linux Fedora Core 2 included) is well worth the price. This is as close to an 'everything you ever needed to know' book that I've seen. It's just that good and rates 5 out of 5." -Ray Lodato, Slashdot contributor "Mark Sobell has written a book as approachable as it is authoritative." -Jeffrey Bianchine, Advocate, Author, Journalist "Excellent reference book, well suited for the sysadmin of a linux cluster, or the owner of a PC contemplating installing a recent stable linux. Don't be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs." -Wes Boudville, Inventor " A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you Mark Sobell." -C. Pozrikidis, University of California at San Diego "This book presents the best overview of the Linux operating system that I have found. . . . It should be very helpful and understandable no matter what the reader's background is: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready." -Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group FRUUG, Boulder, Colorado "Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There's no other book that discusses so many different topics and in such depth." -Eugenia Loli-Queru, Editor in Chief, OSNews.com The Most Useful Linux Tutorial and Reference Ever, with Hundreds of High-Quality Examples Covering Every Linux Distribution! To be truly productive with Linux, you need to thoroughly mast...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 147
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 689 p. , ill. ; , 24 cm
    DDC: 005.2'762
    Keywords: PHP (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: "This book, written by my colleague, Andi Gutmans, and two very prominent PHP developers, Stig Bakken and Derick Rethans, holds the key to unlocking the riches of PHP 5. It thoroughly covers all of the features of this new version, and is a must have for all PHP developers interested in exploring PHP 5's advanced features" -Zeev Suraski, Co-Designer of PHP 5 and Co-Creator of the Zend Engine Expert PHP 5 programming techniques, direct from PHP 5 co-creator and key developers Definitive coverage of the PHP object model, design patterns, XML/SOAP integration, and more Solid introduction and expert insights into performance tuning, PEAR, extensions, and database access The definitive introduction to PHP 5's advanced features! The definitive introduction for today's most powerful PHP 5 techniques In this book, PHP 5's co-creator and two leading PHP developers show you how to make the most of PHP 5's industrial-strength enhancements in any project-no matter how large or complex. Their unique insights and realistic examples illuminate PHP 5's new object model, powerful design patterns, improved XML Web services support, and much more. Whether you're creating web applications, extensions, packages, or shell scripts-or migrating PHP 4 code-here are high-powered solutions you won't find anywhere else. Review PHP's syntax and master its object-oriented capabilities-from properties and methods to polymorphism, interfaces, and reflection Master the four most important design patterns for PHP development Write powerful web applications: handle input, cookies, session extension, and more Integrate with MySQL, SQLite, and other database engines Provide efficient error handling that's transparent to your users Leverage PHP 5's improved XML support-including parsing, XSLT conversions, and more Build XML-based web services with XML-RPC and SOAP Make the most of PEAR: work with the repository, use key packages, and create your own Upgrade PHP 4 code to PHP 5-compatibility issues, techniques, and practical workarounds Improve script performance: tips and tools for PHP optimization Use PHP extensions to handle files/streams, regular expressions, dates/times, and graphics Create original extensions and shell scripts If you're a software developer new to PHP, you'll leap quickly into PHP and its new object-oriented capabilities. If you're an experienced PHP programmer, you already recognize PHP's convenience and simplicity. Now, discover all of its extraordinary pow...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 148
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 396 p. , ill. ; , 23 cm
    DDC: 004.692
    Keywords: Spam (Electronic mail) ; Spam filtering (Electronic mail) ; Electronic books ; local
    Abstract: Real Anti-Spam Help for System Administrators In Slamming Spam , two spam fighters show you how to fight back-and win. Unlike most spam books, this one is written specifically for in-the-trenches system administrators: professionals who need hands-on solutions for detecting, managing, and deterring spam in Unix/Linux and/or Microsoft Windows environments. The authors offer deep, administrator-focused coverage of the most valuable open-source tools for reducing spam's impact in the enterprise-especially SpamAssassin. Drawing on their extensive experience in developing and implementing anti-spam tools, the authors present expert insights into every leading approach to fighting spam, including Bayesian filtering, distributed checksum filtering, and email client filtering. Coverage includes Step-by-step junk mail filtering with Procmail Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse McAfee SpamKiller for Lotus Domino McAfee SpamKiller for Microsoft Exchange Implementing and managing SpamAssassin Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords Sender verification techniques, including challenge/response, special use addresses, and sender compute Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs-IT staff time, network/computing resources, and user productivity. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 363-374) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 149
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    ISBN: 0321267974
    Language: English
    Pages: xviii, 475 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    Series Statement: The Addison-Wesley object technology series
    Parallel Title: Erscheint auch als
    DDC: 005.1
    Keywords: Computer software Development ; UML (Computer science) ; Electronic books ; local ; Computer software ; Development ; UML (Computer science) ; UML (Informatique) ; Engenharia de software ; Uml
    Abstract: For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the artifacts of a software-intensive system. As the de facto standard modeling language, the UML facilitates communication and reduces confusion among project stakeholders. The recent standardization of UML 2.0 has further extended the language's scope and viability. Its inherent expressiveness allows users to model everything from enterprise information systems and distributed Web-based applications to real-time embedded systems. In this eagerly anticipated revision of the best-selling and definitive guide to the use of the UML, the creators of the language provide a tutorial to its core aspects in a two-color format designed to facilitate learning. Starting with an overview of the UML, the book explains the language gradually by introducing a few concepts and notations in each chapter. It also illustrates the application of the UML to complex modeling problems across a variety of application domains. The in-depth coverage and example-driven approach that made the first edition of The Unified Modeling Language User Guide an indispensable resource remain unchanged. However, content has been thoroughly updated to reflect changes to notation and usage required by UML 2.0. Highlights include: A new chapter on components and internal structure, including significant new capabilities for building encapsulated designs New details and updated coverage of provided and required interfaces, collaborations, and UML profiles Additions and changes to discussions of sequence diagrams, activity diagrams, and more Coverage of many other changes introduced by the UML 2.0 specification With this essential guide, you will quickly get up to speed on the latest features of the industry standard modeling language and be able to apply them to your next software project.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 150
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network. Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization's network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks. Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks. Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources. "This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade." -...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 151
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Field-proven MPLS designs covering MPLS VPNs, pseudowire, QoS, traffic engineering, IPv6, network recovery, and multicast Understand technology applications in various service provider and enterprise topologies via detailed design studies Benefit from the authors' vast experience in MPLS network deployment and protocol design Visualize real-world solutions through clear, detailed illustrations Design studies cover various operator profiles including an interexchange carrier (IXC), a national telco deploying a multiservice backbone carrying Internet and IP VPN services as well as national telephony traffic, an international service provider with many POPs all around the globe, and a large enterprise relying on Layer-3 VPN services to control communications within and across subsidiaries Design studies are thoroughly explained through detailed text, sample configurations, and network diagrams Definitive MPLS Network Designs provides examples of how to combine key technologies at the heart of IP/MPLS networks. Techniques are presented through a set of comprehensive design studies. Each design study is based on characteristics and objectives common to a given profile of network operators having deployed MPLS and discusses all the corresponding design aspects. The book starts with a technology refresher for each of the technologies involved in the design studies. Next, a series of design studies is presented, each based on a specific hypothetical network representative of service provider and enterprise networks running MPLS. Each design study chapter delivers four elements. They open with a description of the network environment, including the set of supported services, the network topology, the POP structure, the transmission facilities, the basic IP routing design, and possible constraints. Then the chapters present design objectives, such as optimizing bandwidth usage. Following these are details of all aspects of the network design, covering VPN, QoS, TE, network recovery, and-where applicable-multicast, IPv6, and pseudowire. The chapters conclude with a summary of the lessons that can be drawn from the design study so that all types of service providers and large enterprise MPLS architects can adapt aspects of the design solution to their unique network environment and objectives. Although network architects have many resources for seeking information on the concepts and protocols involved with MPLS, there is no single resource that illustrat...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 152
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 454 p. , ill. ; , 24 cm
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions. Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems. Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detectio...
    Note: Includes bibliographical references (p. [427]-430) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 153
    Online Resource
    Online Resource
    Alexandria, VA : ASTD Press | Boston, MA :Safari,
    Language: English
    Pages: x, 193 p. , ill. ; , 28 cm. +
    Keywords: Diversity in the workplace ; Handbooks, manuals, etc ; Diversity in the workplace ; Study and teaching ; Handbooks, manuals, etc ; Employees ; Training of ; Handbooks, manuals, etc ; Intercultural communication ; Handbooks, manuals, etc ; Interpersonal relations ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Traditionally, diversity education initiatives involve the catch phrase celebrate diversity. While the authors applaud this approach, this book offers a fresh perspective that focuses instead on the search for common ground among individuals and groups. In addition, the four fully scripted diversity modules allow you to develop a customized program quickly or enhance an existing diversity imitative. All ready-to-use PowerPoint slides, handouts, and other materials are included on a companion CD-ROM.
    Note: Accompanying CD-ROM includes: Adobe.pdf documents (assessments, tools, training instruments); Microsoft PowerPoint presentations which add to training activities in the book; Microsoft PowerPoint files of overhead transparency masters to facilitate printing of viewgraphs and handouts. - Includes bibliographical references (p. 189-191)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 154
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Become a savvy Microsoft Excel user. Pivot tables are a great feature in Excel that help you organize and analyze data, but not many Excel users know how to use pivot tables. Pivot Table Data Crunching offers a comprehensive review of all the functionalities of Pivot Tables from author Bill Jelen , otherwise known as Mr. Excel from www.mrexcel.com, and Michael Alexander , a Microsoft Certified Application Developer. The authors' practical scenarios and real-world advice demonstrate the benefits of Pivot Tables and how to avoid the common pitfalls of every day data crunching. Each solution presented in the book can be accomplished with resources available in the Excel interface, making Pivot Table Data Crunching a beneficial resource for all levels of Excel users.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 155
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: viii, 251 p. , ill. ; , 23 cm
    Keywords: Home economics ; Time management ; Electronic books ; local
    Abstract: Add three kids, two sporting events on opposite ends of town, a ballet lesson, and a scout event all in one Saturday and what do you get? An overwhelmed family struggling to just make it through the day. If this sounds all too familiar, Organize Your Family's Schedule In No Time is the book that will help you get control of the calendar. Valentina Sgro, a professional organizer, shows you how to find more family time for fun and relaxation using a system that is customized to your family's unique needs. Using to-do lists and step-by-step instructions, this book helps the entire family better organize the group calendar, project list, homework schedule, and chores. In addition, Valentina helps parents to teach their kids essential organizational skills and good study and scheduling habits. With quick, easy projects, you'll learn how to: Select the planner that is best for you - either paper or electronic Choose a comfortable mix of activities for everyone in the family and avoid overscheduling Schedule the planning and preparations for family events, such as birthday parties and vacations Help children of any age organize their time Deal with special circumstances such as homeschooling your children, caring for an aging relative, or searching for the right college for your teenager Enjoy precious time with your family with the help of Organize Your Family's Schedule In No Time !
    Note: Includes bibliography and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 156
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: x, 136 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Intranets (Computer networks) ; Handbooks, manuals, etc ; Web servers ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: There's nothing like teamwork for making progress on a project, but sharing information and building on each other's successes can be challenging when your team is scattered across the miles. Microsoft's SharePoint helps teams and organizations close the distance. With SharePoint, groups construct web sites specifically for collaboration--sites where individuals can capture and share ideas, and work together on documents, tasks, contacts, and events. It's the next best thing to being in the room together.Unfortunately, much of the documentation for SharePoint is written to help system administrators get it up and running, which often leaves end users in the dark. The SharePoint User's Guide takes another approach: this quick and easy guide shows you what you need to know to start using SharePoint effectively and how to get the most from it. You'll learn how to create sites that your organization can use to work together or independently, from an end user's point of view. Now, even beginners can learn how to: access sites that are already set up create new sites personalize sites use the document and picture libraries for adding and editing content add discussion boards and surveys to a site enhance security You'll learn how you can receive alerts to tell you when existing documents and information have been changed, or when new information or documents have been added. You can even share select information with partners or customers outside your organization. No one that uses SharePoint collaboration services can afford to be without this handy book.The SharePoint User's Guide is designed to help you find answers quickly, explaining key concepts and major points in straightforward language. With SharePoint, any team or organization can overcome geographic or time-zone challenges, and the SharePoint User's Guide will show them how.
    Note: "Getting started with SharePoint collaboration services"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 157
    Language: English
    Pages: xvii, 663 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Series Statement: In a nutshell
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Windows XP in a Nutshell , Second Edition documents everything there is to know about the world's most widely used operating system. Updated to include information on Service Pack 2 (SP2), this compact guide is the ultimate resource for IT professionals and Windows XP power users everywhere. Written in O'Reilly's time-tested in a Nutshell format, Windows XP in a Nutshell , Second Edition cuts through the hype and delivers practical details in a no-nonsense manner. At the heart of the book is an invaluable 200-plus-page section titled Windows XP Application and Tools. In it, readers will find: A list of available commands and utilities, including Start Menu accessories, command prompt tools, and hidden system administration utilities A Task and Setting Index for quick access to hundreds of XP settings A complete reference to XP's command prompt, including advanced commands and scripting features Windows XP in a Nutshell , Second Edition also includes a primer on files, folders, and windows; control panels and built-in applications; how to set up a PC for Internet use; and the standard Windows rituals of troubleshooting, installation, and upgrading. And, of course, this greatly expanded second edition also includes all the need-to-know details about the security technologies featured in SP 2, so you can better defend yourself against viruses, worms, and hackers. Readers even receive guidelines and instructions for installing SP2 on their PC, or across a network of computers. With its wealth of tips, careful instruction, and expert advice, this must-have desktop reference is dedicated to making your time at the computer safer, easier, and more fun.
    Note: "Covers Service Pack 2"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 158
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 333 p., [16] p. of plates , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Spam (Electronic mail) ; Electronic books ; local
    Abstract: More than sixty percent of today's email traffic is spam, according to email filtering firm Brightmail. This year alone, five trillion spam messages will clog Internet users in-boxes, costing society an estimated $10-billion in lost productivity, filtering software, and other expenses. Spam Kings: The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, and %*)# Enlargements is the first book to expose the shadowy world of the people responsible for the junk email problem. Author and veteran investigative journalist Brian S. McWilliams delivers a compelling account of the cat-and-mouse game played by spam entrepreneurs in search of easy fortunes and those who are trying to stop them. Spam Kings chronicles the evolution of Davis Wolfgang Hawke, a notorious neo-Nazi leader (Jewish-born) who got into junk email in 1999. Using Hawke as a case study, Spam Kings traces the twenty-year-old neophyte's rise in the spam trade to his emergence as a major player in the lucrative penis pill market--a business that would eventually make him a millionaire and the target of lawsuits from AOL and others. Spam Kings also tells the parallel story of Susan Gunn, a computer novice in California who is reluctantly drawn into the spam wars and eventually joins a group of anti-spam activists. Her volunteer sleuth work puts her on a collision course with Hawke and other spammers, who try to wreak revenge on the antis. You'll also meet other cyber-vigilantes who have taken up the fight against spammers as well as the cast of quirky characters who comprise Hawke's business associates.The book sheds light on the technical sleight-of-hand--forged headers, open relays, harvesting tools, and bulletproof hosting--and other sleazy business practices that spammers use; the work of top anti-spam attorneys; the surprising new partnership developing between spammers and computer hackers; and the rise of a new breed of computer viruses designed to turn the PCs of innocent bystanders into secret spam factories.
    Note: Includes bibliographical references (p. 309-320) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 159
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 377 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/762
    Keywords: Apache (Computer file : Apache Group) ; Application software ; Development ; Java (Computer program language) ; Open source software ; Electronic books ; local
    Abstract: As a Java developer, you're always looking for tools to help in your web and application development. Maybe you've heard of the Jakarta Commons open source Java tools. The Jakarta Commons is an open source Jakarta subproject where developers create and maintain a collection of twenty-plus independent Java components and utilities that serve useful purposes. Jakarta Commons packages include utilities for web, XML, networking, building and testing applications, and some that help other packages work better together. Jakarta Commons packages are designed to be reusable. Each one is a time saver by itself, and when used in combination the results can be very powerful. But in searching for information on the Jakarta Commons tools, you find it hard to locate documentation relevant to your needs. You don't have lots of time to spend searching for information on a specific Jakarta Commons tool to determine what it does and how to incorporate it in your code. If you are looking for a single source for clear information and samples on how to use the Jakarta Commons tools, then the Jakarta Commons Cookbook is for you. The Jakarta Commons Cookbook summarizes each of the available Jakarta Commons packages and contains practical and efficient recipes for making the most out of the Jakarta Commons open source Java tools. You don't have to be an expert, since the book explains how and why to use a utility, pitfalls to avoid, and where to look for additional information on Jakarta Commons utilities. It introduces design possibilities and explores combining Jakarta Commons utilities in novel assemblies to create complex applications. The book offers detailed code samples and insider tips--making it a valuable resource whether you are an expert Java developer or a novice. If you want to quickly learn how to use Jakarta Commons timing-saving utilities or have an invaluable resource for Jakarta Commons questions and techniques, then the Jakarta Commons Cookbook is for you.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 160
    Language: English
    Pages: xviii, 615 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 004.5/6
    Keywords: Linux device drivers (Computer programs) ; Electronic books ; local
    Abstract: Device drivers literally drive everything you're interested in--disks, monitors, keyboards, modems--everything outside the computer chip and memory. And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic Linux Device Drivers from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.Over the years the book has helped countless programmers learn: how to support computer peripherals under the Linux operating system how to develop and write software for new hardware under Linux the basics of Linux operation even if they are not expecting to write a driver The new edition of Linux Device Drivers is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.
    Note: On t.p. of previous ed. Alessandro Rubini's name appeared first. - Includes bibliographical references (p. 575-577) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 161
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit | Boston, MA :Safari,
    Language: English
    Pages: xvii, 396 p. , ill. ; , 23 cm
    Keywords: Adobe Premiere ; Digital video ; Editing ; Data processing ; Electronic books ; local
    Abstract: Just because you don't work for a major production house and you don't plan to add Star Wars style special effects to your latest movie project doesn't mean you don't want to do interesting things with the video you've shot. Now, with Adobe's first consumer-level video editing software you can-and at $99, you won't spend an arm and a leg to do so! In these pages, veteran author Antony Bolante provides all the instruction you need to start editing video fast with Adobe Premiere Elements. Just as Photoshop Elements brought image manipulation to the masses, Premiere Elements brings video editing prowess to anybody who owns a digital video camera. Whether you're a student filmmaker, a video hobbyist, or a proud parent who wants to put together a snazzy film of your daughter's winning soccer season, Antony's simple step-by-step instructions and straightforward teaching style will have you capturing and importing video, creating transitions and titles, and outputting the final product with Premier Elements in no time.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 162
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 798 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: "The book you are about to read will arm you with the knowledge you need to defend your network from attackers-both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." -Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security-one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." -Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." -Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." -Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes-resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools-including Sguil, Argus, and Ethereal-to mine network traffic for full content, session, statistical, and ale...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 163
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 401 p. , ill. ; , 23 cm
    Keywords: TCP/IP (Computer network protocol) ; Electronic books ; local
    Abstract: Your first step into the world of TCP/IP No TCP/IP experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding TCP/IP begins here! Learn TCP/IP basics Discover the power of TCP/IP components and subcomponents Use hands-on activities to understand TCP/IP Benefit from examples that illustrate the power of TCP/IP Welcome to the world of TCP/IP! TCP/IP is the world's de facto communications protocol. It is the official protocol of the Internet and, consequently, has become the predominant communications protocol suite in many private networks and internetworks. No TCP/IP experience needed! TCP/IP First-Step explores TCP/IP concepts in a reader-friendly manner that assumes no previous experience. Learn about packetized data transfer, open networking, reference models, and standards bodies. Understand the architecture of the TCP/IP protocol suite and learn about its components, functions, and respective uses. TCP/IP First-Step helps you understand TCP/IP's role in the network. Learn more about the First-Step Series at www.ciscopress.com/firststep.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 164
    Online Resource
    Online Resource
    Alexandria, VA : American Society for Training and Development | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The juxtaposition of the words "lecture" and "interactive" might at first appear an unlikely pairing, but Thiagi has managed to pull off an intellectual slight of hand in Interactive Lectures so that the unusual word association makes perfect sense. While admitting that lectures are "probably the most ridiculed training technique," the author provides a solid argument for taking a second look at the method. He offers readers seven well-tested interactive lecture methods capable of turning almost any stand-up lecture into true two-way communication by incorporating highly stimulating game elements and exercises. The book offers specific guidance on how and when to use the games and exercises provided in the book along with step-by-step instructions for their application and blending in the classroom. In addition, icons throughout the book refer the reader to a full set of handouts that are included in the appendix section of the book. Readers are encouraged to photocopy or modify these useful tools to meet the specific needs of most audiences and lecture topics.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 165
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xix, 386 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    DDC: 004
    Keywords: Computers ; Electronic books ; local
    Abstract: Think setting up your new PC is going to be a challenge that you don't have time for? Think again. Absolute Beginner's Guide to Computer Basics, Third Edition can make setting up and learning about your new computer fun and easy. Step-by-step instructions and helpful illustrations will show you how to set up your computer, begin using Microsoft Windows XP and personalize your Windows XP experience. You'll also learn how to: Work with files and folders Add new hardware and devices to your system Perform maintenance and diagnose common problems Install new software Use the Internet Protect your PC from viruses, spam and other nuisances This latest edition has been updated to include coverage of Windows XP Service Pack 2, Windows Media Player 10 and 802.11g wireless networks. You'll also get the chance to explore how to use portable media players, safely shop online, buy and sell things on eBay, and how to use your digital camera and software to create digital scrapbooks. Absolute Beginner's Guide to Computer Basics, Third Edition is the most up-to-date guide for beginning computer users on the market and will be the only book you need to get up and running with your computer.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 166
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: We all have those "go-to" people in our lives. The one you go-to for advice, the one you go-to for comfort, the one you go-to with technical questions...now you can be the one that others go-to for help with Microsoft Office 2003. Tricks of the Microsoft Office Gurus is full of exclusive tricks from Paul McFedries , an Office "insider," that will help you learn the Office applications inside and out. Designed to bridge the gap between your expectation and reality, you will go beyond the basics and learn newly discovered techniques, shortcuts and best practices, including: Using Excel's "Camera Tool" for what-if analysis Embedding fonts in shared documents Adding a live stock price quote to a worksheet Using dummy text to layout and format a document Publishing Outlook Calendar to the web Using Word to customize Power Point handouts Through real-world examples that showcase how the tips and tricks can be used in everyday business tasks, Tricks of the Microsoft Office Gurus will help you get the most out of Office 2003.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 167
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: 915 p. ; , 23 cm
    Keywords: Electronic books ; local
    Abstract: Novell eDirectory (formerly Novell Directory Services- NDS) is employed by system administrator to define users on the network and links those same users to their access rights with corporate resources, devices like printers and security policies. Novell eDirectory is comparable to Microsoft's Active Directory and is designed for large-scale, high-end directory deployments. Its strengths are scalability and reliability, a flexible yet strong security architecture, compatibility with key industry standards and operating systems. Novell's Guide to Troubleshooting eDirectory is the definitive source for information on eDirectory troubleshooting techniques. It is the single stop reference covering topics from good design to proactive/reactive problem resolution. All of the information presented in this book has been gathered from hands-on, real world experiences of the authors.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 168
    Language: English
    Pages: xxvi, 453 p. , ill. ; , 24 cm
    Keywords: Storage area networks (Computer networks) ; Electronic books ; local
    Abstract: An Introduction to Storage Devices, Subsystems, Applications, Management, and File Systems Learn fundamental storage concepts with this comprehensive introduction Compare storage device technologies, including Fibre Channel, SCSI, ATA, and SATA and understand their uses in network storage subsystems Learn about key storage processes such as volume management, storage virtualization, data snapshots, mirroring, RAID, backup, and multipathing Clarify the roles of file systems and databases within network storage Take the next step-this book prepares you to become a storage networking expert Storage networking has become an essential ingredient in Internet information infrastructures. Becoming competent in this new and important technology area requires a sound understanding of storage technologies and principles. Storage Networking Fundamentals gives you an in-depth look into the most important storage technologies. The entire storage landscape is described, incorporating a complete view of system, device, and subsystem operations and processes. Learn how to protect data effectively using mirroring, RAID, remote copy, and backup/ recovery systems. Virtual storage technologies, such as volume management, RAID, and network virtualization, are analyzed and discussed in detail. High-availability storage through dynamic multipathing and clustered/distributed file systems is explained as are designs for robust storage subsystems. Finally, the confusing and arcane worlds of file systems and SCSI are clarified, including the role of initiators, targets, logical units, and LUNs. Storage Networking Fundamentals is a comprehensive overview of storage technologies that also provides insights on designing and running SAN and NAS implementations. This book is part of the Cisco Press Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 169
    Online Resource
    Online Resource
    Alexandria, VA : ASTD | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Needs Assessment Basics is written specifically to show you how to accomplish the important training goal of delivering relevant training as a business partner of your organization. The seven-phase needs assessment model teaches you to think organizationally, design effectively, and evaluate how your program links job performance to end results. Like all books in the Training Basics series, you will find learning guideposts along the way, including dozens of Basic Rules, Notes, and Think About This sidebars that enable the reader to scan the book and pick out and apply concepts immediately.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 170
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xi, 240 p. , ill. ; , 24 cm
    DDC: 006.5
    Keywords: Internet radio broadcasting ; Electronic books ; local
    Abstract: Has anyone ever told you that you should be on radio? While radio can be hard to break into, podcasting lets you put your voice and talents to work to create your own broadcast to be distributed over the Internet to millions of people. Absolute Beginner's Guide to Podcasting is the aspiring podcaster's handbook. Authors George Colombo and Curtis Franklin will guide you through creating, editing, and syndicating your podcast, from the kinds of equipment you need to how to design a podcast that will reach the widest audience possible to legal issues faced by podcasters. You'll also learn how to: Design a podcast that grabs - and keeps - an audience! Choose the right tools - recording software, microphones, and other equipment Create an engaging show persona - podcasting is more than just talking! Craft your 'cast into a show worth listening to with post-production secrets of the pros Set up a web page and RSS feed that will allow listeners to subscribe to your podcast Efffectively promote your podcast The tips inside Absolute Beginner's Guide to Podcasting will guide you towards creating a fun and successful podcast.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 171
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 1187 p. , ill. ; , 24 cm. +
    DDC: 005.4'476
    Keywords: NetWare ; Computer networks ; Management ; Examinations ; Study guides ; Local area networks (Computer networks) ; Management ; Study guides ; Novell software ; Examinations ; Study guides ; Electronic books ; local
    Abstract: If you are studying for the Novell CNE certification tests 681, 682, 664 or 683, you need Novell's CNE Study Guide for NetWare 6 . It is the official Novell study guide and is the most effective tool to turn the passing rate in your favor. Loaded with illustrations, screen shots and hands-on exercises, it also includes sample test questions for all exams. A CD is included that provides you with a 3-user version of NetWare 6 server and NetWare 6 client software. Go after the most sought-after certification that Novell offers with this book in your hand.
    Note: "CD-ROM included; 3-user version of NetWare 6 server; NetWare 6 client software"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 172
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams ; | Boston, MA :Safari,
    Language: English
    Pages: vii, 254 p. ; , 21 cm
    DDC: 005.72
    Keywords: PHP (Computer program language) ; Electronic books ; local
    Abstract: Are you one of those people who think there isn't anything substantial that you can do in only 10 minutes? Think again. Sams Teach Yourself PHP in 10 Minutes is a no-fluff, just-the-answers guide to building dynamic websites using PHP. Broken into 10 minute lessons, you will gain a rapid working knowledge of PHP 5 and be able to immediately put that knowledge to use in practical applications. Who ever would have thought there was so much you could do in just 10 minutes!
    Note: "Covers PHP 5.0"--Cover. - "User level: beginning-intermediate"--p. 4 of cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 173
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 504 p. , ill. ; , 23 cm
    DDC: 005.5
    Keywords: Microsoft Office ; Application software ; Development ; Microsoft .NET ; Electronic books ; local
    Abstract: This book delivers real-world strategies and coding techniques for creating Microsoft Office-based solutions that work seamlessly in the .NET environment-information that's been put to work by Microsoft's own product support and development teams.
    Note: At head of title: Microsoft. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 174
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 180 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Is there any sexier topic in software development than software testing? That is, besides game programming, 3D graphics, audio, high-performance clustering, cool websites, et cetera? Okay, so software testing is low on the list. And that's unfortunate, because good software testing can increase your productivity, improve your designs, raise your quality, ease your maintenance burdens, and help to satisfy your customers, coworkers, and managers. Perl has a strong history of automated tests. A very early release of Perl 1.0 included a comprehensive test suite, and it's only improved from there. Learning how Perl's test tools work and how to put them together to solve all sorts of previously intractable problems can make you a better programmer in general. Besides, it's easy to use the Perl tools described to handle all sorts of testing problems that you may encounter, even in other languages. Like all titles in O'Reilly's Developer's Notebook series, this "all lab, no lecture" book skips the boring prose and focuses instead on a series of exercises that speak to you instead of at you. Perl Testing: A Developer's Notebook will help you dive right in and: Write basic Perl tests with ease and interpret the results Apply special techniques and modules to improve your tests Bundle test suites along with projects Test databases and their data Test websites and web projects Use the "Test Anything Protocol" which tests projects written in languages other than Perl With today's increased workloads and short development cycles, unit tests are more vital to building robust, high-quality software than ever before. Once mastered, these lessons will help you ensure low-level code correctness, reduce software development cycle time, and ease maintenance burdens. You don't have to be a die-hard free and open source software developer who lives, breathes, and dreams Perl to use this book. You just have to want to do your job a little bit better.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 175
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 438 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 381.1702854678
    Keywords: eBay (Firm) ; Auctions ; Computer network resources ; Internet auctions ; Electronic books ; local
    Abstract: Whatever you call it--an online auction house, the world's largest flea market, or a vast social experiment--no metaphor completely describes the huge trading community that is eBay. Underneath it all, eBay is also a computer program and a complex socio-economic system, requiring experience, finesse, and the right tools to master. eBay Hacks , 2nd Edition has been completely revised and updated to make use of an array of new tools and features, as well as to reflect the changes in the eBay API, eBay's policies, and general practices of its increasingly sophisticated users. In all, the new edition of eBay Hacks sports 30 brand-new hacks plus dozens of hacks that have been expanded, deepened, or otherwise completely rewritten. eBay Hacks shows you how to become a more efficient buyer and seller with clever tricks and shortcuts that will surprise even the most experienced eBayers. The book's wide range of topics covers all aspects of using eBay, such as advanced searching techniques, sniping tools, selling strategies, photography tips, and even research techniques for PowerSellers. But eBay Hacks doesn't just cover the basics; you willl learn how to write scripts to automate tedious tasks, take better photos, and tap into the eBay API to develop your own custom tools. Unlike any other book, eBay Hacks , 2nd Edition also provides insight into the social aspects of the eBay community, with diplomatic tools to help to get what you want with the least hassle and risk of negative feedback. This bestseller supplies you with the tools you need to master eBay, whether as a buyer or seller, casual surfer or serious collector, novice or seasoned expert. With this guide, you will become a savvy power user who trades smarter and safer, makes more money, enjoys successes, and has fun doing it.
    Note: "Tips & tools for bidding, buying, and selling"--Cover. - Includes index. - Previous ed.: 2003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 176
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 185 p. , ill. ; , 23 cm
    Keywords: Computer programming ; Java (Computer program language) ; Electronic books ; local
    Abstract: Bruce Tate, author of the Jolt Award-winning Better, Faster, Lighter Java has an intriguing notion about the future of Java, and it's causing some agitation among Java developers. Bruce believes Java is abandoning its base, and conditions are ripe for an alternative to emerge. In Beyond Java , Bruce chronicles the rise of the most successful language of all time, and then lays out, in painstaking detail, the compromises the founders had to make to establish success. Then, he describes the characteristics of likely successors to Java. He builds to a rapid and heady climax, presenting alternative languages and frameworks with productivity and innovation unmatched in Java. He closes with an evaluation of the most popular and important programming languages, and their future role in a world beyond Java. If you are agree with the book's premise--that Java's reign is coming to an end--then this book will help you start to build your skills accordingly. You can download some of the frameworks discussed and learn a few new languages. This book will teach you what a new language needs to succeed, so when things do change, you'll be more prepared. And even if you think Java is here to stay, you can use the best techniques from frameworks introduced in this book to improve what you're doing in Java today.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 177
    Online Resource
    Online Resource
    Beijing ; : Pogue Press/O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: x, 257 p. , ill. ; , 24 cm
    Keywords: GarageBand (Computer file) ; Computer music ; Computer sound processing ; MIDI controllers ; Electronic books ; local
    Abstract: Whether you're a professional musician or a mere novice, Apple's GarageBand software has everything you need to produce commercial-quality recordings entirely on your own. Just imagine how many thousands of singers and instrumentalists remain undiscovered because they lack the capability to produce viable demos. Well, no more. Now there's no need to assemble a backup band or book time at a professional studio--GarageBand has it covered. And GarageBand 2: The Missing Manual gives you the know-how you need to make it all happen. It's an authoritative, witty guide to constructing digital recordings with GarageBand. Written by the master of the Missing Manual series, and a musician himself, David Pogue, this top-selling book shows you how to maximize the program's entire set of tools. Pre-recorded loops, sampled sounds, live recordings--they're all explained in easy-to-understand language. It also shows you how to apply professional-sounding effects like reverb or chorusing, and then export the finished product to iTunes, where you can download your work to an iPod, export it as an MP3, or burn it onto CDs. Now revised to reflect GarageBand's latest features, this book's second edition also addresses how to: use GarageBand's eight-track capabilities display music notation in real time enhance timing and pitch for better quality recordings change the tempo and key of recorded instruments tune guitars with GarageBand before recording So if you're chasing a dream or just having fun, GarageBand 2: The Missing Manual is the only resource you need to make the finest musical recordings possible.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 178
    Language: English
    Pages: xviii, 645 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Keywords: UNIX Shells ; Computer networks ; Security measures ; Data encryption (Computer science) ; Electronic books ; local
    Abstract: Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide . This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
    Note: "Covers SSH-2 protocol"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 179
    Online Resource
    Online Resource
    Sebastopol, CA : Pogue Press | Boston, MA :Safari,
    Language: English
    Pages: 402 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    Keywords: iTunes ; Handbooks, manuals, etc ; MP3 (Audio coding standard) ; Handbooks, manuals, etc ; MP3 players ; Handbooks, manuals, etc ; Music ; Data processing ; Handbooks, manuals, etc ; Pocket computers ; Handbooks, manuals, etc ; iPod (Digital music player) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Whether it's the ultra-thin, pocket-sized iPod or the vast music library known as iTunes, it seems like everyone is relying on these marvels of technology for their musical needs. CDs and cassettes? They're so twentieth century! But like any cutting-edge technology, improvements come fast and furious. To keep up with all the recent changes to iPod and iTunes, O'Reilly has once again fully updated and refreshed its bestselling Missing Manual. This third edition now reflects the following cool advancements: the fourth-generation iPod, which has a capacity of 10,000 songs iPod Photo and iPod Shuffle: the two newest members of the iPod family Airport Express (featuring AirTunes), a gadget that streams iTunes music wirelessly through the speakers of a nearby stereo the latest version of iTunes (4.7) Covering all iPod models for both Mac and Windows, iPod & iTunes: The Missing Manual , 3rd Edition lays bare an astonishing collection of useful tips, tricks, and shortcuts. For prospective iPod owners, it reveals how the iPod can be used as a PalmPilot, a hard drive, an e-book, and even as a GameBoy. Experienced iPodders, meanwhile, will benefit from the up-to-the-minute nature of the book's content. And if the deep reservoir of the iTunes music store is more your style, it's also the ultimate guide to the iTunes software and iTunes Music Store for both Mac and Windows. Like the rest of the Missing Manual series, iPod & iTunes: The Missing Manual is written in a witty and entertaining style that makes it an easy read for even the most non-technical of consumers.
    Note: "Covers iTunes, Music Store (Mac & PC), and the iPod shuffle"--Cover. - "Juiciest secrets of Apple's pocket virtuoso"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 180
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxi, 376 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Home automation ; Household electronics ; Electronic books ; local
    Abstract: So much of what is commonplace today was once considered impossible, or at least wishful thinking. Laser beams in the operating room, cars with built-in guidance systems, cell phones with email access. There's just no getting around the fact that technology always has, and always will be, very cool.But technology isn't only cool; it's also very smart. That's why one of the hottest technological trends nowadays is the creation of smart homes.At an increasing rate, people are turning their homes into state-of-the-art machines, complete with more switches, sensors, and actuators than you can shake a stick at. Whether you want to equip your home with motion detectors for added security, install computer-controlled lights for optimum convenience, or even mount an in-home web cam or two purely for entertainment, the world is now your oyster. Ah, but like anything highly technical, creating a smart home is typically easier said than done.Thankfully, Smart Home Hacks takes the guesswork out of the process. Through a seemingly unending array of valuable tips, tools, and techniques, Smart Home Hacks explains in clear detail how to use Mac, Windows, or Linux to achieve the automated home of your dreams. In no time, you'll learn how to turn a loose collection of sensors and switches into a well-automated and well-functioning home no matter what your technical level may be. Smart Home Hacks covers a litany of stand-alone and integrated smart home solutions designed to enhance safety, comfort, and convenience in new and existing homes. Kitchens, bedrooms, home offices, living rooms, and even bathrooms are all candidates for smart automation and therefore are all addressed in Smart Home Hacks .Intelligently written by engineering guru and George Jetson wannabe, Gordon Meyer, Smart Home Hacks leaves no stone unturned. From what to purchase to how to use your remote control, it's the ultimate guide to understanding and implementing complete or partial home automation.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 181
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 770 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Computer programs ; Electronic books ; local
    Abstract: Whether you are an Excel neophyte, a sophisticate who knows the program inside out, or an intermediate-level plodder eager to hone your skills, Excel: The Missing Manual is sure to become your go-to resource for all things Excel. Covering all the features of Excel 2002 and 2003, the most recent versions for Windows, Excel: The Missing Manual is an easy-to-read, thorough and downright enjoyable guide to one of the world's most popular, (and annoyingly complicated!) computer programs.Never a candidate for "the most user-friendly of Microsoft programs," Excel demands study, practice and dedication to gain even a working knowledge of the basics. Excel 2003 is probably even tougher to use than any previous version of Excel. However, despite its fairly steep learning curve, this marvelously rich program enables users of every stripe to turn data into information using tools to analyze, communicate, and share knowledge. Excel can help you to collaborate effectively, and protect and control access to your work. Power users can take advantage of industry-standard Extensible Markup Language (XML) data to connect to business processes.To unleash the power of the program and mine the full potential of their database talents, users need an authorative and friendly resource. None is more authoritative or friendlier than Excel: The Missing Manual . Not only does the book provide exhaustive coverage of the basics, it provides numerous tips and tricks, as well as advanced data analysis, programming and Web interface knowledge that pros can adopt for their latest project. Neophytes will find everything they need to create professional spreadsheets and become confident users. Excel: The Missing Manual covers: worksheet basics, formulas and functions, organizing worksheets, charts and graphics, advanced data analysis, sharing data with the rest of the world, and programming.If you buy just one book about using Excel, this has GOT to be it. This book has all you need to help you excel at Excel.
    Note: "Covers versions 2002 and 2003"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 182
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 445 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: FreeBSD ; OpenBSD ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Abstract: FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure.FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems.Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate.Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 183
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: 700 p. ; , 24 cm
    DDC: 005.7565
    Keywords: FileMaker pro (Computer file) ; Electronic books ; local
    Abstract: Used by millions worldwide, FileMaker Pro is an award-winning database program for managing people, projects, images, assets, and other information. It's easy to use and totally customizable--so long as you know what you're doing. But FileMaker Pro doesn't come with a printed manual, so FileMaker Pro: The Missing Manual is the authoritative, jargon-free book that should have been in the box. FileMaker Pro: The Missing Manual approaches FileMaker the way FileMaker approaches you: it's user-friendly and seemingly straightforward enough, but it offers plenty of substance worthy of deeper exploration. Packed with practical information as well as countless expert tips and invaluable guidance, it's an in-depth guide to designing and building useful databases with the powerful and pliable FileMaker Pro. Covering FileMaker for both Windows and Macintosh, FileMaker Pro: The Missing Manual is ideal for small business users, home users, school teachers, developers--anyone who wants to organize information efficiently and effectively. Whether you want to run a business, publish a shopping cart on the Web, plan a wedding, manage a student information system at your school, or program databases for clients, this book delivers. Author Geoff Coffey has many years of experience using FileMaker Pro (he was, in fact, an early beta tester for the product). Author Susan Prosser is a FileMaker Certified Developer who trains other developers. Together, Coffey and Prosser show you how to: Get FileMaker up and running quickly and smoothly Import and organize information with ease Design relational databases that are simple to use, yet powerful Take advantage of FileMaker Pro calculation capabilities Automate processes with scripting Customize FileMaker Pro to your needs and preferences Share information with other people (coworkers, clients, and customers) and other programs Understand and select the best security options What could easily come across as dry and intimidating--things like relational theory, calculations, and scripting--are presented in a way that is interesting and intuitive to mainstream users. In no time, you'll be working more productively and efficiently using FileMaker Pro.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 184
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 499 p. , ill. (some col.) ; , 24 cm
    Edition: 1st ed.
    Keywords: Adobe Photoshop elements ; Image processing ; Digital techniques ; Photography ; Digital techniques ; Electronic books ; local
    Abstract: The recent boom in digital camera sales has created a tremendous demand for simple yet powerful photo-editing software. This is because experienced users, as well as amateurs, are quickly outgrowing the program that was originally bundled with their cameras.Fortunately, Photoshop Elements 3, the latest photo-editing software from Adobe, is filling this void. It allows users to achieve high-quality results without the overwhelming complexity of professional-level software. And it's also affordable. As a result, it is the best-selling photo-editing software on the market today. Yet, while Photoshop Elements 3.0 seems to have everything going in its favor, it is missing one very important element: a manual that explains all of its incredible capabilities.To help consumers truly understand this software, there's now Photoshop Elements 3: The Missing Manual . This comprehensive guide from Barbarba Brundage offers page after page of valuable insight into this popular program, making it the only book readers will need on the topic. Photoshop Elements 3: The Missing Manual does a whole lot more than just point out how to straighten photos, crop, and adjust the color and focus. It's a collection of wonderful tips and tricks, from how to make basic selections to advanced color correction strategies, and from classic darkroom techniques to stylized digital effects. Each feature is carefully explained in easy-to-understand language, so that everyone from professional shooters to hobbyists can benefit. Among other lessons, readers will learn how to: Instantly fix flaws using Elements' Quick Fix mode Gain control with sliders, zoom tools, and before and after views Easily organize photos by calendar or keyword label Make dynamic slide shows with transitions, captions, music, and narration Create themed photo email Whether you're a hobbyist or a professional photographer, Photoshop Elements 3: The Missing Manual will help you become a more efficient, sophisticated digital camera user.
    Note: "Covers Windows & Mac"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 185
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 517 , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Many programmers code by instinct, relying on convenient habits ora "style" they picked up early on. They aren't conscious of all thechoices they make, like how they format their source, the namesthey use for variables, or the kinds of loops they use. They'refocused entirely on problems they're solving, solutions they'recreating, and algorithms they're implementing. So they write codein the way that seems natural, that happens intuitively, and thatfeels good. But if you're serious about your profession, intuition isn'tenough. Perl Best Practices author Damian Conway explainsthat rules, conventions, standards, and practices not only helpprogrammers communicate and coordinate with one another, they alsoprovide a reliable framework for thinking about problems, and acommon language for expressing solutions. This is especiallycritical in Perl, because the language is designed to offer manyways to accomplish the same task, and consequently it supports manyincompatible dialects. With a good dose of Aussie humor, Dr. Conway (familiar to manyin the Perl community) offers 256 guidelines on the art of codingto help you write better Perl code--in fact, the best Perl code youpossibly can. The guidelines cover code layout, naming conventions,choice of data and control structures, program decomposition,interface design and implementation, modularity, objectorientation, error handling, testing, and debugging. They're designed to work together to produce code that is clear,robust, efficient, maintainable, and concise, but Dr. Conwaydoesn't pretend that this is the one true universal and unequivocalset of best practices. Instead, Perl Best Practices offerscoherent and widely applicable suggestions based on real-worldexperience of how code is actually written, rather than onsomeone's ivory-tower theories on how software ought to becreated. Most of all, Perl Best Practices offers guidelines thatactually work, and that many developers around the world arealready using. Much like Perl itself, these guidelines are abouthelping you to get your job done, without getting in the way. Praise for Perl Best Practices from Perl communitymembers: "As a manager of a large Perl project, I'd ensure that everymember of my team has a copy of Perl Best Practices on theirdesk, and use it as the basis for an in-house style guide." --Randal Schwartz "There are no more excuses for writing bad Perl programs. Alllevels of Perl programmer will be more productive after readingthis book." ...
    Note: Includes bibliographical references (p. 493-494) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 186
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit ; | Boston, MA :Safari,
    Language: English
    Pages: 144 p. , ill. ; , 23 cm
    DDC: 006.686
    Keywords: Picasa (Computer file) ; Electronic books ; local
    Abstract: If you're looking for an easy way to find photos on your PC, make a few editing fixes, and then share your images with others, look no further. Picasa, available as a free download from Google.com, makes it easy to instantly find, edit and share all the pictures on your PC. Every time you open Picasa, it automatically locates all your pictures in seconds and sorts them into albums. From there, you can apply basic edits to your photos, burn them to CD, post them on your blog, or email them to friends. In this colorful, compact guide, author Steve Schwartz starts at the beginning, walking readers through the Picasa interface and showing readers how to set preferences. From there, he launches into the heart of this book, offering project-based instruction for organizing, viewing, and editing your photos, and then shows you how to use Picasa's built-in tools to print, email, or order professional prints of your images. In addition, readers will learn how to share their photos instantly with Hello, Picasa's free instant messaging software. Throughout the book, full-page, full-color screen shots and simple, step-by-step instructions lead readers through several projects, such as saving an image to the Windows desktop, creating a screensaver, making movies, generating photo-based Web pages, running a slideshow, and creating posters, collages, and contact sheets.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 187
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit | Boston, MA :Safari,
    Language: English
    Pages: 256 p. ; , 24 cm
    DDC: 621.3916
    Keywords: Microcomputers ; Design and construction ; Amateurs' manuals ; Electronic books ; local
    Abstract: Whether you're frustrated with current PC offerings (and their inflated prices) or are simply looking for a cool project to take on, building a computer from the ground up using off-the-shelf parts can offer significant advantages. In these pages, computer dudes Darrel Wayne Creacy and Carlito Vicencio outline those advantages and then show you how to build the computer of your dreams. The pair begins by explaining what components make up a PC and what you need to think about when selecting those components, before helping you determine your needs and suggesting various configurations to fit those uses. Breaking the process down into its simplest terms, the authors provide component lists for a number of different PC setups: for students, home users, multimedia/home-theater enthusiasts, high-end graphic/video/audio producers, and more. Using plain language and plenty of visual and instructional aids--photos, illustrations, diagrams, step-by-step directions, and more--the authors ensure that even someone (like you!) who knows nothing about technology can build the perfect PC! On a more personal note, the authors are donating a percentage of their income from this book to the Breast Cancer Research Foundation-to thank all the women in their lives who have supported them and battled the disease. For more information about BCRF, please visit http://www.bcrfcure.org/.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 188
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "Wow, what can I say? Chapter 4, 'The Build Lab and Personnel,' by itself is enough justification to purchase the book! Vince is obviously a 'Dirty Finger Nails' build meister and there is a lot we can all learn from how he got them dirty! There are so many gems of wisdom throughout this book it's hard to know where to start describing them! It starts where SCM should start, at the end, and works its way forward. This book is a perfect complement to the 'Follow the Files' approach to SCM that I espouse. I will recommend that every software lead and software configuration management person I work with be required to read this book!" -Bob Ventimiglia, autonomic logistics software configuration manager, Lockheed Martin Aeronautics " The Build Master contains some truly new information; most of the chapters discuss points that many people in the industry don't have a full understanding of and need to know. It's written in a way that is easy to read and will help a reader fill holes in their vision regarding software build management. I especially liked Vince's use of Microsoft stories to make his points throughout the book. I will purchase the book and make certain chapters mandatory reading for my build manager consultants." -Steve Konieczka, SCM consultant "Vince does a great job of providing the details of an actual working build process. It can be very useful for those who must tackle this task within their own organization. Also the 'Microsoft Notes' found throughout the book provide a very keen insight into the workings of Microsoft. This alone is worth purchasing this book." -Mario E. Moreira, author of Software Configuration Management Implementation Roadmap and columnist at CM Crossroads "Software configuration management professionals will find this book presents practical ideas for managing code throughout the software development and deployment lifecycles. Drawing on lessons learned, the author provides real-world examples and solutions to help you avoid the traps and pitfalls common in today's environments that require advanced and elegant software controls." -Sean W. Sides, senior technical configuration manager, Great-West Healthcare Information Systems "If you think compiling your application is a build process, then this book is for you. Vince gives us a real look at the build process. With his extensive experience in the area at Microsoft, a reader will get a look in at the Microsoft machine and also how a mature build process sh...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 189
    Online Resource
    Online Resource
    San Jose, Calif. : Adobe ; | Boston, MA :Safari,
    Language: English
    Pages: 504 p. , ill. ; , 24 cm
    DDC: 006.686
    Keywords: Adobe Photoshop (Computer file) ; Electronic books ; local
    Abstract: Photoshop is one of those programs that's so cool you just want to dive right in and start creating-but by plunging in head-first, without any guidance, you're likely to miss a lot. There's a solution: With this book, you learn by doing, getting your feet wet immediately as you progress through a series of hands-on projects that build on your growing Photoshop knowledge. Simple step-by-step instructions, review questions at the end of each chapter, and a companion CD with all of the book's project files make learning a breeze as the Adobe Creative Team takes you on a self-paced tour of the image-editing powerhouse. This bestselling guide has been completely revised to cover all of Photoshop CS2's new features, which include advanced tools for digital photographers, such as a new Spot Healing Brush for correcting scratches or blemishes, and Smart Sharpen for fixing photo blurring. Photoshop CS2 also includes loads of new creative tools, such as Vanishing Point and Image Warp. This comprehensive guide starts with an introductory tour of the software and then progresses on through lessons on everything from Photoshop's interface to more complex topics like color management, Web graphics, and photo retouching.
    Note: Includes CD-ROM
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 190
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 308 p. , ill. ; , 23 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: "This set of articles captures decades of in-the trenches experience across a broad spectrum of software topics. Joe Marasco has the scars and the smarts to articulate patterns of success that can satisfy a broad audience. He uses mathematics, physics, common sense, and storytelling along with a no-candy-coating style to provide unique perspectives on significant problems in delivering software results as a business. Whether you are a computer science theoretician, a frustrated software project manager, a successful businessman, or a skeptical programmer, you will learn a lot from this compilation." - Walker Royce , Vice President, IBM Software Services-Rational, and author of Software Project Management (Addison-Wesley) "Joe Marasco's readable essays on managing successful projects show that software development managers-no different from all managers-must embrace the fundamentals of management if they are to succeed: working through people and process to be decisive, dealing with politics, keeping on schedule, and, yes, shipping a well-developed product. Marasco uses plain English to explain many integrated skills, ranging from estimating the time it will take to really do things, to negotiating effectively, even to eloquently describing three distinct phases of our personal development. He frequently uses a 'can we talk?' conversation with a fictional colleague, Roscoe Leroy, in a Socratic dialogue to illustrate the two sides to a point in many areas (reminiscent of Galileo's writings to explain his then-heretical views); in this case, Marasco's advice will help technology professionals escape the clutches of pervasive Dilbertian incompetence, and enable readers to be more effective in our ever-changing world." - Carl Selinge r, author of Stuff You Don't Learn in Engineering School: Skills for Success in the Real World (Wiley-IEEE Press), and contributing editor of IEEE Spectrum magazine The new software management classic: in-the-trenches wisdom from legendary project leader Joe Marasco Over the course of a distinguished career, Joe Marasco earned a reputation as the go-to software project manager: the one to call when you were facing a brutally tough, make-or-break project. Marasco reflected on his experiences in a remarkable series of "Franklin's Kite" essays for The Rational Edge , Rational and IBM's online software development magazine. Now, Marasco collects and updates those essays, bringing his unique insights (and humor) to everythi...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 191
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit | Boston, MA :Safari,
    Language: English
    Pages: xxi, 374 p. , ill. ; , 23 cm
    Keywords: Adobe Acrobat ; Portable document software ; Electronic books ; local
    Abstract: Chances are good that if you use the Web or work with documents on your computer, you've come across a PDF file at least once or twice in your life. Over 500 million people have already downloaded Adobe's free Adobe Reader software and we,re betting you,re one of them, which is why we think you'll enjoy this new book on how to get the most out of the little program that,s conquering the Web. In the first-ever book on this wildly popular PDF viewer, best-selling author Ted Padova shows you that there's a lot more to Adobe Reader than you may have known. Adobe Acrobat 7.0 Professional enables document creators to turn on the familiar Acrobat commenting tools for Adobe Reader 7.0 users who are included in a document review. This means that if you have Adobe Reader 7.0, you can view, search, and print Adobe PDF files that look just like the original documents, with all formatting intact. You can also copy text and images, download and read Adobe Digital Editions (eBooks), fill in intelligent Adobe PDF forms, and view Adobe Photoshop Album slide shows and eCards. This book offers clear explanations of Adobe Reader features and fully illustrated step-by-step tasks to show you how to maximize your efficiency with this newly boosted productivity tool. So why keep wasting time? If Adobe's going to give you a free lunch, you might as well enjoy it!
    Note: An Adobe Press book. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 192
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit | Boston, MA :Safari,
    Language: English
    Pages: 195 p. , col. ill. ; , 24 x 24 cm. +
    Keywords: Adobe Photoshop ; Photography ; Digital techniques ; Electronic books ; local
    Abstract: A gaming site, a portfolio site, an information site: Each requires a home page, but each of those home pages requires disparate elements and approaches. How to Wow: Photoshop for the Web walks you through the process of designing each, plus 15 other navigation, animation, and automation projects that show you how to add wow to your Web pages with Photoshop-created graphics. Just like your favorite cookbooks-the ones with short, clear-cut instructions and mouthwatering photos of the delectable concoctions-this book identifies challenges, provides simple recipes for overcoming them, and plugs in inspirational photos of the glorious results. Part 1 takes you through a range of navigation, animation, and automation projects (creating rollover navigation, building animated slide shows, producing a dynamic Flash banner, and more), while Part 2 walks you through the steps entailed in creating home pages for gaming, portfolio, and information sites. Each project explains how to create a lush graphic element, while sidebars and glossaries provide the low-down on important underlying principles. A CD includes the lesson files and image assets required to complete the book's projects.
    Note: A CD-ROM inserted in pocket at the back of the book. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 193
    Online Resource
    Online Resource
    Berkeley, CA : Macromedia | Boston, MA :Safari,
    Language: English
    Pages: xiv, 256 p. , ill. ; , 26 cm. +
    DDC: 006.7
    Keywords: Contribute (Computer file) ; Dreamweaver (Computer file) ; Web site development ; Web sites ; Design ; Electronic books ; local
    Abstract: Tired of watching your elegantly constructed Web sites dissolve into a jumble of disorganized pages, broken links, and badly written code as they're updated and added to over time? Then get this guide and regain control by learning to design and deploy Dreamweaver sites specifically for use with Macromedia's hot, new content-management tool Contribute. In the first Macromedia-authorized book to cover this natural pairing, veteran author Joseph Lowery shows you how to develop Dreamweaver Web sites that anyone can update and maintain via Contribute. Through a series of project-based tutorials, Joseph shows you how to take advantage of the programs' shared check-in/check-out and versioning systems, integrated administration, and myriad other complementary features to create sophisticated, unbreakable sites that are a breeze for content creators and administrators alike. You'll also find lessons on handling server-side includes, establishing CSS guidelines, working with external documents, creating and using templates, and more! A companion CD includes all the lesson files you'll need to complete the book's projects. ** Please note: The lessons in the book-and their accompanying files-build upon one another. The basic files are contained in Lesson 2 which, as instructed, are used to create the basic Dreamweaver site. Each subsequent lesson's files are copied on top of the site; the lesson files are stored in the appropriate folders to make copying a one-step operation.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 194
    Online Resource
    Online Resource
    Boston, Mass. ; : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xx, 569 p. , ill. ; , 24 cm
    DDC: 004
    Keywords: Computer science ; Forensic sciences ; Electronic books ; local
    Abstract: The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools-including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for "dead analysis" Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 195
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Financial Times | Boston, MA :Safari,
    Language: English
    Pages: 293 p. , ill. ; , 24 cm
    Keywords: Investments ; Stock exchanges ; Stocks ; Electronic books ; local
    Abstract: To survive in the jungle, you must recognize thesubtle nuances that signal danger and opportunity. That's how it is inthe stock market, too. But the market's radically changed: followyesterday's signals and you'll get eaten alive. The New Laws of theStock Market Jungle systematically explains what's new -- and what itmeans to investors. Michael J. Panzner illuminates the impact ofchanging technologies, market participants, investment time horizons,speculative behavior, investor psychology, risk preferences, pricepatterns, performance metrics, and more. For the unaware, these changesmake the market far more treacherous. For those who know, they offerimmense opportunities. Join those who know: read this book.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 196
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 271 p. , ill. ; , 24 cm
    DDC: 005.3
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: "Very informative...The perfect resource when just getting started, and a great reference for someone who has used the product for some time." --John Burrows, Software Configuration Process Manager, DST Interactive, Inc. "If only this book existed when I began using InstallAnywhere!" --Daniel Kirsch, Senior Software Engineer, Symantec Corporation Software installation and deployment made simple--that's the promise of InstallAnywhere from Zero G Software. Are you harnessing the full potential of InstallAnywhere in your software installation project? InstallAnywhere Tutorial and Reference Guide is the authoritative guide for users of InstallAnywhere. It helps you maximize your investment in this powerful deployment tool by taking you step by step through easy-to-follow exercises that will unleash the power and productivity of InstallAnywhere in your organization. InstallAnywhere Tutorial and Reference Guide is perfect for developers of all knowledge levels. Whether you're just getting started or an experienced user of InstallAnywhere, this handy tutorial will help you build and reinforce the skills necessary to create reliable installations every time. And after you've mastered those skills, it is an ideal resource for troubleshooting the most common installation problems. Inside you'll find best practices for making even the most complex software deployments easy. You will learn essential InstallAnywhere user principles and effortlessly discover why InstallAnywhere is the only software installation and deployment solution you'll ever need. Highlights include: Basic installer development strategies Basic installer customization Using advanced actions, interface options, and organization concepts Managing installation locations and uninstaller issues Source and resource management Integrating InstallAnywhere with advanced build environments Developing and using custom code actions InstallAnywhere has been recognized as the preferred multiplatform software deployment and installation tool by developers worldwide. It is the recipient of prestigious industry accolades, including two consecutive Java Developer's Journal Readers' Choice Awards, the Jolt Product Excellence Award from Software Development, and JavaWorld 's Editor's Choice Award.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 197
    Language: English
    Pages: xiii, 355 p. , ill. ; , 24 cm
    DDC: 005.2/75
    Keywords: Parallel programming (Computer science) ; Electronic books ; local
    Abstract: The Parallel Programming Guide for Every Software Developer From grids and clusters to next-generation game consoles, parallel computing is going mainstream. Innovations such as Hyper-Threading Technology, HyperTransport Technology, and multicore microprocessors from IBM, Intel, and Sun are accelerating the movement's growth. Only one thing is missing: programmers with the skills to meet the soaring demand for parallel software. That's where Patterns for Parallel Programming comes in. It's the first parallel programming guide written specifically to serve working software developers, not just computer scientists. The authors introduce a complete, highly accessible pattern language that will help any experienced developer "think parallel"-and start writing effective parallel code almost immediately. Instead of formal theory, they deliver proven solutions to the challenges faced by parallel programmers, and pragmatic guidance for using today's parallel APIs in the real world. Coverage includes: Understanding the parallel computing landscape and the challenges faced by parallel developers Finding the concurrency in a software design problem and decomposing it into concurrent tasks Managing the use of data across tasks Creating an algorithm structure that effectively exploits the concurrency you've identified Connecting your algorithmic structures to the APIs needed to implement them Specific software constructs for implementing parallel programs Working with today's leading parallel programming environments: OpenMP, MPI, and Java Patterns have helped thousands of programmers master object-oriented development and other complex programming technologies. With this book, you will learn that they're the best way to master parallel programming too. 0321228111B08232004
    Note: Includes bibliographical references (p. 321-331) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 198
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Data protection ; Electronic books ; local
    Abstract: The Definitive Guide to Protecting Enterprise Data Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecycle Management , leading industry consultant Tom Petrocelli presents a systematic, coherent approach to planning and implementing cost-effective data protection. This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy. Coverage includes A complete, unique framework for considering and planning data protection Understanding storage technology from the standpoint of data protection Architecting more effective backup/restore solutions Using remote copy and replication to keep data synchronized and support immediate failover to hot sites Leveraging core computer security concepts and strategies to protect your most critical data Securing your entire storage infrastructure, not just servers Using policy-driven data protection and Data Lifecycle Management (DLM) to improve security and reduce cost Using ILM to identify your highest-value data and choose the right ways to protect it Data Protection and Information Lifecycle Management is an indispensable resource for IT executives who must plan and implement strategies for data protection; administrators who must protect data on a day-to-day basis; and product managers, consultants, and marketers responsible for crafting superior data-security solutions.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 199
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 396 p. ; , 23 cm
    DDC: 346.7304/8
    Keywords: Open source software ; Law and legislation ; United States ; Electronic books ; local
    Abstract: "I have studied Rosen's book in detail and am impressed with its scope and content. I strongly recommend it to anybody interested in the current controversies surrounding open source licensing." -John Terpstra, Samba.org; cofounder, Samba-Team "Linux and open source software have forever altered the computing landscape. The important conversations no longer revolve around the technology but rather the business and legal issues. Rosen's book is must reading for anyone using or providing open source solutions." -Stuart Open Source Development Labs A Complete Guide to the Law of Open Source for Developers, Managers, and Lawyers Now that open source software is blossoming around the world, it is crucial to understand how open source licenses work-and their solid legal foundations. Open Source Initiative general counsel Lawrence Rosen presents a plain-English guide to open source law for developers, managers, users, and lawyers. Rosen clearly explains the intellectual property laws that support open source licensing, carefully reviews today's leading licenses, and helps you make the best choices for your project or organization. Coverage includes: Explanation of why the SCO litigation and other attacks won't derail open source Dispelling the myths of open source licensing Intellectual property law for nonlawyers: ownership and licensing of copyrights, patents, and trademarks "Academic licenses": BSD, MIT, Apache, and beyond The "reciprocal bargain" at the heart of the GPL Alternative licenses: Mozilla, CPL, OSL and AFL Benefits of open source, and the obligations and risks facing businesses that deploy open source software Choosing the right license: considering business models, product architecture, IP ownership, license compatibility issues, relicensing, and more Enforcing the terms and conditions of open source licenses Shared source, eventual source, and other alternative models to open source Protecting yourself against lawsuits
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 200
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: There's a new browser in town: Firefox is quickly becoming a leading alternative to Microsoft Internet Explorer. If you are new to Firefox and want to see what all the buzz is about, Firefox and Thunderbird: Beyond Browsing and Email is the guide that you need. By focusing on how to configure and customize Firefox and Thunderbird, this book will show you how to quickly get a hold of the less intuitive features that most new users struggle to figure out. You will discover which of Firefox's many options should be adjusted, which shouldn't, and how to locate many hidden preferences that will ultimately create a better browsing experience. The author's tips and tricks will teach you how to adjust the browser's appearance and behavior, and how to install the most popular extensions to maximize the browser's performance. You'll also be introduced to Firefox's e-mail client companion, Thunderbird. You'll cover Thunderbird's built-in spam filters, calendar, and customizeable layout and toolbars. Personalize your e-mail with tips and tricks dedicated to getting the most out of Thunderbird, and learn how to make it work together with Firefox for a seamless online experience. You can even find out how to contribute to the development of Firefox and Thunderbird. A special section on Web development will show you how you can add new extensions, themes, and customizations to each one and make an impact on the future of Firefox and Thunderbird.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...